1. Anti-Malware
1.1. Eastern Europe
1.1.1. Czech Republic
1.1.1.1. Avast
1.1.1.2. TrustPort
1.1.1.3. SonicWall
1.1.2. Denmark
1.1.2.1. BullGuard
1.1.2.2. SonicWall
1.1.3. Netherlands
1.1.3.1. AVG
1.1.3.2. SonicWall
1.1.4. Romania
1.1.4.1. Bitdefender
1.1.4.2. SonicWall
1.1.5. Slovakia
1.1.5.1. ESET
1.1.5.2. SonicWall
1.2. Emerging Asia/Pacific
1.2.1. India
1.2.1.1. eScan
1.2.1.2. K7 Computing
1.2.1.3. SonicWall
1.3. Latin America
1.3.1. Spain
1.3.1.1. Optenet
1.3.1.2. SonicWall
1.4. Mature Asia/Pacific
1.4.1. China
1.4.1.1. Qihoo
1.4.1.2. Rising International Software
1.4.1.3. SonicWall
1.4.2. South Korean
1.4.2.1. AhnLab
1.4.2.2. BKAV
1.4.2.3. ESTsoft
1.4.2.4. SonicWall
1.5. Middle East and Africa
1.5.1. Israel
1.5.1.1. Check Point Software
1.5.1.2. SonicWall
1.6. North America
1.6.1. Coro.net
1.6.2. Cyren
1.6.3. Fortinet
1.6.4. MalwareBytes
1.6.5. Microsoft
1.6.6. PC Pitstop
1.6.7. Reason Core Security
1.6.8. Roboscan
1.6.9. SonicWall
1.6.10. Symantec
1.6.11. ThreatTrack
1.6.12. Total Defense
1.6.13. Trellix
1.6.14. Trend Micro
1.7. Russia
1.7.1. Kaspersky
1.8. Western Europe
1.8.1. Austria
1.8.1.1. Ikarus Security
1.8.1.2. SonicWall
1.8.2. Finland
1.8.2.1. F-Secure
1.8.2.2. SonicWall
1.8.3. Germany
1.8.3.1. Avira
1.8.3.2. EgoSecure
1.8.3.3. G-Data
1.8.3.4. Kromtech
1.8.3.5. SonicWall
1.8.4. Norway
1.8.4.1. Norman
1.8.4.2. SonicWall
1.8.5. United Kingdom
1.8.5.1. Sophos
1.8.5.2. SonicWall
1.8.6. Poland
1.8.6.1. Arcabit
1.8.6.2. SonicWall
1.8.7. France
1.8.7.1. Nucleon Security
2. Application Control/Allowlisting
2.1. Airlock Digital
2.2. AppSense
2.3. Avecto
2.4. Broadcom
2.5. EgoSecure
2.6. Faronics
2.7. Heat Software
2.8. Ivanti
2.9. Sophos
2.10. ThreatLocker
2.11. Trellix
2.12. Trend Micro
2.13. VMware
3. Application Isolation
3.1. Appguard
3.2. Bufferzone
3.3. HP
3.4. Invincea
3.4.1. SandBoxie
3.5. ThreatLocker
3.6. Virsec
3.7. VMware
4. Device Management
4.1. Absolute Software
4.2. Beachhead Security
4.3. Blackberry
4.4. Broadcom
4.5. Citrix
4.6. EgoSecure
4.7. Globo
4.8. IBM
4.9. Landesk
4.10. MobileIron
4.11. Mojave
4.11.1. https://www.mojave.net/
4.12. SAP
4.13. Sophos
4.14. Soti
4.15. Tangoe
4.16. VMware
4.16.1. Airwatch
5. Endpoint Detection and Response (EDR)
5.1. Agent-Based
5.1.1. BlackBerry
5.1.1.1. Acquired Cylance
5.1.2. Carbon Black
5.1.2.1. Red Canary
5.1.3. Cisco
5.1.3.1. AMP For Endpoint
5.1.4. Countertack
5.1.5. CrowdStrike
5.1.6. Cyberbit
5.1.7. Cyberreason
5.1.8. Digital Guardian
5.1.9. Dtex Systems
5.1.10. Endgame Systems
5.1.11. Fidelis Cybersecurity
5.1.12. FireEye
5.1.12.1. FireEye HX Series/Mandiant
5.1.13. Forescout
5.1.14. Fortinet
5.1.15. Guidance Software
5.1.15.1. Encase Cybersecurity
5.1.16. Gyala
5.1.17. Huntress
5.1.18. LimaCharlie
5.1.19. LogRhythm
5.1.20. Nehemiahsecurity
5.1.20.1. Acquired Triumfant
5.1.21. NexThink
5.1.22. NPCore
5.1.23. Palo Alto Networks
5.1.23.1. Acquired Secdo
5.1.24. Panda Security
5.1.25. PolyLogyX
5.1.26. RSA (EMC)
5.1.27. Senseon
5.1.28. SentinelOne
5.1.29. SonicWall
5.1.30. Sophos
5.1.31. Tanium
5.1.32. Verint
5.1.33. WatchGuard
5.1.34. Ziften
5.2. Agentless
5.2.1. BeyondTrust
5.2.1.1. BeyondInsight Clarity
5.2.1.1.1. Clarity Malware Analysis
5.2.1.1.2. Clarity Threat Analytics
5.2.1.1.3. Clarity Connectors
5.2.2. Cybonet
5.2.3. Cynet
5.2.4. Datto
5.2.5. Fidelis Cyber Security
5.2.5.1. Resolution One
5.2.5.1.1. ResolutionOne Platform
5.2.6. Palo Alto Networks
5.2.6.1. Formerly LightCyber
5.2.7. Promisec
5.2.8. Root9B
5.2.9. Broadcom (ymantec)
5.2.10. WatchGuard
5.2.10.1. Formerly Hexis Cyber Solutions
6. Application Isolation, and Virtualized Containers
6.1. Endpoint Sandboxes
6.1.1. Panda
6.1.1.1. www.panda.com
6.1.2. Sandboxie
6.1.2.1. http://www.sandboxie.com/
6.1.3. Bitdefender
6.1.3.1. www.bitdefender.com
6.2. Type-0 Hypervisors
6.2.1. Lynxworks
6.2.1.1. http://www.lynuxworks.com/
6.2.2. Zirtu
6.3. Process Isolation/Virtualization
6.3.1. AppGuard
6.3.2. Avectco
6.3.3. HP
6.3.4. Hysolate
6.3.5. Janus Technology
6.3.6. Malwarebytes
6.3.7. Microsoft
6.3.8. Qubes OS
6.3.9. Sophos
6.3.10. Trellix
6.3.11. Virsec
6.4. Confidential Enclaves
6.4.1. Hardware Isolation
6.4.1.1. Intel
6.4.1.1.1. SGX
7. Endpoint Intrusion Prevention
7.1. Arkoon
7.1.1. StormShield
7.2. BeyondTrust
7.3. Broadcom (Symantec)
7.4. IBM
7.5. Landesk
7.6. Safensoft
7.7. Trellix
8. Endpoint User Monitoring
8.1. Fortra
8.2. Dtex Systems
8.3. Forcepoint
8.4. Interguard Software
8.5. Proofpoint
8.6. Veriato
8.7. Varonis
8.8. Teramind
9. Enterprise Mobility Mangement Suites
9.1. Absolute Software
9.2. AMware
9.2.1. Airwatch
9.3. Blackberry
9.4. Citrix
9.5. Globo
9.6. Good Technologies
9.7. IBM
9.8. Landesk
9.9. MobileIron
9.10. Mojave
9.10.1. https://www.mojave.net/
9.11. SAP
9.12. Sophos
9.13. Soti
9.14. Symantec
9.15. Tangoe
10. Execution Control (Allowlisting)
10.1. Airlock Digital
10.2. Carbon Black Protection
10.3. CruelComodo
10.4. Excubits Bouncer
10.5. Hummin Heads
10.6. itWatch
10.7. Lumension
10.8. NVT Exe Radar Pro
10.9. ReHips
10.10. Broadcom
10.11. ThreatLocker
10.12. Trellix
10.13. VooDooShield
10.14. Red Hat (SELINUX)
11. Exploit Technique Prevention Software
11.1. Arms Cyber
11.2. CyActive
11.3. CyBellum
11.4. Malwarebytes Anti-Exploit
11.5. Microsoft
11.5.1. Microsoft EMET - FREE
11.6. Morphisec
11.7. Palo Alto Networks
11.7.1. Endpoint
11.8. SonicWall
11.9. Sophos
11.9.1. Intercept X
11.10. Trend Micro
11.11. ViRobot APT Shield
12. File Integrity Monitoring
12.1. Open Source
12.1.1. 1. AIDE
12.1.2. 2. Trend Micro
12.1.2.1. 1. OSSEC
12.1.3. 3. Samhain
12.1.4. 4. Osiris
12.1.5. 5. Integrit
12.1.6. 6. Tripwire
12.1.7. WAZUH
12.2. Commercial
12.2.1. Imperva
12.2.2. ThreatLocker
12.2.3. Trellix
12.2.4. Tripwire
12.2.5. Broadcom (Carbon Black)
13. Firmware/Bios Security
13.1. Binare
13.2. Binarly
13.3. Crowdstrike
13.4. Eclypsium
13.5. Janus Technology
13.6. Netrise
13.7. Prove&Run
13.8. Trapezoid
14. Malware Analysis
14.1. Any.Run
14.2. Botnets
14.2.1. spyeyetracker.abuse.ch
14.3. Cape Sandbox
14.4. Filescan.io
14.5. Gatewatcher
14.6. Glimps.fr
14.7. Inquest Labs
14.8. Internet Identity
14.9. Intezer
14.10. JoeSecurity
14.11. Malware Patrol
14.12. Nextron Systems
14.13. Polyswarm
14.14. Reversing Labs
14.15. Shadowserver
14.16. SpamHaus
14.17. Team Cymru
14.18. ThreatGrid
14.19. VirusTotal
14.20. zeustracker.abuse.ch
15. Operating System Behavior Control
15.1. Acronis
15.2. AppGuard
15.3. Red Hat
15.3.1. Selinux
16. Policy Assessment and System Configuration Management
16.1. Configuration Management
16.1.1. Axonius
16.1.2. BMC
16.1.2.1. BMC Server Automation
16.1.3. Check Point Software
16.1.3.1. Endpoint Policy Management
16.1.4. Crowdstrike
16.1.5. IBM
16.1.5.1. IBM Endpoint Manager
16.1.6. Qualys
16.1.7. Rapid7
16.1.8. RedHat
16.1.8.1. OpenSCAP
16.1.9. Saint
16.1.9.1. Saint Security
16.1.10. Trellix
16.1.10.1. Enterprise Security Manager
16.1.11. Tripwire
16.1.11.1. Tripwire Enterprise
16.2. Patch Management
16.2.1. Ansa
16.2.2. Automox
16.2.3. Cloud Management Suite
16.2.4. ConnectWise
16.2.5. Ecora
16.2.6. Flexera
16.2.7. GFI Languard
16.2.8. Itarian
16.2.9. Ivanti
16.2.10. Kaseya
16.2.11. Manage Engine
16.2.12. Solar Winds
16.2.13. SysAid
16.3. Continuous Controls Monitoring
16.3.1. Comcast Databee
16.3.2. Cyber Sierra
16.3.3. Hyperproof
16.3.4. MetricStream
16.3.5. Panaseer
16.3.6. Pathlock
16.3.7. Quod Orbis
16.3.8. Trustmap
16.3.9. XM Cyber