Loading...

Looking for alternatives to Daytripper? A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range. Browse 16 similar Endpoint Security tools below, compare features side-by-side, and find the best fit for your security stack.
Automated patch management for Windows, macOS, Linux, and applications
PC optimization tool for cleaning junk files, improving performance & privacy
Cloud-native patch management for Windows, macOS, and Linux endpoints
Cloud-based patch management for Windows, macOS, and Linux endpoints
Cloud-based endpoint mgmt platform for patching, config, & software deployment
Encrypted desktop security for Windows & Mac with antivirus integration.
AI-powered distributed antivirus platform for Windows home & business users.
Managed Bitdefender GravityZone EPP deployment for small businesses.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
Free antivirus software that scans and removes malware, viruses, and ransomware
Enhances Windows OS security through system modifications and settings adjustments.
A repository containing scripts and configuration files to help administrators implement Microsoft AppLocker for application whitelisting based on NSA security guidelines.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.
A Windows security hardening tool that disables potentially dangerous features in Windows 10/11 and common applications to reduce attack surface for individual users.
Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.
Get strategic cybersecurity insights in your inbox