---
description: Page 2 - Discover the best Endpoint Protection Software in New Zealand. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best Endpoint Protection Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software) > [Page 2](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2)

# Endpoint Protection Software

Canonical: https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software

Page: 2 / 8\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=3)

-----

## Products

1. [Action1](https://www.softwareadvice.co.nz/software/261079/action1) — 4.9/5 (237 reviews) — Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minute...
2. [Bitdefender GravityZone](https://www.softwareadvice.co.nz/software/121681/bitdefender) — 4.6/5 (222 reviews) — Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various...
3. [Intercept X Endpoint](https://www.softwareadvice.co.nz/software/159223/sophos-endpoint-antivirus) — 4.5/5 (220 reviews) — Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and of...
4. [OpenText Core Endpoint Protection​](https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection) — 4.5/5 (216 reviews) — OpenText™ Core Endpoint Protection is a cloud-based endpoint security solution that helps small to large enterprises ...
5. [N-central](https://www.softwareadvice.co.nz/software/161863/solarwinds-n-central) — 4.1/5 (195 reviews) — N-able N-central is an IT management solution that enables organizations to manage and track IT devices. The solution...
6. [ACMP Suite](https://www.softwareadvice.co.nz/software/449775/ACMP-Inventory) — 4.5/5 (173 reviews) — ACMP Suite is a modular client management solution. It takes a comprehensive approach to address the daily challenges...
7. [Automox](https://www.softwareadvice.co.nz/software/144031/automox) — 4.7/5 (152 reviews) — Automox is the Autonomous Endpoint Management platform built for autonomous from day one. Policy-driven, human-contro...
8. [Safetica](https://www.softwareadvice.co.nz/software/427221/safetica-nxt) — 4.7/5 (141 reviews) — Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextua...
9. [SentinelOne](https://www.softwareadvice.co.nz/software/363019/sentinelone) — 4.8/5 (109 reviews) — Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platfo...
10. [WatchGuard Endpoint Security](https://www.softwareadvice.co.nz/software/393415/watchguard-epdr) — 4.4/5 (107 reviews) — WatchGuard Endpoint Security is a cloud-based endpoint protection, detection, and response solution that helps organi...
11. [GoodAccess](https://www.softwareadvice.co.nz/software/186523/goodaccess) — 4.9/5 (103 reviews) — GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Tru...
12. [OneLogin](https://www.softwareadvice.co.nz/software/143308/onelogin) — 4.6/5 (92 reviews) — OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web ...
13. [Teramind](https://www.softwareadvice.co.nz/software/156340/teramind) — 4.7/5 (92 reviews) — Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM...
14. [Ivanti Connect Secure](https://www.softwareadvice.co.nz/software/451208/Connect-Secure) — 4.5/5 (90 reviews) — Ivanti Connect Secure is a SSL VPN solution. It provides remote and mobile users access to corporate resources from a...
15. [ThreatLocker](https://www.softwareadvice.co.nz/software/314278/threatlocker) — 4.9/5 (87 reviews) — Stop ransomware\! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint se...
16. [DNSFilter](https://www.softwareadvice.co.nz/software/241689/dnsfilter) — 4.7/5 (86 reviews) — DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to ...
17. [Password Depot](https://www.softwareadvice.co.nz/software/464673/Password-Depot) — 4.8/5 (86 reviews) — Password Depot is an on-premise password management solution that helps businesses secure passwords and other confide...
18. [VMware Cloud Director Availability](https://www.softwareadvice.co.nz/software/360132/vmware-cloud-director-availability) — 4.8/5 (81 reviews) — VMware Cloud Director Availability is a secure data migration and business continuity solution that lets users handle...
19. [PureVPN](https://www.softwareadvice.co.nz/software/442024/purevpn) — 4.3/5 (80 reviews) — PureVPN is a virtual private network for businesses. It encrypts businesses' internal and external communications and...
20. [Perimeter 81](https://www.softwareadvice.co.nz/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
21. [ManageEngine ADAudit Plus](https://www.softwareadvice.co.nz/software/361342/manageengine-adaudit-plus) — 4.4/5 (71 reviews) — ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensiv...
22. [Elastic Stack](https://www.softwareadvice.co.nz/software/132343/elasticsearch) — 4.6/5 (70 reviews) — Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases...
23. [UTunnel VPN](https://www.softwareadvice.co.nz/software/440022/utennel) — 5.0/5 (69 reviews) — UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networkin...
24. [Lookout](https://www.softwareadvice.co.nz/software/379029/lookout) — 4.7/5 (69 reviews) — Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business...
25. [Admin By Request](https://www.softwareadvice.co.nz/software/418541/admin-by-request) — 4.9/5 (68 reviews) — Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enab...

-----

Page: 2 / 8\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Access Governance Software](https://www.softwareadvice.co.nz/directory/4665/access-governance/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@type":"WebSite","@id":"https://www.softwareadvice.co.nz/#website","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Endpoint Protection Software","description":"Page 2 - Discover the best Endpoint Protection Software in New Zealand. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2","about":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best Endpoint Protection Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Action1","position":1,"description":"Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 100 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC 2 and ISO 27001.\n\n\nThe company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19f5bef0-ac2a-4917-90ca-380c51f1788a.png","url":"https://www.softwareadvice.co.nz/software/261079/action1","@type":"ListItem"},{"name":"Bitdefender GravityZone","position":2,"description":"Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mobile support, antivirus protection, and native device encryption.\n\n\nUsing anti-malware and anti-spam capabilities, teams can manage the security of Microsoft Exchange mail servers through Control Center console. Bitdefender GravityZone allows users to ensure regulatory compliance by providing safety of mobile devices across multiple locations, reducing IT intervention for resolving security threats. Additionally, integration with Splunk Enterprise and Splunk Cloud enables enterprises to monitor logs and events for generating reports using graphical layout.\n\n\nBitdefender GravityZone provides data protection of the entire endpoint hard drive on the basis of suitable encryption mechanisms. Pricing is available on request and support is extended via documentation, phone, chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68ced21d-44c9-4c09-a05a-93730b2e9335.png","url":"https://www.softwareadvice.co.nz/software/121681/bitdefender","@type":"ListItem"},{"name":"Intercept X Endpoint","position":3,"description":"Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and offers a remote management tool. The anti-malware protection is designed to identify, block or remove threats, thus protecting computers and servers from viruses, adware, spyware and other infections. It can be deployed on-premise or hosted in the cloud.\n\n\nWeb protection adds a layer of defense, which prevents attacks originating from infected websites, scanning for and blocking threats before they can affect devices.\n\n\nSophos Intercept X also features device and application control which enables an administrator to set rules governing the use of removable media like USBs and mobile and wireless devices. Unauthorized applications and devices can be prevented from accessing the network that helps prevent the spread of malware and reducing the risk of data loss.\n\n\nSophos Intercept X includes a centralized management console which enables an administrator to monitor computers on the network. Support is offered via live chat and through an online helpdesk and a knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/53dffd09-6bf4-49f8-b4a3-4006b48a8d7a.png","url":"https://www.softwareadvice.co.nz/software/159223/sophos-endpoint-antivirus","@type":"ListItem"},{"name":"OpenText Core Endpoint Protection​","position":4,"description":"OpenText™ Core Endpoint Protection is a cloud-based endpoint security solution that helps small to large enterprises perform antivirus scans and prevent cyber threats across networks. It comes with an admin console, which enables users to configure system settings, grant access permissions, view data charts and generate reports on potential malware threats.\n\n\nOpenText™ Core Endpoint Protection allows businesses to sort data in tabular formats and change the order of data points in columns as ascending/descending. It provides users with a centralized dashboard to gain insights into device status using charts, improving business operations. Additionally, managers can create user profiles with credentials, view scan history and restore quarantined files.\n\nOpenText™ Core Endpoint Protection enables enterprises to reassign endpoints and apply security policies to multiple groups on the platform. Pricing is available on annual subscriptions and support is extended via email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a89b4977-1d9c-41f0-801a-1754d22567c0.png","url":"https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection","@type":"ListItem"},{"name":"N-central","position":5,"description":"N-able N-central is an IT management solution that enables organizations to manage and track IT devices. The solution comes with key features that include patch management, antivirus protection, backup and disaster recovery.\n\nThe patch management feature enables organizations to automate patching and reduce vulnerabilities. Further, the solution enables managers to track and fill gaps in networks. The solution allows IT executives to create database backups.\n\nThe solution is suitable for businesses of all sizes and can be deployed both on-premises and in the cloud. N-able N-central allows users to protect email communication and encrypt confidential documents. The solution offers scripting language to automate manual tasks.\n\nSupport is provided via an online portal, email and phone. Further, the solution offers Android and iOS-compatible mobile applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b770e219-49a7-4970-b909-ca635f1315da.png","url":"https://www.softwareadvice.co.nz/software/161863/solarwinds-n-central","@type":"ListItem"},{"name":"ACMP Suite","position":6,"description":"ACMP Suite is a modular client management solution. It takes a comprehensive approach to address the daily challenges faced by IT departments. The platform is designed for organizations of all sizes. ACMP Suite integrates various modules to provide a unified endpoint management solution. It caters to a wide range of industries, helping IT teams streamline their operations and improve efficiency.\n\nThe core of ACMP Suite is its modular design. This allows businesses to customize the solution to their specific needs. Key features include comprehensive inventory management, flexible asset tracking, and advanced software license management. ACMP Suite also automates routine tasks such as software distribution, patch management, and operating system deployment. This frees up IT staff to focus on strategic initiatives.\n\nThe platform places a strong emphasis on security and compliance. It includes integrated modules for Defender management, BitLocker encryption, and vulnerability assessment. ACMP Suite's reporting and analytics capabilities provide valuable insights into the IT infrastructure. This enables data-driven decision-making. The solution can manage a diverse range of devices, from PCs and laptops to mobile devices and servers. As a result, ACMP Suite is a versatile solution for organizations looking to optimize their client management processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d13e7fe4-47c8-4daa-a812-161e4a934636.jpeg","url":"https://www.softwareadvice.co.nz/software/449775/ACMP-Inventory","@type":"ListItem"},{"name":"Automox","position":7,"description":"Automox is the Autonomous Endpoint Management platform built for autonomous from day one.\n\nPolicy-driven, human-controlled automation gives IT and security teams the speed, clarity, and control to reduce risk and move faster with confidence.\n\nAutomox unifies automation, visibility, protection, adaptability, and speed in a single, cloud-native platform – enabling teams to automate up to 96% more patches, shorten remediation time, and operate securely at scale across Windows, macOS, and Linux devices.\n\nThousands of organizations trust Automox to operationalize IT autonomy and secure millions of endpoints globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9e062bbe-8254-4db6-8749-0c06a1bc9b19.png","url":"https://www.softwareadvice.co.nz/software/144031/automox","@type":"ListItem"},{"name":"Safetica","position":8,"description":"Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data. \n\n \n\nData Protection: Classify, monitor and control sensitive data across devices and clouds in real time. \n\nInsider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity. \n\nCompliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest. \n\nCloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data by monitoring, classifying files, and enforcing policies on M365 file operations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/18c0e3cf-c215-484c-8159-d61822b6f913.png","url":"https://www.softwareadvice.co.nz/software/427221/safetica-nxt","@type":"ListItem"},{"name":"SentinelOne","position":9,"description":"Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platform specializing in AI-powered endpoint protection. \n\nThe autonomous agent platform allows users to detect threats across multiple vectors and resolve system attacks. SentinelOne's endpoint detection and response (EDR) module automates mitigation of bugs/issues and ensure immunity against newly discovered threats. Additionally, the artificial intelligence (AI)-based solution performs recurring scans to detect various threats including malware, trojans, worms and more, preserving end-user productivity within the organization.\n\n\nSentinelOne allows integration with various third-party applications such as Tanium, Splunk, Okta, Fortinet and BigFix. The application can also be deployed in an on-premise environment. Pricing is available on annual subscription and support is extended via documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dbe48f25-9e50-4c70-bc05-1f84a811f2df.png","url":"https://www.softwareadvice.co.nz/software/363019/sentinelone","@type":"ListItem"},{"name":"WatchGuard Endpoint Security","position":10,"description":"WatchGuard Endpoint Security is a cloud-based endpoint protection, detection, and response solution that helps organizations monitor threat prevention and detection across devices, applications, and networks. \n\nIt provides behavioral analysis and detection of threats, such as malicious scripts, macros, indicators of attack, and more. It also offers URL filtering, device control, and a managed firewall to block unwanted network traffic. Support is extended via forums, a knowledge base, phone, and other online sources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c1f977f-8ac9-476c-a6e0-3a4508a62143.jpeg","url":"https://www.softwareadvice.co.nz/software/393415/watchguard-epdr","@type":"ListItem"},{"name":"GoodAccess","position":11,"description":"GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. \n\nBy leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. \n\nOur platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. \n\nGoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments.\n\nStart your 14-day full-featured free trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f55a07d-b749-4b55-9def-de441bfbb8b2.png","url":"https://www.softwareadvice.co.nz/software/186523/goodaccess","@type":"ListItem"},{"name":"OneLogin","position":12,"description":"OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web applications, data centers, cloud storage and more. Key features include single sign-on, web access management, adaptive and multi-factor authentication and mobile identity tracking.\n\n\nOneLogin’s web access management tool integrates with the existing web servers and helps businesses secure their web applications. Its adaptive authentication feature uses machine learning to determine the kind of security access that users need to fill in order to access the system. The solution uses a multi-factor authentication system that validates users’ identity through standard user ID and passwords along with one-time passwords (OTP) shared via mobile app and text messages, Duo Security, RSA and more.\n\n\nOneLogin is available on a per user per month subscription basis. Support is offered via phone, email and an online knowledge repository. The solution is used in a variety of businesses including education, energy, manufacturing, government, finance and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/920aaefd-244a-4931-8332-43973d59fe68.png","url":"https://www.softwareadvice.co.nz/software/143308/onelogin","@type":"ListItem"},{"name":"Teramind","position":13,"description":"Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM monitors user activities on applications, websites, file systems, network, email, social media and more. Behavioral rules can be created to automatically warn, block, notify, lockout or take other actions when an anomaly is detected. Its session recording feature allows investigation of incidents with video and optional audio recordings of users' desktop.\n\n\nTeramind DLP comes with all the features available in Teramind UAM plus: automated data discovery and classification with built-in support for many sensitive data types for personal information, health and financial information (PII/PHI/PFI). Its optical character recognition (OCR) module can detect content in real-time even inside images and videos. With support for activities, scheduling, and content-based rules, the system is effective in preventing data leaks in a wide range of scenarios including conforming with regulations like GDPR, HIPAA, PCI DSS and more.     \n\n\nThe solution can either be hosted in the cloud, on-premise or private cloud such as Amazon Web Services (AWS) and Microsoft Azure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/459e44be-5421-4bf0-a654-bdab53451701.png","url":"https://www.softwareadvice.co.nz/software/156340/teramind","@type":"ListItem"},{"name":"Ivanti Connect Secure","position":14,"description":"Ivanti Connect Secure is a SSL VPN solution. It provides remote and mobile users access to corporate resources from any web-enabled device, at any time and location. This SSL VPN is widely used by organizations across various industries, such as healthcare, higher education, logistics, public sector, and others.\n\nThe solution offers a single unified client for both remote and on-site access, making it easy to manage. It integrates with Directory Services, Identity Services, EMM/MDM, SIEM, and NGFWs. Ivanti Connect Secure features dynamic adaptive multi-factor authentication, such as biometric authentication, TOTP, SAML 2.0, PKI, IAM, and digital certificates. The solution ensures stateful endpoint compliance, requiring all devices to meet security requirements before connecting. Users can access on-premises and cloud-based resources with simple, secure, and streamlined single sign-on.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/57f1f3fa-4576-47ed-9465-758ef5443bd2.jpeg","url":"https://www.softwareadvice.co.nz/software/451208/Connect-Secure","@type":"ListItem"},{"name":"ThreatLocker","position":15,"description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e1c711e-8cee-47c7-9f15-9f13dcba68b8.png","url":"https://www.softwareadvice.co.nz/software/314278/threatlocker","@type":"ListItem"},{"name":"DNSFilter","position":16,"description":"DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to streamline threat detection and content filtering processes. Professionals can classify unknown websites into multiple categories and block malicious web content to prevent malware or ransomware activities. \n\nRoaming Client - Prevent access to unwanted and malicious content on all devices, on and off your network. Get credit for switching from Cisco Umbrella Roaming Client.\n\nDNS Filtering - Block threats at the DNS level and make internet browsing safer and faster.\n\nContent Filtering - Customize the content you'd like to block and allow with our machine-learning content filtering capabilities.\n\nFast & Easy Implementation - 53% of DNSFilter customers get up-and-running within 1 day. \n\nOur product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review.\n\nDNSFilter comes with a dashboard, which allows organizations to gain an overview of active sites, top domains, and other metrics on a centralized platform. Managers can block specific categories of content related to chat & instant messaging, social networking, adult content and more. Additionally, it lets users generate activity reports to monitor most active networks, total requests and queries per second.\n\nDNSFilter provides an API, which enables businesses to integrate the platform with various third-party applications. Pricing is available on monthly subscriptions and support is extended via phone, email and other online measures.\n\nWe're a U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6cdcad23-bf7e-4ced-9261-e52302787fcf.png","url":"https://www.softwareadvice.co.nz/software/241689/dnsfilter","@type":"ListItem"},{"name":"Password Depot","position":17,"description":"Password Depot is an on-premise password management solution that helps businesses secure passwords and other confidential data. The software uses advanced AES Rijndael 256 double encryption to protect against unauthorized access. It features a password generator that creates strong, secure passwords, eliminating the need to remember multiple passwords. Password Depot also provides sync capabilities that provide a consistent experience, enabling individuals and teams to access their data from anywhere.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f4e33aa1-3af3-49a1-8880-efc0fdc6d2ff.png","url":"https://www.softwareadvice.co.nz/software/464673/Password-Depot","@type":"ListItem"},{"name":"VMware Cloud Director Availability","position":18,"description":"VMware Cloud Director Availability is a secure data migration and business continuity solution that lets users handle disaster recovery processes to or between multi-tenant cloud sites. It provides simplified onboarding and ensures the continuous availability of VMware vSphere workloads and automates recovery operations.\n\nWith the advanced Retention Policy, businesses can gain more control over replication cycles and the built-in DR & migration plans help sequence and time failover. It is a pervasive multi-tenant self-service cloud infrastructure control plane for cloud providers’ service-delivery needs.\n\nThe replicator service, manager service, cloud service, and tunnel service operate together to support the replication management, secure communication, and storage of the replicated data. Cloud providers can support recovery for multiple tenant environments that can scale to handle increasing loads for each tenant and for multiple tenants.\n\nIn an on-premises environment, Replicator Service and a preconfigured instance of Tunnel Service support replication management by using both the VMware Cloud Director Availability vSphere Client Plug-In and the VMware Cloud Director Availability Tenant Portal, dedicated to tenants.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8d153368-4410-4d05-8f91-0f280306e4b5.png","url":"https://www.softwareadvice.co.nz/software/360132/vmware-cloud-director-availability","@type":"ListItem"},{"name":"PureVPN","position":19,"description":"PureVPN is a virtual private network for businesses. It encrypts businesses' internal and external communications and helps them to protect their assets from data thefts and other malicious attacks.\n\n\nPureVPN designates dedicated IP addresses to log in to company databases. It also uses 256-bit encryption to prevent hackers, agencies and other third-parties from gaining access to sensitive information. In addition, PureVPN supports security protocols including SSTP, PPTP, IPSec, L2TP, iKev2, SSTP and OpenVPN.\n\n\nPureVPN enables businesses to conduct online research in a manner which cannot be tracked by the hackers and attackers. The solution also comes with a NAT firewall and two-factor authentication feature. A dedicated management portal enables a central administrator to control and manage employee accounts.\n\n\nPureVPN offers apps for Windows, Mac, Android and iOS. Services are offered on a monthly subscription basis that includes support via email, online live chat and product videos.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48ce7218-f48e-47ca-9724-f05201927717.png","url":"https://www.softwareadvice.co.nz/software/442024/purevpn","@type":"ListItem"},{"name":"Perimeter 81","position":20,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.co.nz/software/230245/perimeter-81","@type":"ListItem"},{"name":"ManageEngine ADAudit Plus","position":21,"description":"ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensive logon auditing, detailed change monitoring, real-time risk alerting, and streamlined compliance reporting for Active Directory, Azure AD, file servers, Windows servers and workstations.  It helps users monitor and generate real-time change audit reports on Active Directory objects such as users, computers, groups, organizational units and more. Auditing user logon and logoff activity provides deeper insights into user behavior and helps detect anomalous logons using UBA. ADAudit Plus also alerts users in real-time through SMS or email notifications whenever any critical changes to the contents or configurations of Active Directory are detected. \n\nADAudit Plus offers its services through an annual subscription model, and users can access support resources via an online knowledge base, email, phone, and chat. The platform boasts a range of top features that cater to the specific needs of Windows Server environments. These features include real-time change notifications, allowing users to receive instant alerts on system alterations and user activities. Windows logon monitoring functionality enables the continuous tracking of user logon activities and related data, while account lockout analysis helps to identify the root causes of authentication failures. Additionally, the tool offers robust file change monitoring capabilities, enabling auditing of file accesses and permission modifications across various file systems.\n\nOther notable features encompass security and compliance reporting tools, Azure AD auditing capabilities, privileged user monitoring, and detailed reporting on activities related to ADFS, USB usage, and printer activities. Furthermore, ADAudit Plus provides functionalities for employee time tracking, monitoring active and idle time on workstations, as well as file integrity monitoring features to oversee file modifications, deletions, and access permission changes within the network. ADAudit Plus provides its services on an annual subscription basis. Support is available through an online knowledge base, email, phone, and chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4223f3a6-931e-4338-b0bc-a9fd0b954c69.png","url":"https://www.softwareadvice.co.nz/software/361342/manageengine-adaudit-plus","@type":"ListItem"},{"name":"Elastic Stack","position":22,"description":"Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. \n \nReliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8d372ebb-6358-4dc6-b756-c71f4e5b405c.png","url":"https://www.softwareadvice.co.nz/software/132343/elasticsearch","@type":"ListItem"},{"name":"UTunnel VPN","position":23,"description":"UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This enables businesses to establish secure remote access for employees while ensuring encrypted site-to-site connectivity across various network environments such as corporate networks, data centers, offices, VPCs, IoT devices, or standalone hosts. UTunnel streamlines VPN server deployments, supports agent-less resource access via web browsers, and provides intuitive policy-based user and team access management, simplifying remote access administration.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da2ef3e7-8313-4c81-a453-ed52d0ddf40e.jpeg","url":"https://www.softwareadvice.co.nz/software/440022/utennel","@type":"ListItem"},{"name":"Lookout","position":24,"description":"Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, and implement security policies. Lookout can increase visibility and provide protection for teams who are working remotely while using mobile devices and cloud technology.\n\nLookout works as a single security platform that protects data from endpoints to the cloud, without the need for multiple standalone solutions. It includes real-time protection for phishing attacks, custom web filtering for inappropriate web content, data protection in email, SaaS, and IaaS applications, plus more. \n\nPricing information is provided on request by Lookout. Support is available via an FAQ page, online portal, and other resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/764d1f7c-5498-40f5-8da4-941ec7ddb41c.png","url":"https://www.softwareadvice.co.nz/software/379029/lookout","@type":"ListItem"},{"name":"Admin By Request","position":25,"description":"Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enable enterprises to lock down administrative privileges across all endpoints by revoking local admin rights - while still providing means for end users to gain elevated privileges when they need it.\n\nOnce local admin rights are removed based on user or group, end users are still able to gain elevated privileges when they need it via the self-service endpoint application.\n\nPrivileges can be elevated per app (single app elevation), or for a set period of time (session elevation). All elevated activity undertaken by the user while they have elevated privileges is logged in the Admin By Request Auditlog, which can be accessed via a user-friendly online Admin Portal.\n\nAlso accessible from the Admin Portal is a full hardware and software Inventory, customizable reports, features such as Break Glass (a LAPS-replacement feature for creating emergency local admin accounts), Device Owner, and Clean Up Local Admins, as well as all Settings and Sub-Settings, which allow organizations to create granular access control rules to tailor the software to their specific needs.\n\nFile downloads are scanned by over 35 anti-malware engines which comprise OPSWAT's MetaDefender Cloud API, and flagged if malware is detected.\n\nIntegration with ServiceNow, Slack, Teams, Intune, SIEM tools, and a number of other popular software, make adoption of Admin By Request  effortless for end users and administrators.\n\nEnd users can remain productive, Help Desk personnel can focus on more important tasks, and company compliance requirements can be met with a single security tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/458d0ba4-5f9a-47b7-85c7-36844921bbc4.jpeg","url":"https://www.softwareadvice.co.nz/software/418541/admin-by-request","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=2#itemlist","numberOfItems":25}
</script>
