Loading...
Browse 87 edr tools
Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices
Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices
Managed detection and response platform with EDR, email, network, and cloud security
Managed detection and response platform with EDR, email, network, and cloud security
AI-powered cloud security alert investigation and remediation platform
AI-powered cloud security alert investigation and remediation platform
AI-driven endpoint security platform with EDR, NGAV, and autonomous response
AI-driven endpoint security platform with EDR, NGAV, and autonomous response
24x7 MDR service providing threat detection, response, and hunting capabilities
24x7 MDR service providing threat detection, response, and hunting capabilities
Managed EDR with 24/7 SOC for Windows, macOS, and Linux endpoints
Managed EDR with 24/7 SOC for Windows, macOS, and Linux endpoints
Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC
Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC
Managed XDR service with 24/7 SOC, threat detection, and response capabilities
Managed XDR service with 24/7 SOC, threat detection, and response capabilities
XDR platform with endpoint protection, detection, and automated response
XDR platform with endpoint protection, detection, and automated response
Threat intelligence platform with automated detection logic deployment
Threat intelligence platform with automated detection logic deployment
24x7 SOC-as-a-Service with human-led investigation and automated monitoring
24x7 SOC-as-a-Service with human-led investigation and automated monitoring
Automated attack simulation platform for continuous penetration testing
Automated attack simulation platform for continuous penetration testing
AI-driven endpoint security combining NGAV and EDR capabilities via XDR
AI-driven endpoint security combining NGAV and EDR capabilities via XDR
Managed EDR deployment, policy management, and maintenance service
Managed EDR deployment, policy management, and maintenance service
Managed EDR/XDR service with 24/7 SOC monitoring and threat response
Managed EDR/XDR service with 24/7 SOC monitoring and threat response
Attack surface management platform for asset discovery and vulnerability mgmt
Attack surface management platform for asset discovery and vulnerability mgmt
Behavioral ransomware detection engine with automated blocking capabilities
Behavioral ransomware detection engine with automated blocking capabilities
EDR platform with EPP capabilities for endpoint threat detection and response
EDR platform with EPP capabilities for endpoint threat detection and response
Unified endpoint protection platform with EPP, EDR, and ESPM capabilities
Unified endpoint protection platform with EPP, EDR, and ESPM capabilities
EDR solution with in-memory detection and machine learning capabilities
EDR solution with in-memory detection and machine learning capabilities
XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection
XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection
EDR solution with automated threat detection, remediation, and integrated NGAV
EDR solution with automated threat detection, remediation, and integrated NGAV
Mobile EDR for iOS and Android devices with threat detection and response
Mobile EDR for iOS and Android devices with threat detection and response
Unified cybersecurity platform with multiple security modules and single agent
Unified cybersecurity platform with multiple security modules and single agent
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.