- Software restriction policy (AppGuard, Simple Software Restriction Policy, AppLocker, Bouncer)
- Anti-executable (NVT ERP, Voodooshield)
- Light virtualization soft (Sandboxie, Comodo, Shadow Defender, virtual machine)
- System rollback soft (Horizon DataSys Rollback RX, Drive Vaccine RX, Reboot Restore RX)
- Backup and Image Restore soft (Macrium Reflect)
- Containment soft (ReHIPS)
- Memory Protection (AppGuard, MemProtect)
- MBR Protection (HitmanPro.Alert, Macrium Reflect, Horizon DataSys Rollback RX, Drive Vaccine RX, Reboot Restore RX, Shadow Defender)
Notice all - except for Comodo and Voodooshield - are essentially signature-less solutions; they all essentially do it Soviet style: "Trust nothing and suspect everything." Well, I guess Macrium Reflect doesn't do it like that but...
For example, Macrium Reflect is just a backup soft - it needs to know nothing about whether a file is malicious or safe. It restores damaged systems and always works in my experience.
VS uses automated file reputation lookup - as does NVT ERP if the user does the lookup manually. Plus, VS has AI. File reputation lookup is a hash-based, quasi-signature detection method. AI analyzes file attributes and returns a "probabilistic" indication of potentially malicious capabilities.
COMODO has an AV component and relies heavily upon its file reputation lookup. However, Comodo has auto-sandbox - which actually works quite well.