Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

Volatility Foundation
Free

Volatility Foundation View Volatility Foundation

Volatility Foundation provides the world's leading open-source memory forensics framework for comprehensive incident response and in-depth malware analysis. It empowers digital investigators with cutting-edge research translated into practical tools, making it a critical component in high-stakes investigations globally. Trusted by law enforcement, military, academia, and commercial sectors, Volatility is an indispensable asset for digital investigation.

Open-source memory forensics framework
Incident response capabilities
Malware analysis tools
VT Group (VTG)
Free

VT Group (VTG) View VT Group (VTG)

VTG empowers America's defense by delivering advanced force modernization and digital transformation solutions. We specialize in integrating C5ISR, digital engineering, AI/ML, and robust cybersecurity to ensure mission success in the modern battlespace. Our expertise spans the full spectrum of defense technology, providing purpose-built, secure capabilities that protect and advance national interests against evolving digital threats.

C5ISR Systems Engineering & Integration
Digital & Software Engineering
DevSecOps & Cloud Solutions
Vuntie
Free

Vuntie View Vuntie

Vuntie delivers unparalleled cybersecurity gadgets, fusing European craftsmanship with high-performance, open-source technology to neutralize evolving threats. Our integrated approach combines advanced hardware, intelligent software, AI, and deep human expertise to proactively predict, prevent, detect, and respond to cyber risks across critical industries. By bridging hardware and software boundaries, Vuntie offers unique insights and rapid reaction capabilities, ensuring you remain ahead in an increasingly complex digital landscape.

European Craftsmanship & High Performance
Open-Source Technology Integration
Hardware/Software Integrated Solutions
Wadilona Cyber Securities
Free

Wadilona Cyber Securities View Wadilona Cyber Securities

Wadilona Cyber Securities simplifies and secures Information and Communications Technology (ICT) for users worldwide. We empower organizations by providing robust solutions that integrate endpoint management and security, operational efficiency, and secure web browsing with innovative patented technology. Our mission is to make advanced cybersecurity accessible and effective for businesses of all sizes.

Simplified ICT Security
Advanced Endpoint Management
Integrated Security Solutions
WetStone Technologies
Free

WetStone Technologies View WetStone Technologies

WetStone Technologies empowers investigators and analysts with advanced eCrime investigation, eForensics, and incident response software. Our high-performance solutions equip users with the advanced tools and methodologies necessary to tackle complex digital investigations, from incident response and pen testing to malware analysis and digital evidence integrity, ensuring robust security and effective case resolution. We offer specialized software for a wide array of critical security operations, putting powerful capabilities directly into the hands of security professionals.

eCrime Investigation Software
eForensics Capabilities
Incident Response Tools
Whalemate
Free

Whalemate View Whalemate

Whalemate revolutionizes employee cybersecurity training in Latin America with an AI-powered SaaS platform. Leveraging neuroscience, gamification, and personalized learning, we transform your workforce into a robust defense against phishing and other digital threats. Our comprehensive solutions, including automated simulations and an accessible Cybersecurity Academy, empower organizations to strengthen their human firewall.

AI-powered Security Awareness Training
Neuroscience-based Learning Modules
Engaging Gamification Elements
White Cloud Security
Free

White Cloud Security View White Cloud Security

White Cloud Security is a cutting-edge, cloud-based Application Trust-Listing service that proactively prevents unauthorized programs and scripts from executing on your endpoints. By employing a 'Trusted Apps' approach, it delivers a superior cybersecurity posture that effectively blocks all executable and scripted malware, including ransomware, representing a fundamental shift from traditional blacklisting or whitelisting methods.

Application Trust-Listing for enhanced security
Blocks all executable and scripted malware
Effective Ransomware and Cryptolocker prevention
WiseBee
Free

WiseBee View WiseBee

WiseBee is an autonomous, AI-powered cybersecurity platform designed to act as a virtual, on-demand security team for mid-market businesses. It offers continuous, real-time threat monitoring, detection, and neutralization, enabling organizations to proactively defend against evolving cyber risks. WiseBee provides scalable, cost-effective, enterprise-grade security solutions, simplifying complex cybersecurity challenges and empowering businesses to maintain robust protection without requiring a large dedicated security workforce.

AI-Driven Threat Detection and Neutralization
Continuous Real-Time Security Monitoring
Autonomous Security Operations
WithSecure
Free

WithSecure View WithSecure

WithSecure provides outcome-based cybersecurity solutions trusted by leading organizations worldwide, including major financial institutions and technology providers. Leveraging AI-driven protection for endpoints and cloud collaboration, our expert-led intelligent detection and response proactively hunts threats and confronts live attacks, ensuring robust business resilience. With over 30 years of experience, we partner with businesses to build comprehensive security strategies through flexible commercial models and evidence-based advice.

AI-driven endpoint and cloud collaboration security
Expert-led intelligent detection and response
Proactive threat hunting and live attack confrontation
X-Ways Software Technology
Free

X-Ways Software Technology View X-Ways Software Technology

X-Ways Software Technology is a premier global provider of advanced computer forensics and data recovery solutions. Renowned for its powerful and efficient software, X-Ways empowers digital forensics professionals, IT security experts, and legal teams with unparalleled capabilities for in-depth data analysis, electronic discovery, and evidence collection. Complementing its industry-leading software, the company offers comprehensive training and certification programs to ensure users maximize their expertise in utilizing X-Ways tools for critical investigations and data recovery scenarios.

Comprehensive digital forensics analysis
Advanced data recovery capabilities
Efficient electronic discovery processing
Xcitium
Free

Xcitium View Xcitium

Xcitium delivers a cutting-edge Zero Threat platform engineered to proactively combat unknown ransomware and malware, ensuring 100% threat isolation and removal. Leveraging patented Kernel API Virtualization, our advanced endpoint protection (AEP), endpoint detection & response (EDR), and managed detection & response (MDR) solutions prevent zero-day threats before they can impact your organization. With a global network of over 8,000 cybersecurity service providers, Xcitium empowers businesses to strengthen their defenses and mitigate cyber breach risks.

Zero Threat Platform for 100% unknown threat isolation and removal
Patented Kernel API Virtualization technology
Advanced Endpoint Protection (AEP)
Yarix
Free

Yarix View Yarix

Yarix, a premier company within Var Group's Digital Security division, is a leader in innovative IT security solutions with two decades of experience. Serving diverse sectors including industry, government, healthcare, and academia, Yarix delivers comprehensive cyber security, business continuity, and disaster recovery services. Bolstered by an R&D lab in Tel Aviv and a state-of-the-art Cognitive SOC, Yarix proactively defends against evolving threats and ensures robust operational resilience for its clients.

20 years of cybersecurity expertise
Comprehensive cyber security solutions
Business continuity and disaster recovery services
ZecOps
Free

ZecOps View ZecOps

ZecOps is a leading cybersecurity automation company dedicated to disrupting advanced threats. By analyzing attacker methodologies and learning from their mistakes, ZecOps uncovers entire campaign objectives, neutralizes exploits and persistence mechanisms, and significantly escalates attacker costs. Their versatile solutions provide robust protection for servers, endpoints, mobile devices, and custom environments, safeguarding critical assets for a diverse clientele including financial institutions, defense organizations, and service providers.

Automated attacker campaign discovery
Exploit and persistence mechanism neutralization
Increased attacker campaign costs
Zemana
Free

Zemana View Zemana

Since 2007, Zemana has been at the forefront of developing innovative cybersecurity solutions designed to simplify the complex challenges of modern cyber threats. Our mission is to empower users to operate with confidence by delivering robust defenses against sophisticated malware and emerging attack vectors, including advanced AI-generated threats. Through continuous threat monitoring and the implementation of cutting-edge AI-based technologies, Zemana proactively neutralizes risks, ensuring your digital environment remains secure and uninterrupted.

Advanced AI-powered threat detection
Proactive defense against malware and cyber threats
Simplified cybersecurity solutions for complex challenges
Zip Security
Free

Zip Security View Zip Security

Zip Security provides an intuitive, AI-powered platform for deploying, configuring, and managing critical security tools, including cross-platform MDM and advanced EDR. Streamline complex operations like endpoint protection, identity and access management, mobile device security, and compliance workflows into a unified experience accessible to any team. Empower your organization with robust security management designed for modern operational efficiency.

Cross-platform Device Management (MDM)
Endpoint Detection and Response (EDR)
Identity and Access Management (IAM)
Zorins Technologies
Free

Zorins Technologies View Zorins Technologies

Zorins Technologies is a premier IT solutions provider with over 20 years of experience delivering advanced networking equipment, comprehensive managed services, expert consulting, and robust cybersecurity. We empower businesses across the Middle East and Africa to navigate the complexities of the digital landscape, ensuring seamless operations and fortified security through our unified platform for endpoint protection, risk management, and threat intelligence.

Leading IT Networking Equipment Provider
Expert Managed IT Services
Strategic IT Consulting