OpenText Core Endpoint Protection Logo

OpenText Core Endpoint Protection

Cloud-based endpoint protection using ML and threat intel for malware defense

Visit website
Claim and verify your listing
0

OpenText Core Endpoint Protection Description

OpenText Core Endpoint Protection is a cloud-based endpoint security solution that uses machine learning and threat intelligence to protect against malware, ransomware, phishing, and zero-day threats. The product operates through a lightweight agent that can be deployed across endpoints including desktops, laptops, servers, and mobile devices. The solution provides real-time threat detection using behavioral analysis and AI-driven intelligence from OpenText Threat Intelligence. It includes automated policy management and pre-built policy templates to support regulatory compliance and cyber insurance requirements. The platform offers device isolation and process visualization capabilities as part of its EDR features. Management is performed through a cloud-based console that allows administrators to deploy, monitor, and manage protection remotely from any location. The console integrates with over 40 third-party tools including RMM and automation platforms. Deployment options include executable installation files, MSI deployment, and Windows Group Policy Object (GPO). The product is designed for organizations of varying sizes and does not require dedicated IT security expertise to operate. Protection updates are delivered automatically through the cloud-based architecture without requiring manual intervention. The agent is designed to minimize system performance impact while maintaining continuous protection.

OpenText Core Endpoint Protection FAQ

Common questions about OpenText Core Endpoint Protection including features, pricing, alternatives, and user reviews.

OpenText Core Endpoint Protection is Cloud-based endpoint protection using ML and threat intel for malware defense developed by OpenText. It is a Endpoint Security solution designed to help security teams with Behavioral Analysis, Cloud Security, Compliance.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox