Home / Operations Management / Endpoint Security

Endpoint Security

Solutions for securing endpoint devices including EDR, antivirus, and endpoint protection platforms

Try these 78 AI Endpoint Security Tools

WMI Monitor
Free

WMI Monitor

Emsisoft Enterprise Security + EDR provides robust and proven endpoint security for organizations of all sizes with layered protection and a cloud-based management console.

Xcitium Enterprise Platform
Free

Xcitium Enterprise Platform

Advanced malware scanning and removal tool that detects and removes various types of malware and offers additional protection with HitmanPro.Alert.

YARA-Endpoint
Free

YARA-Endpoint

The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.

Zeek Agent
Free

Zeek Agent

AhnLab PLUS is a unified security platform providing comprehensive cybersecurity solutions for businesses.

ClamAV
Free

ClamAV View ClamAV

ClamAV is a robust, open-source antivirus engine designed for comprehensive threat detection across diverse environments. Its versatile architecture is ideal for defending email gateways, web servers, and endpoints from malware, viruses, and other malicious threats. Optimized for scalability and performance, ClamAV offers a flexible multi-threaded daemon, efficient command-line tools, and automated signature updates, establishing itself as the de facto standard for secure email and network infrastructure.

Open-source Antivirus Engine
Email Gateway Scanning
Web Server Protection
OSSEC
Free

OSSEC View OSSEC

OSSEC is a robust, open-source Host-based Intrusion Detection System (HIDS) designed for comprehensive security monitoring and analysis across diverse platforms. Its advanced capabilities include deep log analysis, file integrity verification, rootkit detection, and real-time alerting, ensuring continuous protection against threats. OSSEC excels at centralized policy enforcement and active response, making it an indispensable tool for maintaining robust security postures in complex IT environments.

Scalable, multi-platform Host-based Intrusion Detection System (HIDS)
Advanced log analysis and correlation engine
File integrity checking and monitoring