Endpoint Security for Endpoint Protection
Solutions for protecting devices and endpoints from cyber threats and unauthorized access. Task: Endpoint Protection
Explore 15 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.
All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.
A laser tripwire tool to hide windows, lock computer, or execute custom scripts upon motion detection.
Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.
FortiEDR is an automated endpoint security solution that integrates with the Fortinet Security Fabric and third-party solutions to reduce MTTR and provide real-time breach detection and response.
GravityZone is a unified endpoint security and analytics platform that provides risk assessment, threat prevention, and incident response capabilities.
Heimdal Enterprise provides a unified cybersecurity platform with advanced network and endpoint security solutions, including threat hunting and privileged access management.
CrowdStrike Falcon is a unified cybersecurity platform providing complete protection through its AI-native XDR platform.
Unified defense platform providing endpoint protection, extended detection and response, threat hunting, and digital forensics and incident response.
Cortex XDR is a comprehensive endpoint security solution that blocks advanced attacks with behavioral threat protection, AI, and cloud-based analysis, and provides complete endpoint security and lightning-fast investigation and response.
Comprehensive business security suite with enhanced features to protect against malware, phishing, and advanced threats.
Webroot Endpoint Protection provides advanced cloud-based protection against malicious files, scripts, exploits, and URLs to keep businesses safe from cyberattacks.
Comprehensive endpoint protection solution providing advanced threat detection, proactive defense, and efficient management.
YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.