Best Endpoint Management Software

Endpoint management software products help users keep track of devices in a system and ensure their software is secure and up to date. Typical features of endpoint management products are asset management, patch management, and compliance evaluation. Companies use these tools to make sure no unapproved devices are linked to the system. They also use these products to ensure each endpoint device has up-to-date software that has been patched properly to prevent intrusion. These tools have many overlapping features with vulnerability management and mobile device management (MDM) products. Endpoint management solutions simply have a wider scope of capabilities than vulnerability management tools including device governance and device compliance. While endpoint management software helps secure all sorts of endpoints, MDM tools typically only manage remote workers and mobile devices.

To qualify for inclusion in the Endpoint Management category, a product must:

  • Manage endpoint assets connected to a network
  • Manage patch updates and ensure device compliance
  • Detect new or suspicious devices connected to a network
  • Have the ability to install new operating systems or applications to an endpoint device
G2 Crowd Grid® for Endpoint Management
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction

Get personalized Endpoint Management recommendations

1
2
3
Compare Endpoint Management Software
    Results: 80

    Filters
    Star Rating

    Endpoint Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.


    LogMeIn Central is a pure, cloud-based endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. ​Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.


    inSync provides a comprehensive IT solution for protecting and governing enterprise data being managed by today’s mobile workforce, thereby enabling IT with visibility and control over mobile data without compromising end-user productivity. Designed from the ground up as a unified on-prem or cloud solution, inSync offers rich features like seamless, enterprise-grade backup for endpoints and cloud applications, secure file-sharing, data loss prevention (DLP), and data governance capabilities. In addition to providing tamper-proof audit trails of user and admin activities, inSync uniquely collects and preserves custodian data to easily administer legal holds with an interface for data ingestion into any eDiscovery system for businesses that need to address their compliance and eDiscovery needs. Explore the virtual tour: http://www.druva.com/insync/virtual-tour About Druva Druva is the leader in cloud data protection and information management, leveraging the public cloud to offer a single pane of glass to protect, preserve and discover information - dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva’s award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry's fastest growing data protection provider, Druva is trusted by over 4,000 global organizations and protects over 53 PB of data.

    Druva inSync Reviews
    Optimized for quick response

    Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks


    AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.


    Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.


    VIPRE products are designed to defend against evolving threats without compromising the needs of modern business. We offer flexible cloud configurations for rapid, affordable deployment, plus native mobile interfaces that enable instant threat response—anywhere, anytime. Add in our consistently high ratings from the world’s most widely-trusted independent testing labs, and it’s no wonder that millions of global users depend on VIPRE for a complete approach to cybersecurity. - VIPRE Endpoint Security- Cloud or Server Edition - VIPRE Email Security- Cloud Edition - VIPRE Site Manager (for MSPs)


    Cb Protection is the strongest security possible for data centers and critical systems. Using a ‘Default Deny’ approach, Cb Protection reduces your attack surface with a single security agent and reduces downtime by automating approval of trusted software and eliminating the burden of whitelist management. and drives automatic approvals through IT-driven policies, as well one of the most extensive trust and reputation databases in the world. Cb Protection helps organizations achieve continuous compliance across every regulatory framework. It does this in a highly scalable manner that minimizes IT overhead, allowing a single admin to manage up to 10,000 endpoints.


    Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.


    Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector-by-sector, ensuring that all files are encrypted. In addition to protecting laptops and desktops, Endpoint Encryption supports various types of removable media including USB drives, external hard drives, and CD/DVD/Blu-ray media. With Symantec, removable media users can access their data on any Windows or Mac system, even if encryption isn’t installed on the machine.


    Ivanti Management Suite increases user and IT productivity. It helps you establish intelligent, integrated control over your user’s multi-platform desktops and mobile devices. Empower administrators to automate software and operating systems deployments, quickly fix user issues, and discover software assets. Management Suite provides foundational data and actions that integrate with multiple Ivanti solutions within a unified management experience—reducing operational overhead and delivering a quick ROI.


    ESET’s Endpoint Security solutions leverage a multilayered approach that utilizes multiple technologies working in a dynamic equilibrium, which has the ability to constantly balance performance, detection and false positives. ESET Security Management Center can be installed on Windows, Linux or via Virtual Appliance. After install, all management is done via a web-console, allowing easy access and management from any device or operating system. All ESET Endpoint products despite the OS can be managed from a single ESET Security Management Center instance. In addition, ESET Security Management Center supports full Mobile Device Management (MDM) of Android and iOS devices. Multiple users and permission groups can be created to allow access to a limited portion of the ESET Security Management Center instance. This allows full streamlining of responsibilities across large enterprise teams.

    ESET Endpoint Security Reviews
    Optimized for quick response
    Get a Quote

    Ivanti Endpoint Security for Endpoint Manager prevents, detects, and remediates even the most sophisticated ransomware and other threats, protecting your users, systems, and critical data. Multi-layered defenses automate discovery, inventory, patch management, and application and device control. You can also isolate infected devices, take action to keep running malware from spreading, and provide the data business leaders need to swiftly assess and update the security strategy. And because our solution integrates with Ivanti Endpoint Manager, powered by LANDESK, you can secure your environment from the management console you're already using—saving you time and increasing control over the extended enterprise.


    Comodo provides Advanced Endpoint Protection Solution for Small Medium Enterprise that solve malware problem quickly with complete security from known and unknown threats from automatic containment and crowd-sourced intelligence knowledge base.


    Avast is the global leader in next-gen cyber security products for consumers and businesses and protects over 400 million people online. Avast offers products under the Avast and AVG brands, that protect people from threats on the internet with one of the most advanced threat detection networks in the world. Avast digital security products are top ranked for mobile, PC and Mac. For businesses, Avast offers comprehensive antivirus security that keeps your devices, data, and employees safe from the latest cyber threats. Work and browse confidently from anywhere knowing your business is completely protected. If you are a MSP or VAR, you can also deliver enhanced managed services to your customers and take your business even further. Just choose from our Avast CloudCare cloud-based protection solution or our full-stack, remote monitoring and management platform.


    Trend Micro endpoint application Control allows to enhance your defenses against malware and targeted attacks by preventing unknown and unwanted applications from executing on your corporate endpoints.


    Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise.


    Rippling makes it easy to manage your employee's payroll, benefits, HR and even IT — from their computers to their software — all in one, online platform. Hiring someone, for example? Through Rippling, you can: invite your new hire to e-sign their agreements, add them to payroll and benefits, order and configure their computer, and create their user account in over 300 apps — like Gmail, MS Office, Slack, Salesforce, and Dropbox. All in just a few clicks.


    Absolute delivers adaptive endpoint security and data risk management solutions for computers, laptops, tablets and smartphones. Persistence® technology by Absolute provides a reliable two-way connection with mobile devices to confidently secure mobility. Persistence technology is embedded into core of devices from global manufacturers.


    CloudCare is a free, cloud-based, endpoint security administration platform that makes it significantly faster and easier to monitor threats, resolve issues, and deliver multiple layers of protection to your customers.


    Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.


    User Device Tracker know when and where users and endpoint devices are connected to your network


    Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.


    ForeScout CounterACT is a physical or virtual security solution that dynamically identifies and evaluates physical and virtual network infrastructure, devices and applications the instant they connect to your network.


    Heimdal Corporate manages your network security from a single easy-to-use interface to keep cyber-criminals and data stealing malware away from sensitive data.


    IGEL’s endpoint management software is designed to allow users to convert any x86 device and control every PC from one easy-to-manage platform.


    ManageEngine Patch Manager scans endpoints to detect missing patches, tests patches before deployment to mitigate security risks automates patch deployment to OS and 3rd party applications, audits and reports for better visibility and control.


    View student screens in real-time from the ScreenView Teacher Station. Custom thumbnail arrangement allows teachers to organize screens to match classroom layout.


    ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage. Administrators can use one management console to centrally enforce, administer, and update malware protection on every server throughout an organization. This robust solution enables enterprises to secure the entire server file system including compressed archives, distribute virus patterns to remove any viruses that get through, and help automate the damage cleanup process to resolve problems left by virus infections.


    Complete security that includes encryption, web filtering and patch assessment


    The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.


    Boost the performance and responsiveness of your virtual desktop infrastructure without compromising security. Use the agentless protection features of Symantec Endpoint Protection for VDI to shift the core threat protection processes to a dedicated security virtual appliance and reduce the network and CPU resources required by the virtual desktop.


    Manage, control and secure network access for all authenticated users on Windows Active Directory Network


    Micro Focus ZENworks Endpoint Security Management (formerly Novell ZENworks Endpoint Security Management) is a location-aware, policy-based solution that protects the data on every PC, controls how endpoints communicate and access information, and monitors and maintains the health of endpoint devices all from a single console.


    AccessPatrol is an endpoint protection software that provides a proactive solution for securing company endpoints to prevent the illicit transfer of data to unauthorized devices.


    AppGate Insight automatically and continuously discovers all assets in your virtual fabric, allows the grouping of these assets into logical TrustZones and visualizes asset relationships and the east-west traffic flows between them for improved analytics.


    The Argos Online Asset Protection platform scans your digital footprint to produce alerts and reports for malicious activities. These include: defacements, spamming, malware drop-off, links to phishing sites, account takeover, and more. Once a malicious activity is identified, alerts are disseminated automatically for immediate mitigation, or in some cases, mitigated automatically.


    Bromium has pioneered a completely new approach to defeat cyber attacks in real time and provide unmatched threat intelligence hardware-enforced isolation.


    Bufferzone is a patented containment solution designed to defend endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.


    53% of breaches do not use malware. Streaming prevention through Cb Defense goes beyond machine-learning AV to stop all types of attacks before they compromise your systems. Cb Defense, with its breakthrough prevention model, market-leading detection and response capabilities and single lightweight agent, is the future of next-gen antivirus.


    ceBox is a connected PC solution that lets users pilot all desktops centrally without any third-party solution needed. Offered as a monthly subscription service, the ceBox offer includes the Intel NUC, centralized management of NUC kits as well as proactive support.


    Clearswift Critical Information Protection is a software that enable organizations and individual users to securely collaborate by applying centralized information management policies to include the endpoint, i.e. laptops and desktops.


    Cynet converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.


    Endgame Platform is an endpoint security platform that prevents all device compromise, stops ongoing attacks, and automates the hunt for the next generation of attacks.


    enSilo offers a complete endpoint security and malware protection solution, designed to stop malware post-infection real-time from causing harm and tampering or exfiltrating data from endpoints.


    The ESET Direct Endpoint Management Plug-in for ConnectWise Automate is developed by ESET in cooperation with ConnectWise to deploy, manage and report on ESET endpoint products within your ConnectWise Automate Console.


    Falcon Complete™ changes the game by making endpoint security powerful and easy for all organizations. Falcon Complete combines CrowdStrike’s industry-leading protection technologies with the people, expertise and processes necessary to provide the most effective, worry-free approach to endpoint security.


    CrowdStrike® Falcon® Device Control™ allows administrators to control USB devices used in their environments and reduce associated risks.


    CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.


    FireEye Endpoint Security (HX series) products provide organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise that routinely bypass signature-based and defense-in-depth security systems.


    Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. Identify and remediate vulnerable or compromised hosts across your attack surface.


    Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.


    Hawkeye offers a single Web based interface which scales to monitor hundreds of endpoints anywhere in the world. Endpoints sit at remote sites (e.g. branch office or home) and at a data center, headquarters, private or public cloud. They generate synthetic traffic to inject into and receive from the live network, reproducing real users traffic patterns. The synthetic traffic is processed for objective quality metrics and used for insights.


    Hysolate is revolutionizing enterprise endpoints, resolving the conflict between security and productivity. We bring air gap security to the enterprise and at the same time free knowledge workers from past usage restrictions.


    IBM® BigFix® addresses a major challenge faced by many organizations — how to gain full visibility into the constantly changing endpoint landscape while bridging the gap between threat detection and remediation. See clearly: Discover and audit endpoints on or off the corporate network. Detect evasive attacks with behavioral analytics. Understand completely: Guided investigations to define the scope of detected attacks. Define what remediation action you need to take. Act precisely: Immediately contain and remediate attacks enterprise-wide. Continuously reduce your attack surface.


    MaaS360 with Watson is the industry’s first and only cognitive unified endpoint management (UEM) platform, enabling a smarter approach for enterprises to manage and secure all endpoints plus their users, apps and content. MaaS360 can be used to manage disparate endpoint types—including smartphones, tablets, laptops, ruggedized devices and the Internet of Things (IoT)—all from a single console.


    HUNT- quietly and continuously inspects your endpoints, hunting threats capable of evading even the world's most advanced cybersecurity detection technologies.


    Instant performance assessment of complex networks in pre and post deployment


    Replace your manual processes, non-integrated point solutions, or overly complex software suite with the industry’s most comprehensive endpoint systems management solution and give your IT team more time to innovate. KACE fast-to-implement, easy-to-use systems management and deployment solutions provision, manage, secure, and service your growing organization’s network-connected devices, including Windows PCs, Macs, Chromebooks, tablets, Linux, UNIX, and Windows Servers, printers, storage and the internet of things (IoT), while delivering rapid return on investment. And, to add more value to your endpoint systems management solution, explore KACE Essential Services.


    A comprehensive endpoint solution that prevents attacks through trickery and deception.


    The leader in security and management for mobile apps, documents, and devices, MobileIron's mission is to enable organizations around the world to embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness. More than 5,000 companies rely on MobileIron’s scalable architecture, rapid innovation, and best practices for their mobile initiatives. Global companies, including 8 of the top 10 automotive manufacturers, 7 of the top 10 pharmaceutical companies, 5 of the top 10 banks, 5 of the top 10 law firms, and 4 of the top 10 retailers, rely on MobileIron for their Mobile First initiatives. For more information, please visit www.mobileiron.com.


    NetSupport DNA features a wealth of components including: automatic discovery of devices; hardware and software inventory; change tracking; and user and software license management. Building on the flexibility of a single solution, NetSupport DNA also includes as standard: energy monitoring; power management; USB endpoint security; printer monitoring; application and internet metering; a flexible alerting suite; and an easy-to-use software distribution module. NetSupport also offers optional service desk and remote control modules.


    NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.


    Observable Networks Dynamic Endpoint Modeling solution lets you see these different behaviors so you can quickly take effective action.


    PEM inspects every aspect of endpoint assets not just what's currently running in memory and provides detailed context so that you can detect threats before they are causing problems for your Enterprise not after the damage was done.


    This tool monitors all external storage devices that are connected to PCs, preventing internal data breach.


    The secure and reliable protection against any malware is Application Whitelisting. It defines what can be executed. Anything else cannot be started.


    OPAQ is the premier network security cloud company that enables partners to deliver security-as-a-service to mid-size enterprise customers. With the OPAQ Cloud, service providers can deliver Fortune 100-grade network security and centrally manage and enforce policies through a single interface while optimizing networking performance. This empowers partners to instantly grow their revenue and margins and establish a competitive advantage while eliminating complexity and costs associated with managing a multitude of products.


    Sentinel's managed intrusion detection and prevention systems relieve the burden of security for businesses.


    Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.


    Smartguard is software designed to manage internet, bandwidth and network security.


    The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks.


    Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing, patching, and securing desktops and laptops so organizations can reduce the cost and effort of managing Windows, Mac, Linux, and virtual desktop environments. Client Management Suite 8.0 brings significant new functionality and enhancements to this already feature rich solution. Before covering what’s new in version 8.0, here’s a quick overview of some of the key capabilities of Client Management Suite. Key Deployment features include: - Scalable, enterprise deployment for desktops and laptops across Windows, Mac, and Linux - Web console, well suited for distributed access and detailed security models - Support for Windows PE and Linux pre-boot environments - Support for hardware independent image deployments - Hands-free migration - Ability to configure new systems using imaging, scripting, or a combination of both Key Patch Management features include: - Support for Windows, Mac, and Linux operating systems - Support for 50+ non-Microsoft applications - Support for remote and disconnected users - Patch automation - Complete audit trail and reporting


    Symantec Ghost Solution Suite is an award-winning software solution for imaging and deploying desktops, laptops, tablets and servers. Quickly and easily migrate to the latest operating systems, perform custom configurations and deploy software across hardware platforms and operating systems.


    Tachyon is an endpoint detection and response solution, designed to transform urgent ad-hoc issue identification and resolution time from hours to minutes.


    ThinAir is the next generation Endpoint Data Visibility technology that gives you complete intelligence about every information in your organization.


    TSP is a complete device security solution, delivering a proven, scalable set of services.


    User Management Module (UMM) is BlueSoft answer to fulfill needs in growing demand for an innovative tool for identity access management, security compliance and consolidated credentials to each application in organization. UMM is based on the best practices in field of Customer Identity and Access Management ( CIAM) implemented standardized communication and advanced approach to data encryption. User Management Module allows to manage availability of individual elements of application according to granted roles for and individual user. Solution is tailored to support changing organization needs in the field of market diversity and is very useful in case of gain competitive advantage. UMM ensures high availability achieved with installation of redundant instanced of each component into separate availability zones. Situation such as failure of a single server or single database will not affect availability of the whole solution. Advantages of User Management Module (UMM) implementation: • Introducing a corporate standard for managing identity and access to commercial applications • Unified mode of action to modify user data • Significant reduction of costs and time necessary to build new web and mobile solutions • Flexible access control configuration on the domestic and application level due to the use of a decision rule engine • Flexible management of granted credentials and available subscriptions • Processing hundreds of thousands of log-ons (average log time ~0,5 second) • Standardized way of exchange user data • Different stages of user management depends on the size of an organization and dedicated way to communicate (direct or indirect) • Implementation of flexible models of user registration according to valid legal standards and business model • Provide specific information about user profile and connected components using standardized set of REST API • Unified user profile. Detailed user data available to preview to support following actions: data mining, segmentation, reporting and statistics.


    Valt.X Cyber Security for Windows is antivirus software that protects computers from various types of threats.


    Votiro Disarmer for removable devices eliminates this high risk by detecting and scanning every plugged-in device for known and unknown malware and neutralizing any zero-day exploit that might be hidden as a payload on those removable devices.