search
Join or Log In

Endpoint Security

Browse 142 cybersecurity tools tagged with "Endpoint Security"

BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
Remedio Smart Device Hardening

Remedio Smart Device

language

Endpoint Protection Platform

Remedio Smart Device Hardening on SecurityListing: Automated device hardening and configuration management platform

4.8(3)
Haleum AI

Haleum AI

United States flag

Threat Intelligence Platforms

The Future of Human Risk Intelligence. Behavioral analytics that understand your business. Respond faster with our deep research agents for security data. Haleum monitors cloud workloads, SaaS applic

4.7(2)
Airbus Cybersecurity

Airbus Cybersecurity

France flag

Compliance Consulting

We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin

4.7(2)
Mobilen Secure Mobile Network

Mobilen Secure Mobile

language

Mobile Device Management

Mobilen Secure Mobile Network on SecurityListing: Secure mobile network with post-quantum encryption and SIM swap protection

4.7(2)
ClamAV

ClamAV

language

Endpoint Protection Platform

ClamAV on SecurityListing: ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.

4.7(2)
Fortinet FortiClient

Fortinet FortiClient

language

Endpoint Detection and Response

Fortinet FortiClient on SecurityListing: Unified endpoint agent providing ZTNA, VPN, EPP, and fabric integration

4.7(2)
CyberArk Identity Security Platform

CyberArk Identity Security

language

Multi-Factor Authentication and Single Sign-On

CyberArk Identity Security Platform on SecurityListing: Identity security platform with PAM, SSO, MFA, and secrets management

4.7(2)
HitmanPro

HitmanPro

language

Endpoint Protection Platform

HitmanPro on SecurityListing: Malware detection and removal tool for infected computers

4.7(2)
ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
Safe Solutions

Safe Solutions

EG flag

Data Protection

Safe Solutions is a digital transformation company based in Egypt that specializes in information security, data protection, and process automation. They serve businesses across Egypt and the Gulf reg

4.5(3)
Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Brazil flag

Compliance Consulting

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense. We provide open source threat intelligence, managed detection

4.5(3)
ZecOps

ZecOps

United States flag

Threat Intelligence Platforms

ZecOps is a cybersecurity automation company headquartered in San Francisco with offices in Tel Aviv and London. ZecOps learns from attackers' mistakes with the goal of discovering the course of acti

4.5(3)
Intraframe US

Intraframe US

United States flag

Digital Forensics and Incident Response

Intraframe US is a premium cybersecurity consulting company. We support businesses throughout Memphis and the greater Mid-South with Managed IT services. We combine advanced cybersecurity protection

4.5(3)
Arc4dia Labs

Arc4dia Labs

Canada flag

Threat Intelligence Platforms

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats. SNOW is an endpoint detection/response solution in the form of a lightweight cross platf

4.5(1)
FixIT Computer Technologies

FixIT Computer Technologies

United Arab Emirates flag

Data Protection

FixIT Computer Technologies is a UAE-based information technology services company offering comprehensive managed IT, cybersecurity, data protection, and infrastructure support. They provide end-to-en

4.5(1)
Huawei MDM Security

Huawei MDM Security

language

VPN

Huawei MDM Security on SecurityListing: Enterprise mobile device & app management platform for BYOD, COPE, and COBO

4.5(1)
InQuest Labs

InQuest Labs

language

Threat Hunting

InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

4.5(1)
CrowdStrike Endpoint Security

CrowdStrike Endpoint Security

language

Endpoint Detection and Response

CrowdStrike Endpoint Security on SecurityListing: Endpoint protection platform with EDR and EPP capabilities

4.5(1)
Avast Ultimate Business Security

Avast Ultimate Business

language

Endpoint Protection Platform

Avast Ultimate Business Security on SecurityListing: Business endpoint protection with antivirus, malware defense, and mgmt tools

4.5(1)
autoruns

autoruns

language

Endpoint Detection and Response

autoruns on SecurityListing: A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.

4.5(1)
NinjaOne RMM

NinjaOne RMM

language

Endpoint Protection Platform

NinjaOne RMM on SecurityListing: RMM platform for automating IT management and technician operations

4.5(1)
PAGO Networks PAGO MDR

PAGO Networks PAGO

language

Endpoint Detection and Response

PAGO Networks PAGO MDR on SecurityListing: MDR service with real-time monitoring and threat response capabilities

4.5(1)
Comodo Advanced Endpoint Protection

Comodo Advanced Endpoint

language

Endpoint Protection Platform

Comodo Advanced Endpoint Protection on SecurityListing: Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.

4.5(1)
BluSapphire OneAgent™

BluSapphire OneAgent™

language

Container Security

BluSapphire OneAgent™ on SecurityListing: Prevention-first EDR stopping zero-day attacks, ransomware, and fileless malware

4.5(1)
Avast One

Avast One

language

VPN

Avast One on SecurityListing: All-in-one security suite with antivirus, VPN, and scam protection

4.5(1)
HitmanPro.Alert

HitmanPro.Alert

language

Endpoint Protection Platform

HitmanPro.Alert on SecurityListing: A lightweight malware detection and removal tool that provides real-time protection against complex attacks while preserving system resources.

4.5(1)
DuskRise IoT Device

DuskRise IoT Device

language

Threat Intelligence Platforms

DuskRise IoT Device on SecurityListing: IoT device creating secure network segments for remote workers

4.5(1)
NinjaOne Endpoint Management

NinjaOne Endpoint Management

language

Endpoint Protection Platform

NinjaOne Endpoint Management on SecurityListing: Unified endpoint management platform with automation, patching, and remote access

4.5(1)
Aura Antivirus

Aura Antivirus

language

Endpoint Protection Platform

Aura Antivirus on SecurityListing: Antivirus software with real-time malware protection for Windows and macOS

4.5(1)
Huntress Managed EDR

Huntress Managed EDR

language

Endpoint Detection and Response

Huntress Managed EDR on SecurityListing: Managed EDR with 24/7 SOC for Windows, macOS, and Linux endpoints

4.5(1)
Resecurity Endpoint Protection Platform

Resecurity Endpoint Protection

language

Threat Intelligence Platforms

Resecurity Endpoint Protection Platform on SecurityListing: EPP consolidating 7 security technologies with AI-driven threat detection

4.5(1)
Knockknock

Knockknock

language

Endpoint Detection and Response

Knockknock on SecurityListing: A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.

4.5(1)
G DATA Cyber Defense

G DATA Cyber

language

Endpoint Protection Platform

G DATA Cyber Defense on SecurityListing: German endpoint protection & cyber defense platform with AI-based detection

4.5(1)
WithSecure Elements Cloud

WithSecure Elements Cloud

language

Endpoint Detection and Response

WithSecure Elements Cloud on SecurityListing: Cloud-based cybersecurity platform for MSPs with EDR, XDR, and MDR capabilities

4.5(1)
NinjaOne Mobile Device Management

NinjaOne Mobile Device

language

Mobile Device Management

NinjaOne Mobile Device Management on SecurityListing: MDM solution for managing Android and Apple devices alongside other endpoints

4.5(1)
Crowdroid: Behavior-Based Malware Detection System for Android

Crowdroid: Behavior-Based Malware

language

Mobile Threat Defense

Crowdroid: Behavior-Based Malware Detection System for Android on SecurityListing: A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.

4.5(1)
NetWitness Cybersecurity

NetWitness Cybersecurity

language

Endpoint Detection and Response

NetWitness Cybersecurity on SecurityListing: Integrated XDR platform combining NDR, SIEM, EDR, and SOAR capabilities

4.5(1)
FortiEDR

FortiEDR

language

Endpoint Detection and Response

FortiEDR on SecurityListing: FortiEDR is an automated endpoint security solution that integrates with the Fortinet Security Fabric and third-party solutions to reduce MTTR and provide real-time breach detection and response.

4.5(1)
G DATA Antivirus

G DATA Antivirus

language

Security Awareness Training

G DATA Antivirus on SecurityListing: Antivirus and endpoint protection software for malware detection and defense

4.5(1)
CompanyName Microsegmentation

CompanyName Microsegmentation

language

Zero Trust Network Access

CompanyName Microsegmentation on SecurityListing: Microsegmentation service for zero-trust network isolation and containment

4.5(1)
SecMobi Wiki

SecMobi Wiki

language

Mobile Threat Defense

SecMobi Wiki on SecurityListing: A collection of mobile security resources with tools, white papers, ebooks, and webinars.

4.5(1)
Aegis Cyber Defense Systems

Aegis Cyber Defense

United States flag

Threat Intelligence Platforms

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance. Aegis Defender Pro is a software and service that updates the Nati

4.5(1)
Amnet Technology Solutions (Amnet Systems)

Amnet Technology Solutions

United States flag

Backup as a Service

With a team of experienced technology experts, amnet delivers top-notch services to customers. Amnet continues to invest in new product offerings that provide innovative and best-in-class solutions to

4.5(1)
Beacon Technology

Beacon Technology

United States flag

Threat Intelligence Platforms

Beacon Technology is a multinational cybersecurity company that offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools. This platform is delivered via a robust

4.5(1)
BackupVault

BackupVault

United Kingdom flag

Backup as a Service

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide. We also offer Endpo

4.5(1)
ABM Technology Group

ABM Technology Group

United States flag

Compliance Consulting

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations. CybersecurityOur team stays one step ahead in

4.5(1)
Vysk Communications

Vysk Communications

United States flag

Security Operations

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication. Vysk’s unique 3-pronged approach to privacy - True End-to-End Encryption - is

4.5(1)
Gorilla Technology Group

Gorilla Technology Group

Taiwan flag

Industrial Control System Security

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes. Gorilla offers robust cyberse

4.5(1)
42Gears

42Gears

India flag

Security Operations

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables. Supported on Android, iOS and Windows platforms. We offer MDM, BYOD & Se

4.5(1)
Alias Robotics

Alias Robotics

Spain flag

Industrial Control System Security

Alias Robotics is a robot cyber security company. Founded upon previous experiences in robotics, we take a roboticists' approach to cyber security and deliver security solutions for robots and their c

4.5(1)
X-PHY

X-PHY

United States flag

Security Operations

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core. Built on the principle of Security by Design, X-PHY embeds protection dir

4.5(1)
Advanced Systems International SAC

Advanced Systems International

Peru flag

Data Loss Prevention

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing. USB Device Control is an important part of Endpoint Security Manage

4.5(1)
Zip Security

Zip Security

United States flag

Governance Risk and Compliance Platforms

Zip Security make it easy to deploy, configure, and manage key security tools like cross platform device management (MDM), endpoint detection and response (EDR), and more. Zip's platform streamlines

4.5(1)
ARCON

ARCON

United States flag

Governance Risk and Compliance Platforms

ARCON is a globally recognized Identity-As-A-Service provider with a wealth of experience in risk management and continuous risk assessment tools. Our award-winning solutions portfolio includes our P

4.5(1)
Action1

Action1

United States flag

Security Operations

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain

4.5(1)
Adaptiva

Adaptiva

United States flag

Security Operations

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale. The company offers OneSite, the first fully adaptive autonomous endpoint managem

4.5(1)
Jiran Security

Jiran Security

KO flag

Data Loss Prevention

Jiran Security provides data and application security solution over email, mobile device and endpoints.

4.5(1)
Advantus360

Advantus360

Canada flag

Cloud Security

Advantus360 is an IT Security solutions organization focused on safeguarding our client’s enterprise and virtual presence. We advise, design and deploy best of breed IT Security technology and profess

4.5(1)
Breeze Security

Breeze Security

Israel flag

Threat Intelligence Platforms

Security leaders are overwhelmed with tools, data, and dashboards—yet still struggle to see where they're truly exposed, or whether the right risks are being addressed. We started Breeze to change tha

4.5(1)
BlackhawkNest

BlackhawkNest

United States flag

Security Operations

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance. A complete set of network and host products ensures all y

4.5(1)
eScan Endpoint Security

eScan Endpoint Security

language

Endpoint Protection Platform

eScan Endpoint Security on SecurityListing: Comprehensive endpoint security solution for enterprise networks and SMBs

4.3(2)
Hakware

Hakware

South Africa flag

Security Operations

Hakware is a next-generation Security Management solution offering a comprehensive OneView of your entire IT and security environment. At the heart of Hakware are custom-trained models that consolidat

4.3(2)
Softech Store

Softech Store

United Arab Emirates flag

Email Security

Softech Store is an online marketplace and distributor offering enterprise IT products, solutions, and services to businesses worldwide. It showcases a catalog of branded IT offerings, security produc

4.3(2)
Cloud Networks

Cloud Networks

United Arab Emirates flag

Cloud Security

Cloud Networks Solutions DMCC is a system integrator and IT security provider established in 2015, offering hardware and software sales, IT auditing and consulting, and design and implementation of in

4.3(2)
AlertSec

AlertSec

United States flag

Data Loss Prevention

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices. Many organizations work with third-parties, such as partners

4.3(2)
Morphisec Breach Prevention Platform

Morphisec Breach Prevention

language

Endpoint Protection Platform

Morphisec Breach Prevention Platform on SecurityListing: Endpoint security platform using Moving Target Defense to prevent cyber attacks and provide adaptive exposure management and threat prevention.

4.3(2)
Fortify 24/7

Fortify 24/7

United States flag

Managed Security Service Providers

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks. Fortify 24×7’s Cybersecurity Managed™ program delivers a comprehensive and custom

4.3(2)
Hexnode Unified Endpoint Management

Hexnode Unified Endpoint

language

Mobile Device Management

Hexnode Unified Endpoint Management on SecurityListing: UEM platform for managing and securing endpoints across multiple OS platforms.

4.2(3)
Koi Platform

Koi Platform

language

Risk Assessment

Koi Platform on SecurityListing: Tracks, governs, and secures software installs across endpoints and marketplaces.

3.9(3)
CrowdStrike Falcon for IT

CrowdStrike Falcon for

language

Endpoint Detection and Response

CrowdStrike Falcon for IT on SecurityListing: Unified security and IT management platform with single agent

3.8(1)
Cloudmersive Virus Scan

Cloudmersive Virus Scan

language

Endpoint Protection Platform

Cloudmersive Virus Scan on SecurityListing: Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.

3.8(1)
odix TrueCDR™ Kiosk

odix TrueCDR™ Kiosk

language

Endpoint Protection Platform

odix TrueCDR™ Kiosk on SecurityListing: Secure kiosk for sanitizing USB & uploaded files using CDR technology

3.8(1)
CommuniTake

CommuniTake

Israel flag

Security Operations

CommuniTake is a software company that builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use. CommuniTake Intact Mobi

3.8(1)
Advantech

Advantech

Taiwan flag

Industrial Control System Security

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security. Advantech, a global leader in embedded computing and IoT systems

3.8(1)
Blackwall Industries

Blackwall Industries

PH flag

Compliance Consulting

Blackwall Industries is a Philippine-based cybersecurity firm committed to delivering proactive, scalable protection for local businesses. Our approach combines deep local insight with the power of op

3.8(1)
CAT Labs

CAT Labs

United States flag

Security Operations

The explosion of crypto-targeted crimes like hacks, scams and fraud is the biggest threat to the Web3 and DeFi revolution. CAT Labs is building cybersecurity protocols for crypto projects and retail a

3.8(1)
Becrypt

Becrypt

United Kingdom flag

Data Loss Prevention

With a heritage of creating National Cyber Security Centre certified products, Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisa

3.8(1)
Continuum

Continuum

United Kingdom flag

Backup as a Service

Continuum is the IT management platform company that allows Managed IT Services Providers (MSPs) to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoint

3.8(1)
RAS Infotech

RAS Infotech

United Arab Emirates flag

Application Security

RAS Infotech is a cybersecurity company specializing in enterprise security solutions across the Middle East and North Africa. The company offers a broad range of security disciplines including endpoi

3.8(1)
Avast Free Antivirus

Avast Free Antivirus

language

Endpoint Protection Platform

Avast Free Antivirus on SecurityListing: Free antivirus software with malware protection and scam detection

3.8(1)
FortiSASE

FortiSASE

language

Secure Access Service Edge

FortiSASE on SecurityListing: FortiSASE is a cloud-delivered SASE solution that combines SD-WAN with security service edge capabilities to provide secure access to web, cloud, and applications for hybrid workforces.

3.8(1)
Huntress Managed Security Platform

Huntress Managed Security

language

Endpoint Detection and Response

Huntress Managed Security Platform on SecurityListing: Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC

3.8(1)
ADNET Technologies

ADNET Technologies

United States flag

Managed Security Service Providers

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm. We work closely with clients to provide industry-leading service across three core areas—Managed IT Services, Cyb

3.8(1)
Intezer

Intezer

language

Threat Hunting

Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

3.8(1)
SpyShelter

SpyShelter

language

Endpoint Detection and Response

SpyShelter on SecurityListing: A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.

3.8(1)
CrowdStrike Falcon

CrowdStrike Falcon

language

Endpoint Detection and Response

CrowdStrike Falcon on SecurityListing: Cloud-native cybersecurity platform with EPP, EDR, XDR, and SIEM capabilities

3.8(1)
AT&T Cybersecurity

AT&T Cybersecurity

United States flag

Compliance Consulting

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Cybersecurity Consulting ServicesM

3.8(1)
CrashPlan

CrashPlan

United States flag

Backup as a Service

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes. Our solution ensures data resilience by protecting critical files from ransomware, accidental deletion,

3.8(1)
Dark Reading

Dark Reading

United States flag

Security Operations

Dark Reading is the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousand

3.8(1)
AirDroid Business

AirDroid Business

Singapore flag

Security Operations

AirDroid Business is an unconventional Mobile Device Management (MDM) software that comes with powerful remote control and device monitoring capabilities like no other. It allows businesses and IT tea

3.8(1)
Cyfirma DeFNCE

Cyfirma DeFNCE

language

Risk Assessment

Cyfirma DeFNCE on SecurityListing: Mobile security app for device scanning, data leak detection, and risk assessment

3.8(1)
Osquery

Osquery

language

Endpoint Detection and Response

Osquery on SecurityListing: Open-source tool for monitoring macOS hosts with detailed system activity insights.

3.8(1)
CrowdStrike Falcon Platform

CrowdStrike Falcon Platform

language

Endpoint Detection and Response

CrowdStrike Falcon Platform on SecurityListing: Cloud-native cybersecurity platform with EPP, EDR, XDR, and SIEM capabilities

3.8(1)
AppGuard

AppGuard

United States flag

Threat Intelligence Platforms

AppGuard prevents breaches by blocking applications from performing inappropriate processes, but allows them to continue performing normal actions, using our patented dynamic isolation and inheritance

3.8(1)
Avanan

Avanan

United States flag

Cloud Security

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click. We 'cloudify' over 60 best-of-breed security solutions a

3.8(1)
Todyl Unified Platform

Todyl Unified Platform

language

Managed Detection and Response

Todyl Unified Platform on SecurityListing: Unified cybersecurity platform for MSPs with SASE, EDR, SIEM, MXDR, and GRC

Iru AI

Iru AI

language

Multi-Factor Authentication and Single Sign-On

Iru AI on SecurityListing: AI-powered unified platform for identity, endpoint security, and compliance

Blumira SOC Auto-Focus

Blumira SOC Auto-Focus

language

Endpoint Detection and Response

Blumira SOC Auto-Focus on SecurityListing: XDR platform with AI-enhanced SIEM, automated response, and endpoint visibility

Vali Cyber ZeroLock

Vali Cyber ZeroLock

language

Container Security

Vali Cyber ZeroLock on SecurityListing: Linux security platform for federal/national security environments

Todyl Platform

Todyl Platform

language

Endpoint Detection and Response

Todyl Platform on SecurityListing: Unified platform combining SASE, EDR, SIEM, MXDR, GRC, and security automation

Avast Cleanup Premium

Avast Cleanup Premium

language

Endpoint Protection Platform

Avast Cleanup Premium on SecurityListing: PC optimization and cleanup tool for system performance maintenance

Cisilion

Cisilion

United Kingdom flag

Cloud Security

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services a

XeneX Managed Cybersecurity

XeneX Managed Cybersecurity

language

Managed Security Service Providers

XeneX Managed Cybersecurity on SecurityListing: Managed cybersecurity service with 24/7 SOC, XDR, SIEM, and compliance support

XFA Device Security

XFA Device Security

language

Mobile Device Management

XFA Device Security on SecurityListing: Agentless device security platform for BYOD, managed, and external devices.

Theos Cyber Cyber Engineering

Theos Cyber Cyber

language

Managed Security Service Providers

Theos Cyber Cyber Engineering on SecurityListing: Cybersecurity engineering services for design, implementation, and management

Zip Endpoint Security

Zip Endpoint Security

language

Endpoint Detection and Response

Zip Endpoint Security on SecurityListing: Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices

Huawei HiSec Endpoint

Huawei HiSec Endpoint

language

Endpoint Detection and Response

Huawei HiSec Endpoint on SecurityListing: EDR solution with ransomware recovery, threat detection, and access control

Uptycs Nexus

Uptycs Nexus

language

Endpoint Protection Platform

Uptycs Nexus on SecurityListing: Managed SaaS for osquery fleet management across endpoints

Blancco Technology Group

Blancco Technology Group

United States flag

Security Operations

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions. Blancco is the industry standard in data erasure and mobile device diagnostics. B

G DATA Mobile Security iOS

G DATA Mobile

language

Mobile Device Management

G DATA Mobile Security iOS on SecurityListing: Mobile security app for iOS devices with anti-phishing and anti-theft features

Net Desire Technologies

Net Desire Technologies

United Arab Emirates flag

Data Protection

Net Desire Technologies is a UAE-based cybersecurity and IT solutions provider focusing on data protection, networking, backup and storage, and related infrastructure services. They position themselve

AppTec

AppTec

Switzerland flag

Security Operations

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security. More than 3,800 companies and organizations utilize the APPTEC360 EMM platform to meet the challen

G DATA Internet Security Android

G DATA Internet

language

Mobile Threat Defense

G DATA Internet Security Android on SecurityListing: Mobile security app for Android devices with malware protection & anti-theft

Nuvias Group

Nuvias Group

United Kingdom flag

Cloud Security

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply. Nuvias was born from cyber securit

Appurity

Appurity

United Kingdom flag

Security Operations

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals – from legal to finance, hospitality to the NHS. Mobile security is increasingly essen

Bounga Informatics

Bounga Informatics

Singapore flag

Digital Forensics and Incident Response

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific. Forensic services include digital

ThreatDown EDR

ThreatDown EDR

language

Vulnerability Assessment

ThreatDown EDR on SecurityListing: Powerfully simple endpoint security solution that takes down threats without interrupting business.

zeroRISC Integrity Management Platform

zeroRISC Integrity Management

language

Endpoint Protection Platform

zeroRISC Integrity Management Platform on SecurityListing: Device trust mgmt platform using OpenTitan secure silicon for IoT/edge/DC

Cyberbit

Cyberbit

Israel flag

Industrial Control System Security

Cyberbit is revolutionizing the SOC, with the first analytics-driven product suite for managing the entire incident lifecycle, from detection to incident response, and for simulated SOC team training,

OpenEDR

OpenEDR

language

Endpoint Detection and Response

OpenEDR on SecurityListing: OpenEDR is an open-source platform enhancing cybersecurity through real-time detection and analysis of cyber threats.

Conatix

Conatix

United States flag

Security Operations

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity. The Conatix CYberSecurity ANAlytics (CYSANSA)

Cura Technology

Cura Technology

United Kingdom flag

Backup as a Service

At Cura Technology, we’re not just an IT managed service provider and value-added reseller. We are your technology partner, committed to delivering the best solutions for your business. Boost Your Cy

ALPHA DS

ALPHA DS

EG flag

AI Security

ALPHA DS is a focused cybersecurity service provider offering strategic consultancy and tailored information security solutions across networks, applications, data, endpoints, and OT/ICS/IOT environme

High Tech Vision

High Tech Vision

EG flag

Data Protection

High Tech Vision is a leading provider of business and IT value-added consulting, information security and cyber security services, web development and online presence solutions, and emerging technolo

Verisys Antivirus API

Verisys Antivirus API

language

Endpoint Protection Platform

Verisys Antivirus API on SecurityListing: Scan files for viruses and malware with language-agnostic REST API

Harmony Endpoint

Harmony Endpoint

language

VPN

Harmony Endpoint on SecurityListing: All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.

Elite Blue Team Managed EDR

Elite Blue Team

language

Endpoint Detection and Response

Elite Blue Team Managed EDR on SecurityListing: Managed EDR service with behavioral analytics and SIEM telemetry

Nozomi Networks NOZOMI ARC™

Nozomi Networks NOZOMI

language

Vulnerability Assessment

Nozomi Networks NOZOMI ARC™ on SecurityListing: Host-based security sensor for OT endpoints with threat prevention capabilities

Venn Blue Border

Venn Blue Border

language

Data Loss Prevention

Venn Blue Border on SecurityListing: Secure workspace for BYOD/unmanaged devices without VDI or device takeover

Reveald ManagedDetection and Response

Reveald ManagedDetection and

language

Threat Hunting

Reveald ManagedDetection and Response on SecurityListing: MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring

Redline

Redline

language

Digital Forensics and Incident Response

Redline on SecurityListing: A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.

Resecurity Next-Generation Platform

Resecurity Next-Generation Platform

language

Digital Risk Protection

Resecurity Next-Generation Platform on SecurityListing: Enterprise endpoint protection platform with AI-powered threat detection

Rootkit Hunter

Rootkit Hunter

language

Endpoint Detection and Response

Rootkit Hunter on SecurityListing: A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.

Somansa Privacy-i EDR

Somansa Privacy-i EDR

language

Endpoint Detection and Response

Somansa Privacy-i EDR on SecurityListing: Next-gen antivirus & EDR with pattern/behavior detection engines

Axence ConnectPro

Axence ConnectPro

language

Digital Forensics and Incident Response

Axence ConnectPro on SecurityListing: Remote access and IT support tool for workstation management and diagnostics

CSIS Managed Detection & Response

CSIS Managed Detection

language

Brand Protection

CSIS Managed Detection & Response on SecurityListing: MDR service with threat intel, digital risk protection, and incident response

Todyl Endpoint Security

Todyl Endpoint Security

language

Endpoint Detection and Response

Todyl Endpoint Security on SecurityListing: EDR and NGAV solution for endpoint threat detection, prevention, and response

ThreatLocker Platform

ThreatLocker Platform

language

Endpoint Protection Platform

ThreatLocker Platform on SecurityListing: ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.

Sophos Endpoint

Sophos Endpoint

language

Endpoint Detection and Response

Sophos Endpoint on SecurityListing: AI-powered endpoint security with prevention-first approach and EDR capabilities

Stealth-ISS SOC-AS-A-SERVICE (XDR)

Stealth-ISS SOC-AS-A-SERVICE (XDR)

language

Endpoint Detection and Response

Stealth-ISS SOC-AS-A-SERVICE (XDR) on SecurityListing: Managed SOC service with XDR capabilities for 24/7 threat monitoring and response

G DATA Total Security

G DATA Total

language

Password Management

G DATA Total Security on SecurityListing: Multi-platform security suite with antivirus, firewall, and data protection