---
description: Page 4 - Discover the best Endpoint Protection Software in New Zealand. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 4 - Best Endpoint Protection Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software) > [Page 4](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4)

# Endpoint Protection Software

Canonical: https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software

Page: 4 / 8\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=5)

-----

## Products

1. [Avast Business CloudCare](https://www.softwareadvice.co.nz/software/178108/avg-cloudcare) — 4.0/5 (30 reviews) — AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party ma...
2. [GateKeeper Enterprise](https://www.softwareadvice.co.nz/software/183910/gatekeeper-enterprise) — 5.0/5 (30 reviews) — Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA a...
3. [inDefend](https://www.softwareadvice.co.nz/software/449848/inDefend) — 4.7/5 (30 reviews) — inDefend is a comprehensive data protection and employee monitoring platform that offers threat detection for worksta...
4. [Powertech Antivirus](https://www.softwareadvice.co.nz/software/385633/powertech-antivirus) — 4.5/5 (28 reviews) — Fortra's Powertech Antivirus is an IBM-certified antivirus solution that protects against malware, viruses and other ...
5. [Invicti](https://www.softwareadvice.co.nz/software/174628/netsparker-security-scanner) — 4.7/5 (26 reviews) — Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web appl...
6. [IBM Security MaaS360](https://www.softwareadvice.co.nz/software/423918/maas360) — 4.2/5 (26 reviews) — IBM MaaS360 is an endpoint security solution that helps IT teams to manage mobile devices such as tablets, smartphone...
7. [Apex One](https://www.softwareadvice.co.nz/software/187789/apex-one) — 4.4/5 (25 reviews) — Apex One is a cloud-based and on-premise endpoint security solution, which assists small to large businesses with thr...
8. [Netsurion](https://www.softwareadvice.co.nz/software/134470/eventtracker) — 3.6/5 (23 reviews) — Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly d...
9. [KACE](https://www.softwareadvice.co.nz/software/364128/kace) — 4.0/5 (23 reviews) — KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every devic...
10. [Huntress](https://www.softwareadvice.co.nz/software/351433/huntress) — 4.9/5 (22 reviews) — Huntress is a cloud-based cybersecurity solution, designed to help small to midsize businesses determine and respond ...
11. [RoboShadow](https://www.softwareadvice.co.nz/software/357317/robo-shadow-cyber-platform) — 5.0/5 (21 reviews) — RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vuln...
12. [Darktrace](https://www.softwareadvice.co.nz/software/307875/darktrace) — 4.5/5 (20 reviews) — Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape ...
13. [DataDome](https://www.softwareadvice.co.nz/software/223561/datadome-bot-mitigation) — 4.5/5 (18 reviews) — DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudule...
14. [Cortex XDR](https://www.softwareadvice.co.nz/software/82155/traps) — 4.4/5 (18 reviews) — Cortex XDR (formerly Traps) is cloud-based and on-premise endpoint security solution, which assists security teams wi...
15. [Cisco Umbrella](https://www.softwareadvice.co.nz/software/432062/cisco-umbrella) — 4.4/5 (17 reviews) — Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat def...
16. [ESET PROTECT MDR](https://www.softwareadvice.co.nz/software/354381/eset-protect-mdr) — 4.8/5 (16 reviews) — ESET PROTECT MDR offers comprehensive managed detection and response services designed to secure businesses with 250+...
17. [DriveStrike](https://www.softwareadvice.co.nz/software/151423/drivestrike) — 4.9/5 (16 reviews) — DriveStrike is a data breach protection software designed to help businesses locate, track, lock and wipe all compute...
18. [Cisco Secure Endpoint](https://www.softwareadvice.co.nz/software/402086/cisco-secure-endpoint) — 4.6/5 (14 reviews) — Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic an...
19. [INLYSE Malware.AI](https://www.softwareadvice.co.nz/software/387215/inlyse-malware-ai) — 5.0/5 (14 reviews) — INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware...
20. [Senturo](https://www.softwareadvice.co.nz/software/205978/hiddenapp) — 4.7/5 (13 reviews) — Senturo: Total Device Protection and Fleet Management Senturo is an advanced, all-in-one platform designed to safegua...
21. [ManageEngine Browser Security Plus](https://www.softwareadvice.co.nz/software/435315/manageengine-browser-security-plus) — 4.3/5 (12 reviews) — Browser Security Plus is an enterprise browser security solution crafted by ManageEngine, that empowers IT administra...
22. [TypingDNA ActiveLock](https://www.softwareadvice.co.nz/software/366425/typingdna-activelock) — 4.6/5 (11 reviews) — To secure devices in work-from-anywhere environments, Cybersecurity teams (big and small) rely on TypingDNA ActiveLoc...
23. [Portnox CLEAR](https://www.softwareadvice.co.nz/software/355474/portnox-clear) — 4.1/5 (11 reviews) — Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect c...
24. [Nfina Technologies](https://www.softwareadvice.co.nz/software/397464/hybrid-cloud) — 5.0/5 (11 reviews) — Since 2012, Nfina Technologies has provided products and solutions to IT departments who seek the most up-to-date tec...
25. [ESET PROTECT Complete](https://www.softwareadvice.co.nz/software/419404/eset-protect-complete) — 4.7/5 (10 reviews) — ESET PROTECT Complete delivers robust patch management for businesses with 250+ employees, providing both cloud-based...

-----

Page: 4 / 8\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=5)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Access Governance Software](https://www.softwareadvice.co.nz/directory/4665/access-governance/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Endpoint Protection Software","description":"Page 4 - Discover the best Endpoint Protection Software in New Zealand. Compare top Endpoint Protection Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4","about":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 4 - Best Endpoint Protection Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software?page=4#itemlist","@type":"ItemList","itemListElement":[{"name":"Avast Business CloudCare","position":1,"description":"AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party managed security service providers (MSSPs), who can use this tool to manage security on behalf of their clients.\n\n\nAVG CloudCare includes a wide range of security features including antivirus, which protects PCs and laptops and detects and removes concealed threats. Files are scanned before employees download them and URLs are scanned while they search online, thus reducing the risk of attack.\n\n\nMeanwhile, AVG CloudCare’s content filtering option enables businesses to monitor, and if necessary block, select websites employees visit to improve workplace efficiency. It also enables protection against spam and encryption for email, and pay-as-you-go cloud backup to defend against potential data loss.\n\n\nFinally, AVG’s remote management tool enables an administrator to manage a company's security from anywhere, on any device. Highly scalable, AVG CloudCare is available as a year or two-year subscription with optional monthly add-ons.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fa917f19-e956-4b17-93d1-49d1ad627760.jpeg","url":"https://www.softwareadvice.co.nz/software/178108/avg-cloudcare","@type":"ListItem"},{"name":"GateKeeper Enterprise","position":2,"description":"Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA and automatically lock computers. If a new user logs in with the same account, the solution will automatically start a new session and log out the previous user's session. All with automatic computer lock when users leave. Perfect for high-tempo environments. \n\nGateKeeper Enterprise is a proximity-based access control solution that helps businesses minimize unauthorized data exploitation via user authentication, password management and more. Professionals can utilize the admin console to manage access control lists for specific devices, assign users to workstations and deploy various security policies such as two-factor authentication across the system.\n\n\nGatekeeper Enterprise allows organizations to monitor ongoing activities and maintain audit logs in compliance with industry regulations. Managers can provide employees with wireless access keys/tokens to unlock assigned system devices and automate the login process. Additionally, it lets users track the location of network devices and generate analytical reports. \n\n\nGatekeeper Enterprise comes with an administrative dashboard, which enables businesses to view real-time event logs and filter data based on credentials, computers or activity. Pricing is based on the number of users and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fb1ed6b7-9294-4aa8-a6a5-aadc0e23d6c0.png","url":"https://www.softwareadvice.co.nz/software/183910/gatekeeper-enterprise","@type":"ListItem"},{"name":"inDefend","position":3,"description":"inDefend is a comprehensive data protection and employee monitoring platform that offers threat detection for workstations, cloud emails, printers, and servers. This provides organizations full visibility over confidential data within the organization.\n\nThe platform deploys across desktops, laptops, mobile devices, cloud emails, and printers. It provides a single dashboard for all reports and analytics, and sends incident alerts via email and SMS. inDefend combines activity tracking, employee monitoring, and sensitive data protection into one suite. This offers transparency over every employee, regardless of the organization's size. It helps protect against data compromise, provides control over exiting employees, and delivers reports on employee behavior and productivity, even for remote workforces.\n\ninDefend is a user-friendly DLP product with features like device, application, email, file upload, and content filtering. It also offers shadow logging, screenshot, and work schedule management. The platform provides default policy templates and customization options, exception options for applications or devices, and agent grouping for applying policies on groups. inDefend includes comprehensive reporting for all policies, live alerts for real-time monitoring, and a consolidated report for incident violations across all agents.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d6f3a967-2955-4c41-8fdf-b464567373ed.png","url":"https://www.softwareadvice.co.nz/software/449848/inDefend","@type":"ListItem"},{"name":"Powertech Antivirus","position":4,"description":"Fortra's Powertech Antivirus is an IBM-certified antivirus solution that protects against malware, viruses and other complex threats on any combination of Windows, Linux and Unix servers. It provides organizations with cloud polymorphism detection, multi-engine scanning and advanced heuristics to ensure data and user protection.\n\nPowertech Antivirus offers enterprise scanning capabilities, which lets users identify viruses, ransomware, and zero-day attacks, among other threats. With heuristic analysis tool, staff members can monitor malicious behaviors and report on possible intrusions based on detected suspicious activities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a42fc038-aeb2-4a47-b42f-2e7ee4db35a1.jpeg","url":"https://www.softwareadvice.co.nz/software/385633/powertech-antivirus","@type":"ListItem"},{"name":"Invicti","position":5,"description":"Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web applications and APIs. It incorporates Application Security Posture Management capabilities to support security operations across large application portfolios. The platform is used by organizations in sectors such as government, IT, telecommunications, financial services and healthcare to help maintain compliance standards and manage security at scale.\n\nThe platform includes Dynamic Application Security Testing, Static Application Security Testing, Software Composition Analysis, container security scanning and API security testing. Its scanning engine validates detected vulnerabilities to confirm they are exploitable. It identifies websites, applications, APIs and hidden assets within an organization and prioritizes high-risk applications for testing. The Application Security Posture Management feature consolidates findings from various security tools, providing a centralized view for vulnerability management and risk assessment.\n\nInvicti offers AI-powered remediation guidance, identifying the exact code locations of vulnerabilities and providing detailed resolution steps for developers. It supports integration with various development and security tools through a REST API and is compatible with CI/CD pipelines and DevOps workflows. The platform includes flexible deployment options and role-based access control to manage security across extensive application environments while maintaining accuracy and performance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.softwareadvice.co.nz/software/174628/netsparker-security-scanner","@type":"ListItem"},{"name":"IBM Security MaaS360","position":6,"description":"IBM MaaS360 is an endpoint security solution that helps IT teams to manage mobile devices such as tablets, smartphones and laptops.  The solution manages devices provided by the company or are part of a bring your own device (BYOD) program to control the access to company applications and documents. \n\nMaaS360 allows users to integrate mobile devices with enterprise systems and can be managed from a central unified console. It also provides security measures such as passcode policies, encryption enforcement, geo-fencing and detection and restriction of jailbroken and rooted devices. Corporate data can also be selectively wiped and lost or stolen devices can be remotely located, locked and wiped.\n\nMaaS360 includes a support feature that allows administrators to diagnose and resolve issues, locate lost or stolen devices, reset passcodes and more. Mobility Intelligence dashboards allow device monitoring and report generation. MaaS360 supports devices such as iPhone, iPad, Android, Windows Phone, Blackberry and Kindle Fire.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b727d69f-d542-4719-b748-f61c79e82eda.png","url":"https://www.softwareadvice.co.nz/software/423918/maas360","@type":"ListItem"},{"name":"Apex One","position":7,"description":"Apex One is a cloud-based and on-premise endpoint security solution, which assists small to large businesses with threat detection and virtual patching. Key features include URL filtering, pre-execution machine learning, root cause analysis and data encryption.\n\n\nThe application allows network engineers to assess system-level activities, track malware/ransomware attacks and conduct indication of compromise (IOC) scanning on data. Administrators can use the solution to monitor data losses occurred via email, USB or cloud and send alerts to employees for policy violations. Additionally, its web reputation management feature helps supervisors analyze website content and check IP addresses for malicious code. \n\n\nApex One lets users detect unauthorized site access, measure intrusion timeline and block execution of vulnerable apps. The solution comes with a mobile application for iOS and Android. Support is provided via phone, email and documentation and pricing is available on request.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/84110803-97c6-4ceb-860a-4089751f205e.png","url":"https://www.softwareadvice.co.nz/software/187789/apex-one","@type":"ListItem"},{"name":"Netsurion","position":8,"description":"Netsurion Managed Threat Protection provides the necessary synergy between people, process, and \ntechnology to truly deliver world-class cybersecurity today. What does this mean to you and your business? \nTo be covered today, you have to prevent, detect, and respond to active threats and even predict future \nattacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You \nneed to run fast and lean but cannot afford to risk gaps in cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.softwareadvice.co.nz/software/134470/eventtracker","@type":"ListItem"},{"name":"KACE","position":9,"description":"KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. \n\nDesigned for those seeking simplified total endpoint management: Inventory, service desk, asset management, license compliance, security, mobility, and more. 50 devices? 50,000? KACE does that. KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface. \n\nVisibility\nGet a complete inventory of all devices accessing your network and easily address security risks. How? Agentlessly, Agent-based, Modern Managed - KACE does it all.\n\nDevices\nSupport a range of device types for users working from home, on the go or in the office. Windows, Mac, Linux, iOS, Android, ChromeOS. \n\nAutorenew\nUse automated features to reduce IT team stress and limit impact to your users’ workflow.\n\nDeployment and discovery\nEasily scan for devices hitting your network and quickly deploy ready-to-use devices directly from the vendor.\n\nGranular inventory\nAccess a detailed inventory of data on every device in your environment, using either traditional or modern management.\n\nFlexible configuration\nDefine specific policies and administrative functions that can be applied to a single device or group of devices.\n\nApplication distribution\nAutomatic track, deploy and maintain current versions on software, keeping your environment secure and compliant.\n\nPatch management\nSecure your environment using minimal resources with set-it-and-forget-it patch identification and deployment.\n\nPowerful mobile device control\nRemotely locate, lock, erase or factory reset any enrolled mobile device.\n\nApp store integration\nProvision and deploy required apps from the store or those developed in-house according to enterprise distribution programs. Manually or automatically identify out-of-date apps and push updates.\n\nReporting\nUse existing templates or build ad-hoc reports on your entire endpoint fleet or just a subset of devices. Format reports to meet any compliance or organizational needs.\n\nBuilt-in help desk\nEnable users to easily report endpoint issues and quickly get a resolution, reducing the impact to their workflow and streamlining IT efforts.\n\nComprehensive device coverage\nFully manage all operating systems as well as printers, projectors, IoT devices and more from a single console.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30ec5e4a-8d78-42f3-ae66-3a8b2687d3b9.png","url":"https://www.softwareadvice.co.nz/software/364128/kace","@type":"ListItem"},{"name":"Huntress","position":10,"description":"Huntress is a cloud-based cybersecurity solution, designed to help small to midsize businesses determine and respond to threats and vulnerabilities. \n\nSecurity teams can use the dashboard to track active incidents and investigations and generate custom incident reports. The solution helps users identify malicious footholds and discover hackers attacking Windows applications. With Ransomware Canaries, IT professionals can detect potential ransomware incidents and evaluate the scope of an attack. It also facilitates endpoint protection by managing Microsoft Defender Antivirus.  \n\nPricing is available on request and support is extended via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/42a95385-7b83-410e-ab00-cddfb0b79881.png","url":"https://www.softwareadvice.co.nz/software/351433/huntress","@type":"ListItem"},{"name":"RoboShadow","position":11,"description":"RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vulnerability Assessment Capabilities.\n\nRoboShadow allows any organisation, anywhere on the planet, to get an Internal / External Vulnerability Assessment (70% of a $10,000 - $20,000 penetration test) completely free of charge.  Additional functionality is available, such as Cyber Heal which not only detects  vulnerabilities, but allows users to remediate them from a single platform.  Features inc.  External Vulnerability Scanner,  Zero Trust Device management, Azure AD / 365 integration and much more.\n\nThe platform is built in an intuitive way whereby users don't have to be an IT Genius to get results on our platform to get great results.  The platform is also built around the MSP model so users can ask their service providers to join with no cost to them either. \n\nFor  budget constrained users, they will find a full enterprise grade Cyber Audit Platform so they can narrow the Cyber Gap for you and your team.  For those who have more on their plate, they have some premium plans to ease the Cyber Overhead.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f3b016f-7efe-45a5-a414-faedfffe13a6.png","url":"https://www.softwareadvice.co.nz/software/357317/robo-shadow-cyber-platform","@type":"ListItem"},{"name":"Darktrace","position":12,"description":"Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c32604d5-57d2-45db-b8ce-a4592ee5ffdb.png","url":"https://www.softwareadvice.co.nz/software/307875/darktrace","@type":"ListItem"},{"name":"DataDome","position":13,"description":"DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobile apps, websites and APIs from online fraud, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. \n\nOur AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time.\n\nEasily deployed and ultra-scalable, DataDome is the core component of your application security at the edge. It is compatible with 100% of web infrastructure technologies, thanks to strong technical and business partnerships with all the market leaders. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups.\n\nDataDome detects, on average, a new bad bot every millisecond. Our customers rely on our AI-powered bot detection engine to detect, classify and block all automated threats across their mobile applications, websites and APIs in real time, without them having to think about it.\nHowever, behind the scenes, our threat intelligence and bot SOC teams are always at work. 24/7, they actively monitor the billions of requests processed by our AI to detect any situation requiring human intervention.\n\nDataDome’s cybersecurity technology protects 130+ customers worldwide, including TripAdvisor, Rakuten, The New York Times, Kurt Geiger, Footlocker, BlaBlaCar and Adevinta.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f0b2a8a-6e89-40cb-8b01-a1dff45c1e11.jpeg","url":"https://www.softwareadvice.co.nz/software/223561/datadome-bot-mitigation","@type":"ListItem"},{"name":"Cortex XDR","position":14,"description":"Cortex XDR (formerly Traps) is cloud-based and on-premise endpoint security solution, which assists security teams with threat detection and response management. Key features include malware protection, incident tracking, root cause analysis and records management. \n\n\nThe platform uses artificial intelligence and machine learning technology to collect data on endpoints, network and cloud, providing visibility to teams within the organization. It analyzes attack techniques and behaviours, prevents the launch of malicious executable files and blocks malware, exploits and ransomware. Additionally, it helps network administrators determine root cause of various threats to optimize triage and incident response, adapting defenses in real-time.\n\n\nCortex XDR integrates with various security applications such as WildFire, AlienVault USM, Cortex XDR and more. Its management service console enables administrators to review security events and analyze associated logs.\n\n\nSupport is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46b39c97-1a52-4800-8fa4-29be93f0f355.png","url":"https://www.softwareadvice.co.nz/software/82155/traps","@type":"ListItem"},{"name":"Cisco Umbrella","position":15,"description":"Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat defense against cybersecurity risks. It is used by organizations in sectors such as government, financial services, manufacturing, healthcare, retail, education and hospitality. The platform helps secure remote workers, guest Wi-Fi networks and distributed networks from evolving threats.\n\nThe solution integrates DNS-layer security with secure web gateway capabilities, cloud access security broker functionality and cloud-delivered firewall protection. It includes data loss prevention features to safeguard sensitive information and malware protection to detect and remove threats from cloud file storage applications. Remote browser isolation and zero trust network access enable secure connections to private applications and SaaS platforms. Threat intelligence powered by Cisco Talos provides AI-driven detection of known and emerging threats. Unified policy management with rule-based controls simplifies deployment and administration.\n\nThe platform is FedRAMP authorized for government use and operates on a global cloud architecture with distributed DNS resolvers. Features include web content filtering, shadow IT discovery and app blocking to maintain visibility and control over network activity. It supports securing SD-WAN deployments, protecting mobile users and defending off-network endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a0beb4d-3425-4cd1-87ae-b148c191bbcc.png","url":"https://www.softwareadvice.co.nz/software/432062/cisco-umbrella","@type":"ListItem"},{"name":"ESET PROTECT MDR","position":16,"description":"ESET PROTECT MDR offers comprehensive managed detection and response services designed to secure businesses with 250+ employees. This advanced solution combines continuous threat monitoring, real-time threat intelligence, and expert incident response to protect your organization from cyber threats. ESET's team of cybersecurity professionals works around the clock to detect, analyze, and mitigate potential vulnerabilities, ensuring your systems remain secure. With features like rapid incident response, detailed reporting, and proactive threat hunting, ESET PROTECT MDR enhances your organization's ability to manage and reduce vulnerabilities effectively. Trust ESET to provide the expertise and technology needed to safeguard your digital assets and maintain a robust security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a636085-1735-4764-b67d-d13b8edcfa00.png","url":"https://www.softwareadvice.co.nz/software/354381/eset-protect-mdr","@type":"ListItem"},{"name":"DriveStrike","position":17,"description":"DriveStrike is a data breach protection software designed to help businesses locate, track, lock and wipe all computers, laptops, tablets and phones across multiple locations to protect against stolen or lost devices, insider threats and terminated employees. Key features include data management, automatic user/device recognition, endpoint management, wireless network support, mobile content management and software management.\n\n\nOrganizations using DriveStrike can locate field employees and mobile fleet to report mileage and confirm destination time and route stops for team members. The platform records private and public IP address information, GPS coordinates and WiFi triangulation, allowing users to identify location change of devices in the distributed company computing network. Additionally, the group locations functionality enables managers to enter multiple location pins, which can be displayed according to the specified distance. \n\n\nDriveStrike offers device and data protection to ensure customer information privacy and data security whilst maintaining regulatory compliance with GDPR, HIPAA, DoD and SOX guidelines. It is available on monthly subscriptions and support is extended via documentation, FAQs, phone, email and online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5ac7cc25-2f46-4049-8fa5-087bdb293021.png","url":"https://www.softwareadvice.co.nz/software/151423/drivestrike","@type":"ListItem"},{"name":"Cisco Secure Endpoint","position":18,"description":"Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic and endpoints. The solution prevents threats at point of entry and continuously tracks files to detect and remove file-less malware, ransomware and all other kinds of intrusions. In addition, Cisco provides security services that helps businesses identify incoming threats from third-party interactions, assess vulnerabilities and create information security programs.\n\n\nCisco Secure Endpoint uses multiple preventive engines with a threat intelligence system to facilitate automated identification and virus blocking. It offers a complete overview and control of servers across multiple platforms such as Windows, Android, iOS, macOS and Linux. Features include malicious activity protection, malware exploit prevention and analysis of new threats via machine-learning, sandboxing and more. Additionally, the application suppresses attacks by separating an infected endpoint and blocking it across platforms and devices.\n\n\nCisco Endpoint integrates with various third-party applications such as Blackpoint SNAP Defense, IBM Resilient, CyberSponse SOAR and IBM BigFix. Pricing is available on request and support is extended via phone, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c5debce5-a64f-44c2-9b31-fc9f5bfa0bce.png","url":"https://www.softwareadvice.co.nz/software/402086/cisco-secure-endpoint","@type":"ListItem"},{"name":"INLYSE Malware.AI","position":19,"description":"INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware. It offers plugins for specific needs and provides an added layer of security beyond traditional anti-virus solutions.\n\nDon't let malware ruin your peace of mind, choose INLYSE Malware.AI for advanced and secure malware detection. With INLYSE Malware.AI, you can enjoy the following advantages:\n\n- Advanced malware detection using cutting-edge technology\n- Additional layer of security\n- Plugins for specific needs such as Web App Protection, Mail Client Security, Cloud Applications, Secure Browsing, Mail Server Security, and Microsoft 365\n- Self-learning algorithms and deep neural networks can recognize even the most advanced malware, cyber-attacks, zero-day exploits, and APT attacks within seconds of detection.\n- Upgrade your security with INLYSE Malware.AI and keep your files safe from malicious attacks. Try now and experience the power of visual AI-based malware detection.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f0d19a5a-f097-452c-9d11-838a57727fb7.jpeg","url":"https://www.softwareadvice.co.nz/software/387215/inlyse-malware-ai","@type":"ListItem"},{"name":"Senturo","position":20,"description":"Senturo: Total Device Protection and Fleet Management\n\nSenturo is an advanced, all-in-one platform designed to safeguard, monitor, and manage your organization’s mobile and desktop devices. Whether you operate in education, construction, healthcare, or any other industry that relies heavily on mobile technology, Senturo offers comprehensive support for Apple, Chromebook, Windows, and Android devices. From real-time tracking to compliance enforcement, Senturo helps you maintain a secure, efficient, and traceable IT fleet.\n\nComprehensive Device Security\nSenturo ensures your devices and data are always protected from theft, loss, and unauthorized access. Advanced tracking and monitoring features provide continuous visibility over your fleet, while proactive tools like geofencing, IP whitelisting, and automated notifications keep you informed of potential risks. Should a device go missing, Senturo’s recovery features, including remote lockdown, data wipe, and detailed tracking assistance, enable swift action to protect sensitive information and minimize downtime.\n\nIT Fleet Location Tracking\nSenturo’s intuitive, Google Maps-powered dashboard gives you complete visibility of your device fleet. Track device locations in real-time and access up to a year of historical movement data to ensure accountability and control. Whether you need to monitor an entire fleet across multiple sites or locate a single misplaced device, Senturo delivers the precision and insights you need.\n\nAdvanced Monitoring and Policy Compliance\nSenturo doesn’t just track devices—it actively secures them. Geofencing allows you to define specific zones for your devices, ensuring they remain within approved boundaries. Paired with IP whitelisting, Senturo ensures that your devices only connect to trusted networks. Real-time alerts notify your team the moment a device leaves a designated zone or connects to an unauthorized network. These proactive measures strengthen compliance with organizational policies and industry regulations, reducing the risk of violations.\n\nGeo-Compliance for Critical Operations\nSimplify the management of location-sensitive policies with Senturo’s geo-compliance capabilities. Enforce jurisdictional data protection rules, secure regional assets, and generate detailed location logs to streamline audits. These features are essential for industries like healthcare, education, and government, where strict compliance is often mandatory.\n\nStreamlined Mass Communication\nWith Senturo, you can instantly send critical updates or routine announcements to your entire fleet, ensuring seamless communication. Messages can be displayed prominently on device screens or read aloud, making it easy to reach all users, even in urgent situations.\n\nCentralized Multi-Platform Management\nManaging diverse devices has never been simpler. Senturo supports Apple, Android, Chromebook, and Windows devices, allowing you to oversee your entire fleet through a single, user-friendly platform.\n\nWhy Senturo is the Right Choice\nSenturo blends cutting-edge security, intuitive management tools, and actionable insights into a scalable, all-in-one solution. For schools managing thousands of student devices or businesses with a vast mobile fleet, Senturo delivers the tools needed to secure assets, optimize operations, and reduce risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/62b0795f-6de1-4716-bb25-0e43ffb224b3.png","url":"https://www.softwareadvice.co.nz/software/205978/hiddenapp","@type":"ListItem"},{"name":"ManageEngine Browser Security Plus","position":21,"description":"Browser Security Plus is an enterprise browser security solution crafted by ManageEngine, that empowers IT administrators to manage and bolster browser security across their networks seamlessly. Offering an array of features, this tool provides invaluable insights into browser usage patterns and add-on behaviors.\n\nUnified Command Center: IT administrators benefit from a centralized console that enables them to enforce robust security policies consistently across different browsers, ensuring a uniform and secure browsing environment enterprise-wide.\n\nTailored Security Policies: Browser Security Plus allows for the implementation of customized security policies for various browsers, providing a nuanced approach to addressing specific vulnerabilities and threats associated with diverse browser environments.\n\nEfficient Extension and Plug-in Oversight: Administrators gain precise control over browser extensions and plug-ins, mitigating potential security risks posed by unauthorized or vulnerable add-ons.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7527ef3-6536-472a-99c9-437fdf77b2f6.png","url":"https://www.softwareadvice.co.nz/software/435315/manageengine-browser-security-plus","@type":"ListItem"},{"name":"TypingDNA ActiveLock","position":22,"description":"To secure devices in work-from-anywhere environments, Cybersecurity teams (big and small) rely on TypingDNA ActiveLock to ensure only authorized users are accessing company equipment. By continuously authenticating the employee’s typing pattern while they’re using the device, ActiveLock will trigger an alert and lock the screen if the company computer is intentionally shared or gets into the wrong hands — protecting sensitive data and reducing the risk of fraud.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c57ded9-6a3b-40c2-bf11-20527b6e1ffb.jpeg","url":"https://www.softwareadvice.co.nz/software/366425/typingdna-activelock","@type":"ListItem"},{"name":"Portnox CLEAR","position":23,"description":"Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect compromised devices, and automate mitigation to high-risk devices. It allows staff members to configure essential security policies like two-factor authentication and define access control policies for wireless, wired and VPN connections.  Portnox Clear is used across a wide variety of industries such as in banking, defense, biotech, engineering, healthcare, and legal services.\n\nPortnox Clear enables IT professionals to set up role-based access, so only those who need access have access and guest accounts stay out of confidential company resources. The group-level policies allow administrators to create risk policies for multiple users and devices from within a centralized platform. Additionally, administrators can not only monitor device risks based on several custom criteria, such as encryption, location, firewall, certificates, updates and more, but they can automate mitigation of risk such as updating the firewall or uninstalling a risky application.\n\nPortnox Clear is vendor agnostic, so it works with your existing network infrastructure.  It also seamlessly integrates with several essential technology solutions such as MDM, AD,  SIEM, and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45e81243-0a43-460f-b6b8-902177a09f82.png","url":"https://www.softwareadvice.co.nz/software/355474/portnox-clear","@type":"ListItem"},{"name":"Nfina Technologies","position":24,"description":"Since 2012, Nfina Technologies has provided products and solutions to IT departments who seek the most up-to-date technology to satisfy their expanding compute and storage needs and make the most of their IT infrastructure budgets. We combine the most recent high-performance technology with a 5-year warranty that leads the industry and US-based technical assistance. Managed services are part of Nfina's hybrid cloud offerings, allowing you to concentrate on your business objectives while we handle the difficulties of an optimized IT infrastructure. Our crew gives each Nfina client individual attention because your business is a key component of our success.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/370db34b-678d-452a-9968-1cfcb5772462.jpeg","url":"https://www.softwareadvice.co.nz/software/397464/hybrid-cloud","@type":"ListItem"},{"name":"ESET PROTECT Complete","position":25,"description":"ESET PROTECT Complete delivers robust patch management for businesses with 250+ employees, providing both cloud-based and on-premises solutions. This comprehensive tool ensures your systems are always secure and up-to-date by automating updates and conducting thorough vulnerability assessments. ESET PROTECT Complete helps prevent security breaches by identifying and addressing potential weaknesses in your software and applications. With features like automated patch deployment, detailed reporting, and centralized management, ESET PROTECT Complete simplifies the patch management process, ensuring your IT environment remains secure and efficient. Trust ESET to keep your systems protected and running smoothly.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1fc20acc-e726-4c1b-89ac-ded00c086b4a.jpeg","url":"https://www.softwareadvice.co.nz/software/419404/eset-protect-complete","@type":"ListItem"}],"numberOfItems":25}
</script>
