EDR Software (Endpoint Detection and Response)

Die Endpoint Detection and Response Software (EDR) hilft Unternehmen, ihre Netzwerke vor Schadprogrammen zu schützen, die über Endgeräte in das System eindringen können.

Warum Capterra kostenlos ist
EventTracker, ein Netsurion-Unternehmen, ermöglicht es Organisationen, Cyber-Sicherheitsbedrohungen erfolgreich vorherzusagen, zu verhindern, zu erkennen und auf sie zu reagieren. Die SIEM-Plattform von EventTracker vereint maschinelles Lernen, Verhaltensanalysen und Sicherheitsorchestrierung und wird seit zehn Jahren von Gartner im Magic Quadrant ausgezeichnet. EventTracker bietet SIEM-Lösungen für Unternehmen jeder Größe und jedes Budget. SIEMphonic baut auf der EventTracker-Plattform auf und bietet einen gemeinsam verwalteten SIEM-Service mit globalem 24/7-SOC. Erfahre mehr über EventTracker EventTracker verfügt sowohl über die Technologie als auch über das Know-how, um schnell fortschrittlichen Schutz vor Bedrohungen und Sicherheitsorchestrierung zu bieten. Erfahre mehr über EventTracker
Eliminiert alle Arten von Bedrohungen, einschließlich Viren, Malware, Ransomware, Rootkits, Würmer und Spyware, mit optionalem Cloud-basiertem Scannen für noch bessere Leistung und Erkennung. ESET verwendet mehrschichtige Technologien, die weit über die Möglichkeiten von Antivirenprogrammen hinausgehen. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion.
Endpunktschutzlösung zur Sicherung von Laptops, Dateiservern, virtuellen und physischen Desktops, Geldautomaten und POS-Endpunkten.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Endpoint-Protection-Software der nächsten Generation, die Angriffe erkennt, verhindert und auf sie reagiert. Endpoint-Protection-Software der nächsten Generation, die Angriffe erkennt, verhindert und auf sie reagiert.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

von Hypori

(0 Bewertungen)
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

von Ziften Technologies

(0 Bewertungen)
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

von DigitalDefense

(0 Bewertungen)
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

von IntSights

(0 Bewertungen)
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

von Palo Alto Networks

(0 Bewertungen)
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

von Cyberbit

(0 Bewertungen)
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

von Cybereason

(0 Bewertungen)
Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities. Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

von Symantec

(0 Bewertungen)
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

von Fidelis Cybersecurity

(0 Bewertungen)
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.