
1. Anti-Malware
1.1. Eastern Europe
1.1.1. Czech Republic
1.1.1.1. Avast
1.1.1.2. TrustPort
1.1.1.3. SonicWall
1.1.2. Denmark
1.1.2.1. BullGuard
1.1.2.2. SonicWall
1.1.3. Netherlands
1.1.3.1. AVG
1.1.3.2. SonicWall
1.1.4. Romania
1.1.4.1. Bitdefender
1.1.4.2. SonicWall
1.1.5. Slovakia
1.1.5.1. ESET
1.1.5.2. SonicWall
1.2. Emerging Asia/Pacific
1.2.1. India
1.2.1.1. eScan
1.2.1.2. K7 Computing
1.2.1.3. SonicWall
1.3. Latin America
1.3.1. Spain
1.3.1.1. Optenet
1.3.1.2. SonicWall
1.4. Mature Asia/Pacific
1.4.1. China
1.4.1.1. Qihoo
1.4.1.2. Rising International Software
1.4.1.3. SonicWall
1.4.2. South Korean
1.4.2.1. AhnLab
1.4.2.2. BKAV
1.4.2.3. ESTsoft
1.4.2.4. SonicWall
1.5. Middle East and Africa
1.5.1. Israel
1.5.1.1. Check Point Software
1.5.1.2. SonicWall
1.6. North America
1.6.1. Cyren
1.6.2. Fortinet
1.6.3. MalwareBytes
1.6.4. McAfee
1.6.5. McAfee
1.6.6. Microsoft
1.6.7. PC Pitstop
1.6.8. Reason Core Security
1.6.9. Roboscan
1.6.10. SonicWall
1.6.11. Symantec
1.6.12. ThreatTrack
1.6.13. Total Defense
1.6.14. Trend Micro
1.7. Russia
1.7.1. Kaspersky
1.8. Western Europe
1.8.1. Austria
1.8.1.1. Ikarus Security
1.8.1.2. SonicWall
1.8.2. Finland
1.8.2.1. F-Secure
1.8.2.2. SonicWall
1.8.3. Germany
1.8.3.1. Avira
1.8.3.2. EgoSecure
1.8.3.3. G-Data
1.8.3.4. Kromtech
1.8.3.5. SonicWall
1.8.4. Norway
1.8.4.1. Norman
1.8.4.2. SonicWall
1.8.5. United Kingdom
1.8.5.1. Sophos
1.8.5.2. SonicWall
1.8.6. Poland
1.8.6.1. Arcabit
1.8.6.2. SonicWall
2. Application Control/Whitelisting
2.1. Airlock Digital
2.2. AppSense
2.3. Avecto
2.4. Carbon Black
2.5. EgoSecure
2.6. Faronics
2.7. Heat Software
2.8. Ivanti
2.9. McAfee
2.10. Sophos
2.11. Symantec
2.12. Trend Micro
3. Application Isolation
3.1. Blue Ridge Networks
3.1.1. http://www.blueridge.com/index.php/products/appguard/consumer
3.2. HP
3.3. Bufferzone
3.4. Invincea
3.4.1. SandBoxie
3.5. VMware
4. Device Management
4.1. Absolute Software
4.2. Beachhead Security
4.3. Blackberry
4.4. Citrix
4.5. Globo
4.6. Good Technologies
4.7. IBM
4.8. Landesk
4.9. MobileIron
4.10. Mojave
4.10.1. https://www.mojave.net/
4.11. SAP
4.12. Sophos
4.13. Soti
4.14. Symantec
4.15. Tangoe
4.16. VMware
4.16.1. Airwatch
4.17. EgoSecure
5. Endpoint Detection and Response (EDR)
5.1. Agent-Based
5.1.1. BlackBerry
5.1.1.1. Acquired Cylance
5.1.2. Carbon Black
5.1.2.1. Red Canary
5.1.3. Cisco
5.1.3.1. AMP For Endpoint
5.1.4. Countertack
5.1.5. CrowdStrike
5.1.6. Cyberbit
5.1.7. Cyberreason
5.1.8. Digital Guardian
5.1.9. Dtex Systems
5.1.10. Endgame Systems
5.1.11. Fidelis Cybersecurity
5.1.12. FireEye
5.1.12.1. FireEye HX Series/Mandiant
5.1.13. Forescout
5.1.14. Fortinet
5.1.15. Guidance Software
5.1.15.1. Encase Cybersecurity
5.1.16. Gyala
5.1.17. Huntress
5.1.18. LimaCharlie
5.1.19. LogRhythm
5.1.20. Nehemiahsecurity
5.1.20.1. Acquired Triumfant
5.1.21. NexThink
5.1.22. NPCore
5.1.23. Palo Alto Networks
5.1.23.1. Acquired Secdo
5.1.24. Panda Security
5.1.25. PolyLogyX
5.1.26. RSA (EMC)
5.1.27. Senseon
5.1.28. SentinelOne
5.1.29. SonicWall
5.1.30. Sophos
5.1.31. Tanium
5.1.32. Verint
5.1.33. WatchGuard
5.1.34. Ziften
5.2. Agentless
5.2.1. BeyondTrust
5.2.1.1. BeyondInsight Clarity
5.2.1.1.1. Clarity Malware Analysis
5.2.1.1.2. Clarity Threat Analytics
5.2.1.1.3. Clarity Connectors
5.2.2. Cybonet
5.2.3. Cynet
5.2.4. Fidelis
5.2.4.1. Resolution One
5.2.4.1.1. ResolutionOne Platform
5.2.5. InfoCyte
5.2.6. Palo Alto Networks
5.2.6.1. Formerly LightCyber
5.2.7. Promisec
5.2.8. Root9B
5.2.9. Symantec
5.2.10. WatchGuard
5.2.10.1. Formerly Hexis Cyber Solutions
6. Application Isolation, and Virtualized Containers
6.1. Endpoint Sandboxes
6.1.1. Panda
6.1.1.1. www.panda.com
6.1.2. Sandboxie
6.1.2.1. http://www.sandboxie.com/
6.1.3. Bitdefender
6.1.3.1. www.bitdefender.com
6.2. Type-0 Hypervisors
6.2.1. Lynxworks
6.2.1.1. http://www.lynuxworks.com/
6.2.2. Zirtu
6.3. Process Isolation/Virtualization
6.3.1. AppGuard
6.3.2. Avectco
6.3.3. Bromium
6.3.4. Hysolate
6.3.5. Janus Technology
6.3.6. Malwarebytes
6.3.7. McAfee
6.3.8. Microsoft
6.3.9. Qubes OS
6.3.10. Sophos
6.4. Hardware Isolation
6.4.1. Intel
6.4.1.1. SGX
7. Endpoint Intrusion Prevention
7.1. Arkoon
7.1.1. StormShield
7.2. BeyondTrust
7.3. IBM
7.4. Landesk
7.5. McAfee
7.6. Safensoft
7.7. Symantec
8. Endpoint User Monitoring
8.1. Digital Guardian
8.2. Dtex Systems
8.3. Forcepoint
8.4. Innerview
8.5. Interguard Software
8.6. ObserveIT
8.7. Veriato
8.8. Varonis
8.9. Teramind
9. Enterprise Mobility Mangement Suites
9.1. Absolute Software
9.2. AMware
9.2.1. Airwatch
9.3. Blackberry
9.4. Citrix
9.5. Globo
9.6. Good Technologies
9.7. IBM
9.8. Landesk
9.9. MobileIron
9.10. Mojave
9.10.1. https://www.mojave.net/
9.11. SAP
9.12. Sophos
9.13. Soti
9.14. Symantec
9.15. Tangoe
10. Execution Control (Whitelisting)
10.1. Airlock Digital
10.2. Carbon Black Protection
10.3. CruelComodo
10.4. Excubits Bouncer
10.5. Hummin Heads
10.6. itWatch
10.7. Lumension
10.8. McAfee
10.9. NVT Exe Radar Pro
10.10. Nyotron
10.11. ReHips
10.12. Symantec
10.13. VooDooShield
11. Exploit Technique Prevention Software
11.1. CyActive
11.2. CyBellum
11.3. Malwarebytes Anti-Exploit
11.4. Microsoft
11.4.1. Microsoft EMET - FREE
11.5. Morphisec
11.6. Palo Alto Networks
11.6.1. Endpoint
11.7. SonicWall
11.8. Sophos
11.8.1. Intercept X
11.9. Trend Micro
11.10. ViRobot APT Shield
12. File Integrity Monitoring
12.1. Open Source
12.1.1. 1. AIDE
12.1.2. 2. Trend Micro
12.1.2.1. 1. OSSEC
12.1.3. 3. Samhain
12.1.4. 4. Osiris
12.1.5. 5. Integrit
12.1.6. 6. Tripwire
12.1.7. WAZUH
12.2. Commercial
12.2.1. Imperva
12.2.2. McAfee
12.2.3. Tripwire
13. Firmware/Bios Security
13.1. Crowdstrike
13.2. Eclypsium
13.3. Janus Technology
13.4. Prove&Run
13.5. Trapezoid
14. Malware Analysis
14.1. Botnets
14.1.1. spyeyetracker.abuse.ch
14.2. Internet Identity
14.3. Malware Patrol
14.4. SpamHaus
14.5. Team Cymru
14.6. ThreatGrid
14.7. VirusTotal
14.8. zeustracker.abuse.ch
14.9. JoeSecurity
14.10. Shadowserver
15. Operating System Behavior Control
15.1. AppGuard
15.2. Nyotron
16. Policy Assessment and System Configuration Management
16.1. Configuration Assessment
16.1.1. Crowdstrike
16.2. Configuration Management
16.2.1. BMC
16.2.1.1. BMC Server Automation
16.2.2. Check Point Software
16.2.2.1. Endpoint Policy Management
16.2.3. IBM
16.2.3.1. IBM Endpoint Manager
16.2.4. McAfee
16.2.4.1. Policy Auditor
16.2.5. RedHat
16.2.5.1. OpenSCAP
16.2.6. Saint
16.2.6.1. Saint Security
16.2.7. Tripwire
16.2.7.1. Tripwire Enterprise
16.2.8. Qualys
16.2.9. Rapid7
16.3. Patch Management
16.3.1. Ansa
16.3.2. Automox
16.3.3. Cloud Management Suite
16.3.4. ConnectWise
16.3.5. Ecora
16.3.6. Flexera
16.3.7. GFI Languard
16.3.8. Itarian
16.3.9. Ivanti
16.3.10. Kaseya
16.3.11. Manage Engine
16.3.12. Solar Winds
16.3.13. SysAid