Endpoint Detection and Response

Endpoint Detection and Response (EDR) solutions for real-time endpoint monitoring, threat detection, incident investigation, and automated response on endpoints.

Explore 32 curated cybersecurity tools, with 14,802+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

SpyShelter Logo

A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.

0
Knockknock Logo

A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.

0
Microsoft Defender for Endpoint Logo

Microsoft Defender for Endpoint is a comprehensive endpoint security solution that provides industry-leading, multi-platform detection and response capabilities.

0
ThreatDown EDR Logo

Powerfully simple endpoint security solution that takes down threats without interrupting business.

0
usbdeath Logo

A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.

0
MIDAS Logo

MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.

0
Osquery Logo

Open-source tool for monitoring macOS hosts with detailed system activity insights.

0
Emsisoft Enterprise Security + EDR Logo

Emsisoft Enterprise Security + EDR provides robust and proven endpoint security for organizations of all sizes with layered protection and a cloud-based management console.

0
FortiEDR Logo

FortiEDR is an automated endpoint security solution that integrates with the Fortinet Security Fabric and third-party solutions to reduce MTTR and provide real-time breach detection and response.

-1
Zentral Logo

An Event Hub to gather, process, and monitor system events and link them to an inventory.

0
Cloud Academy Logo

Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.

0
Bitdefender GravityZone Logo

GravityZone is a unified endpoint security and analytics platform that provides risk assessment, threat prevention, and incident response capabilities.

0
Tracee eBPF Runtime Security Logo

Cutting-edge technology for developing security applications within the Linux kernel.

0
Tracee Logo

Tracee is a runtime security and observability tool using eBPF technology.

0
Sophos Intercept X Logo

Sophos Intercept X Endpoint is a comprehensive endpoint security solution that provides unparalleled protection against advanced attacks, ransomware, and data loss.

0
Heimdal Enterprise Logo

Heimdal Enterprise provides a unified cybersecurity platform with advanced network and endpoint security solutions, including threat hunting and privileged access management.

0
OpenEDR Logo

OpenEDR is an open-source platform enhancing cybersecurity through real-time detection and analysis of cyber threats.

0
Cisco Secure Endpoint Logo

Cisco Secure Endpoint is a cloud-native endpoint security solution that provides advanced protection and response to threats.

0
autoruns Logo

A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.

0
Zeek Agent Logo

An endpoint monitoring tool for Linux and macOS that reports file, socket, and process events to Zeek.

0
Xcitium Enterprise Platform Logo

Xcitium's unified zero-trust platform secures endpoints to cloud workloads using patented Zero Dwell technology, providing complete protection from ransomware and malware infections.

0
Trend Vision One - Endpoint Security Logo

A single cybersecurity platform that provides holistic security management, prevention, detection, and response capabilities powered by AI and threat intelligence, designed to simplify and converge security operations in diverse hybrid IT environments.

0
Doorman Logo

Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.

0
MDE-AuditCheck Logo

A script that validates Group Policy Object audit settings required for proper Microsoft Defender for Endpoint functionality.

0