Loading...
Endpoint security tools for protecting desktops, laptops, mobile devices, and IoT endpoints from malware and cyber threats.
Explore 220 curated cybersecurity tools, with 15,190 visitors searching for solutions
Multiplatform endpoint security with detection and response capabilities
Multiplatform endpoint security with detection and response capabilities
Powerfully simple endpoint security solution that takes down threats without interrupting business.
Powerfully simple endpoint security solution that takes down threats without interrupting business.
All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.
All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
A Windows security hardening tool that disables potentially dangerous features in Windows 10/11 and common applications to reduce attack surface for individual users.
A Windows security hardening tool that disables potentially dangerous features in Windows 10/11 and common applications to reduce attack surface for individual users.
AMDH is a Python3 Android security tool that automates mobile device hardening through malware detection, privacy protection, CIS benchmark compliance, and application security analysis.
AMDH is a Python3 Android security tool that automates mobile device hardening through malware detection, privacy protection, CIS benchmark compliance, and application security analysis.
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A collection of mobile security resources and tools
Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.
Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.
Deep Instinct is a predictive prevention platform that uses deep learning to prevent unknown threats, including ransomware and zero-day malware, from infiltrating storage environments, applications, and endpoints.
Deep Instinct is a predictive prevention platform that uses deep learning to prevent unknown threats, including ransomware and zero-day malware, from infiltrating storage environments, applications, and endpoints.
Stronghold is the easiest way to securely configure your Mac.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
A lightweight malware detection and removal tool that provides real-time protection against complex attacks while preserving system resources.
A lightweight malware detection and removal tool that provides real-time protection against complex attacks while preserving system resources.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
Sangfor Technologies is a leading cybersecurity, cloud, and infrastructure vendor providing effective cybersecurity and efficient enterprise cloud solutions.
Sangfor Technologies is a leading cybersecurity, cloud, and infrastructure vendor providing effective cybersecurity and efficient enterprise cloud solutions.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
Avira Free Security is an all-in-one security, privacy, and performance app for Mac, providing real-time protection, password management, VPN, and more, all for free.
Avira Free Security is an all-in-one security, privacy, and performance app for Mac, providing real-time protection, password management, VPN, and more, all for free.
Comprehensive endpoint security solution for enterprise networks and SMBs
Comprehensive endpoint security solution for enterprise networks and SMBs
Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.
Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.
Open-source tool for monitoring macOS hosts with detailed system activity insights.
Open-source tool for monitoring macOS hosts with detailed system activity insights.
Comprehensive cybersecurity platform for hybrid and multi-cloud environments
Comprehensive cybersecurity platform for hybrid and multi-cloud environments
Common questions about Endpoint Security tools including selection guides, pricing, and comparisons.
Endpoint security tools for protecting desktops, laptops, mobile devices, and IoT endpoints from malware and cyber threats.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs