Endpoint Security - by Lawrence Pingree

시작하기. 무료입니다
또는 회원 가입 e메일 주소
Endpoint Security - by Lawrence Pingree 저자: Mind Map: Endpoint Security - by Lawrence Pingree

1. Anti-Malware

1.1. Eastern Europe

1.1.1. Czech Republic

1.1.1.1. Avast

1.1.1.2. TrustPort

1.1.1.3. SonicWall

1.1.2. Denmark

1.1.2.1. BullGuard

1.1.2.2. SonicWall

1.1.3. Netherlands

1.1.3.1. AVG

1.1.3.2. SonicWall

1.1.4. Romania

1.1.4.1. Bitdefender

1.1.4.2. SonicWall

1.1.5. Slovakia

1.1.5.1. ESET

1.1.5.2. SonicWall

1.2. Emerging Asia/Pacific

1.2.1. India

1.2.1.1. eScan

1.2.1.2. K7 Computing

1.2.1.3. SonicWall

1.3. Latin America

1.3.1. Spain

1.3.1.1. Optenet

1.3.1.2. SonicWall

1.4. Mature Asia/Pacific

1.4.1. China

1.4.1.1. Qihoo

1.4.1.2. Rising International Software

1.4.1.3. SonicWall

1.4.2. South Korean

1.4.2.1. AhnLab

1.4.2.2. BKAV

1.4.2.3. ESTsoft

1.4.2.4. SonicWall

1.5. Middle East and Africa

1.5.1. Israel

1.5.1.1. Check Point Software

1.5.1.2. SonicWall

1.6. North America

1.6.1. Coro.net

1.6.2. Cyren

1.6.3. Fortinet

1.6.4. MalwareBytes

1.6.5. Microsoft

1.6.6. PC Pitstop

1.6.7. Reason Core Security

1.6.8. Roboscan

1.6.9. SonicWall

1.6.10. Symantec

1.6.11. ThreatTrack

1.6.12. Total Defense

1.6.13. Trellix

1.6.14. Trend Micro

1.7. Russia

1.7.1. Kaspersky

1.8. Western Europe

1.8.1. Austria

1.8.1.1. Ikarus Security

1.8.1.2. SonicWall

1.8.2. Finland

1.8.2.1. F-Secure

1.8.2.2. SonicWall

1.8.3. Germany

1.8.3.1. Avira

1.8.3.2. EgoSecure

1.8.3.3. G-Data

1.8.3.4. Kromtech

1.8.3.5. SonicWall

1.8.4. Norway

1.8.4.1. Norman

1.8.4.2. SonicWall

1.8.5. United Kingdom

1.8.5.1. Sophos

1.8.5.2. SonicWall

1.8.6. Poland

1.8.6.1. Arcabit

1.8.6.2. SonicWall

1.8.7. France

1.8.7.1. Nucleon Security

2. Application Control/Allowlisting

2.1. Airlock Digital

2.2. AppSense

2.3. Avecto

2.4. Broadcom

2.5. EgoSecure

2.6. Faronics

2.7. Heat Software

2.8. Ivanti

2.9. Sophos

2.10. ThreatLocker

2.11. Trellix

2.12. Trend Micro

2.13. VMware

3. Application Isolation

3.1. Appguard

3.2. Bufferzone

3.3. HP

3.4. Invincea

3.4.1. SandBoxie

3.5. ThreatLocker

3.6. Virsec

3.7. VMware

4. Device Management

4.1. Absolute Software

4.2. Beachhead Security

4.3. Blackberry

4.4. Broadcom

4.5. Citrix

4.6. EgoSecure

4.7. Globo

4.8. IBM

4.9. Landesk

4.10. MobileIron

4.11. Mojave

4.11.1. https://www.mojave.net/

4.12. SAP

4.13. Sophos

4.14. Soti

4.15. Tangoe

4.16. VMware

4.16.1. Airwatch

5. Endpoint Detection and Response (EDR)

5.1. Agent-Based

5.1.1. BlackBerry

5.1.1.1. Acquired Cylance

5.1.2. Carbon Black

5.1.2.1. Red Canary

5.1.3. Cisco

5.1.3.1. AMP For Endpoint

5.1.4. Countertack

5.1.5. CrowdStrike

5.1.6. Cyberbit

5.1.7. Cyberreason

5.1.8. Digital Guardian

5.1.9. Dtex Systems

5.1.10. Endgame Systems

5.1.11. Fidelis Cybersecurity

5.1.12. FireEye

5.1.12.1. FireEye HX Series/Mandiant

5.1.13. Forescout

5.1.14. Fortinet

5.1.15. Guidance Software

5.1.15.1. Encase Cybersecurity

5.1.16. Gyala

5.1.17. Huntress

5.1.18. LimaCharlie

5.1.19. LogRhythm

5.1.20. Nehemiahsecurity

5.1.20.1. Acquired Triumfant

5.1.21. NexThink

5.1.22. NPCore

5.1.23. Palo Alto Networks

5.1.23.1. Acquired Secdo

5.1.24. Panda Security

5.1.25. PolyLogyX

5.1.26. RSA (EMC)

5.1.27. Senseon

5.1.28. SentinelOne

5.1.29. SonicWall

5.1.30. Sophos

5.1.31. Tanium

5.1.32. Verint

5.1.33. WatchGuard

5.1.34. Ziften

5.2. Agentless

5.2.1. BeyondTrust

5.2.1.1. BeyondInsight Clarity

5.2.1.1.1. Clarity Malware Analysis

5.2.1.1.2. Clarity Threat Analytics

5.2.1.1.3. Clarity Connectors

5.2.2. Cybonet

5.2.3. Cynet

5.2.4. Datto

5.2.5. Fidelis Cyber Security

5.2.5.1. Resolution One

5.2.5.1.1. ResolutionOne Platform

5.2.6. Palo Alto Networks

5.2.6.1. Formerly LightCyber

5.2.7. Promisec

5.2.8. Root9B

5.2.9. Broadcom (ymantec)

5.2.10. WatchGuard

5.2.10.1. Formerly Hexis Cyber Solutions

6. Application Isolation, and Virtualized Containers

6.1. Endpoint Sandboxes

6.1.1. Panda

6.1.1.1. www.panda.com

6.1.2. Sandboxie

6.1.2.1. http://www.sandboxie.com/

6.1.3. Bitdefender

6.1.3.1. www.bitdefender.com

6.2. Type-0 Hypervisors

6.2.1. Lynxworks

6.2.1.1. http://www.lynuxworks.com/

6.2.2. Zirtu

6.3. Process Isolation/Virtualization

6.3.1. AppGuard

6.3.2. Avectco

6.3.3. HP

6.3.4. Hysolate

6.3.5. Janus Technology

6.3.6. Malwarebytes

6.3.7. Microsoft

6.3.8. Qubes OS

6.3.9. Sophos

6.3.10. Trellix

6.3.11. Virsec

6.4. Confidential Enclaves

6.4.1. Hardware Isolation

6.4.1.1. Intel

6.4.1.1.1. SGX

7. Endpoint Intrusion Prevention

7.1. Arkoon

7.1.1. StormShield

7.2. BeyondTrust

7.3. Broadcom (Symantec)

7.4. IBM

7.5. Landesk

7.6. Safensoft

7.7. Trellix

8. Endpoint User Monitoring

8.1. Fortra

8.2. Dtex Systems

8.3. Forcepoint

8.4. Interguard Software

8.5. Proofpoint

8.6. Veriato

8.7. Varonis

8.8. Teramind

9. Enterprise Mobility Mangement Suites

9.1. Absolute Software

9.2. AMware

9.2.1. Airwatch

9.3. Blackberry

9.4. Citrix

9.5. Globo

9.6. Good Technologies

9.7. IBM

9.8. Landesk

9.9. MobileIron

9.10. Mojave

9.10.1. https://www.mojave.net/

9.11. SAP

9.12. Sophos

9.13. Soti

9.14. Symantec

9.15. Tangoe

10. Execution Control (Allowlisting)

10.1. Airlock Digital

10.2. Carbon Black Protection

10.3. CruelComodo

10.4. Excubits Bouncer

10.5. Hummin Heads

10.6. itWatch

10.7. Lumension

10.8. NVT Exe Radar Pro

10.9. ReHips

10.10. Broadcom

10.11. ThreatLocker

10.12. Trellix

10.13. VooDooShield

10.14. Red Hat (SELINUX)

11. Exploit Technique Prevention Software

11.1. Arms Cyber

11.2. CyActive

11.3. CyBellum

11.4. Malwarebytes Anti-Exploit

11.5. Microsoft

11.5.1. Microsoft EMET - FREE

11.6. Morphisec

11.7. Palo Alto Networks

11.7.1. Endpoint

11.8. SonicWall

11.9. Sophos

11.9.1. Intercept X

11.10. Trend Micro

11.11. ViRobot APT Shield

12. File Integrity Monitoring

12.1. Open Source

12.1.1. 1. AIDE

12.1.2. 2. Trend Micro

12.1.2.1. 1. OSSEC

12.1.3. 3. Samhain

12.1.4. 4. Osiris

12.1.5. 5. Integrit

12.1.6. 6. Tripwire

12.1.7. WAZUH

12.2. Commercial

12.2.1. Imperva

12.2.2. ThreatLocker

12.2.3. Trellix

12.2.4. Tripwire

12.2.5. Broadcom (Carbon Black)

13. Firmware/Bios Security

13.1. Binare

13.2. Binarly

13.3. Crowdstrike

13.4. Eclypsium

13.5. Janus Technology

13.6. Netrise

13.7. Prove&Run

13.8. Trapezoid

14. Malware Analysis

14.1. Any.Run

14.2. Botnets

14.2.1. spyeyetracker.abuse.ch

14.3. Cape Sandbox

14.4. Filescan.io

14.5. Gatewatcher

14.6. Glimps.fr

14.7. Inquest Labs

14.8. Internet Identity

14.9. Intezer

14.10. JoeSecurity

14.11. Malware Patrol

14.12. Nextron Systems

14.13. Polyswarm

14.14. Reversing Labs

14.15. Shadowserver

14.16. SpamHaus

14.17. Team Cymru

14.18. ThreatGrid

14.19. VirusTotal

14.20. zeustracker.abuse.ch

15. Operating System Behavior Control

15.1. Acronis

15.2. AppGuard

15.3. Red Hat

15.3.1. Selinux

16. Policy Assessment and System Configuration Management

16.1. Configuration Management

16.1.1. Axonius

16.1.2. BMC

16.1.2.1. BMC Server Automation

16.1.3. Check Point Software

16.1.3.1. Endpoint Policy Management

16.1.4. Crowdstrike

16.1.5. IBM

16.1.5.1. IBM Endpoint Manager

16.1.6. Qualys

16.1.7. Rapid7

16.1.8. RedHat

16.1.8.1. OpenSCAP

16.1.9. Saint

16.1.9.1. Saint Security

16.1.10. Trellix

16.1.10.1. Enterprise Security Manager

16.1.11. Tripwire

16.1.11.1. Tripwire Enterprise

16.2. Patch Management

16.2.1. Ansa

16.2.2. Automox

16.2.3. Cloud Management Suite

16.2.4. ConnectWise

16.2.5. Ecora

16.2.6. Flexera

16.2.7. GFI Languard

16.2.8. Itarian

16.2.9. Ivanti

16.2.10. Kaseya

16.2.11. Manage Engine

16.2.12. Solar Winds

16.2.13. SysAid

16.3. Continuous Controls Monitoring

16.3.1. Comcast Databee

16.3.2. Cyber Sierra

16.3.3. Hyperproof

16.3.4. MetricStream

16.3.5. Panaseer

16.3.6. Pathlock

16.3.7. Quod Orbis

16.3.8. Trustmap

16.3.9. XM Cyber

17. Content Sanitization

17.1. Broadcom (Symantec)

17.2. Forcepoint

17.3. Fortinet

17.4. Garrison Technology

17.5. Glasswall

17.6. OPSWAT

17.7. Sasa Software

17.8. Votiro