65 results
Why Capterra is free
Image not available
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from... Learn more about Malwarebytes Endpoint Protection

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Image not available
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced... Learn more about Inky

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console....

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Complete managed security service and XDR platform to predict, prevent, detect, and respond to threats across your entire business.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you have to prevent, detect, and respond to active threats and even predict future attacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You need to run fast and lean but cannot afford to risk gaps in cybersecurity.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Automatic, insightful, all-in-one endpoint security from the trusted leader.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), & a 24/7 managed hunting service all delivered via a single lightweight agent. Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics to ensure nothing is missed and to stop breaches.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
GorillaStack helps to automate real-time security remediation, managing backup lifecycles, and optimize cloud bills.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
SOC Prime TDM is a SaaS community delivering threat detection content that can be used across various SIEM formats and EDR solutions.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their SIEM, EDR, NSM and SOAR tools in use. TDM aggregates over 65,000 SIEM & EDR rules, parsers and search queries, and other content mapped directly to the MITRE ATT&CK® framework and compatible with your EDR solution in use, including Microsoft Defender ATP, Carbon Black, CrowdStrike, and Qualys.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
For on-premises, SaaS, and cloud-native data, Metallic gives you the best choice for your hybrid cloud data protection journey.
Metallic, from Commvault, offers award-winning data protection without the complexity. Built on Microsoft Azure, Metallic offers broad-ranging coverage across apps, endpoints, on-premise, and cloud environments - proven to safeguard critical business data from deletion, corruption, and attack. Stay secure, stay compliant, stay recoverable with Metallic backup and recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. Built on Microsoft Azure, Metallic offers broad-ranging coverage across apps, endpoints, on-premise, and cloud...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
All-in-one unified threat management platform that aims to simplify cybersecurity and reduce its cost.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Management (SIEM), Vulnerability Management, Access Rights Auditor, Incident Response, HIPS/NIPS, Endpoint Protection, and Dark Web Monitoring. You can monitor almost any cloud environment or SaaS application with ready to use Integrations. UTMStack is currently integrated with Azure, AWS, etc.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Defend

Defend

(0 reviews)
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Ziften

Ziften

(0 reviews)
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection,...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Frontline.Cloud platform provides organizations with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS).
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Anomali

Anomali

(0 reviews)
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Cyberbit

Cyberbit

(0 reviews)
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Tachyon

Tachyon

(0 reviews)
Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
zIPS

zIPS

(0 reviews)
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors. It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices. KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Prevent misaddressed emails.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and...

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring
Capsule8

Capsule8

(0 reviews)
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.

Features

  • Anomaly/Malware Detection
  • Remediation Management
  • Prioritization
  • Whitelisting/Blacklisting
  • Continuous Monitoring

Endpoint Detection and Response Software Buyers Guide

What is endpoint detection and response (EDR) software?

Endpoint detection and response (EDR) software helps organizations continuously monitor, investigate, and respond to active threats that target network endpoints.

An effective EDR system should include the following capabilities:

  • Incident data search and investigation
  • Alert triage or suspicious activity validation
  • Suspicious activity detection
  • Threat hunting or data exploration
  • Stopping malicious activity

EDR software is closely related to endpoint protection software , cybersecurity software , network security software , and vulnerability management software .

The benefits of EDR software

Network breaches are becoming more prevalent and most of the breaches are initiated via endpoints such as desktops, mobile devices, or servers. A well-implemented EDR strategy offers tremendous benefits, such as: 

  • Real-time protection against new threats: AV-Test, an IT security company, registers over 350,000 new malware and potentially unwanted applications every day. EDR software collects endpoint data that offer granular visibility around patterns, behavior, and other clues to identify and highlight potentially harmful applications and new malware in real time. Availability of real-time information can help IT teams safeguard networks from both existing and new threats.
  • Proactive cyber defense using data analytics: EDR solutions are not just restricted to securing endpoints and networks—they also help in investigating threats. EDR solutions continuously monitor online and offline endpoints, and collect data on historical events that can be used to map out guidelines to prevent future incidents. These solutions also provide intelligent feeds to IT security teams that can help them avoid critical damage before it’s too late.

Typical features of EDR software

  • Alerts/notifications: Send alerts and notify critical stakeholders whenever the solution discovers a threat or anomaly in the network.
  • Anomaly/malware detection: Scan and detect potentially dangerous and harmful software that can disrupt or damage an endpoint or gain unauthorized access to a network.
  • Reporting/analytics: View and track metrics related to network security. 
  • Remediation management: Identify and implement steps to restore systems to optimal conditions.
  • Behavioral analytics: Continuously track the behavior of the systems connected to a network to check for anomalies.
  • Continuous monitoring: Continuously assess and monitor system health and application usage.

Considerations when purchasing endpoint detection and response software

  • Basic vs. high-end EDR solution: EDR software typically begins by collecting, storing, and analyzing large amounts of data which it uses to offer security insights to IT teams. Basic solutions may simply collect data and present the information on the screen; the decision to quarantine or delete infected files depends on the in-house security experts. Advanced solutions, on the other hand, may analyze the scan results and then self-clean the system. 
  • Cloud vs. on-premise: Cloud deployment of the software offers benefits such as a lower upfront cost, faster service delivery, and remote management. But it stores your data on third-party servers, which limits your control over your data. If you’re willing to share your business and security data with a third-party service provider, opt for cloud-based option; otherwise, go with on-premise deployment.
  • EDR market to grow: The EDR market is expected to grow at almost 50% annually through 2020 , and most large enterprises will have EDR capabilities by 2025.The growth will be driven by the fact that current EDR implementation spans only 40 million endpoints; there are over 711 million desktops, laptops and other devices that can still utilize this software. 
  • EPP and EDR to consolidate: Endpoint protection platforms (EPP) will consolidate with EDR in the near future, triggered by businesses no longer solely relying on protection solutions; they need more advanced solutions that can detect and respond to live threats while constantly protecting the networks. Approximately 40% of EDR deployments are using both EDR and EPP from the same vendor. Going forward, vendors will bundle their EPP and EDR offerings into one consolidated application.
  • Machine learning and AI : EDR applications collect huge amount of data every minute. It’s not possible for humans to manage and analyze such volume of data. That's why vendors are now adding AI capabilities to their solutions to speed up the scanning process and proactively detect threats. Machine learning helps identify new practices of attacks and update the application based on ever-changing user and endpoint behavior.