Define: Endpoint security?
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones, Internet-of-things devices, and other wireless devices to corporate networks creates attack paths for security threats. Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.
Top Endpoint Security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Endpoint Security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, file-less attacks, and web-borne exploits.
This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model. It was founded in 2014 and headquartered in HaDarom, Israel..
[Kaseya](http://www.kaseya.com) is a leading provider of IT automation software for IT service providers and public and private sector IT organizations. Kaseya’s IT automation platform allows IT professionals to proactively monitor, manage and maintain distributed IT infrastructures remotely, easily and efficiently with one integrated Web based platform.
Kaseya’s integrated web based platform is complete, powerful, secure and easy to deploy and administer. The Kaseya managed service platform is designed for IT administrators who need to reduce complexity, and increase productivity and managed service providers that want to pass those benefits to their customers and increase their own profit margins.
**Features:** Our [IT Automation Software](http://www.kaseya.com/features/agent-procedures.aspx) is easy to integrate and implement. The software saves users time and increases staff productivity of businesses.
This decreases production errors and increases productivity, allowing users to focus their time on the needs of their clients. Kaseya gives businesses the tools and technology to completely automate and improve their IT services.
Kaseya’s K2 **Patch Management Software** can eliminate time-consuming tasks such as updating and securing networks in multiple locations and domains. With K2, IT Professionals will be able to automatically keep servers, workstations and remote computers updated with the latest security patches and software updates.
Our patch management feature is able to make automatic and recurring patch scans, approve or deny patches, automate easy, and fast patch deployment, interactively manage patches, flexibly configure patch management, and give comprehensive, scheduled reports. With Kaseya’s [Audit and Inventory](http://www.kaseya.com/features/audit.aspx) feature you are able to track every system you are managing.
The proliferation of digital access has made the world more connected than ever before. Trust is the common thread that connects today’s elastic enterprise–trust that your identity solution will be there when you need it most and trust that your end-users know their information is safe.
The OneLogin Trusted Experience Platform is the identity foundation to build secure, scalable and smart trusted experiences that connect people with technology. With OneLogin, seamlessly manage digital identities for your workforce and customers, so you can focus on what matters most–growing your business.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. Secure: Security is the cornerstone of trust.
It’s the confidence that your identity solution is reliable and always-on, so you can focus on what matters–growing the business. The OneLogin platform protects your organization against threats by securing and centralizing your applications, devices, and end-users all in one, easy-to-access place.
Additionally, through our advanced machine learning capabilities, OneLogin can deliver real-time threat intelligence to help automate the process of keeping your business secure. Scalable: The OneLogin Trusted Experience Platform was built for performance and reliability at scale.
With a wide breadth of extensible functionality, we can expand and retract according to the changing needs of your business. Through our enterprise-grade change management solutions, like our Enterprise Sandbox and API Access, you can quickly test large-scale changes before going live in your production instance.
Duo Security provides a cloud-based access protection solution for companies and organizations worldwide. Clients use its solution for adaptive authentication, BYOD (bring your own device) security, cloud security, endpoint security, mobile security, and two-factor authentication.
Duo Security also offers Duo Managed Service Provider (MSP), a program that provides MSPs with tools to protect their customers from data breaches. Clients can deploy its technology to protect users, data, and applications from breaches, credential theft, and account takeover.
Duo Security serves education, financial services, healthcare, legal, retail, and technology industries. Dug Song and Jonathan Oberheide founded Duo Security in 2009, with its headquarters in Ann Arbor in Michigan and offices in San Mateo in California, Austin in Texas, and London in England..
Carbon Black (NASDAQ: CBLK) is a leading provider of next-generation endpoint security. Carbon Black serves more than 4,300 customers globally, including 35 of the Fortune 100.
As a cybersecurity innovator, Carbon Black has pioneered multiple endpoint security categories, including application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV). Leveraging its big data and analytics cloud platform – the Cb Predictive Security Cloud – Carbon Black solutions enable customers to defend against the most advanced cyber threats, including malware, ransomware, and non-malware attacks.
Deployed via the cloud, on premise or as a managed service, customers use Carbon Black solutions to lock down critical systems, hunt threats, and replace legacy antivirus.. .
SentinelOne delivers autonomous endpoint protection that prevents, detects, and responds to attacks across all major vectors. The company aims to shape the future of endpoint security with an integrated platform that combines behavioral-based detection, advanced mitigation, and forensics to stop threats in real-time.
Specializing in attacks that utilize evasion techniques, SentinelOne is a vendor that offers complete protection against malware, exploit, and insider-based attacks. This led Gartner to recognize SentinelOne as a Visionary in their recent Endpoint Protection Magic Quadrant.
SentinelOne is also a next-generation endpoint protection company to be independently certified as a true antivirus replacement for Windows, OS X, and Linux, including certification for both HIPAA and PCI. SentinelOne was formed by an elite team of cybersecurity and defense experts from IBM, Intel, Check Point Software Technologies, Cylance, McAfee, and Palo Alto Networks.
SentinelOne was named the seventh fastest-growing company in North America in 2019, the fastest-growing in Silicon Valley, and was the only cybersecurity company recognized in the top 10 of the Deloitte Technology Fast 500™. SentinelOne was also the only endpoint protection company on the Forbes AI 50 list, recognizing the 50 most promising companies using AI as a core part of its business model and success.
The Mountain View, California-headquartered company was established in 2013 by co-founders Almog Cohen, Tomer Weingarten, and Ehud Shamir.. .
Endgame is a leading endpoint security platform that transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Endgame’s platform uses machine learning and data science to prevent and detect unique attacks at the earliest and every stage of the attack lifecycle.
Endgame’s integrated response stops attacks without disrupting normal business operations. It was founded in 2008 and has been operating in Arlington, Virginia..
Sternum builds a holistic, highly scalable endpoint security solution, that prevents attacks in real time. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT security.
Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact.. .
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator in cybersecurity. Through full-function Security as a Service and embedded deployment options, CYREN provides web, email, mobile and endpoint security solutions that are relied upon by the world’s largest IT companies to protect against today’s advanced threats.
CYREN collects threat data and delivers real-time cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users. To learn more, visit www.cyren.com.
See a video interview with Cyren’s CTO, Lior Kohavi, here: https://vimeo.com/91949959. .
The Cybersecurity Paradigm Is Shifting and ThreatLocker® is at the Cutting Edge providing unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. ThreatLocker is a zero trust policy driven tool that protects companies from unauthorized software intrusions including ransomeware, malware, viruses and other security threats.
ThreatLocker solutions are suitable for any business organization, and should be deployed to any organization that either has managed I.T. or has an internal I.T.
Department. Powerful yet simple control over what applications and executables can run on your business computers, with a streamlined process of requesting and granting permission to users.
It has a built-in powerful firewall like policy engine that allows you to permit, deny or restrict application access at a granular level. Permit access to applications for a specified amount of time and automatically block applications after the policy has expired.
When deployed correctly, this technology makes it almost impossible for code to be executed that should not be. ThreatLocker Monitor keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted.
This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be. ThreatLocker has developed a solution that allows businesses to control the content that runs on their network.
Minerva Labs is an innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva Labs Anti-Evasion Platform blocks threats which bypass antivirus and other baseline protection solutions by deceiving the malware and controlling how it perceives its environment.
Without relying on signatures, models or behavioral patterns, Minerva Labssolution deceives the malware and causes it to disarm itself, thwarting it before the need to engage costly security resources. Headquartered in Petah Tikva, Israel, and with offices in New York and Atlanta, Minerva Labs boosts customers’ existing defenses without the need to embark upon a costly and risky overhaul of their entire endpoint security architecture.
To learn more about Minerva, visit www.minerva-labs.com.. .
RevBits’ Cyber Intelligence Platform (C.I.P.), a full product suite, fundamentally transforms the cyber-security market. Single source, “best in class”, with patented methodologies eliminates multiple vendors and related integration and training issues.
Cutting-edge modules include RevBits Privileged Access Management, RevBits EndPoint Security, RevBits Email Security, RevBits Deception Technology and RevBits Security Awareness Training. .
Avecto is a pioneering security software company with a vision to transform business cultures, freeing all users to be creative, productive and profitable. Established in 2008 by UK entrepreneurs Paul Kenyon and Mark Austin, Avecto is headquartered in Manchester (UK) with a network of global partners and offices in Boston (US), and Melbourne (Australia).
Avecto’s consultative approach delivers technical solutions to commercial challenges; empowering global enterprises to strike just the right balance between security defense in depth and user flexibility.. .
Kolide is an Endpoint Security agent and MDM that puts user productivity and privacy first. Powered by Honest Security, we believe in security through transparency, trust, education and empowerment.
We provides end-users with real-time alerting through Slack, enabling them to take ownership of the security of their device.. .
ReaQta is Europe’s top-tiered AI Endpoint Security Platform, built by an elite group of cyber security experts and AI/ML researchers with extensive backgrounds in government intelligence operations. Focused on building the best user experience for endpoint security, ReaQta is the most elegant, powerful and easy-to-use platform that allows organizations to eliminate the most advanced threats in the fastest way possible.
As experts in AI and behavioral analysis, ReaQta’s proprietary dual-AI engines provide organizations across all industries with complete and fully customised endpoint security, minus all the complexity. Security teams can now do more, with less..
Invincea is the leader in advanced endpoint threat protection, protecting more than 25,000 customers and 3 million active users. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls.
Invincea protects enterprises against targeted threats, including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea offers the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware.
The company has been in market with its award-winning technology since 2009. In 2011, Invincea was recognized as “Most Innovative Company of the Year” at RSA Conference, and since then the company has won numerous awards for its technology and business.
Invincea maintains an OEM agreement with Dell to ship a customized version of Invincea’s award-winning endpoint security solution, under the Dell Data Protection | Protected Workspace brand. This offering ships on Dell’s entire line of commercial PCs and tablets, comprising 20 million devices per year.
The company, which was founded by Dr. Anup Ghosh to address the rapidly increasing security threat from nation states, cyber criminals, and rogue actors, has commercialized technology originally built under DARPA funding.
The company is venture capital-backed and based in Fairfax, VA. For more information, visit https://www.invincea.com..
Confer is fundamentally changing endpoint security through the Converged Endpoint – providing advanced threat prevention and incident response for endpoints, servers. and cloud workloads.
Confer’s patented technology uses enterprise-wide telemetry and data science to analyze, adapt and eliminate manual processes, and facilitates an intelligent and efficient approach to securing the enterprise.. .
Pixm is a computer and network company that specializes in cybersecurity and endpoint security. Its services also offer anti-phishing, email security, computer vision, and deep learning it helps companies, businesses, and organizations on website, network, and computer security.
The company was founded in 2015 and headquartered in New York, United States.. .
ESET is an information technology security company that develops security software solutions which deliver protection against computer security threats for home users and corporate customers worldwide. The company provides ESET Smart Security, an integrated anti-virus, anti-spyware, anti-spam, and personal firewall solution; ESET NOD32 Antivirus, an integrated security solution that detects and disables viruses, Trojans, worms, adware, spyware, phishing, rootkits, and other internet threats; ESET Cybersecurity for MAC; and ESET Endpoint Security, a security solution for company endpoints combining a two-way firewall, web control, and remote administration tool.
ESET also offers ESET Endpoint Antivirus, an anti-virus and anti-spyware protection utilizing cloud-powered scanning, device control, and remote management of clients; ESET Mobile Security for Android that provides Android smartphone and tablet users with safer mobile technology adventures; and ESET Rootkit Detector, a security tool for Mac OSX that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the operating system. ESET was founded in 1992 and is based in Bratislava, Slovakia with regional distribution centers in San Diego, California; Buenos Aires, Argentina; and Singapore.
It has additional offices in Sao Paulo, Brazil; and Prague, Czech Republic as well as malware research centers in Bratislava and Košice, Slovakia; San Diego, California; Buenos Aires, Argentina; Singapore; Prague, Czech Republic; Krakow, Poland; Montreal, Canada; and Moscow, Russian Federation.. .
Check Point Software Technologies
Check Point Software Technologies and its subsidiaries develop, market, and support a range of software and hardware products, and services for information technology security worldwide. The company’s products include firewall and VPN security gateways and appliances; dedicated security gateways, including secure remote access solutions and intrusion detection and…
see more prevention systems; endpoint security comprising integrity products and SecureClient products, as well as ZoneAlarm security suite; data security products, such as Pointsec PC disk encryption, Pointsec for mobile devices, and Pointsec removable media product family; and security management solutions, which consist of SmartCenter, Eventia, Provider-1, and Security Management Portal. Check Point’s products provide protection for network perimeter that enables authorized users to access network resources and to detect and thwart attacks; against internal threats protecting customers’ networks and endpoints from the threats; for Web-based communications allowing remote and mobile employees to securely connect to their organizations’ networks through Web browser; for network endpoints with security solutions that address the risks posed by hackers, worms, spyware, and other threats to the internal and remote computers; for data security protecting corporate information stored on mobile computing devices, such as laptops, PDAs, smartphones, and removable media, and controlling data that traverses through security gateways.
The company serves enterprises, service providers, small and medium-sized businesses, and consumers. It has strategic relationships with Crossbeam Systems, Inc.; Dell, Inc.; Hewlett-Packard Co.; International Business Machines Corporation (IBM); Nokia Corporation; Nortel Networks Corp.; Siemens AG; and Sun Microsystems, Inc.
The company was founded in 1993 and is headquartered in Tel Aviv, Israel.. .
QuickLaunch is a next-generation AI-based Identity-as-a-Service Platform that transforms how Institutions & Organizations manage user identities, endpoint security and authentication. The platform enables verifying users, managing devices, limiting access depending on authorization levels, AI-based authentication, complementing BYOD security and more, thereby changing the way identities are managed.
1,000 plus Institutions such as Jenzabar, Unifyed, OculusIT, New Mexico State University, Colorado Community College System, BlackBeltHelp have transformed Identity Management using QuickLaunch.. .
Neohapsis provides mobile and cloud security services to enterprises and government agencies. It offers application security services, including application assessment, architecture design assessment, threat modeling, secure software development lifecycle assessment, and product security assessment; and cloud security services, including rapid secure cloud application deployment, cloud application assessments, cloud data compliance, and cloud infrastructure assessment.
It also assists clients with various compliance requirements, including payment card industry data security standard, the U.S. state data protection and data privacy, HIPAA/HITECH, NERC CIP, and DIACAP.
In addition it provides IT risk management and governance, third-party risk management, cloud computing strategy, mobile security, and on-site advisory; mobile application, mobile infrastructure, mobile device security, mobile strategy, policy, and risk management services; and network and endpoint security services, including network archite…. .
SecondWrite’s next-generation sandbox detects advanced malware including APTs, targeted attacks and zero-day evasions that defeat other solutions. Its university-developed patent pending technology identifies hidden paths in malware and forcibly executes them, achieving complete code coverage.
Customers include network security, endpoint security, threat intelligence and IR vendors, SOCs, and MSSPs.. .
Advanced Cyber Security
Advanced Cyber Security offers next-generation cybersecurity for the enterprise, small business, and consumer. Advanced Cyber Security is a pioneer in endpoint security, with proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement.
Advanced Cyber Security’s products provide the first line of defense to a company’s layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Security’s Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments..
WEBGAP is a cybersecurity startup focused on remote browser isolation and the developer of the WEBGAP Remote Browser platform. We physically isolate our users from malware and cyber attacks by physically isolating their web browsing activity away from their local machine and network.
If the endpoint is the new perimeter, then WEBGAP is the future of endpoint security, we provide cost-effective and massively-scalable physical browser isolation.. .
Absolute Software is the leader in endpoint resiliency, enabling more than 12,000 customers worldwide to protect devices, data, applications and users against theft or attack—both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT to enforce asset management, harden the resiliency of third-party endpoint security agents, and enforce data compliance for today’s remote digital workforces.
Patented Absolute Persistence™ is embedded in the firmware of Dell, HP, Lenovo, and 26 other manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of deployment.. .
Endpoint Security Inc
Endpoint has developed secure wireless communications for SCADA and for the Internet of Things (IoT). The device does not consume bandwidth, works with old devices without modification, and is instantly compatible with 802.11x, Bluetooth, Zigbee and other protocols used for wireless data transfer.
It employs a physical layer device that recognizes a physical signature in a received signal to verify the desired device is communicating along a standard, parallel path. Endpoint licenses IP-Core for making ASICs, along with patent rights.
Endpoint is seeking commercial partners for using the secure device in their routers.. .
Trustcom is a cybersecurity company that offers a wide variety of solutions. These include; mobile security, malware and antivirus, SIEM, endpoint security, email security, data protection, risk management, and security and awareness training.
The company was founded in 2017 and based in Nairobi, Kenya.. .
BUFFERZONE Security Ltd
BUFFERZONE is a pioneer in advanced endpoint security. BUFFERZONE’s patented containment solution defends endpoints from the most evasive threats – including zero-days, ransomware, drive-by downloads and phishing – while maximizing user and IT productivity.
By isolating browsers, email and removable media in a virtual container, BUFFERZONE traps exploits and prevents them from harming the organization. BUFFERZONE includes a unique bridge for transferring content and data safely between the container and secure network zones, along with critical intelligence for enterprise-wide security analytics.
Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for thousands of endpoints.. .
Stratodesk is redefining endpoint computing by delivering a single endpoint solution for VDI, DaaS and IoT markets. Today’s enterprises are moving beyond traditional desktops towards smart workplaces where the diverse network of endpoint devices will create interoperability and compatibility issues without a single unified endpoint solution.
Stratodesk’s cutting edge linux-based endpoint OS and management suite, NoTouch, is a next generation, hardware-agnostic solution that enables companies to cost-effectively manage their endpoints. Our solution works seamlessly across x86 and ARM based hardware products (including Raspberry Pi) to provide a unified platform for your endpoints.
Our solution increases your endpoint security, simplifies user experience and allows customers to maximize the benefits of existing desktop hardware through PC Repurposing. Founded in San Francisco in 2010, Stratodesk has rapidly grown to over 2000 customers and maintains strong relationships with many distribution and reseller partners across the globe.
We are certified by and have long standing technology partnerships with industry leaders such as Citrix, VMware and Imprivata, that ensure the highest product standards, innovative new features and complete and up to date integration of third party products. Our customers include government and healthcare organizations, banks, armed forces, small/medium sized businesses and large enterprises in North America and around the world..
SecPod creates computer security software for proactively managing endpoint computer risks. SecPod (Security Podium, incarnated as SecPod) was founded in 2008 with the goal to establish a research oriented information security organization that develops endpoint security software to effectively overcome vulnerabilities and threats.
At SecPod we firmly believe in “A Strong Defense, Not a Weak Cure” approach and we are committed to detecting and eliminating risks at the grass root level. With more devices being connected to the Internet and an increasing number of attacks targeting endpoints, a new approach to endpoint security is needed..
BigFix, Inc. provides an IT security and operations platform that enables real-time visibility and control of globally distributed desktop, mobile, and server computers.
The company offers BigFix Platform that instruments a messaging and management nervous system, as well as distributes the work of managing IT infrastructures to managed devices; BigFix AntiThreat for endpoint security; BigFix IT Policy Enforcement to set and enforce security policies and processes; and BigFix Systems Management that focuses on automating IT operations tasks. It also provides BigFix Policy Content Modules to develop custom management content.
In addition, the company offers products support, consumer edition support, and professional services. It serves companies, government agencies, and public sector institutions.
The company was founded in 1997 and is based in Emeryville, California.. .
Sacumen specializes in working with Security Product Companies. We are working with 50+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering.
We have built 700+ Connectors in the areas of SIEM, IAM, Ticketing Systems, Incident Response, Cloud Applications, Cloud Monitoring, Threat Intelligence Feed, Endpoint Security, Cloud Storage, GRC, Vulnerability Management, Authentication, etc.. .
Fiberlink Communications Corporation provides mobility as a service (MaaS) that helps enterprises to connect, control, and secure laptops and mobile devices. Its MaaS Platform helps mobile workers to connect to the Internet and the applications and data they need.
The company’s MaaS platform is used to perform identity management and authentication services; deploy, monitor, and manage security and connectivity applications on laptops and PCs; view information on compliance status, security events, and connectivity costs; and protect mobile devices and the data from loss, theft, data leakage, hackers, and viruses. Its MaaS360 mobility platform manages security and connectivity services on mobile and remote devices, as well as helps administrators to deploy, monitor, update, and remediate various endpoint security and connectivity applications..
PolyLogyx provides an endpoint security platform built for cloud and managed security service providers (MSSPs). The platform provides a massive advantage to MSSPs moving into higher-margin offerings such as managed detection and response (MDR) services.
The platform features an open architecture with support for endpoint-side and server-side integrations.. .
Sattrix Information Security
Sattrix Information Security is professionally driven & value based, quality-oriented organization. We pivoted around providing our customers and partners the best of Cybersecurity services.
We have collaborated and worked with diverse range of industries such as BFSI, Retail, TELCO, Government, Oil and Gas and ITIS worldwide. Sattrix Information Security helps small, mid and large enterprises in digital transformation which thrive in a continuously changing period.
We offer advance Managed Services, Cloud Security consulting, and InfoSec Consulting services to create new avenues for our valuable customers. We don’t only make absolute sense to your business but do so in a way that is customized by none other than you.
And because we rely purely on our expertise to deliver a solution, no constraint is really a deal breaker- be it remote, onsite or hybrid solution deployment or the complexity associated with it; we are ready to walk with you in the Cybersecurity journey. Our Key Services: Managed Security Services – Managed SOC, Vulnerability and Patch, MDR, Managed Devices, TAC Support, Threat Hunting Assessment and Advisory – Vulnerability assessment, Penetration Testing, Red Teaming, Application Code Review, Compliance Consulting / Implementation, Web-app security testing Cybersecurity solutions – Enterprise Security, Network Security, SOAR, Application Security, Automation Security, Endpoint Security, EDR, etc.
Digital Transformation – Professional Services, Cloud Security, IT-Operations Management Your security is our interest, and we make it interesting for you as well. With a rich palette of service offerings, we have something that just suits your information security needs..
Dark Reading is an IT-focused comprehensive news and information portal that helps information security professionals manage the balance between data protection and user access. The portal provides its users with up-to-date information about products, management strategies, architectures, and security policies.
Dark Reading encompasses ten communities which drill deeper into the enterprise security challenge: attacks and breaches, application security, cloud security, data leaks and insider threats, endpoint security and privacy, network and perimeter security, risk management and compliance, security management and analytics, vulnerabilities and threats, and mobile security. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts, and other Dark Reading members to provide timely, accurate, and informative articles that lead to spirited discussions.
Dark Reading was launched in 2006.. .
Action1 combines scalability and ease of use in its approach to endpoint security. Action1’s vision is to arm organizations around the world with effective means to assess security and enforce compliance of their endpoints, accomplishing security and compliance goals without sacrificing user productivity and easily scaling their cybersecurity efforts as organization grows.
The company was founded by Alex Vovk and Mike Fimin, the two co-founders of Netwrix Corporation, well known for its market leading visibility platform for cybersecurity and risk mitigation. After building Netwrix for almost 12 years from the ground up to a very successful technology business and ensuring the successful transition of strategy to a new CEO, the team founded Action1 Corporation to further extend into the hyper growing cybersecurity ecosystem from servers to endpoints and the cloud..
eEye Digital Security
eEye Digital Security, Inc. is a developer of endpoint security and vulnerability management software solutions, as well as a contributor to security research and education.
eEye’s software products provide a vulnerability management solution that addresses the full lifecycle of security threats: before, during and after attacks.. .
Oxtrabot Systems LLC is nestled in the foothills of Boulder, Colorado, operating as strategic reseller in the Rockies, known as Oxtrabot, with focus on the latest technology regarding endpoint security, email phishing protection, intelligent cloud monitoring and predictive analytics. Oxtrabot solution experts support the client by creating automated systems increasing productivity, lowering costs from RPA workflow process solutions.
Featuring automated virtual attendant software including automated virtual attendant, email security best practices and assessments, robotic process automation and endpoint threat management services. Oxtrabot Systems is pleased to announce our global partners and managed operations that specialize in machine learning, email phishing security, robotic process automation and managed threat cybersecurity solutions.
Robotic process automation is our passion and Oxtrabot wants to increase productivity with our software robot solutions that are fully-integrated and specifically programmed to create repetitive actions for normal priorities and business activities. Oxtrabot works directly with client requirements and contract partners that solely work on analytical data for advancing the business capabilities with elite visualization from our intelligent monitoring, even for the most complex environments.
Follow our social media for new updates!. .
Ceedo protects the endpoint by jailing untrusted or malicious content inside a secure application container. Using containerization, Ceedo isolates Web-facing applications from their host and ensures that what happens in the container stays in the container, and never impacts the host.
Ceedo’s protection-based approach has proven effective against known and unknown threats, including zero-day attacks, and acts as an important security layer that complements detection-based controls. MalwareLocker protects against Web-borne threats.
It runs Web-facing applications, including Web browsers, email client and other applications inside an isolated virtual environment – a container – creating a security perimeter around the application and related data. Users continue to use protected applications as they otherwise would, while all interactions between the application and the host computer are filtered through intelligent security checkpoints that ensure potential threats are confined to the container.
The outcome is a highly effective protection measure against malware infections, as anything that happens in the container stays in the container, and will not affect the host machine.. .
baramundi software AG
baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 1800 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products.
These are compiled into an integrated, future-orientated approach in baramundi Management Suite: client management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.. .
Lockdown Networks, Inc. provides network access control solutions that ensure various users and devices on the network comply with security and information technology policies.
It network access control appliances automate authentication, management, assessment, enforcement, and reporting capabilities. The company’s products include Lockdown Enforcer, which protects devices from exploits and attacks without compromising network productivity; and Lockdown Commander, an appliance-based solution that provides a comprehensive view of policy compliance, device health, and enforcement.
Its products also include Lockdown Sentry, an appliance-based solution, which provides access control and policy enforcement to smaller, hard to secure, remote facilities; and Lockdown Agent, a value-added software for comprehensive device health assessment. In addition, the company offers intelligent network access control architecture, which integrates network access control with external security, endpoint, networking, and infrastructure systems.
Further, it provides iNAC partner program that enables third-party solution providers to collaborate on network access policy decisions, sharing information critical to network, and endpoint security. The company serves customers in multiple markets, including health; education; financial; retail; technology; manufacturing; and federal, state, and local government.
It has operations in North America, Europe, and Japan. Lockdown Networks, Inc.
was founded in 2001 as InteractNetworks, Inc. and changed its name to Lockdown Networks, Inc.
GULAR Technology is a young and innovative company managed by a team of cyber experts with in-depth knowledge and vast experience in mobile and endpoint security and cyber-attack methodology. They are developers and providers of advanced and comprehensive end-to-end cyber security products and solutions.
They provide cutting-edge cyber products and solutions to government agencies and private sector customers around the world. GULAR Technology ensures communication of your organization and employees is safe and protected, matching the threat level and organizational policies to the top level of security..
Beachhead provides non-invasive MDM, Endpoint Security, and encryption solutions suitable for companies of all sizes. From a single console, an administrator can manage and secure Mac’s, PC’s, Android, iOS, and USB devices instantaneously.
Best of all, Beachhead offers 20 free SimplySecure Phones & Tablets licenses to any individual or company that wishes to protect iOS and Android devices.. .
Whale Communications Ltd. provides business-driven secure access products.
It provides secure access products, including secure sockets layer virtual private networks, and Web application firewalls, as well as application security, and endpoint security offerings. Whale’s solutions provide remote access, content inspection, and granular access control.
It enables businesses to protect corporate applications and data when accessed remotely by mobile workers, partners, and customers. Whale’s Intelligent Application Gateway products enable various employees, business partners, and customer users to securely and easily access their critical business applications and resources.
The Intelligent Application Gateway Express Edition provides secure remote access through the browser to widely used enterprise applications for a small number of users. It offers organizations out-of-the-box functionality and straightforward integration with existing enterprise directories, authentication schema, and Web Single Sign On.
Whale’s flagship Intelligent Application Gateway Enterprise Edition, is an application access and security appliance, designed to support an unlimited number of users in various configurations with independent policy sets. It offers professional services and training.
The company serves Fortune 500 and Global 1000 companies, as well as government and public sector organizations. Whale Communications Ltd.
Rohde & Schwarz Cybersecurity
Rohde & Schwarz Cybersecurity protects companies and public institutions worldwide against espionage and cyberattacks. The company develops and produces high-end encryption products, next-generation firewalls, network traffic analytics and endpoint security software as leading-edge technical solutions for information and network security requirements.
The award-winning “made in Germany” IT security solutions range from compact all-in-one products to bespoke solutions for critical infrastructures. Rohde & Schwarz has been active for over 20 years in the field of IT security and is expanding further into this business sector.
The activities and expertise of the Rohde & Schwarz enterprise security companies gateprotect, Addyton, ipoque, Sirrix and Rohde & Schwarz SIT are now concentrated within the Rohde & Schwarz Cybersecurity venture. A leading provider of cybersecurity in Europe has emerged, one that leverages the infrastructure and competences of a respected high-tech organization with the drive and innovation of startup companies.
The development of trustworthy IT solutions is founded on the “security by design” principle, which proactively prevents cyberattacks rather than reacting to a known threat. This radically new approach even protects against complex attacks that, for example, use zero-day exploits which exploit the weaknesses of current antivirus software and traditional firewalls..
WholeSecurity was a software company that provides behavior-based security and anti-phishing technology. It delivers security solutions that protect PCs from crimeware such as worms, Trojan horses, malicious spyware, and phishing attacks.
The company also provides on-demand endpoint security for companies to protect access via SSL VPN, Citrix, or web mail technologies as well as always-on endpoint security for companies for threat protection on LANs or IPSEC VPNs. It was founded in 2000 and is based in Austin, Texas..
Endpoint security of EgoSecure protects your business from data loss, liability, and work time loss. The solution concept is based on the innovative CAFE principle, taking into account all terminals and data paths.
Smart and centralized management ensures that the functions are easy to install and administer. Find safeguards for the user while transparent but still largely in the background instead, so that the usual operations are not disrupted.
An important factor in the acceptance of a security concept. endpoint security need not be a mega-project.
With EgoSecure endpoint is a basic protection after a 20 minute basic installation.. .
Shavlik, a global leader in simplifying the complexity of IT management, is dedicated to significantly reducing the time-to-value for IT professionals from months to minutes. Shavlik’s Protect, Patch for Microsoft System Center and Management Intelligence are some of its on-premise and cloud base solutions that enable customers to manage both physical and virtual machines, deploy software, discover assets, simplify configuration, control power usage and ensure endpoint security.
By bringing the sophisticated capabilities enjoyed by large companies to organizations of all sizes and types, Shavlik is driving the democratization of IT.. .
Network Distributors FZ LLC
Network Distributors FZ LLC. operates as a value added distributors in information technology security and mobility industries in the Middle East.
The company offers application traffic management, identity management system, simplifying and securing user access, network automation and control, enterprise threat management/IPS, AV protection, realtime log analysis, operational endpoint security, and strong authentication and e-signature solutions; and solutions for MPLS.. .
Neuromesh is a Managed Security and Intelligence company specifically designed for Internet of Things (IoT) technology. IoT has unique security challenges that are posing personal privacy and national security threats.
Our technology acts as a vaccine for IoT devices using hacker tools to defeat hackers using blockchain.. .
Neocleus’ solutions address IT’s most pressing endpoint concerns. The solutions operate IT resources outside of a Windows environment while still offering complete access to all the capabilities offered by the underlying endpoint hardware.
The approach Neocleus provides offers IT departments a virtual endpoint environment that is easy to control and gives users the flexibility to gain secure access to critical corporate assets from any endpoint regardless of its location or state of security. To achieve breakthrough results, Neocleus enhanced the Xen Open Source hypervisor and transformed it into an endpoint-oriented hypervisor.
Neocleus contributes this platform to the open source community to facilitate the growth of an ecosystem of endpoint virtualization partners and collaborators. These open source contributions enable software developers to focus on building high-performance applications without worrying about the underlying architecture..
Zone Labs is a provider of endpoint security solutions. Zone Labs(R), one of the most trusted brands in Internet security, is a leading creator of endpoint security solutions protecting millions of PCs and the valuable, personally-identifiable information on those PCs, from hackers, spyware and data theft.
The company’s award-winning endpoint security product line is deployed in global enterprises, small businesses and consumers’ homes, protecting them from Internet-borne threats. Zone Labs Integrity(TM) is an endpoint security management platform that protects corporate data and productivity.
ZoneAlarm(R) Pro, ZoneAlarm Plus and ZoneAlarm are among the most popular and successful Internet security products available today while IMsecure(TM) Pro offers comprehensive security for instant messaging. Founded in 1997, Zone Labs is a private company headquartered in San Francisco, California, USA, with European headquarters in Frankfurt, Germany and offices in Japan and Singapore..
Advanced Systems International, SAC.
Global Reach Security Software Company dedicated to Development, Support, and Licensing of its USB Lock RP: Centralized Devices Access Control -Endpoint Security Software https://www.usb-lock-rp.com/ Our company goal is to continue to provide straightforward, effective solutions, that do the job better, utilizing minimum system resources, with emphasis in easy of use, and real-time response. Advanced Systems International was founded on 2004.
The Advanced Systems team started development of its flagship security software product USB-Lock-RP in 2005 from headquarters in Peru. USB-Lock-RP Copyright USB-Lock-RP (Remote Protect) is Strong Endpoint Security Software, designed to protect organizations windows networks from the risks associated with portable storage use.
Since initial development The Advanced Systems Team has focused on incorporating support to newer operating systems, and to include new portable device technologies under its protection scope, without dropping support to legacy operating systems. Over the years it has remained true to its original concept of providing a straightforward tool to allow effective device control and prevent data loss and systems infection in windows organizations networks.
Today in 2018 while complex highly integrated solutions proliferate. Both IIoT and IoT challenge Cybersecurity providers.
USB-Lock-RP™© remains a specialized tool that brings ease to complexities and provides device control capable of protecting organizations data assets and stopping USB-based exploits before they spread.. .
Centennial Software Limited develops information technology (IT) audit and network inventory, software asset management, and endpoint security tools. Its products include Centennial Discovery, which provides an updated PC audit and software inventory of IT assets connected to the network; License Manager, which is used in managing desktop license compliance across the organization; DeviceWall, which prevents the unwanted transfer of data to or from portable devices, automatically encrypts data copied to authorized storage devices, and provides visibility of user and administrator actions; Centennial Enterprise.Suite, which helps organizations in finding, tracking, and reporting on assets across the network; Centennial SAM.Suite, which provides a solution for software management; and Centennial Security.Suite, which helps in defending the corporate network from external and internal risks.
The company also offers solutions for managed service providers (MSPs), such as Discovery.MSP, which helps MSPs to deliver Web-based visibility of IT infrastructure across multiple customers; and MicroAUDIT, which helps in software asset management. The company’s solutions help organizations in managing IT assets, license compliance, and network security.
Centennial offers its products under private label, as well as through solutions providers and distributors in Austria, Brazil, Mexico, Latin America, Eastern and Western Europe, Greece, Italy, Spain, and Portugal. Centennial Software Limited was founded in 1997 and is based in Swindon, United Kingdom with additional offices in Europe, North and South America, the Asia Pacific, the Middle East, and Africa.
As of April 28, 2008, Centennial Software Limited operates as a subsidiary of FrontRange Solutions USA, Inc. .
Sygate is the market leader of endpoint security solutions for the large enterprise. Using the award-winning Sygate Secure Enterprise, organizations protect their networks, enforce business policies, and automate security best practices to regain control of network security, ensure compliance across the enterprise and reduce cost.
Partnerships with industry leaders, including Aventail, Cisco, iPass, Nortel, Netscreen and RSA, enable seamless protection across multiple platforms and applications. Sygate Technologies also makes award winning consumer and small business security and Internet access solutions that offer the user a range of features from basic to advanced..
Sigma Cyber Security
Sigma Cyber Security provide enterprise grade security solutions to clients across the UK. These services include: Network Security, Endpoint Security, Database Security, Penetration Testing, Vulnerability Testing and much more.
Whatever your Cyber Security requirements get in touch with our highly experienced Cyber Security team today!. .
K7 Computing UK
K7 Computing UK is an antivirus distribution company providing sales and service for K7 Computing antivirus products. K7 Computing UK was founded in 2011 to provide sales and support for K7 Antivirus products for United Kingdom.
K7 antivirus software are the fastest performing antivirus products by AV-Comparatives and had received multiple awards (VB-100, CheckMark, AV-Test, etc.) K7 Antivirus products: K7 Antivirus Plus K7 Total Security K7 Ultimate Security K7 Business Edition products: K7 Enterprise Security – Endpoint Security K7 Mail Security for MS Exchange. .
Ramesys (e-Business) Services
Ramesys (e-Business) Services Limited provides IT infrastructure services in the United Kingdom. The company offers services in the areas of analysis and planning, design, implementation and migration, and management and support.
It also provides managed services, such as service desk and proactive monitoring; and onsite hardware maintenance, assistance, training, consultancy, and account management. In addition, the company offers mobility and distance computing services in the areas of messaging anywhere, information anywhere, field mobility solutions, and workforce mobility solutions; and security services in the areas of local area network security, remote access control, content security and filtering, host-based or endpoint security, authentication, business continuity, and disaster recovery.
Further, it provides email and file archiving services. The company was incorporated in 1984 and is based in Nottingham, the United Kingdom.
Ramesys (e-Business) Services Limited operates as a subsidiary of RedSky IT Holdings Limited.. .
ItWatch is the world market leader in secure device management. Therefore itWatch promotes IT security in Germany as the it-sa platinum sponsor and first it-sa Charity Member.
ItWatch stands for innovative software products with a focus on endpoint security and added value in IT operations. When developing our products, the focus is on the cost-effectiveness of our customers.
Before the implementation a detailed analysis of the customer interests, the quantity scaffolding and the business processes is carried out. The products of the itWatch always support the already established customer processes.
Through this investment of the itWatch, the products are never driven by technology, but are always geared to the needs of the big customers, the middle class and the authorities. A broad customer base ensures permanent development, thus guaranteeing investment protection for the customer in addition to direct access to technical innovation.
Security products often lack a contribution to value creation. Therefore itWatch products cover not only the aspects of endpoint security from to topics like Information Leakage Prevention, Compliance enforce Data Protection Act proactively and cost-effectively, but they also bring the tools with a real return on investment (ROI) by reducing costs In operation and in procurement.
This aspect has impressively described the Bavarian police in an experience report. The third major pillar of success is the ease of product handling – both for administrators and end users.
SecureWave provides endpoint security software solutions. The company offers desktop security, data leakage prevention, malware protection, IT system health maintenance, and compliance solutions.
It provides Sanctuary, an endpoint security solution to manage, monitor, and control applications and devices on the corporate network, as well as secures organizations from known and unknown data threats. The company serves financial, government, healthcare, education, manufacturing, and legal sectors.
It offers its products through a network of reseller and service provider partners.. .
Bay Computing Co., Ltd. is one of the leading IT security companies.
End-to-End Turnkey Solution: Cyber Security Operation Solution, Endpoint Security and Management, Network & Network Security Solutions, Data Security Solution, Infrastructure Solution and Advisory Service. Organization of all levels With a team of professionals with more than 20 years of experience in delivering effective and tailored solutions to every organization, the Company is trusted by leading organizations such as telecommunications and financial services providers.
, Finance and securities companies, government agencies, state-owned enterprises, and leading educational institutions. The company has more than 50 staffs who are well equipped and specialized in various technology.
Take care and drive your business forward. To achieve business goals in a highly competitive environment.
With over 20 years of experience. .
Visual Automation, Inc.
Visual Automation is a software development company, started in 1994 by Duane Fahey, former Product Manager at ICOM, Inc. (now Rockwell Automation).
Visual Automation is dedicated to creating high quality handcrafted endpoint security software products that are needed when a computer is used by a few or several people. Visual Automation currently offers a family of handcrafted software products: Secure Desktop 7 for Windows XP or Vista iLock 3 for Mozilla Firefox 2 or 3 ColdKey 3 For Windows 2000 or XP.
Custodian360 is a complete managed endpoint security solution, providing the most effective protection against all forms of cyber attack and data breach. Powered by leading independent IT security and mobility solutions specialists AVR International, Custodian360 is built on the highly effective SentinelOne security platform, which detects, protects and repairs against attacks and provides full recovery from Ransomware.
For smaller businesses with limited access to IT support, Custodian360 provides total management and monitoring of all endpoints, leaving business owners free to run their businesses.. .
Matrix Global Partners
Matrix Global Partners, Inc. provides information security solutions, integration services, and professional and managed services.
It offers a line of security and SIEM technologies; and distributes endpoint security solutions, encrypted USB flash drives, compliance and security management solutions, and drives that provide mandatory password protection and automatic hardware encryption of stored data. The company also offers software that insures the confidentiality and integrity of information stored on PCs, laptops, servers, mobile devices, in email exchanges, and other communications.
In addition, it provides pre-sales consulting, installation services, training, implementation support.. .
Dekart is a developer of trusted data protection tools that address today’s endpoint security challenges. The company is headquartered in Chisinau, the Republic of Moldova.
There team is composed of highly qualified professionals with an extensive experience in the field of information security. Founded in 1995, Dekart now serves several thousands of businesses and enterprises around the world..
Norman Safeground is an IT security company that offers users with software that protects systems from cyber-threats. It offers small businesses with endpoint security, cloud based file sharing, backup solutions, mail protection, web protection and a range of other premium security solutions.
It offers home users with premium anti-virus, anti-spam, and spyware protection as well as cloud based backup solutions. Norman Antivirus for Mac, Norman Mobile Security for Android, Norman Web Advisor, Norman Security Suite PRO, Norman Security Suite, Norman Antivirus 10, Norman Personal Backup, and Norman System Speedup are some of the products developed by Norman Safeground.
Norman Safeground was founded in 1984 and is based in Akershus, Norway. It was acquired by AVG Technologies, an online security company, on November 6, 2014..
Sinnott Wolach Technology Group
Sinnott Wolach Technology Group (SWTG) is a leading provider of Next-Generation Network and Information Security Solutions & Services. Through partnerships with leading technology providers — they offer solutions for high-level network monitoring and deep packet inspection as well as solutions for Network Access Control, WAN Optimization, Vulnerability & Threat Monitoring, Monitor & Block Data Leakage, and Endpoint Security.
They provide solutions to Fortune 1000 companies, State & Local Government Agencies, as well as many small / medium business organizations throughout Florida. The company was founded as MS Networks in 2000, expanded in 2006 and changed its name to Sinnott Wolach Technology Group, Inc..
nProtect is the leading information security solution provider with industry-leading endpoint security and help companies protect their customers from cyber attacks. nProtect offers a complete security system to financial service companies to fight against malware, keylogging, and other types of malicious attacks.
nProtect provides the products to many organization of all sizes and helps users around the world enjoy the safe online transaction. nProtect is a smart choice for banking security and fraud prevention..
TestudoData engages in the distribution of cloud services for small and medium businesses. Its reseller network includes various managed service providers who provide cloud security services and hosted solutions directly to customers.
The company offers email security, Web security, endpoint security, hosted, compliance and vulnerability assessment, professional, and Postini Transition products; and provisioning support, migration support, personalized sales support, technical support, and custom marketing support services.. .
Code Red Systems
Code Red Systems is an innovative technology company specializing in software development, project management, and online marketing. In addition to developing its own software products for network management and endpoint security, the company has also provided outsourced development for complex civilian and military software projects.
From a marketing perspective, in addition to launching and promoting its own products, the company’s expertise in worldwide online marketing has also been leveraged by startups and large multinational companies alike. They manage and develop complex enterprise and client-side applications from initial concept through implementation and leverage years of marketing experience specializing in integrated solutions for online video and social media.
Code Red has developed proprietary technology in the fields of network management, WiFi management, data security, and endpoint configuration.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.