Skip to content

Latest commit

 

History

History
49 lines (42 loc) · 5.71 KB

endpoint-protection.md

File metadata and controls

49 lines (42 loc) · 5.71 KB
title description
Endpoint Protection
Protect your endpoints.

Anti-Virus

  • Avast - Ensure your privacy, security, and performance with Avast’s complete online protection.
  • Avira - Award-winning cybersecurity, powered by 1 click.
  • BitDefender - Threat prevention, detection, and response solutions worldwide.
  • ClamAV - Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. last-commit
  • Emsisoft - New Zealand-based anti-virus distributed company software company.
  • ESET - Fast and light, vital for gamers and everyday users that don’t want any interruptions.
  • F-Secure - A global cyber security and privacy company with over 30 offices around the world and is headquartered in Helsinki, Finland.
  • G-Data - G DATA prepares you optimally for cyber threats and opens up all possibilities for you in the digital future.
  • Kaspersky - Endpoint Security Cloud.
  • Malwarebytes - Protects your home endpoints against malware, ransomware, malicious websites, and other advanced online threats.
  • McAfee - Antivirus for PC, Android, Mac, and iOS now includes McAfee identity protection. Download McAfee for Free Today!
  • Norton - Provides industry-leading antivirus and security software for your PC, Mac, and mobile devices.
  • Objective-See - Free security Mac tools.
  • Panda - Don't be a target: join the next generation of digital protection.
  • Sophos - World's best endpoint security, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, XDR, and more
  • Trend Micro - Global leader in enterprise data security and cybersecurity solutions for businesses, data centers, cloud environments, networks, and endpoints.
  • Webroot - Delivers multi-vector protection for endpoints and networks and threat intelligence services.

EDR (Endpoint Detection & Response)

  • CarbonBlack - On-premises threat hunting and incident response solution delivers continuous EDR visibility in offline, air-gapped and disconnected environments.
  • Cisco Secure Endpoint - Our cloud-native solution delivers robust protection, detection, and response to threats—reducing remediation times by as much as 85 percent.
  • Comodo - Complete Endpoint Protection With Extensive Threat Hunting And Expanded Visibility.
  • Cortex - Palo Alto - Stop attacks with the power of AI and full visibility.
  • Cylance - Cylance® AI advanced intelligence for endpoint security stops malware and malicious attacks—before they happen.
  • Cynet - Cynet Converges XDR, Response Automation and 24/7 MDR Services.
  • ESET - A sophisticated tool for identification of anomalous behavior and breaches, risk assessment, incident response, investigations and remediation.
  • FireEye - Endpoint Security protects your organization with intelligence led protection, detection and response.
  • FTK Enterprise - Gain deep visibility into endpoint data to investigate a breach or employee wrongdoing.
  • Intercept-X - Sophos - Intercept X Advanced with XDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints.
  • MVision - McAfee - Future-proof your defenses with intelligent endpoint security and integrated XDR.
  • N-Able - Provide real-time, automated protection against evolving threats at each endpoint.
  • SanerNow - Prevent potential cybersecurity breaches by rapidly detecting and responding to threats.
  • SentinelOne - Cybersecurity that prevents threats at faster speed, greater scale, and higher accuracy than humanly possible. We are XDR.
  • Symantec Endpoint Security Enterprise - Advanced threat prevention for traditional and mobile endpoints.
  • WatchGuard - Security solutions deliver the technologies required to stop advanced cyberattacks on endpoints including next-gen antivirus.
  • Wazuh - Security solution capable of monitoring your infrastructure, detecting threats, intrusion attempts, system anomalies, poorly configured applications and unauthorized user actions.