Compare Endgame vs. Unbound Crypto-of-Things

Endgame is ranked 33rd in Endpoint Protection (EPP) for Business with 2 reviews while Unbound Crypto-of-Things is ranked 53rd in Endpoint Protection (EPP) for Business. Endgame is rated 8.0, while Unbound Crypto-of-Things is rated 0. The top reviewer of Endgame writes "The system intelligence gives you good detail for creating intelligence reports". On the other hand, Endgame is most compared with Carbon Black CB Defense, CrowdStrike and Symantec Endpoint Protection (SEP), whereas Unbound Crypto-of-Things is most compared with .
Cancel
You must select at least 2 products to compare!
Endgame Logo
1,507 views|1,314 comparisons
Unbound Crypto-of-Things Logo
0 views|0 comparisons
Find out what your peers are saying about Symantec, Microsoft, HCL and others in Endpoint Protection (EPP) for Business. Updated: March 2020.
406,070 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Endpoint Protection (EPP) for Business solutions are best for your needs.
406,070 professionals have used our research since 2012.
Ranking
Views
1,507
Comparisons
1,314
Reviews
2
Average Words per Review
430
Avg. Rating
8.0
Views
0
Comparisons
0
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Top Comparisons
Compared 23% of the time.
Compared 22% of the time.
Also Known As
Unbound CoT
Learn
Elastic
Video Not Available
Unbound Tech
Overview

Endgame's converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent.

Unbound Crypto-of-Things (CoT) ensures that your apps are secure regardless of the security posture of the device on which they’re deployed. A unified, single API is used to deploy a virtual root of trust that protects crypto keys at the application level, ensuring they cannot be compromised, cloned or tampered even if the device is infected by malware or controlled by an adversary.

Completely abstracted from underlying hardware, CoT can be deployed on any endpoint device and platforms; from IoT and mobile to laptops and even application servers and containers in the cloud or data center. Enable high trust operations like document signing, payments, blockchain transactions and authentication from any endpoint device.

Offer
Learn more about Endgame
Learn more about Unbound Crypto-of-Things
Sample Customers
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health CareMiTek
Find out what your peers are saying about Symantec, Microsoft, HCL and others in Endpoint Protection (EPP) for Business. Updated: March 2020.
406,070 professionals have used our research since 2012.
We monitor all Endpoint Protection (EPP) for Business reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.