Endpoint Detection & Response (EDR) software

Gebruik Capterra in Nederland om de beste Endpoint Detection & Response (EDR) software voor je bedrijf te vinden.

Waarom Capterra gratis is
Netsurion stelt organisaties in staat om met succes cyberbeveiligingsbedreigingen te voorspellen, te voorkomen, te detecteren en erop te reageren. Dit SIEM-platform, EventTracker, combineert machine learning, gedragsanalyses en beveiligingsorganisatie met erkenning gedurende 11 opeenvolgende jaren op de Gartner MQ voor SIEM. De beheerde beveiligingsservice, EventTracker SIEMphonic, levert een Co-Managed SIEM-service die wordt aangestuurd door de 24/7 SOC. EventTracker EDR beschermt daarnaast kritieke eindpunten tegen zero-day-aanvallen en muterende malware. Meer informatie over EventTracker Door SIEM, EDR en een 24/7 SOC te combineren, levert dit platform snel en efficiënt zowel geavanceerde bescherming tegen bedreigingen als beveiligingsorganisatie. Meer informatie over EventTracker
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebruik van meerlagige technologieën die de vaardigheden van standaard antivirusprogramma's ruimschoots overtreffen. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization. Automatic, insightful, all-in-one endpoint security from the trusted leader.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.

door CrowdStrike

(3 beoordelingen)
Profiel bekijken
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.

door Great Bay Software

(1 review)
Profiel bekijken
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

door Kaspersky Lab

(1 review)
Profiel bekijken
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

door Plurilock Security Solutions

(0 beoordelingen)
Profiel bekijken
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.

door Hypori

(0 beoordelingen)
Profiel bekijken
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

door Anakage

(0 beoordelingen)
Profiel bekijken
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.

door Ziften Technologies

(0 beoordelingen)
Profiel bekijken
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

door DigitalDefense

(0 beoordelingen)
Profiel bekijken
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

door IntSights

(0 beoordelingen)
Profiel bekijken
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

door Palo Alto Networks

(0 beoordelingen)
Profiel bekijken
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

door Cyberbit

(0 beoordelingen)
Profiel bekijken
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

door Cybereason

(0 beoordelingen)
Profiel bekijken
Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities. Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities.

door Tanium

(0 beoordelingen)
Profiel bekijken
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

door Symantec

(0 beoordelingen)
Profiel bekijken
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

door Fidelis Cybersecurity

(0 beoordelingen)
Profiel bekijken
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.