Endpoint Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Endpoint Security by Mind Map: Endpoint Security

1. Application Control

1.1. AppSense

1.2. Avecto

1.3. Bit9

1.4. EgoSecure

1.5. Faronics

1.6. Heat Software

1.7. Landesk

1.8. McAfee

1.9. Sophos

1.10. Symantec

1.11. Trend Micro

2. Application Isolation

2.1. Blue Ridge Networks

2.1.1. http://www.blueridge.com/index.php/products/appguard/consumer

2.2. Bromium

2.3. Bufferzone

2.4. Invincea

2.4.1. SandBoxie

2.5. VMware

3. Device Management

3.1. Absolute Software

3.2. Beachhead Security

3.3. Blackberry

3.4. Citrix

3.5. Globo

3.6. Good Technologies

3.7. IBM

3.8. Landesk

3.9. MobileIron

3.10. Mojave

3.10.1. https://www.mojave.net/

3.11. SAP

3.12. Sophos

3.13. Soti

3.14. Symantec

3.15. Tangoe

3.16. VMware

3.16.1. Airwatch

3.17. EgoSecure

4. Endpoint Detection and Response (EDR)

4.1. Agent-Based

4.1.1. Carbon Black

4.1.1.1. Red Canary

4.1.2. Cisco

4.1.2.1. AMP For Endpoint

4.1.3. Countertack

4.1.4. CrowdStrike

4.1.5. Cyberbit

4.1.6. Cyberreason

4.1.7. Cylance

4.1.8. Digital Guardian

4.1.9. Dtex Systems

4.1.10. Endgame Systems

4.1.11. Fidelis Cybersecurity

4.1.12. FireEye

4.1.12.1. FireEye HX Series/Mandiant

4.1.13. Forescout

4.1.14. Fortinet

4.1.15. Guidance Software

4.1.15.1. Encase Cybersecurity

4.1.16. LimaCharlie

4.1.17. LogRhythm

4.1.18. NexThink

4.1.19. NPCore

4.1.20. Panda Security

4.1.21. RSA (EMC)

4.1.22. SecDo

4.1.23. SentinelOne

4.1.24. SonicWall

4.1.25. Sophos

4.1.26. Tanium

4.1.27. Triumfant

4.1.28. Verint

4.1.29. WatchGuard

4.1.30. Ziften

4.2. Agentless

4.2.1. BeyondTrust

4.2.1.1. BeyondInsight Clarity

4.2.1.1.1. Clarity Malware Analysis

4.2.1.1.2. Clarity Threat Analytics

4.2.1.1.3. Clarity Connectors

4.2.2. Cynet

4.2.3. Fidelis

4.2.3.1. Resolution One

4.2.3.1.1. ResolutionOne Platform

4.2.4. WatchGuard

4.2.4.1. Formerly Hexis Cyber Solutions

4.2.5. InfoCyte

4.2.6. Palo Alto Networks

4.2.6.1. Formerly LightCyber

4.2.7. Symantec

4.2.8. Promisec

4.2.9. Cybonet

5. Endpoint Intrusion Prevention

5.1. Arkoon

5.1.1. StormShield

5.2. BeyondTrust

5.3. IBM

5.4. Landesk

5.5. McAfee

5.6. Safensoft

5.7. Symantec

6. Endpoint Sandboxes and Virtualized Containers

6.1. Endpoint Sandboxes

6.1.1. Panda

6.1.1.1. www.panda.com

6.1.2. Sandboxie

6.1.2.1. http://www.sandboxie.com/

6.1.3. Bitdefender

6.1.3.1. www.bitdefender.com

6.2. Type-0 Hypervisors

6.2.1. Lynxworks

6.2.1.1. http://www.lynuxworks.com/

6.2.2. Zirtu

6.3. Process Isolation/Virtualization

6.3.1. Avectco

6.3.2. Bromium

6.3.3. Invincea

7. Enterprise Mobility Mangement Suites

7.1. Absolute Software

7.2. AMware

7.2.1. Airwatch

7.3. Blackberry

7.4. Citrix

7.5. Globo

7.6. Good Technologies

7.7. IBM

7.8. Landesk

7.9. MobileIron

7.10. Mojave

7.10.1. https://www.mojave.net/

7.11. SAP

7.12. Sophos

7.13. Soti

7.14. Symantec

7.15. Tangoe

8. Execution Control

8.1. McAfee

8.2. Nyotron

9. Exploit Technique Prevention Software

9.1. CyActive

9.2. CyBellum

9.3. Malwarebytes Anti-Exploit

9.4. Microsoft

9.4.1. Microsoft EMET - FREE

9.5. Morphisec

9.6. Palo Alto Networks

9.6.1. Endpoint

9.7. SonicWall

9.8. Sophos

9.8.1. Intercept X

9.9. Trend Micro

9.10. ViRobot APT Shield

10. File Integrity Monitoring

10.1. Open Source

10.1.1. 1. AIDE

10.1.2. 2. Trend Micro

10.1.2.1. 1. OSSEC

10.1.3. 3. Samhain

10.1.4. 4. Osiris

10.1.5. 5. Integrit

10.1.6. 6. Tripwire

10.1.7. WAZUH

10.2. Commercial

10.2.1. Imperva

10.2.2. McAfee

10.2.3. Tripwire

11. Malware Analysis

11.1. Botnets

11.1.1. spyeyetracker.abuse.ch

11.2. Internet Identity

11.3. Malware Patrol

11.4. SpamHaus

11.5. Team Cymru

11.6. ThreatGrid

11.7. VirusTotal

11.8. zeustracker.abuse.ch

11.9. JoeSecurity

11.10. Shadowserver

12. Operating System Behavior Control

12.1. AppGuard

12.2. Nyotron

13. Policy Assessment and System Configuration Management

13.1. BMC

13.1.1. BMC Server Automation

13.2. Check Point Software

13.2.1. Endpoint Policy Management

13.3. IBM

13.3.1. IBM Endpoint Manager

13.4. McAfee

13.4.1. Policy Auditor

13.5. RedHat

13.5.1. OpenSCAP

13.6. Saint

13.6.1. Saint Security

13.7. Tripwire

13.7.1. Tripwire Enterprise

14. Anti-Malware

14.1. Eastern Europe

14.1.1. Czech Republic

14.1.1.1. Avast

14.1.1.2. TrustPort

14.1.1.3. SonicWall

14.1.2. Denmark

14.1.2.1. BullGuard

14.1.2.2. SonicWall

14.1.3. Netherlands

14.1.3.1. AVG

14.1.3.2. SonicWall

14.1.4. Romania

14.1.4.1. Bitdefender

14.1.4.2. SonicWall

14.1.5. Slovakia

14.1.5.1. ESET

14.1.5.2. SonicWall

14.2. Emerging Asia/Pacific

14.2.1. India

14.2.1.1. eScan

14.2.1.2. K7 Computing

14.2.1.3. SonicWall

14.3. Latin America

14.3.1. Spain

14.3.1.1. Optenet

14.3.1.2. SonicWall

14.4. Mature Asia/Pacific

14.4.1. China

14.4.1.1. Qihoo

14.4.1.2. Rising International Software

14.4.1.3. SonicWall

14.4.2. South Korean

14.4.2.1. AhnLab

14.4.2.2. BKAV

14.4.2.3. ESTsoft

14.4.2.4. SonicWall

14.5. Middle East and Africa

14.5.1. Israel

14.5.1.1. Check Point Software

14.5.1.2. SonicWall

14.6. North America

14.6.1. Cyren

14.6.2. Fortinet

14.6.3. MalwareBytes

14.6.4. McAfee

14.6.5. McAfee

14.6.6. Microsoft

14.6.7. PC Pitstop

14.6.8. Reason Core Security

14.6.9. Roboscan

14.6.10. SonicWall

14.6.11. Symantec

14.6.12. ThreatTrack

14.6.13. Total Defense

14.6.14. Trend Micro

14.7. Russia

14.7.1. Kaspersky

14.8. Western Europe

14.8.1. Austria

14.8.1.1. Ikarus Security

14.8.1.2. SonicWall

14.8.2. Finland

14.8.2.1. F-Secure

14.8.2.2. SonicWall

14.8.3. Germany

14.8.3.1. Avira

14.8.3.2. EgoSecure

14.8.3.3. G-Data

14.8.3.4. Kromtech

14.8.3.5. SonicWall

14.8.4. Norway

14.8.4.1. Norman

14.8.4.2. SonicWall

14.8.5. United Kingdom

14.8.5.1. Sophos

14.8.5.2. SonicWall

14.8.6. Poland

14.8.6.1. Arcabit

14.8.6.2. SonicWall