Loading...

Do Not Disturb is a free open-source macOS security tool that detects unauthorized physical access to laptops.
AI-powered endpoint protection, detection, and response platform
Multiplatform endpoint security with detection and response capabilities
Cutting-edge technology for developing security applications within the Linux kernel.
Endpoint security platform providing threat detection, prevention, and response
Autonomous EDR preventing data theft, ransomware & identity theft attacks
AI-powered EDR solution for endpoint threat detection and automated response
EDR solution with Zero Trust architecture and AI-based malware detection
EDR platform for workstation and server protection with EPP capabilities
EDR solution with ransomware recovery, threat detection, and access control
AI-driven EDR for threat detection, response, and investigation on endpoints
Next-gen antivirus & EDR with pattern/behavior detection engines
EDR platform with automated cross-endpoint correlation and prevention-first approach
EDR solution for endpoint threat detection and response capabilities
AI-powered endpoint protection with integrated EPP and EDR capabilities
EDR solution for endpoint threat detection and response capabilities
EDR platform detecting and remediating endpoint threats with ML-based analysis
AI-based endpoint security with behavioral analysis and autonomous response
EDR and NGAV solution for endpoint threat detection, prevention, and response
Managed EDR service providing 24/7 threat detection & remediation for endpoints
AI-driven endpoint security with prevention, detection, and response capabilities
Mobile EDR for iOS and Android devices with threat detection and response
EDR solution with automated threat detection, remediation, and integrated NGAV
EDR solution with in-memory detection and machine learning capabilities
Prevention-first EDR stopping zero-day attacks, ransomware, and fileless malware
EDR platform with EPP capabilities for endpoint threat detection and response
Behavioral ransomware detection engine with automated blocking capabilities
Managed EDR service with behavioral analytics and SIEM telemetry
AI-driven endpoint security combining NGAV and EDR capabilities via XDR
Managed EDR service with 24x7 SOC monitoring using Cynet platform
Managed EDR with 24/7 SOC for Windows, macOS, and Linux endpoints
AI-native endpoint security platform with threat intel integration and EDR
AI-driven endpoint security platform with EDR, NGAV, and autonomous response
EDR+EPP solution for endpoint protection, threat detection, and response
Endpoint security platform with managed AV, EDR, and 24/7 MDR capabilities
Unified XDR platform combining EDR, NGAV, deception, and network analytics
Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices
Unified endpoint security platform with EDR, next-gen AV, and threat hunting
EDR solution for workstations and servers with attack detection capabilities
Behavior-based detection with proactive remediation capabilities for endpoints
AI-driven endpoint security platform with autonomous case management
24/7 managed EDR service with threat detection, response, and remediation
Endpoint detection and response solution within HYPERSECURE IT platform
APIs for FireEye endpoint security management and monitoring operations
API for automating endpoint security actions and SIEM integrations
Managed EDR service with 24x7 monitoring and threat response capabilities
Endpoint security platform with auto-containment and zero trust technology
Cloud-based EDR solution for threat detection and response across endpoints
Cloud-based EDR platform with real-time telemetry streaming and response
EDR platform enabling remote command execution on endpoints via web or CLI
Network isolation for endpoints while maintaining command and control access
Managed EDR solution with 24/7 SOC, AI-driven threat detection, and Zero Trust
EDR software that monitors system activity and detects threats via behavior
EDR platform for APT threat hunting and ransomware prevention with MDR
EDR platform with integrated SIEM and SOAR for unified threat detection
Policy-based EDR solution monitoring endpoints for IoCs with automated responses
Endpoint security agent with ZTNA, EDR, and secure remote access capabilities
Managed EDR service with 24x7 monitoring, threat hunting, and response
AI-powered EDR solution for behavioral threat detection across endpoints
Managed EDR service with continuous monitoring and threat response
AI-driven endpoint protection platform for threat detection and response
Ransomware-specific detection tool for rapid identification of extortion attacks
AI-powered EDR detecting zero-day threats & APTs via behavioral analysis
AI-powered EDR for fileless malware detection and automated threat analysis
Cross-platform EDR sensor for endpoint threat detection and telemetry.
Managed EDR service with 24/7 monitoring, response, and ransomware warranty.
Single-agent server security with FIM, EDR, compliance & WAF for hybrid envs.
Fully managed EPP+EDR service with deep learning prevention and 24/7 SOC.
Managed EPP, EDR, and patch management service for business endpoints.
eBPF-based, AI-driven EDR for edge, containers, and critical infra.
On-premises/hybrid EDR with local threat detection, response, and NAC integration.
Unified endpoint control plane combining EDR, EPP, and XDR with NAC/ZTNA enforcement.
European EPP+EDR+ASM platform with IKARUS malware engine in a single agent.
Managed EDR service with 24/7 monitoring, forensics & threat hunting.
Kernel-level runtime integrity verification using NSA-licensed technology.
Continuously verifies OS kernel runtime integrity using NSA-licensed technology.
Enterprise endpoint security platform with EDR, XDR, and risk analytics.
Endpoint utility for EDR/XDR alert validation and user phishing reporting.
Managed EDR service with 24/7 SOC, threat hunting & endpoint protection.
User-mode Windows agent detecting in-memory & out-of-context code execution.
Endpoint agent detecting in-memory malicious code execution on Windows.
EDR solution using behavioral monitoring & ML to detect endpoint threats.
Managed 24/7 EDR service with threat hunting and incident response experts.
Managed EDR service with real-time monitoring, threat detection & response.
A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.
Enterprise endpoint security with EDR, anti-ransomware, and behavior blocking
OpenEDR is an open-source platform enhancing cybersecurity through real-time detection and analysis of cyber threats.
YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.
Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.
A script that validates Group Policy Object audit settings required for proper Microsoft Defender for Endpoint functionality.
Monitor WMI consumers and processes for potential malicious activity
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
An endpoint monitoring tool for Linux and macOS that reports file, socket, and process events to Zeek.
An Event Hub to gather, process, and monitor system events and link them to an inventory.
A tool to locally check for signs of a rootkit with various checks and tests.
A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.
Open-source tool for monitoring macOS hosts with detailed system activity insights.
Get strategic cybersecurity insights in your inbox