Endpoint Security - by Lawrence Pingree

Get Started. It's Free
or sign up with your email address
Endpoint Security - by Lawrence Pingree by Mind Map: Endpoint Security - by Lawrence Pingree

1. Endpoint User Monitoring

1.1. Fortra

1.2. Dtex Systems

1.3. Forcepoint

1.4. Interguard Software

1.5. Proofpoint

1.6. Veriato

1.7. Varonis

1.8. Teramind

2. Enterprise Mobility Mangement Suites

2.1. Absolute Software

2.2. AMware

2.2.1. Airwatch

2.3. Blackberry

2.4. Citrix

2.5. Globo

2.6. Good Technologies

2.7. IBM

2.8. Landesk

2.9. MobileIron

2.10. Mojave

2.10.1. https://www.mojave.net/

2.11. SAP

2.12. Sophos

2.13. Soti

2.14. Symantec

2.15. Tangoe

3. Execution Control (Allowlisting)

3.1. Airlock Digital

3.2. Carbon Black Protection

3.3. CruelComodo

3.4. Excubits Bouncer

3.5. Hummin Heads

3.6. itWatch

3.7. Lumension

3.8. NVT Exe Radar Pro

3.9. ReHips

3.10. Broadcom

3.11. ThreatLocker

3.12. Trellix

3.13. VooDooShield

3.14. Red Hat (SELINUX)

4. Exploit Technique Prevention Software

4.1. Arms Cyber

4.2. CyActive

4.3. CyBellum

4.4. Malwarebytes Anti-Exploit

4.5. Microsoft

4.5.1. Microsoft EMET - FREE

4.6. Morphisec

4.7. Palo Alto Networks

4.7.1. Endpoint

4.8. SonicWall

4.9. Sophos

4.9.1. Intercept X

4.10. Trend Micro

4.11. ViRobot APT Shield

5. File Integrity Monitoring

5.1. Open Source

5.1.1. 1. AIDE

5.1.2. 2. Trend Micro

5.1.2.1. 1. OSSEC

5.1.3. 3. Samhain

5.1.4. 4. Osiris

5.1.5. 5. Integrit

5.1.6. 6. Tripwire

5.1.7. WAZUH

5.2. Commercial

5.2.1. Imperva

5.2.2. ThreatLocker

5.2.3. Trellix

5.2.4. Tripwire

5.2.5. Broadcom (Carbon Black)

6. Firmware/Bios Security

6.1. Binare

6.2. Binarly

6.3. Crowdstrike

6.4. Eclypsium

6.5. Janus Technology

6.6. Netrise

6.7. Prove&Run

6.8. Trapezoid

7. Malware Analysis

7.1. Any.Run

7.2. Botnets

7.2.1. spyeyetracker.abuse.ch

7.3. Cape Sandbox

7.4. Filescan.io

7.5. Gatewatcher

7.6. Glimps.fr

7.7. Inquest Labs

7.8. Internet Identity

7.9. Intezer

7.10. JoeSecurity

7.11. Malware Patrol

7.12. Nextron Systems

7.13. Polyswarm

7.14. Reversing Labs

7.15. Shadowserver

7.16. SpamHaus

7.17. Team Cymru

7.18. ThreatGrid

7.19. VirusTotal

7.20. zeustracker.abuse.ch

8. Operating System Behavior Control

8.1. Acronis

8.2. AppGuard

8.3. Red Hat

8.3.1. Selinux

9. Policy Assessment and System Configuration Management

9.1. Configuration Management

9.1.1. Axonius

9.1.2. BMC

9.1.2.1. BMC Server Automation

9.1.3. Check Point Software

9.1.3.1. Endpoint Policy Management

9.1.4. Crowdstrike

9.1.5. IBM

9.1.5.1. IBM Endpoint Manager

9.1.6. Qualys

9.1.7. Rapid7

9.1.8. RedHat

9.1.8.1. OpenSCAP

9.1.9. Saint

9.1.9.1. Saint Security

9.1.10. Trellix

9.1.10.1. Enterprise Security Manager

9.1.11. Tripwire

9.1.11.1. Tripwire Enterprise

9.2. Patch Management

9.2.1. Ansa

9.2.2. Automox

9.2.3. Cloud Management Suite

9.2.4. ConnectWise

9.2.5. Ecora

9.2.6. Flexera

9.2.7. GFI Languard

9.2.8. Itarian

9.2.9. Ivanti

9.2.10. Kaseya

9.2.11. Manage Engine

9.2.12. Solar Winds

9.2.13. SysAid

9.3. Continuous Controls Monitoring

9.3.1. Comcast Databee

9.3.2. Cyber Sierra

9.3.3. Hyperproof

9.3.4. MetricStream

9.3.5. Panaseer

9.3.6. Pathlock

9.3.7. Quod Orbis

9.3.8. Trustmap

9.3.9. XM Cyber

10. Anti-Malware

10.1. Eastern Europe

10.1.1. Czech Republic

10.1.1.1. Avast

10.1.1.2. TrustPort

10.1.1.3. SonicWall

10.1.2. Denmark

10.1.2.1. BullGuard

10.1.2.2. SonicWall

10.1.3. Netherlands

10.1.3.1. AVG

10.1.3.2. SonicWall

10.1.4. Romania

10.1.4.1. Bitdefender

10.1.4.2. SonicWall

10.1.5. Slovakia

10.1.5.1. ESET

10.1.5.2. SonicWall

10.2. Emerging Asia/Pacific

10.2.1. India

10.2.1.1. eScan

10.2.1.2. K7 Computing

10.2.1.3. SonicWall

10.3. Latin America

10.3.1. Spain

10.3.1.1. Optenet

10.3.1.2. SonicWall

10.4. Mature Asia/Pacific

10.4.1. China

10.4.1.1. Qihoo

10.4.1.2. Rising International Software

10.4.1.3. SonicWall

10.4.2. South Korean

10.4.2.1. AhnLab

10.4.2.2. BKAV

10.4.2.3. ESTsoft

10.4.2.4. SonicWall

10.5. Middle East and Africa

10.5.1. Israel

10.5.1.1. Check Point Software

10.5.1.2. SonicWall

10.6. North America

10.6.1. Coro.net

10.6.2. Cyren

10.6.3. Fortinet

10.6.4. MalwareBytes

10.6.5. Microsoft

10.6.6. PC Pitstop

10.6.7. Reason Core Security

10.6.8. Roboscan

10.6.9. SonicWall

10.6.10. Symantec

10.6.11. ThreatTrack

10.6.12. Total Defense

10.6.13. Trellix

10.6.14. Trend Micro

10.7. Russia

10.7.1. Kaspersky

10.8. Western Europe

10.8.1. Austria

10.8.1.1. Ikarus Security

10.8.1.2. SonicWall

10.8.2. Finland

10.8.2.1. F-Secure

10.8.2.2. SonicWall

10.8.3. Germany

10.8.3.1. Avira

10.8.3.2. EgoSecure

10.8.3.3. G-Data

10.8.3.4. Kromtech

10.8.3.5. SonicWall

10.8.4. Norway

10.8.4.1. Norman

10.8.4.2. SonicWall

10.8.5. United Kingdom

10.8.5.1. Sophos

10.8.5.2. SonicWall

10.8.6. Poland

10.8.6.1. Arcabit

10.8.6.2. SonicWall

10.8.7. France

10.8.7.1. Nucleon Security

11. Application Control/Allowlisting

11.1. Airlock Digital

11.2. AppSense

11.3. Avecto

11.4. Broadcom

11.5. EgoSecure

11.6. Faronics

11.7. Heat Software

11.8. Ivanti

11.9. Sophos

11.10. ThreatLocker

11.11. Trellix

11.12. Trend Micro

11.13. VMware

12. Application Isolation

12.1. Appguard

12.2. Bufferzone

12.3. HP

12.4. Invincea

12.4.1. SandBoxie

12.5. ThreatLocker

12.6. Virsec

12.7. VMware

13. Application Isolation, and Virtualized Containers

13.1. Endpoint Sandboxes

13.1.1. Panda

13.1.1.1. www.panda.com

13.1.2. Sandboxie

13.1.2.1. http://www.sandboxie.com/

13.1.3. Bitdefender

13.1.3.1. www.bitdefender.com

13.2. Type-0 Hypervisors

13.2.1. Lynxworks

13.2.1.1. http://www.lynuxworks.com/

13.2.2. Zirtu

13.3. Process Isolation/Virtualization

13.3.1. AppGuard

13.3.2. Avectco

13.3.3. HP

13.3.4. Hysolate

13.3.5. Janus Technology

13.3.6. Malwarebytes

13.3.7. Microsoft

13.3.8. Qubes OS

13.3.9. Sophos

13.3.10. Trellix

13.3.11. Virsec

13.4. Confidential Enclaves

13.4.1. Hardware Isolation

13.4.1.1. Intel

13.4.1.1.1. SGX

14. Device Management

14.1. Absolute Software

14.2. Beachhead Security

14.3. Blackberry

14.4. Broadcom

14.5. Citrix

14.6. EgoSecure

14.7. Globo

14.8. IBM

14.9. Landesk

14.10. MobileIron

14.11. Mojave

14.11.1. https://www.mojave.net/

14.12. SAP

14.13. Sophos

14.14. Soti

14.15. Tangoe

14.16. VMware

14.16.1. Airwatch

15. Endpoint Detection and Response (EDR)

15.1. Agent-Based

15.1.1. BlackBerry

15.1.1.1. Acquired Cylance

15.1.2. Carbon Black

15.1.2.1. Red Canary

15.1.3. Cisco

15.1.3.1. AMP For Endpoint

15.1.4. Countertack

15.1.5. CrowdStrike

15.1.6. Cyberbit

15.1.7. Cyberreason

15.1.8. Digital Guardian

15.1.9. Dtex Systems

15.1.10. Endgame Systems

15.1.11. Fidelis Cybersecurity

15.1.12. FireEye

15.1.12.1. FireEye HX Series/Mandiant

15.1.13. Forescout

15.1.14. Fortinet

15.1.15. Guidance Software

15.1.15.1. Encase Cybersecurity

15.1.16. Gyala

15.1.17. Huntress

15.1.18. LimaCharlie

15.1.19. LogRhythm

15.1.20. Nehemiahsecurity

15.1.20.1. Acquired Triumfant

15.1.21. NexThink

15.1.22. NPCore

15.1.23. Palo Alto Networks

15.1.23.1. Acquired Secdo

15.1.24. Panda Security

15.1.25. PolyLogyX

15.1.26. RSA (EMC)

15.1.27. Senseon

15.1.28. SentinelOne

15.1.29. SonicWall

15.1.30. Sophos

15.1.31. Tanium

15.1.32. Verint

15.1.33. WatchGuard

15.1.34. Ziften

15.2. Agentless

15.2.1. BeyondTrust

15.2.1.1. BeyondInsight Clarity

15.2.1.1.1. Clarity Malware Analysis

15.2.1.1.2. Clarity Threat Analytics

15.2.1.1.3. Clarity Connectors

15.2.2. Cybonet

15.2.3. Cynet

15.2.4. Datto

15.2.5. Fidelis Cyber Security

15.2.5.1. Resolution One

15.2.5.1.1. ResolutionOne Platform

15.2.6. Palo Alto Networks

15.2.6.1. Formerly LightCyber

15.2.7. Promisec

15.2.8. Root9B

15.2.9. Broadcom (ymantec)

15.2.10. WatchGuard

15.2.10.1. Formerly Hexis Cyber Solutions

16. Endpoint Intrusion Prevention

16.1. Arkoon

16.1.1. StormShield

16.2. BeyondTrust

16.3. Broadcom (Symantec)

16.4. IBM

16.5. Landesk

16.6. Safensoft

16.7. Trellix

17. Content Sanitization

17.1. Broadcom (Symantec)

17.2. Forcepoint

17.3. Fortinet

17.4. Garrison Technology

17.5. Glasswall

17.6. OPSWAT

17.7. Sasa Software

17.8. Votiro