17 years helping Australian businesses choose better software
Endpoint Protection Software
Endpoint Protection software gives IT professionals the tools they need to protect their networks and assets from targeted attacks, malware, and other threats.
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Australia, Austria, Belgium, Canada, Denmark, Finland, France, Germany, Indonesia, Ireland
, Israel, Italy, Malaysia, Netherlands, New Zealand, Norway, Philippines, Poland, Portugal, Qatar, Saudi Arabia, Singapore, Spain, Sweden, Switzerland, Thailand, United Arab Emirates, United Kingdom, United States
and 19 others
Languages
Danish, Dutch, English, French, German, Italian, Norwegian, Polish, Portuguese, Russian
, Spanish, Swedish
and 2 others
This information was sourced from ManageEngine Endpoint DLP Plus
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from ManageEngine Endpoint DLP Plus
Who Uses ManageEngine Endpoint DLP Plus?
Endpoint DLP Plus can be used for any industry like finance and insurance. The product is particularly useful in health industry, for the ability to...
"iPhone, Android, Linux, and Macintosh are all supported devices for this VPN, which allowed me to..."
Read the full review
Mas Idayu
Information Technology Assistant in Malaysia
This information was sourced from NordLayer
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of NordLayer
Pros:
I love the easiness of adding new users, and adding subscriptions. Simple billing and online portal.
Read more
Cons:
Counting the time spent on a machine or in a group over a given period is problematic. Last week, it was impossible to identify whose computers had been accessed.
Read more
Australia, Canada, France, Germany, India, Ireland, Israel, Italy, Malaysia, Mexico
, Netherlands, New Zealand, Philippines, Romania, Singapore, South Africa, Türkiye, United Arab Emirates, United Kingdom, United States
and 10 others
"I am overall very satisfied with Trellix Endpoint Security. As end user I feel safe about my data..."
Read the full review
Przemek
Lead, Infrastructure Specialist in Poland
This information was sourced from Trellix Endpoint Security
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of Trellix Endpoint Security
Pros:
Customer Support is pleasant and quick to reply. The program is constantly being updated.
Read more
Cons:
The expense incurred in the protection against cyber security attack is a trade-off of having an unused personal computer. It is a burden for low income level people.
Read more
This information was sourced from Trellix Endpoint Security
Who Uses Trellix Endpoint Security?
Endpoint protection solution that helps businesses of all sizes with threat prevention, application containment, machine learning analysis. and...
"Stops a lot of malware sites. Blocks malware popups and does not slow down the computer"
Read the full review
Natan
Coder in Spain
This information was sourced from ESET Endpoint Security
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of ESET Endpoint Security
Pros:
Ease of use, quick installation, frequent database update, integrate seamlessly.
Read more
Cons:
The disadvantages it has are: it analyzes a few files (zip, ace, rar), the options it has been limited. Sometimes has problems detecting compressed programs; some files do not disinfect them.
Read more
This information was sourced from ESET Endpoint Security
Who Uses ESET Endpoint Security?
ESET Endpoint Security offers a cloud-based and on-premises application for any size company that requires comprehensive protection for their devices.
"It is a protection system with very broad capabilities, it protects us from ransomware, phishing..."
Read the full review
Idaly
Project Manager in US
This information was sourced from Symantec Endpoint Security
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of Symantec Endpoint Security
Pros:
Ability to create groupings and assign each group their own individual protection scheme. Ease of localized and remote deployment with active directory integration.
Read more
Cons:
It had the worst update "additional" app which worked for about 20% of time. It is heavy on resources.
Read more
This information was sourced from Symantec Endpoint Security
Who Uses Symantec Endpoint Security?
IT Security Professionals: Small, Midsize, and Enterprise Organizations
"Overall, the platform works well. I've had no issues with security - either to the main account or..."
Read the full review
Vin
IT Director in US
This information was sourced from LogMeIn Central
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of LogMeIn Central
Pros:
It has everything you need to manage your computer remotely. It's very easy to use and it can help you transfer data without the need to log into the other computer and interrupt the user.
Read more
Cons:
There is poor support for Mac. The software for Mac doesn't support chat.
Read more
This information was sourced from LogMeIn Central
Who Uses LogMeIn Central?
Small Business, Mid Size Business, and Large Enterprises in Internal IT, MSPs, and Tech Support organizations.
"The major problem of whole IT industry that it is helping to keep our local org environment secure,..."
Read the full review
Er Avinash
Technical support engineer in India
This information was sourced from FortiClient
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of FortiClient
Pros:
I was invited as a user to install, configure and use this VPN software. I received all the instructions by email and for me, my area of expertise is technical support, it was very easy.
Read more
Cons:
Its security features as its annoying and pop ups frequently. As we have other antivirus its not of any use.
Read more
This information was sourced from FortiClient
Who Uses FortiClient?
Endpoint protection solution that enables small and medium businesses to manage software & hardware inventory via vulnerability management, client...
"For several years, WebTitan has supported us with a reliable web filtering tool that has served us..."
Read the full review
Nabila
Human Resources Manager in Malaysia
This information was sourced from WebTitan
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of WebTitan
Pros:
The platform is very easy to use, simple interface easy to navigate.
Read more
Cons:
I cannot seem to get it to show the same list of blocked attempts in the email. I can only get a block count by category along with a unique domain count.
Read more
This information was sourced from WebTitan
Who Uses WebTitan?
This is a business solution for any business that wants a vital security layer at the HTTP and HTTPS layer and wants to control web content.
"Outstanding performance over the 3 year period that I used it. Once my data was uploaded (it took..."
Read the full review
Ray
Research and Cultural Consultant, Editor/writer, interpreter. in Canada
This information was sourced from CrashPlan
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of CrashPlan
Pros:
Enterprise class features like (Active) Directory integration and storing encryption keys on-site while using cloud backup.
Read more
Cons:
Downloading files, viewing them, archiving and many other functions are impossible. Beyond that I was double charged two different times for two separate companies that I manage.
Read more
This information was sourced from CrashPlan
Who Uses CrashPlan?
Web-based data protection tool that enables IT professionals and small businesses to manage back up of user files, external hard drives, and NAS...
"Splunk is a powerful and useful monitoring tool. Splunk's efficiency is enhanced by the ability to..."
Read the full review
Shayla
Human Resources Specialist in US
This information was sourced from Splunk Enterprise
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of Splunk Enterprise
Pros:
When you need to store, correlate, and search large amounts of data, especially System Log data, there is no tool that even comes close to Splunk. It's power and flexibility is amazing.
Read more
Cons:
So, first time user it can be difficult to use it.
Read more
This information was sourced from Splunk Enterprise
Who Uses Splunk Enterprise?
AI-powered solutions for security and observability that accelerate detection, investigation and response. Supported by an enterprise-class platform...
Australia, Brazil, Canada, China, France, Germany, India, Japan, Mexico, Netherlands
, New Zealand, Singapore, United Kingdom, United States
and 4 others
Languages
Chinese, English, French, German, Italian, Japanese, Korean, Portuguese, Russian, Spanish
, Traditional Chinese
and 1 others
"Best solution that you can even sell over other AVs as an add on even if they are on a current..."
Read the full review
Daniel
Managing Partner in US
This information was sourced from Intercept X Endpoint
Device Management
Activity Tracking
Application Security
Compliance Management
Encryption
This information was sourced from verified user reviews of Intercept X Endpoint
Pros:
DLP(Data Lost Prevention) features are useful and easy to implement on workstations. Useful Web application filter to implement specific rules to users and/or equipments.
Read more
Cons:
Portal and setup can be confusing with not too much concise and simple documentation.
Read more
This information was sourced from Intercept X Endpoint
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.