Second Wave of Players Push Progression in Evolving Endpoint Security Market
There is an evolutionary arc in endpoint security that frames the present moment of this Observatory report. One with humble beginnings of singular-purpose endpoint agents detecting viruses. Since those early days (when many vendors in this report were active), this realm of information security has rapidly transformed as the volume of endpoints expanded to firewalls, servers, virtual machines, mobile, embedded devices, and IoT. Simultaneously, the functionality of the increasingly lighter-weight agents widened, fostering inter-device communication across vast networks and facilitating a boundless permutation of information flow.
Introduction
With that backdrop, allow us a small caveat that no single report could encompass all factors at play with endpoint protection platforms. However, this Observatory features the most comprehensive and current end-user data and feedback about the marketplace. In addition to relying upon ETR’s industry-leading evaluation and spending intentions data, this report also leverages a new syndicated data set: the ETR Market Array. This debut ETR Market Array for Endpoint Protection Platforms (EPP) study was designed specifically for the endpoint market, targeting security professionals and capturing spending and usage metrics, as well as product feature rankings, ROI, Net Promoter Scores (NPS), and more for the endpoint players encompassed in this Observatory. This report utilizes some of that market intelligence data; in addition, the full Market Array study on Endpoint Protection Platforms is available separately.
While structuring a grouping of vendors that appeases all definitions is futile, this Observatory for EPP vendors categorizes the vendor group in two ways. First, we break down the data-driven plotting of each vendor into our four Observatory Scope vectors. Second, we sort the vendors by their historical entry into the endpoint protection marketplace, beginning with the first generation of vendors with a pre-existing history in antivirus that are still serving the market today. Next, we identify the interesting subgroup of vendors that were originally utilized for their networking acumen before developing endpoint security functionality, including Cisco, Palo Alto Networks, Fortinet, and Check Point. Then, we focus on the next generation of endpoint players robustly driving the ongoing evolution of the market, including CrowdStrike, SentinelOne, Tanium, and others. Lastly, we touch upon mobile-native players like Lookout and Zimperium.
This Observatory report examines endpoint protection vendors by triangulating data from ETR’s Technology Spending Intentions Survey (TSIS), Emerging Technology Survey (ETS), commentary from ETR Insights Interviews with IT decision makers (ITDM) from the ETR Community, and proprietary industry analysis by our research staff.
The Observatory Scope
The plotting of vendors across the Observatory Scope is supported wholly by ETR’s exclusive market intelligence and spending intentions data sets (see Figure 1). The Leading vector in this period consisted of CrowdStrike, Microsoft Defender, Palo Alto Networks, and Fortinet. CrowdStrike led in Momentum, while Microsoft Defender dominated in Presence. Palo Alto Networks was solidly positioned in the middle of this group in both measures, while Fortinet, who has been called a “Swiss army knife of tech vendors” due to its broad product offerings, captured enough Momentum and Presence to take the fourth and final spot within the Leading vector.
The Advancing and Trailing vectors were less populated. SentinelOne broke into the Advancing category due to elevated Momentum, which was the second highest, but failed to reach the Leading category because of lower overall Presence. Tanium joins SentinelOne in the Advancing vector based on the fifth-highest Momentum but still trails many peers in Presence. Occupying the Tracking vector is the well-established Cisco, where the vendor was ranked in the top three in Presence but was shy of the Leading vector due to lower Momentum.
In this ETR Observatory, numerous vendors fell within the Trailing vector. While Tanium, Trellix, Carbon Black, Trend Micro, and Sophos all held positive Market Array Net Scores, their relative position was much lower than peers. Malwarebytes had a Net Score of zero, whereas Check Point exhibited negative spending intention levels.
Spending Intentions

Figure 2. ETR’s Market Array Net Score for Endpoint Protection Platform vendors was derived from a survey of 336 security-expert ITDMs.
In Figure 2, we exhibit the Market Array Net Score for each vendor within the EPP marketplace. This tracks the forward-looking spending trajectory for each vendor’s endpoint security offerings and differs from ETR’s TSIS, which tracks overall spending projections at the company and sector-wide levels. The data visualized in this figure will be referenced throughout this Observatory report.
CrowdStrike leads with a 61.4% Net Score, driven by the highest level of Increase spend (58% of the vendor’s unique respondents). SentinelOne’s Net Score comes in second and stands out with the highest expected Adoption percentage at 13%. Meanwhile, the ubiquitous Microsoft Defender rounds out the top three with a Net Score slightly below 50%, highlighted by the lowest level of Negative spend (Decrease + Replace).
The peloton of vendors resting in the middle has spending scores ranging from 37% to 16% and consists of (in order) Tanium, Palo Alto Networks, Fortinet, Trellix, and Cisco. Palo Alto Networks, Fortinet, and Cisco all stand on solid footing, with 88%, 89%, and 84% (respectively) of their unique respondents citing either stable or increased spending intent on their vendor’s endpoint products. That is a remarkable feat for all three vendors within an EPP-specific study, considering their origins in the networking sector before branching into security.
On the other end of the spectrum, Symantec (Broadcom), Check Point, and Trellix (formerly McAfee and FireEye) captured the highest anticipated Replacement rates among their respective respondents, ranging from 13% to 12% to 11%, respectively. Trellix is a curious case since its 11% Replacement rate is offset by an equal 11% of its respondents showing intent to Adopt the product. Lastly, given the recent acquisition of Carbon Black (VMware) by Broadcom, that vendor’s relatively high Replacement rate of 8% is of interest, as anecdotal commentary from ETR Insights guests highlights concern regarding the private equity owner’s intentions with the long-tenured endpoint player. One CISO for a large consumer enterprise directly stated, “We have Carbon Black, but the acquisition by VMware and now private equity has us really concerned about the long-term health of that product. So, our intention is probably to change it.”
The Vendor Breakdown
With the data-driven positioning of the Observatory Scope explained, here we break down the vendor-specific categorization of the varying endpoint players, with supporting data and ITDM commentary.
I. First-Generation Players: Malwarebytes, Microsoft, Sophos, Symantec, Trellix, TrendMicro
While some might be surprised to see Microsoft in this first grouping, it is historically accurate. Before Microsoft became the omnipresent Goliath it is today, the vendor made its foray into the market by building endpoint encryption into its operating systems on all Windows devices (Apple did the same for its macOS as well, and Jamf has successfully launched itself from that role these days). One CISO recalls the general attitude of that time as “Why would I pay you more money to secure the computer that you’re giving me? It should already be secure." Of course, back then, the idea that Microsoft would become a dominant enterprise security player was unfathomable. One CISO of a large hospitality enterprise remembered, “Ten years ago, I would have laughed if you told me to use Microsoft’s endpoint security tool. But as an industry, we moved way beyond that, and Microsoft has gained a lot of credibility and industry power in having such a big ownership of the market. Looking at this [ETR data] now, it makes sense with all the investment that Microsoft has done and the security ecosystem they built.”
Another ITDM backed up the notion that Microsoft’s security services are seen as significantly improved. “I can remember as recently as 2019, I wouldn’t have trusted Microsoft Defender any further than I could throw it, but it’s become a great product in the last number of years.” Microsoft Defender for Endpoint, formerly Windows Defender Advanced Threat Protection (ATP), is praised for its comprehensive and unified platform. “If I look at Defender, ATP is actually a pretty solid endpoint security product. They’re definitely getting better with time.”
Microsoft’s suite of Defender offerings is extremely broad, boasting solutions and services for basic antivirus, EDR, Identity, IoT, Cloud Security, SIEM, and even unified XDR offerings. As such, enterprise security practitioners are being won over. “I still don’t think I would put all my eggs in the Microsoft basket,” said one CISO. “But I would definitely consider them for this if they could prove that they’re going to be an open platform and still be able to integrate with competitors.” Hidden within that last comment is the final hurdle left for Microsoft to clear because Microsoft’s capacity is often seen as limited to its own suite, forcing clients to consider alternative players for other areas of security, such as networking, for instance. “If you look at Microsoft 365 Defender, maybe it’s really great at protection of your environment, but when it comes to detection of network anomalies and detection of events, they don’t seem to play at nearly as mature a level as Cisco does.” That said, Microsoft Defender tightly integrates with its other O365 services, which can be an advantage for the majority of large enterprise organizations that already use the universal vendor.
The next highest vendor of this first-generation classification in terms of EPP spending intentions is Trellix, a formed entity that combined McAfee with FireEye in 2022 to create what is being marketed as a unified XDR security provider. Trellix captured a 17.6% Net Score within the endpoint market, with 39% of the vendor’s unique respondents indicating intent to either newly adopt or increase spending with the product. The specific spending intent data for Trellix within the Market Array for Endpoint Protection is much higher than the vendor’s aggregate spending levels across all of Information Security that was captured within ETR’s broader OCT23 TSIS.
Two more names in this grouping of early entrants into the endpoint market were also the only two vendors without any Replacement indications in the Market Array for EPP, and they were Trend Micro and Malwarebytes. Unfortunately, neither of these two vendors had any new Adoptions either. Of the two, Trend Micro had the higher EPP-specific Net Score at 6.7% versus Malwarebytes at an even zero, meaning that positive and negative spend intent were equal and offsetting. Malwarebytes is known for being effective, easy to use, and affordable, and is often marketed as a managed service for businesses that don’t have in-house capabilities. This notion is supported by the Market Array Vendor Strengths data, where easy implementation, integration, and offering good value for the money are top strengths attributed to the vendor.
Trend Micro is one of the numerous vendors in this grouping that offers much more than endpoint protection, including a full suite of CSPM, networking security, vulnerability assessment, and even penetration testing. The wide range of offerings does not translate to increased share, however, as ETR data shows flat Pervasion rates for the vendor over the last 12 months, which are stagnant at 14%. That is a data trend supported by ITDM commentary like this: “I know they have their niche as a cheaper alternative, but I think that Trend Micro is one that people are going to be moving away from because they’re not innovating at the same velocity.” Despite that sentiment, in the ETR Market Array for EPP, Trend Micro ranked third highest in the ROI tracker (out of 18 endpoint vendors), trailing only Microsoft Defender and SentinelOne. Such a favorable ROI sentiment from end users is likely attributable to the more affordable pricing that Trend Micro offers.
II. Networking Vendors that Evolved into Endpoints – Check Point, Cisco, Fortinet, Palo Alto
In our second grouping of endpoint protection players, we pair four vendors whose roots are deeply embedded in the networking world but have since spread out to cover a wide swath of security functions and services. Unlike the previous group, who began as endpoint-first players, these companies have leveraged their strong networking market share to land and expand into endpoint-driven features. This group includes Check Point, Cisco, Fortinet, and Palo Alto Networks and was described by one CISO in the ETR Community as such, “Several years ago, Fortinet was the go-to for network security if you wanted a better-than-good but also inexpensive solution. They were the cheaper alternative to Palo Alto, but they performed well. They’ve carried that over into that endpoint space, and there’s absolutely a place in the market for that. Not everyone is going to buy a Ferrari, and if they’re a Honda, or maybe even a Mercedes, there is a space for that.” He adds, “I would view them along with Palo Alto, Cisco, and Check Point, in that same class, meaning they started in the network and they’ve expanded into endpoints.”
Based on the Market Array for EPP data, Palo Alto Networks leads this particular group as one of the two companies in our Leading vector along with Fortinet. Palo Alto Networks also captured the fifth highest EPP-specific Net Score at 33.8%, a level that was driven by 42% of its unique respondents citing an intention to Increase spending with the vendor’s endpoint products. Palo Alto Networks, of course, is known for much more than endpoint-related security services. With origins in hardware, much like this entire grouping, Palo Alto Networks already had a large installed base to expand into and has deployed a deft roll-up strategy to catch up to leading competitors when in-house R&D and innovation weren’t fast enough. As one security manager stated, “Palo Alto’s growth by acquisition is well-recognized. We are all familiar with the business model of Palo Alto, to find the best solutions out there that you either aren’t competing with or, if you are, acquire them and then rebrand them as your own.”
Palo Alto Networks is not the only company in this networking grouping willing to use its market cap and cash flow to retain its market-leading presence, with Cisco deploying a similar playbook. However, simply acquiring solutions and rebranding them does not ensure successful integration and customer loyalty. This is why it is critical to point out that Palo Alto Networks also leads in another auspicious metric within this data set, which is the lowest Churn Score of all featured endpoint vendors. This new and proprietary metric is included in ETR’s Market Array study and is based on customer expectations of longevity and stickiness of a product offering.
Fortinet holds the second-highest EPP Net Score within this networking categorization at 27%, which was buoyed by a lack of Replacement indications among its unique respondent base. While Fortinet was most widely recognized for its networking and hardware prowess, especially affordable firewalls, the vendor has evolved into a full-service shop for many budget-minded IT decision makers. Fortinet’s networking, firewall, endpoint, and SIEM capabilities enable it to collect and analyze security logs from across the organization to provide real-time visibility into security threats and incidents. The company also boasts aspects of security orchestration and automation response (SOAR) that, when added all together, sound an awful lot like the modern interpretation of an XDR. As one ITDM noted, “We do work with Fortinet, and they do bring a lot to the table, and I think have really good value. They’re not just a firewall. They can do a lot of other things; they can do endpoints and SIEM for you.” Another price-sensitive Director of Technology for a higher education institution even went as far as switching away from an existing vendor to sign a more palatable contract with Fortinet. “We switched from Palo Alto to Fortinet. Palo Alto is great technology; they’re just terribly priced. Palo Alto has lost a ton to Fortinet in education, and I don’t foresee that changing until Palo changes their pricing model.”

Figure 3. The above image is an abridged visualization of ETR’s Market Array Individual Vendor Strengths analysis. The full data model ranks 10 answer options and is searchable by all vendors. See the full Market Array data for details.
III. Second Generation Vendors – Carbon Black, CrowdStrike, SentinelOne, Tanium


The structure of the ETR Market Array study was designed to capture metrics based on the survey respondents’ choice of EPPs being deployed within their enterprise, and as a result, some vendors were cited more often than others. This section quickly touches upon those vendors that did not garner enough citations to merit inclusion in many of the analyses depicted above.Conclusion: Progression Plus Integration Will Fulfill the XDR Promise
Straight from Technology Leaders
We eliminate bias and increase speed-to-market by cutting out the middleman and going straight to the voice of the customer