Endpoint Protection Vendors – Full list

CyberDB - Endpoint Protection Vendors - Full list

The following is the full list of Endpoint Protection Vendors. Vendors in this domain cover one or more of the following Cyber Security capabilities: Anti-Virus, Anti-Malware, Phishing protection, blocking Zero-day attacks and Endpoint Intrusion Prevention. The category does not include Endpoint Detection vendors or EDR solutions.

This Endpoint Protection Vendors list is managed and maintained by CyberDB, including additional information on their Cyber Security and Cyber Protection products.
Please contact CyberDB for any further clarifications.

Privatisehttps://privatise.com
AaDya Securityhttps://www.aadyasecurity.com/
ARMOhttps://www.armosec.io/
Byoshttps://byos.io
gatewatcherhttps://www.gatewatcher.com
VIPRE (Acquired by FuseMail)https://global.vipre.com/
OpenAVNhttps://www.openavn.com
4Securitashttps://www.4securitas.com/
SKOUT Cybersecurityhttp://getskout.com/
Acronishttps://www.acronis.com/
Remedianthttps://www.remediant.com
MistNet.aihttps://www.mistnet.ai
RevBitshttps://www.revbits.com
Preventonhttp://www.preventon.com/
Societas Analytics – Anova Intelligencehttps://www.anovaintel.com/
SafeGuard Cyberhttps://www.safeguardcyber.com/
Nova Leahhttps://novaleah.com
Exeinhttps://www.exein.io/
Ceedohttps://www.ceedo.com/
TriagingXwww.triagingx.com
SOOSAN INThttps://www.soosanint.com/
LUCY Securitywww.lucysecurity.com
CodeHunterhttps://www.codehunter.io/
DeferPanic, Inc.deferpanic.com
Deepfence Inc.www.deepfence.io
Awake Securityhttps://awakesecurity.com
AppGuardhttps://www.appguard.us/
itWatchwww.itwatch.de
genuahttps://www.genua.de/
AVL Mobile Securitywww.avlsec.com
nProtectnprotect.com
Intego Inc.intego.com
EMCO Softwareemcosoftware.com
Doctor Webdrweb.com
CensorNetcensornet.com
BankVaulthttps://www.bankvault.com/
adawareadaware.com
Sepio Systemshttp://www.sepio.systems/
SafeDNSSafedns.com
Wontokhttp://www.wontok.com
Harmanhttps://www.harman.com/
SecureBrainhttp://www.securebrain.co.jp/eng/web/index.php
Salient Federal Solutionshttp://www.salientcrgt.com/
Red Balloon Securityhttps://www.redballoonsecurity.com/
Raz-Leehttp://www.razlee.com/
OnSystem Logichttp://www.onsystemlogic.com/
CyberClanhttps://cyberclan.com/
Mission Securehttp://www.missionsecure.com/
Ibox Cybersecurityhttp://www.iboxcomputer.com/
Heimdal Securityhttps://heimdalsecurity.com
spark cognitionhttps://www.sparkcognition.com/
DriveWare (Cyber)https://www.cyberdriveware.com/
Digital Immunityhttp://www.digitalimmunity.com/
Cyber Advanced Technologyhttps://www.unhackablecloud.com/
Atomicorphttps://atomicorp.com/
OgaSechttps://ogasec.com/
Magal Security Systems Ltd.https://magalsecurity.com/
Vaulto Technologies Ltd.http://www.vaulto.co/
Regulushttps://www.regulus.com/
Intezer Labshttp://www.intezer.com
Source Defense Ltd.http://www.sourcedefense.com
Perception Point Ltd.http://perception-point.io/
Fenror7 Ltd.http://www.fenror7.com
Cyber 2.0 Ltd.http://www.cyber20.com
BitDam – Dattohttps://www.bitdam.com/
AGS Encryptions Ltd.http://www.agsencryptions.com
vkeyhttps://www.v-key.com/
Virustotal (Acquired by Google)https://www.virustotal.com/
Trustporthttp://www.trustport.com/en
Trustlookhttp://www.trustlook.com/
TrustedSechttps://www.trustedsec.com/
Total Defensehttps://www.totaldefense.com/
solitonhttps://solitonsystems.com/
Netshieldhttps://www.netshieldcorp.com/
Smoothwallhttp://www.smoothwall.org/
SentryBayhttp://www.sentrybay.com/
Sasa-Softwarehttp://www.sasa-software.com/
Sandboxie (Acquired by Invincea/Sophos)https://sandboxie-plus.com/
Safensofthttp://www.safensoft.com/
EST Securityhttps://www.estsecurity.com/public/product/alyac
Redsockshttp://www.redsocks.nl/
Reason Core Securityhttps://www.reasoncoresecurity.com/
Positive Technologieshttps://www.ptsecurity.com/
Cybonetwww.cybonet.com
Shearwater PhriendlyPhishinghttps://www.shearwater.com.au/phriendlyphishing/
Percipient Networks (Acquired by WatchGuard)https://strongarm.io/
PC Pitstophttp://www.pcpitstop.com/
Panda Securityhttp://www.pandasecurity.com/israel/
Norman (acquired by AVG)http://www.avg.com/ww-en/norman-home-and-home-office
Niksunhttps://www.niksun.com/
Morphisechttp://www.morphisec.com/
lookouthttps://www.lookout.com/
K7 Computinghttps://www.k7computing.com
Joe Securityhttps://www.joesecurity.org/
information security exchangehttp://www.infosecurityeurope.com/
Ikarus Securityhttps://www.ikarussecurity.com/
G-Datahttps://www.gdatasoftware.com/internet-security-for-windows
FixmeStickhttps://www.fixmestick.com/
Elastichttps://www.elastic.co/
DeviceLockhttp://www.devicelock.com/
Device Authorityhttp://www.deviceauthority.com/
Weborionhttps://www.weborion.io/
F-Securehttps://www.f-secure.com/en/welcome
eScanhttp://www.escanav.com/en/index.asp
EMC (RSA)https://www.rsa.com/en-us
Digital Handshttps://www.digitalhands.com/
Cymbelhttps://www.cymbel.com/
CloudMark (Acquired by Proofpoint)https://www.cloudmark.com/en
BullGuardhttp://www.bullguard.com/
BKAVhttps://www.bkav.com/
BioCatchhttp://www.biocatch.com/
Avirahttps://www.avira.com/
AVG (Acquired by Avast)http://www.avg.com/
Avastwww.avast.com
Avananhttp://www.avanan.com/
STORMSHIELD (ARKOON NETASQ)https://www.stormshield.eu/
Arcabithttps://www.arcabit.pl/
AnubisNetworks (BitSight Company)https://www.anubisnetworks.com/
AhnLabhttps://global.ahnlab.com/site/main.do
WEBROOThttp://www.webroot.com
WatchGuard Technologieshttps://www.watchguard.com/
Vysk Communicationshttp://www.vysk.com
Votirohttp://www.votiro.com/
VMware, Inc. (Acquired by EMC/RSA)https://www.vmware.com/
Trustwavehttps://www.trustwave.com
Trend Micro, Inc.http://www.trendmicro.com
TrapX Securityhttp://trapx.com/
ThreatBookhttp://www.threatbook.cn
The Media Trusthttp://www.themediatrust.com
Broadcom – Symantechttps://www.broadcom.com/
Sophoshttps://www.sophos.com/
Skybox Securityhttps://www.skyboxsecurity.com/
SentinelOnehttps://sentinelone.com/
SECUDRIVEhttp://www.secudrives.com
Safe-Thttp://www.safe-t.com/
Rohde & Schwarzhttps://www.rohde-schwarz.com/
Quick Heal Technologieshttp://www.quickheal.com
OPSWAThttp://www.opswat.com
NPCorehttp://www.npcore.com/
MobileIronhttp://www.mobileiron.com
Malwarebyteshttps://www.malwarebytes.com/
Kaspersky Labhttps://www.kaspersky.co.in/?domain=kaspersky.com
McAfeehttps://www.mcafee.com/en-us/index.html
INCA Internet Co., Ltdhttp://www.inca.co.kr
Illusive Networkshttps://illusive.com/
IBM Corporationhttps://www.ibm.com/us-en/
OpenTexthttps://security.opentext.com/
Great Bay Softwarehttp://greatbaysoftware.com/
Fox-IT (Acquired by NCC)https://www.fox-it.com/en/
Fortinet, Inc.https://www.fortinet.com/
FireEyehttps://www.fireeye.com/
Fidelis Cybersecurityhttps://www.fidelissecurity.com/
F5 Networkshttps://f5.com/
ESEThttp://www.eset.com/
eSentire, Inc.https://www.esentire.com/
Matrix42https://www.matrix42.com/en
Digital Guardianhttps://digitalguardian.com/
Deep Instincthttp://www.deepinstinct.com/#/home
CYRENhttp://www.cyren.com/
Cybereasonhttp://www.cybereason.com/
CrowdStrikehttps://www.crowdstrike.com/
Comodo Grouphttps://www.comodo.com
Cheetah Mobilehttp://www.cmcm.com/en-us/
Check Point Softwarehttps://www.checkpoint.com/
DriveLockhttps://www.drivelock.com/
BUFFERZONEhttp://www.bufferzonesecurity.com
Bricatahttp://www.bricata.com
Bluelivhttp://www.blueliv.com
BlackBerryhttp://www.BlackBerry.com
Bitdefenderhttp://www.bitdefender.com
BeyondTrusthttp://www.beyondtrust.com
Antiy Labshttp://www.antiy.net/
Allot Communicationshttp://www.allot.com/
Akamai Technologieshttps://www.akamai.com/
Minerva Labshttp://www.minerva-labs.com/

Glossary
For your convenience, here are some definitions to Key elements in this list-

Endpoint Protection – Endpoint security is the practice of preventing malicious actors and campaigns from targeting endpoints or entry points of end-user devices like desktops, laptops, and mobile devices
Endpoint Intrusion Prevention – Also known as IPS or IDPS (detection), is a technology that keeps an eye on a network for any malicious activities attempting to exploit a known vulnerability.
Anti-Virus / Anti-Malware Anti Virus / Anti Malware is a program used to prevent, detect, and remove Viruses and/or Malware.
Malware / Virus Any software intentionally designed to damage to a computer, server, client, or computer network.
Phishing protection Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.
Zero-day attacks Zero Day is a computer-software’s vulnerability unknown to those who should be interested in its mitigation. Until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network. An exploit directed at a zero-day is called a zero-day exploit, or zero-day attack.

Our Newsletter

Please leave your name and E-mail to subscribe



    Get connected with CyberDB, your source of Cyber Security data, in popular social networks