Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

TDi Technologies
Free

TDi Technologies View TDi Technologies

TDI Technologies' ConsoleWorks is a unified IT/OT cybersecurity and operations platform designed for privileged access users. It empowers organizations with comprehensive oversight and streamlined workflows for security, operations, compliance, and automation. ConsoleWorks ensures a persistent security perimeter, meticulously monitoring, auditing, and logging all user and endpoint device interactions down to the keystroke to enforce best practices and regulatory requirements.

Unified IT/OT Cybersecurity and Operations Platform
Privileged Access Management
End-to-end Session Monitoring, Auditing, and Logging
Tehtris
Free

Tehtris View Tehtris

The TEHTRIS XDR Platform is a cutting-edge, modular solution engineered to fortify the IT security posture of both private and public organizations against sophisticated cyber threats, including espionage and sabotage. Designed for effortless deployment and high adaptability, the platform offers flexible SIEM and EDR capabilities, deployable on-premise or in the cloud to align with unique security objectives. Its SaaS model empowers organizations to selectively integrate and scale security components, ensuring robust protection tailored to evolving risk landscapes.

Comprehensive Extended Detection and Response (XDR)
Modular and Scalable Security Architecture
On-Premise and Cloud Deployment Options
Telelogos
Free

Telelogos View Telelogos

Telelogos is a leading European provider specializing in comprehensive Enterprise Mobility Management (EMM), Digital Signage, and Data Transfer & Synchronization solutions. Their flagship MediaContact software empowers organizations to efficiently manage and secure both remote fixed and mobile devices, offering a turnkey solution that streamlines administrative tasks and enhances device security. By centralizing control and protection, Telelogos enables businesses to optimize their operations and safeguard their digital assets.

Enterprise Mobility Management (EMM)
Digital Signage Solutions
Data Transfer and Synchronization
Temasoft
Free

Temasoft View Temasoft

Temasoft is a dedicated software company specializing in advanced security and infrastructure solutions. Their product suite, including Ranstop for robust anti-ransomware protection and FileMonitor for real-time file activity surveillance, is engineered to proactively defend organizations against ransomware, data breaches, and unauthorized data usage. Temasoft empowers businesses to fortify their digital defenses and maintain operational integrity.

Advanced anti-ransomware protection with TEMASOFT Ranstop
Real-time file monitoring and auditing with TEMASOFT FileMonitor
Proactive defense against cyber threats and data leakage
Teramind
Free

Teramind View Teramind

Teramind offers a user-centric security platform designed to proactively monitor employee behavior and bolster your organization's defenses. By intelligently collecting and analyzing user data, Teramind swiftly identifies suspicious activities, detects potential threats, and ensures regulatory compliance. Its real-time alerts, warnings, redirects, and automated lock-outs empower businesses to maintain optimal efficiency and security, minimizing risks and operational disruptions.

Real-time activity monitoring
Suspicious activity detection
Employee efficiency analysis
th4ts3cur1ty.company
Free

th4ts3cur1ty.company View th4ts3cur1ty.company

th4ts3cur1ty.company excels in intelligence-led adversary emulation and purple teaming, empowering organizations to proactively defend against sophisticated threats. We specialize in building bespoke Security Operations Centers (SOCs), demystifying security operations, and fostering confident, vendor-neutral security postures that enhance your internal defense capabilities.

Intelligence-led Adversary Emulation
Purple Teaming Engagements
Bespoke Security Operations Center (SOC) Development
ThreatDown
Free

ThreatDown View ThreatDown

ThreatDown, powered by Malwarebytes, simplifies cybersecurity for resource-constrained IT teams by delivering integrated solutions that proactively detect and eliminate advanced threats. Combining cutting-edge technology with expert services, ThreatDown offers robust, cost-effective protection across the entire attack lifecycle, from endpoint prevention to managed detection and response. Leverage a decade of proven malware remediation expertise to fortify your security posture and empower your IT operations.

Advanced threat detection and remediation powered by Malwarebytes.
Integrated Endpoint Protection (EP) and Endpoint Detection & Response (EDR).
Managed Detection & Response (MDR) services for augmented IT teams.
ThreatHunter.ai
Free

ThreatHunter.ai View ThreatHunter.ai

ThreatHunter.ai provides advanced, real-time threat detection and mitigation services powered by our proprietary ARGOS Platform and elite human threat hunters. We go beyond traditional security measures, continuously monitoring your network for sophisticated threats that evade standard defenses, analyzing security data to eliminate false positives, and rapidly responding to incidents to minimize impact.

Real-time threat detection and monitoring
Elite human threat hunting expertise
Proprietary ARGOS threat intelligence platform
ToucanX
Free

ToucanX View ToucanX

ToucanX fundamentally redefines enterprise endpoint security by integrating near real-time virtualization directly into the operating system. Our revolutionary Bifurcated Security Operating Policy (BSoP) architecture creates an isolated, virtually inaccessible environment for sensitive and classified assets, neutralizing remote attack vectors without compromising user productivity. This innovative approach provides a comprehensive cybersecurity solution applicable across desktops, mobile devices, IoT, and cloud environments, built on the Zero Trust principle.

Embedded Near Real-Time Virtualization
Bifurcated Security Operating Policy (BSoP) Architecture
Zero Trust Principle Implementation
Trapmine
Free

Trapmine View Trapmine

Trapmine is a pioneering cybersecurity company offering a next-generation endpoint protection solution designed to proactively defend against Advanced Persistent Threats (APTs) and zero-day attacks. By focusing on blocking attack techniques rather than relying on traditional signature-based or sandboxing methods, Trapmine ensures robust protection against novel and sophisticated cyber threats. This innovative approach enhances an organization's security posture, reduces the risk of breaches, and supports business continuity by delivering advanced, signature-less defense.

Signature-less attack technique blocking
Next-generation endpoint protection
Advanced Persistent Threat (APT) defense
Trend Micro
Free

Trend Micro View Trend Micro

Trend Micro stands as a global leader in comprehensive cybersecurity, delivering innovative solutions for hybrid cloud, endpoint, and network defense. Leveraging over 25 years of security expertise, Trend Micro's offerings are designed to protect users, optimize modern data centers, and secure networks against sophisticated threats. Their advanced client-server, network, and cloud-based protection ensures faster threat detection, improved breach containment, and robust data security across all environments.

Hybrid Cloud Security
Endpoint Security
Network Security
TriagingX
Free

TriagingX View TriagingX

TriagingX is the pioneering malware sandbox solution empowering Fortune 500 companies with advanced daily malware analysis. We address the fundamental security challenge of attacker asymmetry by focusing on attack techniques and behavioral anomalies, not just signatures. Our platform significantly accelerates suspect event investigation, delivering clear insights in under 10 minutes, and is designed for minimal endpoint impact while keeping critical data within your enterprise.

First-generation malware sandbox technology
Focus on attack techniques and behavioral anomalies
Rapid investigation of suspect events (under 10 minutes)
Troye Computer Systems
Free

Troye Computer Systems View Troye Computer Systems

Troye Computer Systems delivers comprehensive digital workspace solutions designed to empower your workforce with secure, anytime, anywhere access across any device. Leveraging our status as a Citrix Platinum Plus Solution Advisor, we implement best-in-class cloud-delivered security, including advanced endpoint protection and threat intelligence from ReSecurity, to ensure your organization achieves unparalleled agility, speed, and future-readiness without the complexity of traditional data center security.

Complete digital workspace solutions
Secure, anywhere, anytime access
Multi-device support
Tulpa AI
Free

Tulpa AI View Tulpa AI

Tulpa AI specializes in developing secure AI co-pilots engineered to augment human expertise in high-stakes, mission-critical decision-making scenarios. Our technology fosters scalable, high-performance human-machine collaboration within demanding operational environments. Proven in laboratory settings, Tulpa AI agents have demonstrated over a 300% enhancement in speed and accuracy for novice penetration testers, operating seamlessly as intelligent co-pilots.

Secure AI Co-pilot Development
Enhances Human Performance in High-Stakes Environments
Facilitates Scalable Human-Machine Teamwork
Tychon
Free

Tychon View Tychon

Tychon delivers an advanced enterprise endpoint management platform designed to unify security and IT operations, providing near real-time endpoint visibility and control. Developed by former U.S. Department of Defense cybersecurity experts, Tychon empowers commercial and government organizations to break down silos, leverage a single data set, and instantly access critical information for rapid threat identification and remediation at unprecedented scale and performance.

Unified Endpoint Visibility and Control
Near Real-Time Threat Detection
Consolidated Data Set and Console
Uptycs
Free

Uptycs View Uptycs

Uptycs empowers organizations with a unified platform for comprehensive fleet visibility, intrusion detection, vulnerability management, and compliance. By integrating the open-source osquery agent with a powerful security analytics engine, Uptycs provides real-time insights across Linux, macOS, Windows, containers, and cloud environments. Leverage the power of SQL to transform raw endpoint telemetry into actionable dashboards, reports, and alerts, enabling continuous and proactive security posture improvement for teams of any size.

Unified fleet visibility across diverse endpoints
Real-time intrusion detection and threat hunting
Proactive vulnerability and compliance management
US Fleet Cyber Command (FLTCYBER)
Free

US Fleet Cyber Command (FLTCYBER) View US Fleet Cyber Command (FLTCYBER)

U.S. Fleet Cyber Command (FLTCYBER) operates as the U.S. Navy's Echelon II command directed by the Chief of Naval Operations, leading critical information network operations, offensive and defensive cyberspace operations, space operations, and signals intelligence. As the Navy's component command to U.S. Cyber Command and its space component to U.S. Strategic Command, FLTCYBER is integral to national cyber defense and intelligence. The command executes its mission through U.S. TENTH Fleet, its operational arm, ensuring robust maritime cyber and space superiority.

Navy Information Network Operations
Offensive Cyberspace Operations
Defensive Cyberspace Operations
US Marine Corps Forces Cyberspace Command (MARFORCYBER)
Free

US Marine Corps Forces Cyberspace Command (MARFORCYBER) View US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) executes full-spectrum military cyberspace operations, ensuring freedom of action and denying adversaries within the cyber domain. This includes comprehensive operation and defense of the Marine Corps Enterprise Network (MCEN) and conducting both defensive and, when directed, offensive cyberspace operations in support of joint and coalition forces. MARFORCYBER enables operational success across all warfighting domains by safeguarding vital networks and projecting cyber power.

Full-spectrum cyberspace operations
Operation and Defense of MCEN
Defensive Cyberspace Operations (DCO)
Vali Cyber
Free

Vali Cyber View Vali Cyber

Vali Cyber, founded in 2020, is a cybersecurity innovator specializing in Linux environments. Leveraging DARPA-funded research from MIT and CMU, our flagship product, ZeroLock, offers comprehensive system lockdown and superior threat detection with minimal resource consumption. We empower organizations by automating critical security tasks, employing advanced AI/ML for proactive threat identification and response, and streamlining attack recovery to ensure business continuity.

Comprehensive Linux System Lockdown
Advanced AI/ML Threat Detection
Behavioral Anomaly Detection
Velstadt Cybersecurity
Free

Velstadt Cybersecurity View Velstadt Cybersecurity

Velstadt Cybersecurity provides robust digital asset protection for businesses and organizations through advanced solutions and innovative strategies. Our seasoned experts excel at identifying vulnerabilities, analyzing threats, and implementing comprehensive security frameworks to ensure unparalleled protection. We empower your security teams by integrating cutting-edge platforms like Tines for task automation and Resecurity for unified endpoint protection and threat intelligence, thereby enhancing operational efficiency and minimizing risk.

Advanced Cybersecurity Solutions
Vulnerability Identification & Analysis
Threat Assessment & Mitigation Strategies
Verastel
Free

Verastel View Verastel

Verastel, an Eficens company, is a leader in proactive cyber-defense and adaptive resilience, significantly enhancing enterprise digital security. Their flagship solutions, SPARK and SNoOps, are designed to fortify defenses against configuration errors, reduce breach risks, and provide real-time threat interception and mitigation.

SPARK: Security Profiling, Assessment & Remediation Kit for configuration error reduction
SNoOps: Dynamic threat diffusing system for real-time threat combat
Proactive cyber-defense against emerging threats
Veriato
Free

Veriato View Veriato

Veriato delivers advanced User Behavior Analytics and User Activity Monitoring solutions, empowering organizations to gain unparalleled visibility into network activity. By understanding employee actions and identifying potential risks, Veriato helps enhance security posture, boost productivity, and mitigate insider threats. Trusted by over 36,000 global entities, Veriato's award-winning tools provide actionable insights for informed decision-making and a more secure digital environment.

Actionable User Behavior Analytics
Comprehensive User Activity Monitoring
Insider Threat Detection and Prevention
Veridify Security
Free

Veridify Security View Veridify Security

Veridify Security is a cutting-edge cybersecurity provider offering a comprehensive and unified platform designed to bolster your organization's resilience against evolving cyber threats. We empower security professionals with advanced capabilities for endpoint protection, proactive risk management, and actionable cyber threat intelligence, ensuring immediate improvements in security posture and demonstrable ROI. Our adaptive network access security solutions are built for the complexities of modern businesses, delivering robust protection from a globally trusted cybersecurity brand to safeguard your digital assets.

Unified Platform for Cybersecurity
Advanced Endpoint Protection
Proactive Risk Management
ViroSafe
Free

ViroSafe View ViroSafe

As Norway's leading value-added distributor of IT security solutions, ViroSafe empowers organizations with expert-driven services and market-leading, user-friendly technologies. Our team of seasoned data security professionals offers comprehensive support, from initial implementation to ongoing services, ensuring your IT environment is robustly protected and optimized for cost-benefit value. We provide holistic security strategies encompassing security testing, risk analysis, training, endpoint security, and backup solutions, designed to safeguard your operations and your customers.

Value-added distribution of IT security solutions
Expert consultation in data security
User-friendly and market-leading security products