Endpoint Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Endpoint Security by Mind Map: Endpoint Security

1. Anti-Malware

1.1. Eastern Europe

1.1.1. Czech Republic

1.1.1.1. Avast

1.1.1.2. TrustPort

1.1.1.3. SonicWall

1.1.2. Denmark

1.1.2.1. BullGuard

1.1.2.2. SonicWall

1.1.3. Netherlands

1.1.3.1. AVG

1.1.3.2. SonicWall

1.1.4. Romania

1.1.4.1. Bitdefender

1.1.4.2. SonicWall

1.1.5. Slovakia

1.1.5.1. ESET

1.1.5.2. SonicWall

1.2. Emerging Asia/Pacific

1.2.1. India

1.2.1.1. eScan

1.2.1.2. K7 Computing

1.2.1.3. SonicWall

1.3. Latin America

1.3.1. Spain

1.3.1.1. Optenet

1.3.1.2. SonicWall

1.4. Mature Asia/Pacific

1.4.1. China

1.4.1.1. Qihoo

1.4.1.2. Rising International Software

1.4.1.3. SonicWall

1.4.2. South Korean

1.4.2.1. AhnLab

1.4.2.2. BKAV

1.4.2.3. ESTsoft

1.4.2.4. SonicWall

1.5. Middle East and Africa

1.5.1. Israel

1.5.1.1. Check Point Software

1.5.1.2. SonicWall

1.6. North America

1.6.1. Cyren

1.6.2. Fortinet

1.6.3. MalwareBytes

1.6.4. McAfee

1.6.5. McAfee

1.6.6. Microsoft

1.6.7. PC Pitstop

1.6.8. Reason Core Security

1.6.9. Roboscan

1.6.10. SonicWall

1.6.11. Symantec

1.6.12. ThreatTrack

1.6.13. Total Defense

1.6.14. Trend Micro

1.7. Russia

1.7.1. Kaspersky

1.8. Western Europe

1.8.1. Austria

1.8.1.1. Ikarus Security

1.8.1.2. SonicWall

1.8.2. Finland

1.8.2.1. F-Secure

1.8.2.2. SonicWall

1.8.3. Germany

1.8.3.1. Avira

1.8.3.2. EgoSecure

1.8.3.3. G-Data

1.8.3.4. Kromtech

1.8.3.5. SonicWall

1.8.4. Norway

1.8.4.1. Norman

1.8.4.2. SonicWall

1.8.5. United Kingdom

1.8.5.1. Sophos

1.8.5.2. SonicWall

1.8.6. Poland

1.8.6.1. Arcabit

1.8.6.2. SonicWall

2. Application Control/Whitelisting

2.1. Airlock Digital

2.2. AppSense

2.3. Avecto

2.4. Carbon Black

2.5. EgoSecure

2.6. Faronics

2.7. Heat Software

2.8. Ivanti

2.9. McAfee

2.10. Sophos

2.11. Symantec

2.12. Trend Micro

3. Application Isolation

3.1. Blue Ridge Networks

3.1.1. http://www.blueridge.com/index.php/products/appguard/consumer

3.2. HP

3.3. Bufferzone

3.4. Invincea

3.4.1. SandBoxie

3.5. VMware

4. Device Management

4.1. Absolute Software

4.2. Beachhead Security

4.3. Blackberry

4.4. Citrix

4.5. Globo

4.6. Good Technologies

4.7. IBM

4.8. Landesk

4.9. MobileIron

4.10. Mojave

4.10.1. https://www.mojave.net/

4.11. SAP

4.12. Sophos

4.13. Soti

4.14. Symantec

4.15. Tangoe

4.16. VMware

4.16.1. Airwatch

4.17. EgoSecure

5. Endpoint Detection and Response (EDR)

5.1. Agent-Based

5.1.1. BlackBerry

5.1.1.1. Acquired Cylance

5.1.2. Carbon Black

5.1.2.1. Red Canary

5.1.3. Cisco

5.1.3.1. AMP For Endpoint

5.1.4. Countertack

5.1.5. CrowdStrike

5.1.6. Cyberbit

5.1.7. Cyberreason

5.1.8. Digital Guardian

5.1.9. Dtex Systems

5.1.10. Endgame Systems

5.1.11. Fidelis Cybersecurity

5.1.12. FireEye

5.1.12.1. FireEye HX Series/Mandiant

5.1.13. Forescout

5.1.14. Fortinet

5.1.15. Guidance Software

5.1.15.1. Encase Cybersecurity

5.1.16. Gyala

5.1.17. Huntress

5.1.18. LimaCharlie

5.1.19. LogRhythm

5.1.20. Nehemiahsecurity

5.1.20.1. Acquired Triumfant

5.1.21. NexThink

5.1.22. NPCore

5.1.23. Palo Alto Networks

5.1.23.1. Acquired Secdo

5.1.24. Panda Security

5.1.25. PolyLogyX

5.1.26. RSA (EMC)

5.1.27. Senseon

5.1.28. SentinelOne

5.1.29. SonicWall

5.1.30. Sophos

5.1.31. Tanium

5.1.32. Verint

5.1.33. WatchGuard

5.1.34. Ziften

5.2. Agentless

5.2.1. BeyondTrust

5.2.1.1. BeyondInsight Clarity

5.2.1.1.1. Clarity Malware Analysis

5.2.1.1.2. Clarity Threat Analytics

5.2.1.1.3. Clarity Connectors

5.2.2. Cybonet

5.2.3. Cynet

5.2.4. Fidelis

5.2.4.1. Resolution One

5.2.4.1.1. ResolutionOne Platform

5.2.5. InfoCyte

5.2.6. Palo Alto Networks

5.2.6.1. Formerly LightCyber

5.2.7. Promisec

5.2.8. Root9B

5.2.9. Symantec

5.2.10. WatchGuard

5.2.10.1. Formerly Hexis Cyber Solutions

6. Application Isolation, and Virtualized Containers

6.1. Endpoint Sandboxes

6.1.1. Panda

6.1.1.1. www.panda.com

6.1.2. Sandboxie

6.1.2.1. http://www.sandboxie.com/

6.1.3. Bitdefender

6.1.3.1. www.bitdefender.com

6.2. Type-0 Hypervisors

6.2.1. Lynxworks

6.2.1.1. http://www.lynuxworks.com/

6.2.2. Zirtu

6.3. Process Isolation/Virtualization

6.3.1. AppGuard

6.3.2. Avectco

6.3.3. Bromium

6.3.4. Hysolate

6.3.5. Janus Technology

6.3.6. Malwarebytes

6.3.7. McAfee

6.3.8. Microsoft

6.3.9. Qubes OS

6.3.10. Sophos

6.4. Hardware Isolation

6.4.1. Intel

6.4.1.1. SGX

7. Endpoint Intrusion Prevention

7.1. Arkoon

7.1.1. StormShield

7.2. BeyondTrust

7.3. IBM

7.4. Landesk

7.5. McAfee

7.6. Safensoft

7.7. Symantec

8. Endpoint User Monitoring

8.1. Digital Guardian

8.2. Dtex Systems

8.3. Forcepoint

8.4. Innerview

8.5. Interguard Software

8.6. ObserveIT

8.7. Veriato

8.8. Varonis

8.9. Teramind

9. Enterprise Mobility Mangement Suites

9.1. Absolute Software

9.2. AMware

9.2.1. Airwatch

9.3. Blackberry

9.4. Citrix

9.5. Globo

9.6. Good Technologies

9.7. IBM

9.8. Landesk

9.9. MobileIron

9.10. Mojave

9.10.1. https://www.mojave.net/

9.11. SAP

9.12. Sophos

9.13. Soti

9.14. Symantec

9.15. Tangoe

10. Execution Control (Whitelisting)

10.1. Airlock Digital

10.2. Carbon Black Protection

10.3. CruelComodo

10.4. Excubits Bouncer

10.5. Hummin Heads

10.6. itWatch

10.7. Lumension

10.8. McAfee

10.9. NVT Exe Radar Pro

10.10. Nyotron

10.11. ReHips

10.12. Symantec

10.13. VooDooShield

11. Exploit Technique Prevention Software

11.1. CyActive

11.2. CyBellum

11.3. Malwarebytes Anti-Exploit

11.4. Microsoft

11.4.1. Microsoft EMET - FREE

11.5. Morphisec

11.6. Palo Alto Networks

11.6.1. Endpoint

11.7. SonicWall

11.8. Sophos

11.8.1. Intercept X

11.9. Trend Micro

11.10. ViRobot APT Shield

12. File Integrity Monitoring

12.1. Open Source

12.1.1. 1. AIDE

12.1.2. 2. Trend Micro

12.1.2.1. 1. OSSEC

12.1.3. 3. Samhain

12.1.4. 4. Osiris

12.1.5. 5. Integrit

12.1.6. 6. Tripwire

12.1.7. WAZUH

12.2. Commercial

12.2.1. Imperva

12.2.2. McAfee

12.2.3. Tripwire

13. Firmware/Bios Security

13.1. Crowdstrike

13.2. Eclypsium

13.3. Janus Technology

13.4. Prove&Run

13.5. Trapezoid

14. Malware Analysis

14.1. Botnets

14.1.1. spyeyetracker.abuse.ch

14.2. Internet Identity

14.3. Malware Patrol

14.4. SpamHaus

14.5. Team Cymru

14.6. ThreatGrid

14.7. VirusTotal

14.8. zeustracker.abuse.ch

14.9. JoeSecurity

14.10. Shadowserver

15. Operating System Behavior Control

15.1. AppGuard

15.2. Nyotron

16. Policy Assessment and System Configuration Management

16.1. Configuration Assessment

16.1.1. Crowdstrike

16.2. Configuration Management

16.2.1. BMC

16.2.1.1. BMC Server Automation

16.2.2. Check Point Software

16.2.2.1. Endpoint Policy Management

16.2.3. IBM

16.2.3.1. IBM Endpoint Manager

16.2.4. McAfee

16.2.4.1. Policy Auditor

16.2.5. RedHat

16.2.5.1. OpenSCAP

16.2.6. Saint

16.2.6.1. Saint Security

16.2.7. Tripwire

16.2.7.1. Tripwire Enterprise

16.2.8. Qualys

16.2.9. Rapid7

16.3. Patch Management

16.3.1. Ansa

16.3.2. Automox

16.3.3. Cloud Management Suite

16.3.4. ConnectWise

16.3.5. Ecora

16.3.6. Flexera

16.3.7. GFI Languard

16.3.8. Itarian

16.3.9. Ivanti

16.3.10. Kaseya

16.3.11. Manage Engine

16.3.12. Solar Winds

16.3.13. SysAid