Header banner
Revain logoHome Page

Endpoint Protection

All results
keysure logo
Revainrating 4.5 out of 5

2 Review

B2B keyholding and alarm response provider.

thinair logo
Revainrating 4.5 out of 5

2 Review

ThinAir is the next generation Endpoint Data Visibility technology that gives you complete intelligence about every information in your organization.

huntress logo
Revainrating 4.5 out of 5

2 Review

The endpoint detection and remediation market is a crowded space with several great options for large organizations. However, most require analysts with security expertise, only integrate with enterprise products, and come at a steep price point.

i24r logo
Revainrating 4.5 out of 5

2 Review

i24R Protects from Ransomware. i24R shield protects confidential files from unauthorized users.

cloud os logo
Revainrating 4.5 out of 5

2 Review

Cloud OS is a "super app" for everyone. OS Administration features allows user management, role hierarchy customization, and entity settings.

valt.x cyber security for windows logo
Revainrating 4.5 out of 5

2 Review

Valt.X Cyber Security for Windows is antivirus software that protects computers from various types of threats.

g data endpoint protection logo
Revainrating 4.5 out of 5

2 Review

G Data Endpoint Protection helps protect clients directly from threats and exploiting vulnerabilities, including proactive protection against malware, including an effective client firewall and efficient patch management to prevent vulnerabilities in installed programs from becoming an attacker's gateway.

rocketcyber cloud platform logo
Revainrating 4.5 out of 5

2 Review

Designed from the ground up for the managed service provider. Delivered as a Software-as-Service from the cloud to customer endpoints, RocketCyber helps MSPs streamline detection and response capabilities and build security into monthly core services.

third wall logo
Revainrating 4.5 out of 5

2 Review

Dangerous end users with too much privilege. Unused, often obsolete, protocols. Unauthorized software. With Third Wall, you can lock down, enforce policies and passwords, eliminate many gaping vulnerabilities.

ansa logo
Revainrating 4.5 out of 5

2 Review

ANSA is a patch management software that allows for cross-platform capabilities, reporting on every device within the enterprise, and deploying custom applications.

alarmkey logo
Revainrating 4.5 out of 5

2 Review

AlarmKey is a security system installer software that manages operations, customer service, accounting, business analysis and planning inefficient, cost-effective ways.

security logo
Revainrating 4.5 out of 5

2 Review

OPAQ is the premier network security cloud company that enables partners to deliver security-as-a-service to mid-size enterprise customers. With the OPAQ Cloud, service providers can deliver Fortune 100-grade network security and centrally manage and enforce policies through a single interface while optimizing networking performance. This empowers…

Read more about this company
bitdefender gravityzone logo
Revainrating 4.5 out of 5

2 Review

Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.

malwarebytes for business logo
Revainrating 4.5 out of 5

2 Review

Malwarebytes is the cybersecurity company that millions worldwide trust. Malwarebytes proactively protects organizations and their employees against advanced malicious threats, including ransomware, that traditional antivirus tools and other endpoint protection products miss. Driven from the cloud through a single pane of glass, Malwarebytes solutions…

Read more about this company
bluvector pulse logo
Revainrating 4.5 out of 5

2 Review

BluVector Pulse delivers a fully turnkey sense and respond platform, automating the health and heartbeat monitoring and device management of the market-leading BluVector Cortex offering.

cebox logo
Revainrating 4.5 out of 5

2 Review

ceBox is a connected PC solution that lets users pilot all desktops centrally without any third-party solution needed. Offered as a monthly subscription service, the ceBox offer includes the Intel NUC, centralized management of NUC kits as well as proactive support.

getform logo
Revainrating 4.5 out of 5

2 Review

Form endpoints to manage the backend of your online webforms.

hysolate logo
Revainrating 4.5 out of 5

2 Review

Hysolate is revolutionizing enterprise endpoints, resolving the conflict between security and productivity. We bring air gap security to the enterprise and at the same time free knowledge workers from past usage restrictions.

seculution application whitelisting logo
Revainrating 4.5 out of 5

2 Review

The secure and reliable protection against any malware is Application Whitelisting. It defines what can be executed. Anything else cannot be started.

arcadia snow logo
Revainrating 4.5 out of 5

2 Review

SNOW is an endpoint detection/response solution in the form of a lightweight cross platform sensor. Operating on a host based managed system, it proactively searches through networks 24/7 to provide the ultimate protection against todays most sophisticated cyber security threats.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.