---
description: Discover the best Endpoint Protection Software in Ireland. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Endpoint Protection Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)

# Endpoint Protection Software

Canonical: https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software

Page: 1 / 8\
Next: [Next page](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software?page=2)

-----

## Products

1. [Heimdal Ransomware Encryption Protection](https://www.softwareadvice.ie/software/242919/heimdal-ransomware-encryption-protection) — 4.8/5 (4 reviews) — Ransomware Encryption Protection by Heimdal is a revolutionary 100% signature-free component, ensuring market-leading...
2. [NinjaOne](https://www.softwareadvice.ie/software/349671/ninjarmm) — 4.7/5 (284 reviews) — NinjaOne is an IT management software platform designed to consolidate various IT operations into a single console. I...
3. [JumpCloud Directory Platform](https://www.softwareadvice.ie/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (267 reviews) — JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or ...
4. [Netwrix Endpoint Protector](https://www.softwareadvice.ie/software/11310/endpoint-protector-4) — 4.4/5 (8 reviews) — Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux comp...
5. [Tanium](https://www.softwareadvice.ie/software/84240/tanium) — 4.2/5 (5 reviews) — Tanium delivers autonomous IT and is built for organizations that need real-time visibility and reliable control acro...
6. [Heimdal Next-Gen Endpoint Antivirus](https://www.softwareadvice.ie/software/242918/heimdal-next-gen-endpoint-antivirus) — 4.8/5 (12 reviews) — Heimdal Next-Gen Endpoint Antivirus is an advanced antivirus solution with next-generation capabilities. Its unmatche...
7. [Versa SASE](https://www.softwareadvice.ie/software/421450/versa-sase) — 5.0/5 (1 reviews) — At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads \&amp; app...
8. [TeamViewer ONE](https://www.softwareadvice.ie/software/99131/teamviewer) — 4.6/5 (11624 reviews) — TeamViewer is a digital workplace platform designed for remote desktop access, IT support, and device management. It ...
9. [Rippling](https://www.softwareadvice.ie/software/410674/rippling) — 4.9/5 (4680 reviews) — Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operatio...
10. [Malwarebytes for Business](https://www.softwareadvice.ie/software/354549/malwarebytes-for-business) — 4.7/5 (2514 reviews) — Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwar...
11. [1Password](https://www.softwareadvice.ie/software/123595/1password) — 4.7/5 (2124 reviews) — 1Password protects and stores all company secrets beyond SSO such as passwords, security tokens, 2FA codes, documents...
12. [Trellix Endpoint Security](https://www.softwareadvice.ie/software/166867/mcafee-endpoint-security) — 4.2/5 (1805 reviews) — McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (S...
13. [ManageEngine Endpoint Central](https://www.softwareadvice.ie/software/117339/manageengine-endpoint-central) — 4.6/5 (1557 reviews) — ManageEngine Desktop Central is a mobile device management (MDM) solution designed to help businesses automate, secur...
14. [ESET Endpoint Security](https://www.softwareadvice.ie/software/134149/eset-endpoint-security) — 4.7/5 (1169 reviews) — ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This ver...
15. [Cisco AnyConnect](https://www.softwareadvice.ie/software/432039/cisco-anyconnect) — 4.6/5 (978 reviews) — Cisco AnyConnect is a cloud-based software, which helps businesses offer remote employees secure VPN access to an ent...
16. [Symantec Endpoint Security](https://www.softwareadvice.ie/software/194173/symantec-endpoint-protection-small-business) — 4.4/5 (548 reviews) — Symantec Endpoint Security is a cybersecurity defense suite specifically designed for needs of the small business. Co...
17. [Iru](https://www.softwareadvice.ie/software/71745/Iru) — 4.9/5 (479 reviews) — Iru is the AI-powered IT \&amp; security platform used by the world's fastest-growing companies to secure their users,...
18. [LogMeIn Central](https://www.softwareadvice.ie/software/232924/logmein-central) — 4.5/5 (333 reviews) — LogMeIn Central is a cloud-based endpoint management solution that enables IT professionals to monitor and manage the...
19. [FortiClient](https://www.softwareadvice.ie/software/299571/forticlient) — 4.4/5 (292 reviews) — FortiClient is a cloud-based endpoint protection Fabric Agent designed to help businesses of all sizes provide securi...
20. [WebTitan](https://www.softwareadvice.ie/software/159217/webtitan) — 4.5/5 (276 reviews) — WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also...
21. [CleanMyMac](https://www.softwareadvice.ie/software/269994/cleanmymac-x) — 4.7/5 (269 reviews) — CleanMyMac is a pack of tools for almost any Mac situation. It can free up space, detect duplicates, hidden apps, and...
22. [Splunk Enterprise](https://www.softwareadvice.ie/software/234262/splunk-enterprise) — 4.6/5 (260 reviews) — The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includ...
23. [CrashPlan](https://www.softwareadvice.ie/software/130789/crashplan) — 4.4/5 (249 reviews) — CrashPlan provides cyber resilience and data protection through a unified platform trusted by organizations worldwide...
24. [Action1](https://www.softwareadvice.ie/software/261079/action1) — 4.9/5 (237 reviews) — Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minute...
25. [Bitdefender GravityZone](https://www.softwareadvice.ie/software/121681/bitdefender) — 4.6/5 (222 reviews) — Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various...

-----

Page: 1 / 8\
Next: [Next page](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software?page=2)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.ie/directory/4528/security/software)
- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Vulnerability Management Software](https://www.softwareadvice.ie/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Anti-spam Software](https://www.softwareadvice.ie/directory/4581/anti-spam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)
- [All Categories](https://www.softwareadvice.ie/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4777/endpoint-protection-software/software> |
| en | <https://www.softwareadvice.com/category/4777-endpoint-protection/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4777/endpoint-protection-software/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software> |
| fr | <https://www.softwareadvice.fr/directory/4777/endpoint-protection-software/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@id":"https://www.softwareadvice.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Endpoint Protection Software","description":"Discover the best Endpoint Protection Software in Ireland. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software","about":{"@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#breadcrumblist"},"@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Best Endpoint Protection Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software#itemlist","@type":"ItemList","itemListElement":[{"name":"Heimdal Ransomware Encryption Protection","position":1,"description":"Ransomware Encryption Protection by Heimdal is a revolutionary 100% signature-free component, ensuring market-leading detection and remediation of any type of ransomware, whether fileless or file-based.\n\nIt can detect any encryption attempts without signatures or behavioral patterns. Your ransomware-free experience starts here. This module was engineered to be universally compatible with any antivirus. Ransomware Encryption Protection extends the functionality of your antivirus instead of displacing it.\n\nThe module’s built-in white- and blacklisting capacities, allows Ransomware Encryption Protection to distinguish between autonomic and routine system-wide processes and malicious attempts, thus decreasing the false-positive rate.\n\nRansomware Encryption Protection’s advanced reporting features derive invaluable digital forensics data such as process attack pathing, represented via bidimensional tree diagrams with stunning graphs, attacker’s origins, file connections, attempted kernel-level I\\O, read\\write operations, directory executions and file enumerations, CVE classification, impact severity, and more. \n\nThe auto-ruling system can help you contain the aggression before it spreads throughout your network via the block in firewall feature. For auditing purposes, the module offers an Export to CVS feature, allowing your SOC team to determine the origin, process callbacks, kernels accessed during the intrusion, and to model actionable network defense strategies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68e14fb1-f297-42fe-b8d9-b517e327d9cf.png","url":"https://www.softwareadvice.ie/software/242919/heimdal-ransomware-encryption-protection","@type":"ListItem"},{"name":"NinjaOne","position":2,"description":"NinjaOne is an IT management software platform designed to consolidate various IT operations into a single console. It provides tools for endpoint management, patching, automation, backup, and security. The platform is used by organizations in sectors such as technology, healthcare, government, education, and financial services to manage IT infrastructure and support their workforce.\n\nThe software includes endpoint management with centralized visibility and control across devices. It offers autonomous patch management powered by AI to streamline patching processes and mobile device management for Android and Apple devices with policy-based controls. Backup capabilities cover endpoints, servers, and SaaS applications, with compliance support for platforms such as Microsoft 365 and Google Workspace. Remote access is available with cross-operating system support, and service desk functionality includes automated ticketing with contextual information.\n\nNinjaOne adheres to enterprise-grade security standards, including FedRAMP Moderate Rev 5 authorization, SOC 2 certification, ISO 27001 compliance, and GovRAMP certification. The platform operates from a centralized console, enabling IT teams to manage devices, secure endpoints, and automate workflows. Additional features include documentation tools, script automation, and a developer API for customization and extended functionality.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/803a0498-8e27-4565-a80f-af93af1c6fc1.png","url":"https://www.softwareadvice.ie/software/349671/ninjarmm","@type":"ListItem"},{"name":"JumpCloud Directory Platform","position":3,"description":"JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys.\n\n\nProfessionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints.\n\n\nJumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7818866c-4066-4078-ba1a-03c0e105f11d.png","url":"https://www.softwareadvice.ie/software/180508/jumpcloud-directory-as-a-service","@type":"ListItem"},{"name":"Netwrix Endpoint Protector","position":4,"description":"Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more.\n\n\nIt features specialized modules that clients can pick and choose from based on their needs: Device Control (USB and peripheral port control), Content Aware Protection (safeguards data in motion), eDiscovery (scans data at rest), and Enforced Encryption (secures USB storage devices).\n\n\nWith the eDiscovery feature, data at rest stored on employees’ endpoints can be scanned based on specific file types, predefined content, file names, regular expressions or compliance profiles for regulations such as HIPAA, GDPR, and NIST. Based on the scan results, remediation actions like encrypting and deleting data can be taken.\n\n\nSupport is offered through online help portal.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/50c70f53-cdf3-4cdc-ac44-131126d30aa2.png","url":"https://www.softwareadvice.ie/software/11310/endpoint-protector-4","@type":"ListItem"},{"name":"Tanium","position":5,"description":"Tanium delivers autonomous IT and is built for organizations that need real-time visibility and reliable control across large endpoint environments. \n\nBy combining live endpoint intelligence with AI-driven workflows, Tanium helps IT and security teams quickly assess risk, manage endpoints, and take action at scale, all from a single platform. \nAutonomous IT. Unstoppable Business.  \n\nTanium equips IT and security teams to: \n\n• Improve endpoint visibility and security posture \n\n• Automate IT and security workflows \n\n• Respond quickly to issues across distributed environments \n\n• Reduce operational complexity by unifying tools and data \n\nTanium is a strong fit for organizations managing large, complex endpoint estates that require speed, accuracy, and confidence in their IT and security operations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d0504db4-3b71-47bb-bea1-9266f958deb5.jpeg","url":"https://www.softwareadvice.ie/software/84240/tanium","@type":"ListItem"},{"name":"Heimdal Next-Gen Endpoint Antivirus","position":6,"description":"Heimdal Next-Gen Endpoint Antivirus is an advanced antivirus solution with next-generation capabilities. Its unmatched threat intelligence combined with progressive forensics and firewall integration can enhance any company’s security through a complete endpoint detection and response (EDR) approach.\nHeimdal Next-Gen Endpoint Antivirus relies on signature-based code scanning. This means that it closely monitors the files that are transferred within an organization, protecting endpoints against a variety of cyber threats, including malware, ransomware, and APTs. The feature allows you to perform file scans actively in the background in real-time. Or, if you think that something suspicious is happening, you can run scheduled or on-demand scans for your endpoints and detect any unlawful activity. \nIn addition to signature-based code scanning, Heimdal Next-Gen Endpoint Antivirus also performs real-time cloud scanning. Known files are sent to the Heimdal database and run through advanced detection algorithms determined by machine learning. In this way, our NGAV can detect even the most robust cyber-threats out there, including much-dreaded polymorphic malware. \nFurthermore, Heimdal Next-Gen Endpoint Antivirus performs sandbox and backdoor analysis for files as well, which further mitigates risks within the organization. If the files that were scanned by their signature and in the cloud still do not appear as malware, they will be isolated in our sandboxing system and further examined for any signs of malicious behavior.\nTo bridge all security gaps, Heimdal Next-Gen Endpoint Antivirus also monitors processes and changes that occur in them with the help of behavior-based engines powered by artificial intelligence. This ensures that hackers can’t come up with any sort of clever trick to fool your digital defenses into letting them into the corporate network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0af61797-a349-4ccb-b5fc-87ef1c70b5c9.png","url":"https://www.softwareadvice.ie/software/242918/heimdal-next-gen-endpoint-antivirus","@type":"ListItem"},{"name":"Versa SASE","position":7,"description":"At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.\n\nProtect – Every asset (device, user, site, workload) in the organization.\n\nConnect – Effortlessly and provide the best user/device-to-app experience.\n\nSimplify – With one unified platform, unified policy, unified data lake and unified console.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b306a716-d3f6-4c53-a85e-1eb65bfb3b4d.png","url":"https://www.softwareadvice.ie/software/421450/versa-sase","@type":"ListItem"},{"name":"TeamViewer ONE","position":8,"description":"TeamViewer is a digital workplace platform designed for remote desktop access, IT support, and device management. It is used by IT professionals, enterprises, managed service providers, and organizations across industries such as automotive, agriculture, logistics, manufacturing, retail, healthcare, banking, and the public sector. The platform supports businesses of various sizes, from individual users and small businesses to large enterprises managing devices across multiple locations.\n\nThe platform provides remote connectivity features that allow users to access and control devices from any location, deliver technical support, and monitor IT infrastructure in real time. It includes capabilities to detect and resolve IT issues proactively, using automated remediation to reduce manual tasks. Security features include compliance with ISO/IEC 27001, HIPAA/HITECH, and SOC 2 and 3 standards, as well as two-factor authentication, single sign-on support, and conditional access controls. Additional features include asset and patch management, mobile device management, endpoint protection, and augmented reality solutions for industrial applications.\n\nTeamViewer is a cloud-based platform with cross-platform compatibility for desktops, mobile devices, IoT devices, and headless systems. It uses artificial intelligence to automate IT tasks, streamline support processes, and provide insights into endpoint performance, applications, operating systems, security, and networking. The platform can be accessed through a web application, Management Console, or client software. It offers different product tiers, including TeamViewer Remote for IT access and support, TeamViewer Tensor for enterprise operations, TeamViewer DEX for endpoint management, and TeamViewer ONE as a unified platform combining all capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/475c5739-e3c4-4b32-87f5-9faef564c4ae.png","url":"https://www.softwareadvice.ie/software/99131/teamviewer","@type":"ListItem"},{"name":"Rippling","position":9,"description":"Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operations. It centralizes employee data and automates tasks, offering features such as workflow studio for automation, reporting analytics, automated policies, and permissions management. Rippling provides specialized suites for various needs: Rippling HR manages the employee lifecycle, Rippling Payroll automates payments and direct deposits, IT tools enhance IT security with identity and device management, and the Finance suite integrates corporate cards, expenses, and accounts payable automatically. It also supports global compliance for onboarding and management across countries. Rippling is an all-in-one platform that offers a wide range of features to streamline HR operations, enhance security measures, automate payroll processes and control company costs. With its focus on scalability, security, automation and cost management, Rippling empowers businesses to optimize their workforce operations, reduce risks and achieve operational efficiency across their organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ec57690-a46d-4978-83cf-a6f85c097649.png","url":"https://www.softwareadvice.ie/software/410674/rippling","@type":"ListItem"},{"name":"Malwarebytes for Business","position":10,"description":"Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response. The platform provides  enterprise-class threat detection, isolation, and remediation - driven from the cloud and easy to use for organizations of all sizes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/94bacb01-a894-4d16-ab69-b244f690eb63.png","url":"https://www.softwareadvice.ie/software/354549/malwarebytes-for-business","@type":"ListItem"},{"name":"1Password","position":11,"description":"1Password protects and stores all company secrets beyond SSO such as passwords, security tokens, 2FA codes, documents, and passkeys (coming soon) to centralize and simplify the sign-in experience. Employees get quick, secure access to any app or service – even those Security or IT may not be aware of – and can safely manage and share everything they need to work together productively. Developers also have access to a collection of features to help secure secrets and speed up workflows throughout the software development life cycle. \n\n1Password also provides admins with more control and visibility as a result of aggregating identity and centralizing credential management. It is easy to deploy and integrates with Azure AD, Okta, OneLogin, Google Workspace and more, so admins can automatically provision employees or configure SSO using the systems they already trust. You can view data breaches, password vulnerabilities, and usage insights in a single dashboard, or send activity data to your SIEM tool via our Events API giving you a complete picture of your security posture. \n\n1Password is secure and private by design. We’re the only password manager that can say with full confidence your data and secrets will remain safe in the unlikely event of a breach. 1Password’s unique Two-Key-Derivation using the combination of an account password and Secret Key (128-bit, machine-generated code) means nobody could decrypt the data in the unlikely case they were able to access it. To keep data safe at rest and in transit, our security approach starts with AES 256-bit encryption, and we use multiple techniques to make sure only you have access to your information. No other password manager uses SRP protocol to prevent anyone from stealing your credentials or reading any non-secret information sent to the server. Lastly, we’ve built our Single Sign-On integration maintaining zero-knowledge architecture and end-to-end encryption using a trusted device model meaning even if your identity provider credentials are compromised, attackers still wouldn’t be able to access your 1Password data. See our security white paper to learn more. \n\nComing summer 2023 we’ll be supporting sign-up and sign in to 1Password using passkeys. In Q2, we are also beginning support for the storing of passkeys within 1Password so that our users can securely access passkeys across platforms in the same place where they keep passwords and other secure information.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d7f48d65-0ebc-4a51-918e-c1cfd1dc4c53.png","url":"https://www.softwareadvice.ie/software/123595/1password","@type":"ListItem"},{"name":"Trellix Endpoint Security","position":12,"description":"McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (SMBs).\n\n\nThe solution offers businesses with a wide array of functionality. A firewall helps keep hackers out of company networks, while anti-malware protection, device control and Web security all defend against multiple security threats.\n\n\nMcAfee Endpoint Protection Essential also features an access protection tool that, in the event of a cyber attack, restricts access to folders designated as \"confidential.\"\n\n\nIt comes with a central control panel, available on-premise or in the cloud, which enables a single administrator to manage and monitor the company network, making sure company security is up-to-date.\n\n\nMcAfee, a subsidiary of Intel, has clients ranging from government agencies to at-home users. Support is available via phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2b255f73-d8ec-43d5-990e-26c7334a1455.jpeg","url":"https://www.softwareadvice.ie/software/166867/mcafee-endpoint-security","@type":"ListItem"},{"name":"ManageEngine Endpoint Central","position":13,"description":"ManageEngine Desktop Central is a mobile device management (MDM) solution designed to help businesses automate, secure, audit, standardize and manage operations across servers, desktops, smartphones, and more. Features include software license management, asset inventory tracking, patch management, endpoint administration, OS deployment and bring your own device (BYOD).\n\nManageEngine Desktop Central helps administrators to seek users' permissions to remotely access desktops and troubleshoot machines using collaboration, video recording and file transfer capabilities. The application offers various inbuilt configurations related to environment variables, mapping, properties, shortcuts, IP/shared printers, message boxes, and application launches. Additionally, it also features an endpoint security module, which lets IT teams detect and mitigate vulnerabilities, automatically deploy patches, eliminate high-risk software and prevent data loss, among others.\n\nServices are offered on an annual subscription basis that includes support via phone, product videos and an online knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c6184cd6-5264-4608-a681-054651cd40bd.png","url":"https://www.softwareadvice.ie/software/117339/manageengine-endpoint-central","@type":"ListItem"},{"name":"ESET Endpoint Security","position":14,"description":"ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This versatile application, available both as a cloud-based and on-premises solution, provides comprehensive internet security and malware protection. Trusted by businesses worldwide, ESET leverages advanced cloud sandbox technology to safeguard mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. Key features include file, bot, and mail protection, remote device management, virtualization security, firewall configuration, and web control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1b5a4629-d4eb-49f6-966e-66b8bfe234da.jpeg","url":"https://www.softwareadvice.ie/software/134149/eset-endpoint-security","@type":"ListItem"},{"name":"Cisco AnyConnect","position":15,"description":"Cisco AnyConnect is a cloud-based software, which helps businesses offer remote employees secure VPN access to an enterprise network from any device or location. Administrators can track and identify users and devices accessing the network. \n\nThe application automates endpoint posture checks, provides remediation and determines the state of compliance to enhance security. Cisco AnyConnect enables multi-factor authentication to devices in order to verify users.  Administrators can use the solution to determine blind spots, generate reports to identify the network’s vulnerability and create an early-warning alert system to manage threats. It enables IT teams to respond to various types of threats like zero-day malware, abnormal user behavior, or data exfiltration. \n\nCisco AnyConnect comes with mobile applications for iOS and Android. Pricing is available on request and support is extended via documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ef9e6553-261f-4f4d-b139-988b2d990ac6.png","url":"https://www.softwareadvice.ie/software/432039/cisco-anyconnect","@type":"ListItem"},{"name":"Symantec Endpoint Security","position":16,"description":"Symantec Endpoint Security is a cybersecurity defense suite specifically designed for needs of the small business.\n\n\nCore features include antivirus, antispyware and a firewall to protect laptops, desktops and file servers from online threats and hackers. The solution also analyzes downloaded files and applications for potential threats, which prevent employees from triggering attacks.\n\n\nSymantec Endpoint Security has a central control panel and can be managed on-premise or through the cloud via an online portal. A single administrator has the capability to set policies for devices and users and can receive security alerts via SMS or email. Updates are delivered automatically via the Web to employees’ computers which helps in keeping the security of systems up-to-date.\n\n\nSymantec Endpoint Security charges users depending on the number of licenses and that includes support via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b8401567-5c1f-432e-82a5-85c908dc9c03.jpg","url":"https://www.softwareadvice.ie/software/194173/symantec-endpoint-protection-small-business","@type":"ListItem"},{"name":"Iru","position":17,"description":"Iru is the AI-powered IT & security platform used by the world's fastest-growing companies to secure their users, apps, and devices. Built for the AI era, Iru unifies identity & access, endpoint security & management, and compliance automation—collapsing the stack and giving IT & Security teams time and control back.\n\nThe Problem\nIT & Security teams today juggle dozens of point solutions with separate consoles and data silos. There's no shared context or single view, so work slows and risk grows. Nearly half of teams cite overlapping tools as their top challenge. The stack is the problem.\n\nIru collapses the stack by bringing together the capabilities every business relies on. When they live in one place, they inform each other, and everything works better.\n\nAt the core is the Iru Context Model—a living map of your environment. On top of it sits Iru AI, which transforms complex data into clear, strategic insights and enables all products to inform and improve each other.\n\nThe Platform\nIru gives you a single view of your users, apps, and devices through six integrated products:\n- Workforce Identity delivers passwordless single sign-on with device-bound passkeys, context-aware access to every app, and automated user lifecycle management.\n- Endpoint Management provides advanced automation to onboard users, update apps, and enforce policies across Apple, Windows, and Android—all with a single lightweight endpoint agent.\n- Endpoint Detection & Response stops advanced and emerging threats with machine learning-enhanced detections, autonomous containment, and remediation in real time across Mac and Windows.\n- Vulnerability Management gives full visibility into software risk on Mac and Windows with autonomous response to patch vulnerable software, prioritized by Iru AI.\n- Compliance Automation is AI-native—transforming frameworks into tailored controls, breaking them into tasks, and mapping evidence automatically to keep you audit-ready.\"\n- Trust Center provides a public portal to share certifications, reports, and security posture to accelerate deals, with security questionnaires answered by Iru AI.\n\nBuilt for the AI Era\nIru AI is designed from the ground up to connect agents across identity, endpoints, and compliance. Powered by the Iru Context Model, it understands your users, devices, and apps to act safely, intelligently, and in context across your organization. This gives IT & Security teams time and control back.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fbc7072f-654f-49f7-9fc8-6ae0b6bb3b84.png","url":"https://www.softwareadvice.ie/software/71745/Iru","@type":"ListItem"},{"name":"LogMeIn Central","position":18,"description":"LogMeIn Central is a cloud-based endpoint management solution that enables IT professionals to monitor and manage their endpoint infrastructure. Key features include user management, antivirus management, system health monitoring and computer grouping according to location, access and permission.\n\nAdministrators can manage endpoints with a single-view dashboard where they can monitor device status, manage alerts for connectivity and deploy software. Central also helps admins create groups for different sets of endpoints, define control permissions, enable two-factor authentication and extend computer access. It also provides functionality to scan networks for malicious files and eliminate malware from a central console.\n\nLogMeIn Central offers mobile applications for iOS and Android devices that enables IT professionals to monitor network health remotely. The solution is available on an annual subscription basis that includes support through email and phone. Users can also access the online knowledge base and community forum to address basic inquiries.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/652c22a4-9b71-4a05-befa-db36275209aa.png","url":"https://www.softwareadvice.ie/software/232924/logmein-central","@type":"ListItem"},{"name":"FortiClient","position":19,"description":"FortiClient is a cloud-based endpoint protection Fabric Agent designed to help businesses of all sizes provide security and protection for endpoints when remote or local. Key features include software inventory management, remote deployment, central quarantine management, dynamic access control, remote triggers, Active Directory (AD) integration, and automatic email alerts. \n\nSecurity teams using FortiClient can deliver content filtering, web security, and remote web filtering by providing granular application traffic control and botnet protection. The platform provides ransomware protection by allowing managers to roll back changes made by malicious programs. Additionally, FortiClient Managed services enable IT teams to streamline deployment, configuration, and monitoring of agents.  \n\nOther features of FortiClient include vulnerability dashboard, automated response, real-time endpoint status, telemetry, application-based split tunnel, central logging, and more. Support is extended via live chat, phone, email, and online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9327301f-c3b6-4cfe-8715-649d7c05102f.png","url":"https://www.softwareadvice.ie/software/299571/forticlient","@type":"ListItem"},{"name":"WebTitan","position":20,"description":"WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also provides web and DNS filtering control and is suitable for large and midsize businesses across all industries.\n\n\nKey features include content filtering, which includes bring your own device (BYOD) web filtering for employees’ personal mobile devices. The solution supports the implementation of different policies for different environments, which allows users to enable customized filter outcomes. Reporting, website whitelists and blacklists, configurable content filtering and support for multiple locations are also available.\n\n\nWebTitan offers various deployment options, including deployments for wifi providers, a cloud-based content filter for hotspot network guests, and industry-based content filters that can be deployed in the cloud or on-premise.\n\n\nTitan offers services on an annual subscription basis that includes support via phone, email and an online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ec785bf4-940f-4c19-a58c-b7cfaaa1ae95.png","url":"https://www.softwareadvice.ie/software/159217/webtitan","@type":"ListItem"},{"name":"CleanMyMac","position":21,"description":"CleanMyMac is a pack of tools for almost any Mac situation. It can free up space, detect duplicates, hidden apps, and remove tons of unseen clutter. The application is notarized by Apple and has been verified as malware-free.\n\nCleanMyMac removes 25+ types of Mac junk so that users can double the free space on their computer. With its Smart Care tool, users can automatically clean, speed up, and protect their computers.\n\n\"CleanMyMac is the Toolbox Your Mac Needs\" — Forbes. \nAnalyze your Mac and run quick performance boosters: free up RAM,  disable background apps, login items, etc.\n\nCleanMyMac helps business users stay more productive. The My Clutter tool shows duplicate items and large hidden files across all folders.\nWith its Updater, users can update all apps in one click, while the Uninstaller tool finds and removes the non-productive apps. \n\n• System Junk removal\n• Duplicate file finder\n• Mac optimization and speedup tools\n• Antivirus\n• Decluttering\n• App uninstallation \n• Privacy cleanup\n• Real-time Mac health monitoring","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/de022d6c-2bdf-4577-8d26-8d1de052c175.png","url":"https://www.softwareadvice.ie/software/269994/cleanmymac-x","@type":"ListItem"},{"name":"Splunk Enterprise","position":22,"description":"The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includes data indexing tools, which enable users to locate specific data across large data sets.\n\n\nThe software is designed to serve users with limited technical expertise. A key selling point is the platform's scalability, which allows it to grow with the amount of data it is needed to process; up to at least 100 terabytes per day. To ensure users always have access to their data, even in the event of a system disruption, this platform features built-in failover and disaster recovery capabilities.\n\n\nDeployment options include both on-premise and SaaS (Software as a Service). Subscription pricing is based on the amount of data indexed per day, and pricing decreases as the amount of data indexed increases. There are perpetual and term license pricing options as well.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c935ef6d-e80a-4f64-8b46-1864f7d1e6e3.png","url":"https://www.softwareadvice.ie/software/234262/splunk-enterprise","@type":"ListItem"},{"name":"CrashPlan","position":23,"description":"CrashPlan provides cyber resilience and data protection through a unified platform trusted by organizations worldwide. With secure, scalable backup and recovery for servers, endpoints, Microsoft 365, and Google Workspace, CrashPlan safeguards critical data against threats such as accidental deletion, ransomware, and system failure. Built with proactive threat detection and automated governance, CrashPlan ensures continuous access and compliance. Whether you back up to our cloud, your Azure instance, a local destination, or a third-party cloud, CrashPlan restores your data and your peace of mind.\n\nThe CrashPlan Data Resilience Platform:\nA unified backup and recovery platform—tailored to your business, the CrashPlan Data Resilience Platform provides cost-effective storage solutions, comprehensive security, built-in compliance, and precise recovery for SaaS, endpoints and servers.\n\nMicrosoft 365 Backup\nComprehensive backup, recovery, and data management for your business-critical Microsoft 365 apps, including Exchange Online, OneDrive, SharePoint, and Teams. CrashPlan provides reliable and secure data protection and seamless integration with Microsoft technologies.\n\nGoogle Workspace Backup\nCrashPlan provides data resiliency to keep your modern workplace moving forward. Free yourself from Gmail and Google Drive’s 30-day retention, limited versioning, and incomplete recovery capabilities. Meet compliance requirements, protect against ransomware, and enable your employees to recover from data loss quickly and easily. \n\nServer Backup\nCrashPlan’s server backup solution provides powerful and secure data backup built for enterprise data resiliency and disaster recovery. Backup all your Microsoft Windows Server data to the cloud easily and with complete data security, so you can bounce back from disasters fast, and keep your business moving forward. CrashPlan offers tailored deployment options – hosted in our secure data centers with a global presence; hybrid Implementation where you can run\nCrashPlan on your on-premises infrastructure while still using a cloud storage target like OneDrive or Google Drive; or fully on your on-premises infrastructure and write to on-premises storage targets such as FC-SAN, NAS, iSCSI, and even object storage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2dc76eb5-4f42-4eb3-ab62-495a6044d74c.png","url":"https://www.softwareadvice.ie/software/130789/crashplan","@type":"ListItem"},{"name":"Action1","position":24,"description":"Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 100 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC 2 and ISO 27001.\n\n\nThe company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19f5bef0-ac2a-4917-90ca-380c51f1788a.png","url":"https://www.softwareadvice.ie/software/261079/action1","@type":"ListItem"},{"name":"Bitdefender GravityZone","position":25,"description":"Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mobile support, antivirus protection, and native device encryption.\n\n\nUsing anti-malware and anti-spam capabilities, teams can manage the security of Microsoft Exchange mail servers through Control Center console. Bitdefender GravityZone allows users to ensure regulatory compliance by providing safety of mobile devices across multiple locations, reducing IT intervention for resolving security threats. Additionally, integration with Splunk Enterprise and Splunk Cloud enables enterprises to monitor logs and events for generating reports using graphical layout.\n\n\nBitdefender GravityZone provides data protection of the entire endpoint hard drive on the basis of suitable encryption mechanisms. Pricing is available on request and support is extended via documentation, phone, chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68ced21d-44c9-4c09-a05a-93730b2e9335.png","url":"https://www.softwareadvice.ie/software/121681/bitdefender","@type":"ListItem"}],"numberOfItems":25}
</script>
