1. Endpoint User Monitoring
1.1. Fortra
1.2. Dtex Systems
1.3. Forcepoint
1.4. Interguard Software
1.5. Proofpoint
1.6. Veriato
1.7. Varonis
1.8. Teramind
2. Enterprise Mobility Mangement Suites
2.1. Absolute Software
2.2. AMware
2.2.1. Airwatch
2.3. Blackberry
2.4. Citrix
2.5. Globo
2.6. Good Technologies
2.7. IBM
2.8. Landesk
2.9. MobileIron
2.10. Mojave
2.10.1. https://www.mojave.net/
2.11. SAP
2.12. Sophos
2.13. Soti
2.14. Symantec
2.15. Tangoe
3. Execution Control (Allowlisting)
3.1. Airlock Digital
3.2. Carbon Black Protection
3.3. CruelComodo
3.4. Excubits Bouncer
3.5. Hummin Heads
3.6. itWatch
3.7. Lumension
3.8. NVT Exe Radar Pro
3.9. ReHips
3.10. Broadcom
3.11. ThreatLocker
3.12. Trellix
3.13. VooDooShield
3.14. Red Hat (SELINUX)
4. Exploit Technique Prevention Software
4.1. Arms Cyber
4.2. CyActive
4.3. CyBellum
4.4. Malwarebytes Anti-Exploit
4.5. Microsoft
4.5.1. Microsoft EMET - FREE
4.6. Morphisec
4.7. Palo Alto Networks
4.7.1. Endpoint
4.8. SonicWall
4.9. Sophos
4.9.1. Intercept X
4.10. Trend Micro
4.11. ViRobot APT Shield
5. File Integrity Monitoring
5.1. Open Source
5.1.1. 1. AIDE
5.1.2. 2. Trend Micro
5.1.2.1. 1. OSSEC
5.1.3. 3. Samhain
5.1.4. 4. Osiris
5.1.5. 5. Integrit
5.1.6. 6. Tripwire
5.1.7. WAZUH
5.2. Commercial
5.2.1. Imperva
5.2.2. ThreatLocker
5.2.3. Trellix
5.2.4. Tripwire
5.2.5. Broadcom (Carbon Black)
6. Firmware/Bios Security
6.1. Binare
6.2. Binarly
6.3. Crowdstrike
6.4. Eclypsium
6.5. Janus Technology
6.6. Netrise
6.7. Prove&Run
6.8. Trapezoid
7. Malware Analysis
7.1. Any.Run
7.2. Botnets
7.2.1. spyeyetracker.abuse.ch
7.3. Cape Sandbox
7.4. Filescan.io
7.5. Gatewatcher
7.6. Glimps.fr
7.7. Inquest Labs
7.8. Internet Identity
7.9. Intezer
7.10. JoeSecurity
7.11. Malware Patrol
7.12. Nextron Systems
7.13. Polyswarm
7.14. Reversing Labs
7.15. Shadowserver
7.16. SpamHaus
7.17. Team Cymru
7.18. ThreatGrid
7.19. VirusTotal
7.20. zeustracker.abuse.ch
8. Operating System Behavior Control
8.1. Acronis
8.2. AppGuard
8.3. Red Hat
8.3.1. Selinux
9. Policy Assessment and System Configuration Management
9.1. Configuration Management
9.1.1. Axonius
9.1.2. BMC
9.1.2.1. BMC Server Automation
9.1.3. Check Point Software
9.1.3.1. Endpoint Policy Management
9.1.4. Crowdstrike
9.1.5. IBM
9.1.5.1. IBM Endpoint Manager
9.1.6. Qualys
9.1.7. Rapid7
9.1.8. RedHat
9.1.8.1. OpenSCAP
9.1.9. Saint
9.1.9.1. Saint Security
9.1.10. Trellix
9.1.10.1. Enterprise Security Manager
9.1.11. Tripwire
9.1.11.1. Tripwire Enterprise
9.2. Patch Management
9.2.1. Ansa
9.2.2. Automox
9.2.3. Cloud Management Suite
9.2.4. ConnectWise
9.2.5. Ecora
9.2.6. Flexera
9.2.7. GFI Languard
9.2.8. Itarian
9.2.9. Ivanti
9.2.10. Kaseya
9.2.11. Manage Engine
9.2.12. Solar Winds
9.2.13. SysAid
9.3. Continuous Controls Monitoring
9.3.1. Comcast Databee
9.3.2. Cyber Sierra
9.3.3. Hyperproof
9.3.4. MetricStream
9.3.5. Panaseer
9.3.6. Pathlock
9.3.7. Quod Orbis
9.3.8. Trustmap
9.3.9. XM Cyber
10. Anti-Malware
10.1. Eastern Europe
10.1.1. Czech Republic
10.1.1.1. Avast
10.1.1.2. TrustPort
10.1.1.3. SonicWall
10.1.2. Denmark
10.1.2.1. BullGuard
10.1.2.2. SonicWall
10.1.3. Netherlands
10.1.3.1. AVG
10.1.3.2. SonicWall
10.1.4. Romania
10.1.4.1. Bitdefender
10.1.4.2. SonicWall
10.1.5. Slovakia
10.1.5.1. ESET
10.1.5.2. SonicWall
10.2. Emerging Asia/Pacific
10.2.1. India
10.2.1.1. eScan
10.2.1.2. K7 Computing
10.2.1.3. SonicWall
10.3. Latin America
10.3.1. Spain
10.3.1.1. Optenet
10.3.1.2. SonicWall
10.4. Mature Asia/Pacific
10.4.1. China
10.4.1.1. Qihoo
10.4.1.2. Rising International Software
10.4.1.3. SonicWall
10.4.2. South Korean
10.4.2.1. AhnLab
10.4.2.2. BKAV
10.4.2.3. ESTsoft
10.4.2.4. SonicWall
10.5. Middle East and Africa
10.5.1. Israel
10.5.1.1. Check Point Software
10.5.1.2. SonicWall
10.6. North America
10.6.1. Coro.net
10.6.2. Cyren
10.6.3. Fortinet
10.6.4. MalwareBytes
10.6.5. Microsoft
10.6.6. PC Pitstop
10.6.7. Reason Core Security
10.6.8. Roboscan
10.6.9. SonicWall
10.6.10. Symantec
10.6.11. ThreatTrack
10.6.12. Total Defense
10.6.13. Trellix
10.6.14. Trend Micro
10.7. Russia
10.7.1. Kaspersky
10.8. Western Europe
10.8.1. Austria
10.8.1.1. Ikarus Security
10.8.1.2. SonicWall
10.8.2. Finland
10.8.2.1. F-Secure
10.8.2.2. SonicWall
10.8.3. Germany
10.8.3.1. Avira
10.8.3.2. EgoSecure
10.8.3.3. G-Data
10.8.3.4. Kromtech
10.8.3.5. SonicWall
10.8.4. Norway
10.8.4.1. Norman
10.8.4.2. SonicWall
10.8.5. United Kingdom
10.8.5.1. Sophos
10.8.5.2. SonicWall
10.8.6. Poland
10.8.6.1. Arcabit
10.8.6.2. SonicWall
10.8.7. France
10.8.7.1. Nucleon Security
11. Application Control/Allowlisting
11.1. Airlock Digital
11.2. AppSense
11.3. Avecto
11.4. Broadcom
11.5. EgoSecure
11.6. Faronics
11.7. Heat Software
11.8. Ivanti
11.9. Sophos
11.10. ThreatLocker
11.11. Trellix
11.12. Trend Micro
11.13. VMware
12. Application Isolation
12.1. Appguard
12.2. Bufferzone
12.3. HP
12.4. Invincea
12.4.1. SandBoxie
12.5. ThreatLocker
12.6. Virsec
12.7. VMware
13. Application Isolation, and Virtualized Containers
13.1. Endpoint Sandboxes
13.1.1. Panda
13.1.1.1. www.panda.com
13.1.2. Sandboxie
13.1.2.1. http://www.sandboxie.com/
13.1.3. Bitdefender
13.1.3.1. www.bitdefender.com
13.2. Type-0 Hypervisors
13.2.1. Lynxworks
13.2.1.1. http://www.lynuxworks.com/
13.2.2. Zirtu
13.3. Process Isolation/Virtualization
13.3.1. AppGuard
13.3.2. Avectco
13.3.3. HP
13.3.4. Hysolate
13.3.5. Janus Technology
13.3.6. Malwarebytes
13.3.7. Microsoft
13.3.8. Qubes OS
13.3.9. Sophos
13.3.10. Trellix
13.3.11. Virsec
13.4. Confidential Enclaves
13.4.1. Hardware Isolation
13.4.1.1. Intel
13.4.1.1.1. SGX
14. Device Management
14.1. Absolute Software
14.2. Beachhead Security
14.3. Blackberry
14.4. Broadcom
14.5. Citrix
14.6. EgoSecure
14.7. Globo
14.8. IBM
14.9. Landesk
14.10. MobileIron
14.11. Mojave
14.11.1. https://www.mojave.net/
14.12. SAP
14.13. Sophos
14.14. Soti
14.15. Tangoe
14.16. VMware
14.16.1. Airwatch
15. Endpoint Detection and Response (EDR)
15.1. Agent-Based
15.1.1. BlackBerry
15.1.1.1. Acquired Cylance
15.1.2. Carbon Black
15.1.2.1. Red Canary
15.1.3. Cisco
15.1.3.1. AMP For Endpoint
15.1.4. Countertack
15.1.5. CrowdStrike
15.1.6. Cyberbit
15.1.7. Cyberreason
15.1.8. Digital Guardian
15.1.9. Dtex Systems
15.1.10. Endgame Systems
15.1.11. Fidelis Cybersecurity
15.1.12. FireEye
15.1.12.1. FireEye HX Series/Mandiant
15.1.13. Forescout
15.1.14. Fortinet
15.1.15. Guidance Software
15.1.15.1. Encase Cybersecurity
15.1.16. Gyala
15.1.17. Huntress
15.1.18. LimaCharlie
15.1.19. LogRhythm
15.1.20. Nehemiahsecurity
15.1.20.1. Acquired Triumfant
15.1.21. NexThink
15.1.22. NPCore
15.1.23. Palo Alto Networks
15.1.23.1. Acquired Secdo
15.1.24. Panda Security
15.1.25. PolyLogyX
15.1.26. RSA (EMC)
15.1.27. Senseon
15.1.28. SentinelOne
15.1.29. SonicWall
15.1.30. Sophos
15.1.31. Tanium
15.1.32. Verint
15.1.33. WatchGuard
15.1.34. Ziften
15.2. Agentless
15.2.1. BeyondTrust
15.2.1.1. BeyondInsight Clarity
15.2.1.1.1. Clarity Malware Analysis
15.2.1.1.2. Clarity Threat Analytics
15.2.1.1.3. Clarity Connectors
15.2.2. Cybonet
15.2.3. Cynet
15.2.4. Datto
15.2.5. Fidelis Cyber Security
15.2.5.1. Resolution One
15.2.5.1.1. ResolutionOne Platform
15.2.6. Palo Alto Networks
15.2.6.1. Formerly LightCyber
15.2.7. Promisec
15.2.8. Root9B
15.2.9. Broadcom (ymantec)
15.2.10. WatchGuard
15.2.10.1. Formerly Hexis Cyber Solutions
16. Endpoint Intrusion Prevention
16.1. Arkoon
16.1.1. StormShield