List of references for Volume IV - End Point Protection Sections 1-6

Introduction to the Instructor!
Nathan’s Twitter #GotoNathan
https://twitter.com/gotonathan
Nathan’s Cyber Security Blog
https://www.stationx.net/nathan-house/

Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
N.S.A. Able to Foil Basic Safeguards of Privacy on Web

Further reading on quantum computing and its effect of cryptography - NIST Reports

Disk Encryption Attacks - Physical 11:17
Inception

Choose the Right BitLocker Countermeasure
https://technet.microsoft.com/en-us/library/dn632181.aspx
Intel® Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices

Wikipedia - Disk encryption

Evil Maid goes after TrueCrypt!

Security Pitfalls in Cryptography
https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
Inception over firewire attack - video

Cold Boot Attack Demo - Video

nullcon Goa 2015: Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video

Passware Kit Enterprise - Hard Disk Decryption

Windowsscope
http://www.windowsscope.com/?page=shop.product_details&flypage=flypage.tpl&product_id=24&category_id=1&option=com_virtuemart&Itemid=34
Report - Cold Boot Attack on DDR2 and DDR3 RAM

Disk Encryption Attacks - Containers, Volumes and Partitions
Security Pitfalls in Cryptography
https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html

Windows - Disk Encryption - An Introduction
Comparison of disk encryption software From Wikipedia

Windows BitLocker
https://technet.microsoft.com/en-us/library/cc766295(v=ws.10).aspx
Truecrpyt v7.2 (latest full version) - Download
https://www.grc.com/misc/truecrypt/truecrypt.htm
Veracrypt

CipherShed
https://www.ciphershed.org/*
DiskCryptor
https://diskcryptor.net/wiki/Main_Page
Symantec Drive Encryption
https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption
BestCrypt Container Encryption

Windows - Disk Encryption - Bitlocker
Windows BitLocker Drive Encryption Step-by-Step Guide
https://technet.microsoft.com/en-us/library/cc766295(v=ws.10).aspx
What’s new in Windows 10, versions 1507 and 1511

Every Windows 10 in-place Upgrade is a SEVERE Security risk

YUBIKEYS

Windows - Setting Up BitLocker
ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT

Windows - Disk Encryption - VeraCrypt
Veracrypt

IsTrueCryptAuditedYet? Yes!
http://istruecryptauditedyet.com/
German Government Audits Truecrypt

Truecrypt 7 Derived Code/Windows: Drive Letter Symbolic Link Creation EoP
https://bugs.chromium.org/p/project-zero/issues/detail?id=538&redir=1
Truecrypt 7 Derived Code/Windows: Incorrect Impersonation Token Handling EoP
https://bugs.chromium.org/p/project-zero/issues/detail?id=537&redir=1
TrueCrypt and VeraCrypt vulnerability
http://www.openwall.com/lists/oss-security/2016/01/11/1
VeraCrypt - Operating Systems Supported for System Encryption

VeraCrypt Secure Boot
https://sourceforge.net/p/veracrypt/code/ci/master/tree/src/Boot/EFI/Readme.txt#l19
Veracrypt FAQ

https://www.yubico.com/why-yubico/for-businesses/systems/disk-encryption/
UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS

Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
Comparison of disk encryption software From Wikipedia

DiskCryptor
https://diskcryptor.net/wiki/Main_Page
DiskCryptor
https://diskcryptor.net/
CipherShed
https://www.ciphershed.org/
BestCrypt Volume Encryption

Symantec Drive Encryption
https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption

Windows, Mac & Linux - Setting up VeraCrypt
VeraCrypt - Beginner’s Tutorial

Mac - Filevault2
OS X Security and Privacy Guide - full disk encryption

Use FileVault to encrypt the startup disk on your Mac - Apple

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption

Mac - Setting up Filevault2
Startup key combinations for Mac

pmset – manipulate power management settings - Man Page
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/pmset.1.html
DeepSleep - Hibernate your Mac
http://www.axoniclabs.com/DeepSleep/
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption

Security Analysis and Decryption of FileVault 2 IFIP WG 11.9

Apple Technical White Paper - Best Practices for Deploying FileVault 2
http://training.apple.com/pdf/WP_FileVault2.pdf

Linux Whole Disk Encryption - Dm-crypt and LUKS
Plain dm-crypt
https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt
LUKS support for storing keys in TPM NVRAM

Two factor authentication with Yubikey for harddisk encryption with LUKS

Yubikey Two-factor Authentication Full-disk Encryption via LUKS

Linux - Setting up DMCrypt/LUKS
The Debian Administrator’s Handbook
https://debian-handbook.info/browse/stable/sect.installation-steps.html
Cryptsetup & LUKS

Arch - dm-crypt/Encrypting an entire system
https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system
Arch - Disk encryption
https://wiki.archlinux.org/index.php/Disk_encryption
zuluCrypt

Linux - Encrypting the boot partition with Grub2
Arch - Encrypted boot partition (GRUB)
https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Encrypted_boot_partition_.28GRUB.29
Two factor authentication with Yubikey for harddisk encryption with LUKS

Yubikey Two-factor Authentication Full-disk Encryption via LUKS

Self Encrypting Drives (SEDs)
Ten Reasons to Buy Self-Encrypting Drives

Defense Against Disk Decryption Attacks
Security Requirements and Precautions

TRESOR Runs Encryption Securely Outside RAM
https://www1.informatik.uni-erlangen.de/tresor

File Encryption
PeaZip archiver
http://www.peazip.org/
Keka archiver for macOS
http://www.kekaosx.com/en/
AES Crypt
https://www.aescrypt.com/
GNU Privacy Guard
https://www.gnupg.org/

Mandatory Key Disclosure & Plausible Deniability
Key disclosure law From Wikipedia
https://en.wikipedia.org/wiki/Key_disclosure_law
veracrypt - Hidden Volume
https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume
Arch - Plain dm-crypt
https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt
veracrypt - Plausible Deniability
https://veracrypt.codeplex.com/wikipage?title=Plausible%20Deniability
Appeals Court Upholds Constitutional Right Against Forced Decryption
https://www.eff.org/press/releases/appeals-court-upholds-constitutional-right-against-forced-decryption
xkcd comic – security
https://xkcd.com/538/

Case Studies in Disk Decryption
KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
https://www.kingpin.cc/
Darkmarket
https://www.amazon.com/Darkmarket-Misha-Glenny/dp/1847921272/ref=pd_sim_14_1/180-9905085-7712930?ie=UTF8&dpID=51f6mmmB%2BqL&dpSrc=sims&preST=AC_UL160_SR105%2C160&refRID=14XEDCD4Z9K4SDD5SDYE
Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court
https://www.wired.com/2009/01/hacking-godfath/

Is Anti-Virus dead? - The Threat Landscape
av-test.org - The best antivirus software for Windows Home User
https://www.av-test.org/en/antivirus/home-windows/
kaspersky compare
https://www.kaspersky.co.uk/home-security
FUD Crypting Service (0/35 100% FUD)
https://www.youtube.com/watch?v=OvFwFrJGemU

Is Anti-Virus dead? - Protection Methods
Cyberthreat Real-Time Map
https://cybermap.kaspersky.com/
Malicious Code Detection Technologies
https://pdfs.semanticscholar.org/36a6/675b54a963aa4cba708882f1e172536a5dba.pd

Ransomware
The cost of ransomware attacks: $1 billion this year
http://www.zdnet.com/article/the-cost-of-ransomware-attacks-1-billion-this-year/

Anti-Virus and End-Point-Protection Testing
List of AV Testing Labs
https://www.av-comparatives.org/list-of-av-testing-labs/
AV Comparatives
https://www.av-comparatives.org/
bitdefender
http://www.bitdefender.co.uk/solutions/antivirus-comparison.html

The Best of Business End-Point-Protection (EPP)
The best antivirus software for Windows Client Business User
https://www.av-test.org/en/antivirus/business-windows-client/windows-10/
BitDefender Business
http://www.bitdefender.co.uk/business/
Kaspersky SMB
http://www.kaspersky.co.uk/business-security/small-to-medium-business

Windows - The Best of Anti-Virus and End-Point-Protection
Windows 10 – Protect Your PC
http://windows.microsoft.com/en-us/windows-10/getstarted-protect-your-pc
Microsoft’s Free Security Tools – Windows Defender Offline
https://blogs.microsoft.com/microsoftsecure/2012/09/19/microsofts-free-security-tools-windows-defender-offline/
BitDefender
http://www.bitdefender.co.uk/solutions/antivirus-comparison.html
Kaspersky
http://www.kaspersky.co.uk/compare
Norton Security
https://uk.norton.com/norton-security-with-backup
Windows Security Essentials Download
https://support.microsoft.com/en-us/help/14210/security-essentials-download
Bitdefender
http://www.bitdefender.com/media/html/freeav-upgrade/?et_cid=EMM_NA_FreeAV_Upsell

Business End Point Protection (EPP)
The best antivirus software for Windows Client Business User
https://www.av-test.org/en/antivirus/business-windows-client/windows-10/

Mac - XProtect
Are you sure you want to open it?" alert (File Quarantine / Known Malware Detection) in OS X
https://support.apple.com/en-gb/HT201940
The Mac Security Blog
https://www.intego.com/mac-security-blog/topic/xprotect/
YARA for malware researchers
https://virustotal.github.io/yara/

Mac - The Best of Anti-Virus and End-Point-Protection
History of Mac Malware
https://www.webroot.com/blog/2015/10/02/history-of-mac-malware/
The Safe Mac Blog
http://www.thesafemac.com/
Mac Security Test & Review
http://www.av-comparatives.org/wp-content/uploads/2015/07/avc_mac_2015_en.pdf
Intego
https://www.intego.com/
Malwarebytes for Mac
https://www.malwarebytes.com/mac/
Patrick Wardle, Synack: “How to practically create elegant, bad@ss OS X malware.”
https://www.youtube.com/watch?v=oT8BKt_0cJw

Linux - The Best of Anti-Virus and End-Point-Protection
Linux malware From Wikipedia
https://en.wikipedia.org/wiki/Linux_malware
Linux Security Review
http://www.av-comparatives.org/wp-content/uploads/2015/05/avc_linux_2015_en.pdf
ClamAV
http://www.clamav.net/
rootkit_hunter lynis

Chkrootkit
http://www.chkrootkit.org/
Linux Malware Detect
https://www.rfxn.com/projects/linux-malware-detect/

Online and Second Opinion - Anti-Virus and End-Point-Protection
virustotal.com email-submissions
https://www.virustotal.com/en/documentation/email-submissions/
Virus Software Recomendations
https://alternativeto.net/software/virustotal/
Applications and Threat Intelligence Platform
https://www.metascan-online.com/#!/scan-file
Jotti’s malware scan
https://virusscan.jotti.org/
on-line scan service
http://virscan.org/
ThreatAnalyzer
https://www.threattrack.com/malware-analysis.aspx
ESET Online Scanner
https://www.eset.com/us/online-scanner/
herdProtect Anti-Malware Scanner
https://www.herdprotect.com/downloads.aspx
HitmanPro malware detection tool
http://www.surfright.nl/en/hitmanpro

Is Anti-Virus and End-Point-Protection Dangerous?
AVG can sell your browsing and search history to advertisers
http://www.wired.co.uk/article/avg-privacy-policy-browser-search-data
Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products
https://www.grahamcluley.com/zero-day-vulnerability-kaspersky-fireeye/
‘Ridiculous’ Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords
http://thehackernews.com/2016/01/free-antivirus-hacking.html?m=1
Comodo: Comodo “Chromodo” Browser disables same origin policy, Effectively turning off web security.
https://bugs.chromium.org/p/project-zero/issues/detail?id=704&utm_content=buffer30a71&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer&redir=1
MalwareBytes: multiple security issues
https://bugs.chromium.org/p/project-zero/issues/detail?id=714&redir=1
High-severity bugs in 25 Symantec/Norton products imperil millions
http://arstechnica.com/security/2016/06/25-symantec-products-open-to-wormable-attack-by-unopened-e-mail-or-links/
Tavis Ormandy @taviso
https://twitter.com/taviso?lang=en

Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
Magic Quadrant for Endpoint Protection Platform
https://www.inisi.com/documents/magic-quadrant-for-endpoint-protection-platforms.pdf
Magic Quadrant review of changes in 2017
https://solutionsreview.com/endpoint-security/gartner-2017-epp-magic-quadrant/

What is application and execution control?
the-backdoor-factory
https://github.com/secretsquirrel/the-backdoor-factory

Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
How to Change File Permissions on Windows 7
http://www.wikihow.com/Change-File-Permissions-on-Windows-7
Windows Permission Identifier
https://www.stationx.net/windows-permission-identifier/
AccessEnum
https://technet.microsoft.com/en-us/sysinternals/accessenum.aspx

Windows - Application control - User Account Control (UAC)
User Account Control (UAC)
https://technet.microsoft.com/en-us/library/2009.07.uac.aspx
User Account Control From Wikipedia
https://en.wikipedia.org/wiki/User_Account_Control
Windows 7 – How to Configure UAC (User Account Control)
http://helpdeskgeek.com/windows-7/windows-7-disable-uac/
How User Account Control works
https://technet.microsoft.com/en-us/itpro/windows/keep-secure/how-user-account-control-works

Windows - Application control - Software Restriction Policies
Use Software Restriction Policies to block viruses and malware
https://blog.brankovucinec.com/2014/10/24/use-software-restriction-policies-to-block-viruses-and-malware/
Application Whitelisting using Software Restriction Policies (version 1.1)
https://www.iad.gov/iad/library/reports/application-whitelisting-using-srp.cfm
Server not found
Use a Software Restriction Policy (or Parental Controls) to stop exploit payloads and Trojan Horse programs from running
http://www.mechbgon.com/srp/

Windows - Application control - AppLocker
What Is AppLocker?
https://technet.microsoft.com/en-us/library/ee424367(v=ws.10).aspx
Restrict Access to Programs with AppLocker in Windows 7
http://www.howtogeek.com/howto/6317/block-users-from-using-certain-applications-with-applocker/
Lock down Windows 10 to specific apps
https://technet.microsoft.com/itpro/windows/manage/lock-down-windows-10-to-specific-apps
AppLocker Step-by-Step Guide
https://technet.microsoft.com/en-us/library/dd723686(v=ws.10).aspx
Use AppLocker and Software Restriction Policies in the same domain
https://technet.microsoft.com/en-gb/itpro/windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain
Bypass the Windows AppLocker bouncer with a tweet-size command
http://www.theregister.co.uk/2016/04/22/applocker_bypass/
Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files)
http://subt0x10.blogspot.rs/2016/04/bypass-application-whitelisting-script.html
Finding Evil in the Whitelist
https://www.sans.org/reading-room/whitepapers/Whitelists/finding-evil-whitelist-35832
Guide to Application Whitelisting
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf
bypassing_windows_applocker
https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2013/2013-12-04_-ncc-technical_paper-_bypassing_windows_applocker-2.pdf
NoVA Hackers Curt Shaffer & Judah Plummer - Application Whitelisting
https://www.youtube.com/watch?v=xRxE98B76hU

Windows - Application Control - Parental controls
Ensure a Windows PC Never Gets Malware By Whitelisting Applications
http://www.howtogeek.com/195381/ensure-a-windows-pc-never-gets-malware-by-whitelisting-applications/
Test: Parental control software for Windows and Mac OS X
https://www.av-test.org/en/news/news-single-view/test-parental-control-software-for-windows-and-mac-os-x/

Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
Protecting your PC against any malware using Kaspersky Lab’s Trusted Applications technology
http://media.kaspersky.com/pdf/kaspersky_lab_whitepaper_trusted_applications_mode.pdf
Kaspersky Internet Security 20xx
https://support.kaspersky.com/us/12100
AppGuard® Breach Prevention
http://www.appguardus.com/
NoVirusThanks EXE Radar Pro
http://www.novirusthanks.org/products/exe-radar-pro/
voodooshield.com
https://voodooshield.com/
Lumension Application Control
https://www.lumension.com/application-control-software.aspx
Cb Endpoint Security Platform
https://www.carbonblack.com/products/
McAfee Application Control
http://www.mcafee.com/us/products/application-control.aspx

Windows - Exploitation Prevention - EMET
ANGLER EXPLOIT KIT EVADING EMET
https://www.fireeye.com/blog/threat-research/2016/06/angler_exploit_kite.html
Microsoft - Moving Beyond EMET
https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/
CVE-2015-2545 ITW EMET Evasion
http://casual-scrutiny.blogspot.rs/2016/02/cve-2015-2545-itw-emet-evasion.html
EMET: Guide To New Features - Video
https://www.youtube.com/watch?v=kKcuQDWY3v0
Enhanced Mitigation Experience Toolkit (EMET)
https://technet.microsoft.com/en-us/security/jj653751
Microsoft - The Enhanced Mitigation Experience Toolkit
https://support.microsoft.com/en-us/kb/2458544
Process Explorer
https://technet.microsoft.com/en-gb/sysinternals/processexplorer
Whitepaper on Bypassing ASLR/DEP
https://www.exploit-db.com/docs/17914.pdf

Windows - Exploitation Prevention - Traps, MBEA and HMPA
HitmanPro.Alert
https://www.hitmanpro.com/en-us/alert.aspx
Malwarebytes Anti-Exploit
https://www.malwarebytes.org/antiexploit/
Malwarebytes and sandboxie
http://forums.sandboxie.com/phpBB3/viewtopic.php?f=17&t=19132&start=30#p110120
Palo Alto Traps
https://www.paloaltonetworks.com/products/secure-the-endpoint/traps.html
HitmanPro.Alert - Exploit Test Tool Manual
http://dl.surfright.nl/Exploit%20Test%20Tool%20Manual.pdf

Windows 10 - Device Guard
What’s new in Windows 10, versions 1507 and 1511

Device Guard deployment guide
https://technet.microsoft.com/itpro/windows/keep-secure/device-guard-deployment-guide
Microsoft future security strategy - black hat talk
https://www.blackhat.com/docs/us-16/materials/us-16-Weston-Windows-10-Mitigation-Improvements.pdf
Device Guard and Credential Guard hardware readiness tool
https://www.microsoft.com/en-us/download/details.aspx?id=53337
IOMMU: A Detailed view
http://osidays.com/osidays/wp-content/uploads/2014/12/Final_OSI2014_IOMMU_DetailedView_Sanil_Anurup.pdf

Windows - Defender Application Guard for Microsoft Edge
Introducing Windows Defender Application Guard for Microsoft Edge
https://blogs.windows.com/msedgedev/2016/09/27/application-guard-microsoft-edge/#KL53Dth0deHaxKHd.97
Videos
Windows Defender Application Guard for Microsoft Edge
https://www.youtube.com/watch?v=McP8ZGAInwI

Linux - Security frameworks - AppArmor
AppArmor From Wikipedia
https://en.wikipedia.org/wiki/AppArmor
AppArmor How To Use
https://wiki.debian.org/AppArmor/HowToUse

Linux - Security frameworks - SElinux
Security-Enhanced Linux From Wikipedia
https://en.wikipedia.org/wiki/Security-Enhanced_Linux
SELinux Project Wiki
http://selinuxproject.org/page/Main_Page
SELinux on Debian
https://wiki.debian.org/SELinux/Setup

Linux - Security frameworks - Grsecurity
Grsecurity/Configuring and Installing grsecurity
https://en.wikibooks.org/wiki/Grsecurity/Configuring_and_Installing_grsecurity
Hardening Debian for the Desktop Using Grsecurity
https://micahflee.com/2016/01/debian-grsecurity/
Which is better, grsecurity, AppArmor or SELinux?
https://grsecurity.net/compare.php
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
https://www.cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html
Which distributions maintain a kernel package with grsecurity support
http://unix.stackexchange.com/questions/126469/which-distributions-maintain-a-kernel-package-with-grsecurity-support
Alpine Linux
https://alpinelinux.org/
grsecurity.net
https://grsecurity.net/features.php
Arch Linux kernel and modules with grsecurity
https://www.archlinux.org/packages/community/x86_64/linux-grsec/
Debian grsecurity kernel APT repository (unofficial)
http://molly.corsac.net/~corsac/debian/kernel-grsec/packages/

Linux - Security frameworks - PaX and more
Homepage of The PaX Team
https://pax.grsecurity.net/
Rule Set Based Access Control
https://www.rsbac.org/
TOMOYO Linux
http://tomoyo.osdn.jp/
FBAC-LSM
http://schreuders.org/FBAC-LSM/
Yama is a Linux Security Module
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/security/Yama.txt?id=HEAD

Mac - Application control - Parental controls
How can I ensure only “whitelisted” applications run on OS X
https://apple.stackexchange.com/questions/83406/how-can-i-ensure-only-whitelisted-applications-run-on-os-x

Mac - Application control - Gatekeeper
OS X: About Gatekeeper
https://support.apple.com/en-gb/HT202491
Researchers slip malware onto Apple’s App Store, again
https://www.cnet.com/news/researchers-slip-malware-onto-apples-app-store-again/
Gatekeeper Exposed
https://www.youtube.com/watch?v=G93STf2YD90
Gatekeeper Exposed
https://www.synack.com/wp-content/uploads/2016/01/GatekeeperExposed.pdf
Ostiarius
https://objective-see.com/products/ostiarius.html

Mac - Application control - System Integrity Protection
El Capitan’s System Integrity Protection will shift utilities’ functions
http://www.macworld.com/article/2948140/os-x/private-i-el-capitans-system-integrity-protection-will-shift-utilities-functions.html
What’s New in OS X El Capitan v10.11
https://developer.apple.com/library/content/releasenotes/MacOSX/WhatsNewInOSX/Articles/MacOSX10_11.html
About System Integrity Protection on your Mac
https://support.apple.com/en-gb/HT204899
Security and Your Apps
https://developer.apple.com/videos/play/wwdc2015/706/

Mac - Application control - Santa
How to bypass Google’s Santa LOCKDOWN mode
https://reverse.put.as/2015/04/13/how-to-bypass-googles-santa-lockdown-mode/
A binary whitelisting/blacklisting system for Mac OS X
https://github.com/google/santa

Mac - Application control - Little Flocker
Little Flocker
www.littleflocker.com/

Mac - Other Stuff!
RansomWhere?
https://objective-see.com/products/ransomwhere.html
OverSight
https://objective-see.com/products/oversight.html
FREE TOOL PROTECTS MAC USERS FROM WEBCAM SURVEILLANCE
https://threatpost.com/free-tool-protects-mac-users-from-webcam-surveillance/121154/
Dylib Hijack Scanner
https://objective-see.com/products/dhs.html

The New Normal For End-Point-Protection Technology
X by Invincea
www.invincea.com/
Bromium
https://www.bromium.com/
BUFFERZONE
http://bufferzonesecurity.com/
Deep Freeze
http://www.faronics.com/en-uk/products/deep-freeze/standard/
illusive
https://www.illusivenetworks.com/
Javelin
http://javelin-networks.com/
Attivo Networks
https://attivonetworks.com/
Canary

Protect
https://www.cylance.com/
Deep Instinct
http://www.deepinstinct.com/

Cylance
Magic Quadrant for Endpoint Protection Platform
https://www.inisi.com/documents/magic-quadrant-for-endpoint-protection-platforms.pdf
Magic Quadrant review of changes in 2017​
https://solutionsreview.com/endpoint-security/gartner-2017-epp-magic-quadrant/