Header banner
Revain logoHome Page

Endpoint Protection

All results
threatbook tdp logo
Revainrating 4.5 out of 5

2 Review

ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

haikiki iq logo
Revainrating 4.5 out of 5

2 Review

Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ ́s anomaly detection analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection and guided investigation. Its self-learning AI is similar to the human…

Read more about this company
reve endpoint security logo
Revainrating 4.5 out of 5

2 Review

REVE Antivirus Endpoint Security solutions incorporate a Device Control technology that allows the administrator to block or allow permissions for using external devices such as Hard Disk, Pen drive, USB Dongle, Printers, External CD/DVD. By blocking unauthorized media, Device control prevents the spreading of a virus via removable devices.

wahupa scm logo
Revainrating 4.5 out of 5

2 Review

Wahupa SCM is based on a proven successful concept with a slew of new innovations. We've taken our vast experience building best-of-class Supply Chain Management (SCM) products and started all over to build a product that will optimize your supply chain, and still be affordable.

txhunter logo
Revainrating 4.5 out of 5

2 Review

TXHunter provides an easy to use and convenient tool for conducting threat incident investigations remotely. If any endpoint system or server is suspected of having been attacked, TXHunter can simply take a snapshot of the suspicious system and automatically conduct an incident investigation. If the investigation process identifies suspicious files or…

Read more about this company
wazuh - the open source security platform logo
Revainrating 4.5 out of 5

2 Review

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

smartshield logo
Revainrating 4.5 out of 5

2 Review

Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.

heimdal threat prevention logo
Revainrating 4.5 out of 5

2 Review

Heimdal Security is a Denmark-based, self-financed, cybersecurity vendor, specialized in DNS filtering, silent patching, antivirus/antimalware software, and Privileged Access Management (PAM) solutions. In an ever-evolving threatscape, traditional, file-based, Antivirus solutions are no longer sufficient to withstand the next generation of online…

Read more about this company
pc matic pro endpoint suite logo
Revainrating 4.5 out of 5

2 Review

panda adaptive defense 360 logo
Revainrating 4 out of 5

2 Review

Panda Adaptive Defense 360 is an innovative cybersecurity solution for endpoints and servers, delivered from the Cloud. Its agent is lightweight and minimal impact on endpoints performance, which is managed via a single Cloud console. AD360 combines the widest range of endpoint protection (EPP) technologies with EDR capabilities, automating the…

Read more about this company
infoexpress cybergatekeeper logo
Revainrating 4 out of 5

2 Review

CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.

ciss forza logo
Revainrating 4 out of 5

2 Review

CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.

i-guard logo
Revainrating 4 out of 5

2 Review

Endpoint Detection & Response solution based on artificial intelligence

keyfocus web server logo
Revainrating 4 out of 5

2 Review

KF Web Server is a free HTTP Server that can host a number of web sites.

threatlocker logo
Revainrating 4 out of 5

2 Review

The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not…

Read more about this company
network management logo
Revainrating 4 out of 5

2 Review

NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.

binary defense endpoint detection and response (edr) logo
Revainrating 4 out of 5

2 Review

Endpoint Detection and Response

sequretek edpr logo
Revainrating 4 out of 5

2 Review

Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industry to achieve efficiency and sophistication in product design that combines a multitude of technologies.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.