Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

Salvador Technologies
Free

Salvador Technologies View Salvador Technologies

Salvador Technologies delivers unparalleled cyber-attack recovery speed with its patent-pending storage technology designed to shield your data from advanced threats and APTs. Our integrated software ensures continuous operation of critical business functions post-attack through maximum automation and minimal IT intervention, enabling swift restoration with a single restart. DigitalStakeout further enhances organizational security posture by offering proactive solutions that reduce cyber risk and deliver immediate ROI, while The PC Support Group complements these offerings with comprehensive IT, telecoms, and cybersecurity services for improved productivity and cost reduction.

World's fastest cyber-attack recovery technology
Patent-pending data protection storage device
Protection against malicious attacks and APTs
Samsung Knox
Free

Samsung Knox View Samsung Knox

Samsung Knox is a comprehensive, defence-grade mobile security solution designed to protect your business's smartphones and tablets. Integrated deeply into both hardware and software, it offers multi-layered protection through continuous real-time monitoring and validation. This robust security framework ensures device integrity and prevents unauthorized access to sensitive business data, empowering your workforce in today's dynamic mobile environment.

Hardware-backed security integrated from the chip level
Multi-layered, real-time threat detection and prevention
Continuous device integrity verification
Sandfly Security
Free

Sandfly Security View Sandfly Security

Sandfly Security offers a premier, agentless Linux security solution designed for unparalleled performance, stability, and compatibility across all your systems. Our dedicated focus on securing Linux environments ensures comprehensive protection against a wide array of threats without impacting system performance or requiring downtime. Sandfly empowers organizations with advanced capabilities including credential monitoring, weak password auditing, drift detection, and customizable modules for proactive threat hunting, all delivered with industry-leading safety and efficacy.

Agentless Endpoint Security for Linux
High Performance and Stability
Comprehensive Threat Detection
Saudi Information Technology Company (SITE)
Free

Saudi Information Technology Company (SITE) View Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE) is a pioneering enterprise dedicated to modernizing Saudi Arabia's digital landscape. We deliver exceptional services across cybersecurity, sophisticated software development, and advanced big data analytics, empowering organizations with robust digital infrastructure and capabilities. Our commitment extends to safeguarding client assets through world-class cybersecurity resilience and proactive, active defense strategies.

Managed Cybersecurity Services
Threat Intelligence and Active Defense
Cybersecurity Engineering and Resilience
Scalarr
Free

Scalarr View Scalarr

Scalarr is a cutting-edge cybersecurity firm leveraging advanced automation and AI to deliver robust threat detection and prevention solutions. Our Protection Suite empowers app developers and marketers with ML-driven fraud detection for ad campaigns, analyzing data from clicks through post-install analytics. Furthermore, AI EdgeLabs provides autonomous, immediate AI-powered defense for Edge and IoT infrastructures, proactively identifying and remediating diverse threats like malware, ransomware, DDoS, and botnets.

Next-generation AI and automation for threat detection
Machine Learning-based fraud detection for ad campaigns
End-to-end ad campaign analytics (click to post-install)
SCIS Security
Free

SCIS Security View SCIS Security

SCIS Security delivers comprehensive and affordable cybersecurity solutions tailored for small to medium-sized businesses and individual homes. We utilize advanced detection, correlation, AI, and machine learning capabilities from leading technology partners to protect against a wide spectrum of cyber and physical threats. Our flexible, modular approach allows clients to customize their security posture, integrating strategic programs, endpoint protection, network security, and video analytics for robust, end-to-end defense.

Affordable cybersecurity solutions
Advanced AI and machine learning detection
Modular and customizable defense options
SentinelOne
Free

SentinelOne View SentinelOne

SentinelOne delivers autonomous security across endpoint, datacenter, and cloud environments, unifying prevention, detection, response, remediation, and forensics into a single, AI-powered platform. This comprehensive solution empowers organizations to rapidly detect and eliminate threats with automated response capabilities, adapting defenses against sophisticated cyberattacks. SentinelLabs further strengthens collective security by providing a dedicated venue for threat intelligence sharing and research insights.

Autonomous Endpoint Security
Cloud and Datacenter Protection
AI-Powered Threat Detection
Sequretek
Free

Sequretek View Sequretek

Sequretek is dedicated to simplifying enterprise security through innovative solutions that address the complexities of modern IT environments. We deliver streamlined, secure, and manageable security technologies for endpoints, end-users, and overall organizational posture. Our on-premise and SaaS offerings are designed to close security gaps and protect against evolving threats, ensuring robust protection for businesses.

Endpoint security solutions
End-user security management
Comprehensive organizational security
Shepherd
Free

Shepherd View Shepherd

Shepherd provides IT teams with intuitive, scalable, and robust solutions designed to simplify complex endpoint management. By empowering full control over devices, applications, and data, Shepherd enhances security against evolving threats and ensures data integrity and compliance for modern work environments. Its adaptive network access security capabilities, from Nord Security, are built to protect your organization.

Intuitive Endpoint Management
Scalable IT Solutions
Robust Security Features
SimSpace
Free

SimSpace View SimSpace

SimSpace is the leading platform for rigorously testing your organization's security posture against realistic, sustained cyberattacks. By simulating adversary tactics, techniques, and procedures (TTPs) in a live-fire environment, SimSpace bridges the critical gap between theoretical security promises and actual operational resilience. Move beyond guesswork and achieve true preparedness with continuous, actionable insights derived from a defense-proven approach.

Realistic attack simulation across diverse TTPs
Continuous security posture assessment
Live-fire, hands-on cyber range environments
SIXGEN
Free

SIXGEN View SIXGEN

SIXGEN is a leading cybersecurity innovator, delivering comprehensive incident response, operational and penetration testing, and red teaming services. We specialize in identifying critical network vulnerabilities through on-site and remote assessments, alongside developing cutting-edge hardware and software solutions for Endpoint Detection and Response, Red Team operations, Data Science, and Threat Intelligence. Our commitment to excellence enhances the cybersecurity posture of organizations worldwide.

Incident Response & Forensics
Penetration Testing & Red Teaming
Custom Tool Development (Hardware & Software)
SiyanoAV
Free

SiyanoAV View SiyanoAV

SiyanoAV is at the forefront of cyber defense, engineered to safeguard your digital environment against the dynamic landscape of modern cyber threats. Our advanced endpoint security solutions provide robust, multi-layered protection against malware, ransomware, phishing, and evolving risks, ensuring comprehensive digital life security. We are committed to continuous innovation, delivering intuitive and powerful antivirus technology that empowers users with unparalleled peace of mind.

Comprehensive multi-layered malware protection
Advanced ransomware defense
Real-time phishing attack prevention
SOOHO
Free

SOOHO View SOOHO

SOOHO empowers businesses with comprehensive IT, cybersecurity, and telecommunications solutions designed to enhance productivity and reduce operational costs. By integrating cutting-edge endpoint management and security platforms with robust network application protection, SOOHO ensures seamless, secure, and high-performing technology operations across all devices and locations.

Comprehensive IT and Cybersecurity Services
Enhanced Business Productivity
Reduced Operational Costs
Sophos
Free

Sophos View Sophos

Sophos delivers comprehensive, cloud-native cybersecurity solutions designed to protect organizations of all sizes across the globe from evolving cyberthreats. Leveraging advanced AI and the intelligence of SophosLabs, our adaptive security platform secures endpoints, networks, web and email traffic, and mobile devices, offering unparalleled protection against emerging cybercriminal tactics. We specialize in simplifying complex security challenges, providing tailored products that ensure robust defense and compliance for every facet of your digital infrastructure.

Next-generation endpoint protection
Cloud-native and AI-enhanced security
Comprehensive network defense
SOTI
Free

SOTI View SOTI

SOTI stands as an industry leader in Enterprise Mobility Management (EMM), simplifying the comprehensive management of mobile devices, applications, content, and security. Regardless of device make, model, or operating system, SOTI EMM seamlessly supports both Bring Your Own Device (BYOD) and corporate-liable environments, empowering over 17,000 businesses in 170 countries to unlock the full potential of mobility. Elevate your enterprise mobility strategy with a robust and adaptable EMM solution designed for today's dynamic business needs.

Comprehensive Device Management
Application Deployment and Control
Content Management and Distribution
SparkCognition
Free

SparkCognition View SparkCognition

SparkCognition delivers transformative AI-driven solutions across critical industries including energy, manufacturing, finance, and defense. By converting complex data into actionable intelligence, we empower organizations to predict outcomes, enhance cybersecurity, and proactively prevent equipment failures. Our patented AI technology provides prescriptive insights for asset maintenance and offers advanced endpoint protection with DeepArmor, while ZenGRC streamlines compliance management.

AI-driven predictive analytics for forecasting
Advanced cybersecurity threat detection and prevention
Proactive industrial equipment failure identification
Spyderbat
Free

Spyderbat View Spyderbat

Spyderbat is a groundbreaking Attack Tracing and Intercept (ATI) platform designed to bridge the critical gap between threat detection and response. By instantly mapping causally connected threat activity, Spyderbat empowers security analysts to immediately distinguish true positives from false ones, understand the complete attack lifecycle, and uncover sophisticated evasions. Built on a scalable, cloud-native SaaS architecture, Spyderbat creates an 'Operations Plane' by fusing third-party security alerts with ground truth data, enabling real-time attack illumination and tracing across systems and over extended timelines.

Attack Tracing and Interception (ATI)
Causal threat activity mapping
Automated investigation context
Sternum
Free

Sternum View Sternum

Sternum delivers comprehensive and intelligent endpoint security specifically designed for the unique challenges of IoT devices. By embedding robust, real-time protection directly into embedded systems, Sternum proactively identifies and neutralizes attack vectors across both known and novel threats. This holistic, scalable solution ensures the integrity and resilience of your entire IoT ecosystem.

Real-time threat prevention and detection
Seamless embedding into embedded devices
Holistic, scalable endpoint security architecture
STM
Free

STM View STM

STM is a distinguished provider of comprehensive system engineering, technical support, project management, technology transfer, and logistics services, primarily serving the Turkish Armed Forces. As a leading solution provider in integrated cyber security and defense, STM excels in R&D and solution development within the cyber domain, offering end-to-end capabilities from R&D project design to operational support. With a strategic vision to become a globally recognized Centre of Excellence in cyber, STM empowers organizations with advanced security automation and operational efficiency.

Integrated Cyber Security and Defense Solutions
System Engineering and Design
Technical Support and Operational Readiness
SubCom
Free

SubCom View SubCom

SubCom transforms endpoint security by empowering organizations to proactively identify and mitigate vulnerabilities before they are exploited. Our AI-driven platform provides a continuous Trust Score for each endpoint, enabling real-time assessment of security posture and automated implementation of hardening recommendations. Unlike traditional, resource-intensive solutions, SubCom delivers high-performance, adaptive defense with minimal manual intervention, ensuring your devices and data remain protected.

Real-time Endpoint Trust Score assessment
AI-driven vulnerability detection and prioritization
Automated security hardening recommendations
Swif.ai
Free

Swif.ai View Swif.ai

Swif.ai is the leading real-time platform for multi-OS endpoint compliance and security, ensuring Macs, Windows, and Linux devices remain perpetually secure and audit-ready. Its lightweight agent proactively enforces critical policies like encryption and patching while automatically remediating configuration drift and delivering essential audit evidence to leading GRC tools such as Vanta and Drata. Swif.ai moves beyond mere reporting by providing true enforcement and granular Shadow IT/AI governance to detect and block unauthorized SaaS and LLM usage, reducing tool sprawl and operational burden for enterprises.

Real-time multi-OS endpoint compliance and security
Lightweight agent with proactive policy enforcement
Automated drift remediation and audit evidence streaming
Syxsense
Free

Syxsense View Syxsense

Syxsense unifies IT and security operations, delivering a single console for comprehensive endpoint management, advanced patch management, vulnerability scanning, and Endpoint Detection and Response (EDR). Its AI-powered platform provides unparalleled visibility across all endpoints, on-premises and in the cloud, proactively identifying and neutralizing threats before they impact your organization. Empower your teams with intelligent automation and unified control for streamlined operations and robust security.

Integrated Patch Management and Vulnerability Scanning
Endpoint Detection and Response (EDR)
AI-Powered Threat Prediction and Prevention
Tanium
Free

Tanium View Tanium

Tanium delivers Autonomous Endpoint Management (AEM) via its industry-leading real-time platform enhanced by AI. This comprehensive solution intelligently manages endpoints globally, providing critical capabilities for asset discovery, vulnerability management, incident response, compliance, and digital employee experience. Trusted by 40% of the Fortune 100 and supporting over 34 million endpoints, Tanium empowers organizations to achieve superior operational efficiency and a robust security posture.

Autonomous Endpoint Management (AEM)
Real-Time Endpoint Visibility and Control
AI-Powered Operations
Tapestry Technologies
Free

Tapestry Technologies View Tapestry Technologies

Tapestry Technologies, now part of ManTech, empowers the Department of Defense with advanced cybersecurity and IT solutions tailored to evolving threats. We integrate cutting-edge innovations across cyber defense, engineering, training, and IT operations to deliver efficient, secure, and compliant outcomes for federal requirements. Our dedicated agile workforce and dedicated Cyber Defense Lab drive research and development to solve complex challenges and ensure mission readiness.

DoD Cybersecurity Support
Innovative Solutions Development
Agile Workforce Responsiveness