Endpoint Security
The best Endpoint Security Products based on votes, our collection of reviews, verified products and a total of 96 factors.
Best Endpoint Security Products in 2025
- Open-Source Endpoint Security products
-
Filter by related categories:
-
Prey is the simplest and most reliable solution for tracking, data protection & management for Windows, Mac, and mobile devices. Track with precise location, wipe, reset and secure devices across all platforms. .
Key Prey features:
Cross-platform compatibility Real-time tracking Remote management features User-friendly interface
-
Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
Key Symantec Endpoint Encryption features:
Comprehensive Encryption Centralized Management Industry Compliance Strong Authentication
-
Remote Wipe on any operating system in one place using DriveStrike. Data Breach Protection for your laptop, smartphone, and tablet.
Key DriveStrike features:
Cross-Platform Compatibility Remote Wipe Remote Lock and Locate GDPR and HIPAA Compliant
-
Cylance is an endpoint security platform that detects, prevents and blocks threats.
Key Cylance features:
Advanced AI Technology Low System Impact Behavior-based Detection Ease of Deployment
-
Kaspersky offers security systems designed for small business, corporations and large enterprises.
Key Kaspersky Endpoint Protection features:
Comprehensive Security Features Advanced Threat Detection Centralized Management Ease of Deployment
-
Endpoint visibility and control, vulnerability and patch management, threat detection and response.
Key SecPod features:
Comprehensive Vulnerability Management Automated Patching Ease of Deployment Continuous Monitoring
-
Sophos Endpoint Protection helps secure your workstation.
Key Sophos Endpoint Protection features:
Comprehensive Security Cloud-based Management Real-time Threat Intelligence Device Control
-
Partner Portal.
Key CB Response features:
Comprehensive Endpoint Visibility Advanced Threat Detection Rapid Incident Response Integration with Security Tools
-
iAlertU is an alarm system for your Apple MacBook that uses the built in motion detection to...
Key iAlertU features:
Security Feature Remote Notifications Customization User-Friendly Interface
-
HiddenApp gives organizations 24/7 visibility of their IT devices using track, trace & locate capabilities, all manageable from one simple user-friendly dashboard. .
Key HiddenApp features:
Device Location Tracking Multiple Device Management Sneak Peek Feature Remote Data Wipe
-
Carbon Black Response is an incident response and threat hunting solution.
-
Theft-recovery tracking opensource software.
Key Pombo features:
Open Source Cross-Platform Active Development Community Support
-
Find My can help you locate your devices and your friends and family.
Key Find My features:
Device Tracking Find Friends Activation Lock Offline Finding