• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government ERP Solutions
      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Search and Product Discovery
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Game Engine Software
      • Website Builders
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • Virtual Reality Development Software
      • AI-Augmented Code Modernization Tools
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Green Software Engineering
      • Event Brokers
      • Application Integration Platforms
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • AI Agent Development Platforms for Software Engineering
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Load Testing Tools
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Value Stream Management Platforms
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • API and MCP Testing Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Endpoint Protection Platforms

Endpoint Protection Platforms Reviews and Ratings

What is an Endpoint Protection Platform?

Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed endpoints — including desktop PCs, laptop PCs, virtual desktops, mobile devices and, in some cases, servers — against known and unknown malicious attacks. EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents, deployed to endpoints, and connected to centralized security analytics and management consoles.

EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections and file-less attacks using a combination of security techniques (such as static and behavioral analysis) and attack surface reduction capabilities (such as device control, host firewall management and application control). EPP prevention and protection capabilities are deployed as a part of a defense-in-depth strategy to help reduce the endpoint attack surface and minimize the risk of compromise. EPP detection and response capabilities are used to uncover, investigate and respond to endpoint threats that evade security protection, often as a part of broader threat detection, investigation and response (TDIR) capable products.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of CrowdStrike Falcon
CrowdStrike Falcon
Logo of SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Logo of Sophos Endpoint
Sophos Endpoint
For 50M-1B USD Companies
Logo of Sophos Endpoint
Sophos Endpoint
Logo of Trend Vision One
Trend Vision One
Logo of FortiEDR
FortiEDR
For North America
Logo of CrowdStrike Falcon
CrowdStrike Falcon
Logo of Sophos Endpoint
Sophos Endpoint
Logo of WatchGuard EPDR
WatchGuard EPDR
Integration & Deployment
Logo of CrowdStrike Falcon
CrowdStrike Falcon
Logo of SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Logo of Sophos Endpoint
Sophos Endpoint

Product Listings

Filter by

Products 1 - 20 of 114
Sort by
Logo of CrowdStrike Falcon

CrowdStrike Falcon

By CrowdStrike

4.7
(3006 Ratings)
customers choice 2026

The CrowdStrike Falcon platform features a single lightweight agent that delivers cutting-edge, AI-powered real-time protection and visibility. Designed to defend endpoints and workloads both on and off the network, it stops threats before they become breaches. Backed by adversary-driven threat intelligence and AI, the Falcon platform processes trillions of global events weekly in real time, fueling an advanced security data platform accessible through a unified command console.

Show More Details
Logo of SentinelOne Singularity Endpoint

SentinelOne Singularity Endpoint

By SentinelOne

4.7
(2857 Ratings)

SentinelOne Singularity Endpoint is a software designed to protect endpoints by autonomously detecting, preventing, and responding to threats across devices within an organization. The software leverages machine learning and behavioral AI to identify and mitigate a wide range of cyber threats, including malware, ransomware, and fileless attacks. It provides continuous monitoring and automated remediation capabilities to help reduce manual intervention and response time during security incidents. SentinelOne Singularity Endpoint integrates with existing IT security and management workflows, offering visibility into endpoint activities and assisting organizations in maintaining compliance by ensuring devices meet security standards. The software is engineered to address business challenges related to endpoint protection, threat management, and operational efficiency in cybersecurity environments.

Show More Details
Logo of Sophos Endpoint

Sophos Endpoint

By Sophos

4.8
(2054 Ratings)
customers choice 2026

Sophos Endpoint is a software designed to protect computers and mobile devices from malware, exploits, ransomware, and other cyber threats. The software integrates antivirus, web filtering, and application control to secure endpoints against unauthorized access and harmful content. It features centralized management for policy enforcement and monitoring, enabling organizations to maintain compliance and reduce the risk of security breaches. The software employs behavioral analytics to identify and block suspicious activity, assists with threat detection and response, and provides reporting capabilities for security oversight. It helps organizations address challenges related to data protection, system integrity, and operational continuity by delivering security measures that adapt to evolving threats.

Show More Details
Logo of Microsoft Defender for Endpoint

Microsoft Defender for Endpoint

By Microsoft

4.4
(1911 Ratings)

Microsoft Defender for Endpoint is an endpoint security software designed to detect, investigate, and respond to advanced threats across devices within an organization. The software provides protection against malware, ransomware, and other malicious activities by leveraging behavioral sensors, threat intelligence, and cloud-based analytics. It supports automated response and remediation actions, secures data through attack surface reduction, and integrates with other security solutions for centralized management. Microsoft Defender for Endpoint addresses business challenges related to protecting endpoints from evolving cyber threats, managing vulnerabilities, and maintaining compliance with organizational security policies.

Show More Details
Logo of Trellix Endpoint Security Suite

Trellix Endpoint Security Suite

By Trellix

4.5
(1876 Ratings)

Trellix Endpoint Security Suite is a software designed to protect devices against various cyber threats, including malware, ransomware, and advanced attacks. The software offers integrated threat prevention, detection, and response capabilities, aiming to safeguard endpoints within an organization’s network. It uses machine learning and behavioral analytics to identify suspicious activities and offers centralized management for deploying security policies across multiple devices. Trellix Endpoint Security Suite supports monitoring, investigation, and remediation of security incidents, helping organizations address vulnerabilities and maintain compliance with regulatory standards. This software is built to assist businesses in improving endpoint visibility and resilience against evolving security challenges.

Show More Details
Logo of Symantec Endpoint Security Complete

Symantec Endpoint Security Complete

By Broadcom

4.4
(1624 Ratings)

Symantec Endpoint Security Complete is a software designed to protect endpoints such as laptops, desktops, and mobile devices from a variety of cybersecurity threats. The software integrates multiple security technologies, including antivirus, firewall, intrusion prevention, and device control, to help prevent malware, ransomware, exploitation, and unauthorized access. It incorporates machine learning and behavioral analysis to identify and stop advanced and emerging threats. The software includes capabilities for threat containment, remediation, vulnerability management, and application control. Centralized management enables administrators to configure policies, monitor endpoint activities, and respond to incidents. Symantec Endpoint Security Complete addresses challenges related to securing distributed workforces and maintaining compliance with security policies across multiple device types and operating systems.

Show More Details
Logo of Trend Vision One - Endpoint Security

Trend Vision One - Endpoint Security

By Trend Micro

4.6
(1453 Ratings)

Trend Vision One - Endpoint Security is a software designed to provide comprehensive threat protection for endpoints within an organization. The software offers features such as malware detection, vulnerability protection, application control, and behavioral analysis. It helps organizations identify, analyze, and respond to emerging security threats across endpoints, including laptops, desktops, and servers. The software integrates with security operations to deliver incident response capabilities and automated remediation, enabling organizations to address risks and reduce attack surfaces. By streamlining management and providing visibility into endpoint activity, the software assists businesses in maintaining security compliance and protecting critical assets from cyber threats.

Show More Details
Logo of ESET PROTECT Platform

ESET PROTECT Platform

By ESET

4.7
(1105 Ratings)
customers choice 2026

ESET PROTECT is a unified cybersecurity platform that delivers modern Endpoint Protection Platform (EPP) and Extended Detection and Response (XDR) capabilities in a single, integrated solution. It protects Windows, macOS, Linux, Android, and iOS devices, including Mobile Device Management functionality.

The platform offers multi-tenant management with real-time visibility across multiple perimeters, providing comprehensive reporting and security operations from a single pane of glass. It can be securely deployed either in the cloud or on-premises, giving organizations the flexibility to choose the model that best fits their needs and constraints.

It combines strong prevention, advanced detection, and automated response with additional capabilities such as vulnerability and patch management, cloud-based sandboxing, and full disk encryption, helping organizations strengthen prevention, detection, and response across their entire environment.

Show More Details
Logo of ThreatDown Endpoint Detection and Response

ThreatDown Endpoint Detection and Response

By Malwarebytes

4.6
(903 Ratings)

ThreatDown Endpoint Detection & Response (EDR) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. It provides protection against a range of threats, including malware, ransomware, zero-day exploits, phishing, and other threats with a suite of tools to detect, investigate and contain even human-operated attacks that bypass prevention layers. Seven-day ransomware rollback allows organizations to restore systems. ThreatDown solutions employ machine learning and AI to provide accurate threat assessments. The simplified management component creates a unified dashboard for real-time monitoring and prioritizing remediation, catering to organizations of all sizes.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.5
(811 Ratings)

Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.

Show More Details
Logo of Aurora Endpoint Security

Aurora Endpoint Security

By Arctic Wolf Networks

4.7
(797 Ratings)

CylanceENDPOINT is an AI-based Endpoint Protection Platform (EPP) that leverages Cylance® 7th generation AI and machine learning capabilities to block cyberattacks and provides flexible controls for safeguarding against sophisticated threats even working offline. – No human intervention, internet connections, signatures files, heuristics, or sandboxes required. In addition, taking a comprehensive approach to be preventative-first CylanceENDPOINT aims to prevent the zero-day threat, and phishing attacks, effectively stopping ransomware in its tracks on every device you have.

Show More Details
Logo of Bitdefender GravityZone

Bitdefender GravityZone

By Bitdefender

4.7
(719 Ratings)
customers choice 2026

GravityZone is a comprehensive cybersecurity platform which delivers prevention, protection, extended detection and response for organizations of all sizes across multi-, hybrid-cloud servers, workloads, endpoints, networks, productivity apps, users, identities and mobile devices. The defense-in-depth architecture integrates security insight and control in a unified management console where administrators centrally monitor and manage their cybersecurity risk posture. The management console also provides investigation and remediation capabilities. GravityZone’s multi-layered Security strategy is built on advanced artificial intelligence/machine learning technologies that protect against known and unknown cyber attacks. To balance between accurate threat detection and creating unnecessary noise, advanced algorithms are constantly updated to minimize the time the local IT team must dedicate to managing security so they can focus on advancing the goals of their organization.

Show More Details
Logo of Cortex XDR

Cortex XDR

By Palo Alto Networks

4.6
(641 Ratings)

Cortex XDR is a software developed by Palo Alto Networks that integrates data from network, endpoint, and cloud sources to detect, investigate, and respond to cyber threats. The software enables security teams to identify suspicious behavior, conduct root cause analysis, and respond to incidents through automated response capabilities. It provides analytics-driven threat prevention and leverages behavioral analytics to correlate alerts across different environments, helping organizations reduce risks from advanced attacks. Cortex XDR addresses challenges of fragmented security data and manual threat investigations by consolidating security operations into a single platform, allowing for more efficient detection and response workflows.

Show More Details
Logo of WatchGuard EPDR

WatchGuard EPDR

By WatchGuard

4.7
(541 Ratings)

WatchGuard EPDR is an endpoint protection, detection, and response software designed to safeguard endpoints by combining automated prevention with advanced detection technologies. The software integrates traditional antivirus functions with behavioral monitoring and threat hunting to identify, block, and respond to known and unknown threats such as malware, ransomware, and fileless attacks. WatchGuard EPDR delivers continuous visibility and control over endpoint activities, enabling organizations to address vulnerabilities and enforce security policies across devices. It provides centralized management, contextual threat intelligence, and remediation capabilities to help organizations protect sensitive data, maintain regulatory compliance, and minimize disruptions caused by security incidents.

Show More Details
Logo of Carbon Black Cloud

Carbon Black Cloud

By Broadcom

4.4
(525 Ratings)

Carbon Black Cloud is a software that provides endpoint protection and threat detection capabilities. It integrates various security functions including prevention, detection, investigation, and response, aiming to secure endpoints across organizations. The software collects and analyzes unfiltered data from endpoints to help identify suspicious activity and potential threats. It supports automated responses and remediation, assisting organizations in addressing and managing cyber incidents. Carbon Black Cloud is designed to help businesses reduce the risk of data breaches and maintain security posture by offering visibility into endpoint activity, flexible policy management, and tools for investigating security incidents.

Show More Details
Logo of Sophos Endpoint Protection (Legacy)

Sophos Endpoint Protection (Legacy)

By Sophos

4.3
(407 Ratings)
customers choice 2026

Sophos Endpoint Protection (Legacy) is a software designed to secure devices and endpoints from malware, ransomware, and other cyber threats. The software includes features such as antivirus, web filtering, application control, device control, and host-based intrusion prevention to help protect business environments. It provides real-time protection by scanning files, websites, and applications for potential risks, and enables administrators to manage security policies across multiple devices. The software aims to address the challenge of managing threats to endpoints within organizations by centralizing security controls and reporting, offering a method for organizations to protect sensitive data and maintain regulatory compliance.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.8
(386 Ratings)
customers choice 2026

FortiClient is an endpoint security software that provides integrated protection features including antivirus, web filtering, firewall, and VPN capabilities. The software enables secure remote access to corporate networks, helps identify and prevent malware, and enforces security policies across devices. It addresses business needs related to safeguarding endpoints and maintaining compliance with organizational security standards. FortiClient is designed to work within network environments to reduce the risk of data breaches and system compromise by offering centralized management and automated threat response. The software assists organizations in enhancing workforce productivity while maintaining a secure computing environment.

Show More Details
Logo of Trend Vision One

Trend Vision One

By Trend Micro

4.7
(379 Ratings)

Trend Vision One is a cybersecurity software developed to provide extended detection and response capabilities across endpoints, servers, cloud environments, and email. The software integrates security data from multiple sources to enable threat detection, investigation, and response through a unified console. It offers automated threat analysis, security posture visibility, and incident remediation tools designed to improve organizational security operations and minimize the impact of cyber threats. The software is utilized by businesses to address challenges such as detecting advanced attacks, reducing investigation times, and maintaining compliance with security standards. Its feature set includes correlation of security events, comprehensive reporting, and integration with third-party security solutions.

Show More Details
Logo of Cisco Secure Endpoint

Cisco Secure Endpoint

By Cisco Systems

4.2
(325 Ratings)

Cisco Secure Endpoint is a software designed to provide advanced endpoint protection through threat detection, prevention, and response capabilities. The software integrates with security infrastructures to monitor endpoint activities, block malicious behavior, and contain threats. It enables centralized management, leveraging cloud and on-premises options for deployment. Cisco Secure Endpoint uses behavioral analytics, machine learning, and retrospective analysis to identify suspicious files and processes, helping organizations safeguard sensitive data and maintain compliance requirements. The software assists business teams in streamlining investigation and remediation workflows, reducing manual effort and improving operational efficiency for endpoint security management across diverse device environments.

Show More Details
Logo of Cybereason Defense Platform

Cybereason Defense Platform

By LevelBlue (Cybereason)

4.3
(314 Ratings)

Cybereason Defense Platform is a software designed to provide endpoint protection and threat detection across enterprise environments. The software delivers capabilities including prevention, detection, and response to malicious activities by leveraging behavioral analytics and machine learning. It offers real-time monitoring of endpoints, automated remediation, and investigation tools to help organizations address advanced threats such as ransomware, fileless attacks, and lateral movements. By integrating threat intelligence and correlation features, the software aims to streamline security operations and reduce the time required to identify and mitigate potential risks. The solution is intended to assist businesses in managing and protecting their digital assets from cyber threats while maintaining operational continuity.

Show More Details

Features of Endpoint Protection Platforms

Updated September 2025

Mandatory Features:

  • Protection against malware and file-less attacks using endpoint real-time scanning and anti-malware techniques

  • Endpoint attack surface reduction capabilities, such as device control, host firewall, exploit protection or application control

  • Detection and blocking of endpoint threats using behavioral analysis of endpoint, application and end-user activity

Peer Lessons Learned for Endpoint Protection Platforms

Published May 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Endpoint Protection PlatformsLessons learned by your peers shared on Gartner Peer Insights for Endpoint Protection PlatformsPeer Lessons Learned for Endpoint Protection PlatformsLesson 1LESSON1Assess the Organization's Security Needs;Obtain Stakeholder Buy-In for EPP SuccessLesson 2LESSON2Evaluate EPPs Through POCs; AssessIntegration Capabilities With Existing SystemsLesson 3LESSON3Drive Change Management; ProvideComprehensive EPP Training for Quick UserAdoptionLesson 4LESSON4Manage Workflows and Design GovernancePolicies Ahead of the EPP ImplementationLesson 5LESSON5Utilize Third-Party and Vendor Support toImplement the EPP in Phasesn = 359Source: Reviews (359) submitted to Gartner Peer InsightsID: 6512571Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Endpoint Protection PlatformsCritical Capabilities for Endpoint Protection Platforms
Gartner Peer Insights 'Voice of the Customer': Endpoint Protection Platforms

Top Trending Products

CrowdStrike FalconHuntress Managed EDRTrend Vision One - Endpoint SecurityESET PROTECT PlatformMicrosoft Defender for EndpointSentinelOne Singularity EndpointSophos EndpointCortex XDRBitdefender GravityZoneGenian Insights E

Popular Product Comparisons

CrowdStrike Falcon vs Microsoft Defender for EndpointMicrosoft Defender for Endpoint vs Symantec Endpoint Security CompleteCortex XDR vs CrowdStrike FalconBitdefender GravityZone vs CrowdStrike FalconCortex XDR vs Microsoft Defender for Endpoint

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.