Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

BuddoBot
Free

BuddoBot View BuddoBot

Since 2008, BuddoBot has been a leader in cybersecurity and information technology, protecting critical U.S. military, federal, and commercial systems. Our Continuous Adversary Emulation (CAE) provides a proactive, sophisticated approach to offensive cybersecurity, moving beyond traditional, less effective testing methodologies to continuously identify and address real-world threats.

Continuous Adversary Emulation (CAE)
Proactive threat identification
Real-world adversary simulation
Bufferzone Security
Free

Bufferzone Security View Bufferzone Security

Bufferzone Security's Safe Workspace® revolutionizes endpoint security through its patented Protection By Containment™ technology. It establishes an isolated, virtual environment for users to interact with untrusted content, such as web pages, email links, or external files, without risking system compromise. This proactive approach ensures that all malware remains confined within the secure container, safeguarding your organization's data and network integrity while maintaining user productivity and simplifying IT management.

Protection By Containment™ isolates risky activities
Virtual environment prevents malware escape
Safe browsing for untrusted web pages
Cado Security
Free

Cado Security View Cado Security

Cado Security, now part of Darktrace, offers a cutting-edge cloud-native platform designed to revolutionize digital forensics and cyber incident response. Their software empowers organizations to rapidly investigate complex incidents across on-premise and cloud environments without requiring agent deployment, accelerating response times and ensuring the integrity of evidence. Complementing their platform, Cado Security provides expert consulting services to help organizations prepare for and effectively manage even the most sophisticated cyber threats.

Cloud-native digital forensics platform
Agentless incident response
Rapid investigation across hybrid environments
Capsule8
Free

Capsule8 View Capsule8

Capsule8 provides advanced, high-performance attack protection specifically for Linux production environments, spanning containerized, virtualized, bare-metal, on-premise, and cloud deployments. The platform empowers SecOps teams by automating the management of manual tasks and delivering real-time threat detection and response with distributed, streaming analytics. Its high-fidelity data ensures comprehensive security without impacting even the most demanding workloads or busy networks, offering automated response capabilities at the first sign of an attempted attack. Acquired by Sophos in 2021, Capsule8 continues its legacy of robust Linux security.

High-performance attack protection for Linux
Supports containerized, virtualized, and bare-metal environments
On-premise and cloud deployment flexibility
CBIT Digital Forensics Services (CDFS)
Free

CBIT Digital Forensics Services (CDFS) View CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS), now part of Excite Cyber, stands as Australia's foremost provider of advanced digital forensic tools, expert training, and certification for Law Enforcement, Government, and Corporate sectors. Leveraging extensive experience, CDFS designs tailored preparation and response services to address complex challenges involving electronically stored information and digital investigations, enhancing organizational capabilities through a blend of cutting-edge technology and multidisciplinary problem-solving for legally defensible outcomes.

Premier supplier of digital forensic tools in Australia
Industry-embedded training and certification programs
Bespoke preparation and response services for digital investigations
Cellebrite
Free

Cellebrite View Cellebrite

Cellebrite provides industry-leading solutions for mobile data forensics and lifecycle management, empowering organizations to access, unify, and defend digital evidence. As a pioneer in mobile forensics since 1999, Cellebrite's innovative technology and comprehensive UFED solutions form the market's only complete, end-to-end Digital Forensics Platform, crucial for addressing the complexities of digital investigations.

Comprehensive Mobile Data Forensics
Full Mobile Lifecycle Management
End-to-End Digital Forensics Platform
Censornet
Free

Censornet View Censornet

Censornet delivers autonomous, integrated cloud security, empowering mid-market organizations with enterprise-grade cyber protection. Our advanced, machine learning-driven platform proactively identifies and neutralizes threats across email, web, and cloud channels, safeguarding over 1,500 customers and millions of users worldwide. Experience unparalleled, 24/7 automated defense that eliminates alert fatigue and ensures your IT environment is secured, allowing you to focus on strategic business growth.

Autonomous Cloud Security
Integrated Threat Protection
Machine Learning Threat Detection
CERT-EU
Free

CERT-EU View CERT-EU

CERT-EU serves as the dedicated Computer Emergency Response Team for EU institutions, agencies, and bodies, fostering a secure digital environment. Comprised of seasoned IT security specialists from key EU entities, the team actively collaborates with national and international CERTs, as well as leading cybersecurity firms. CERT-EU is a cornerstone of European cyber defense, committed to safeguarding the ICT infrastructure of over 80 constituents by proactively preventing, detecting, mitigating, and responding to cyber threats, thereby acting as the central hub for cybersecurity information exchange and incident response coordination.

Dedicated EU-wide incident response coordination
Proactive cyber threat prevention and detection
Expert mitigation and response strategies
CERT-SE
Free

CERT-SE View CERT-SE

CERT-SE serves as Sweden's national and governmental Computer Security Incident Response Team, safeguarding the entire Swedish society. Its constituency encompasses a wide range of entities, including governmental authorities, regional administrations, municipalities, and private enterprises. As the Governmental CERT, CERT-SE holds specialized responsibilities for the government's cybersecurity posture, offering expert guidance and incident response to protect critical national infrastructure and sensitive data.

National incident response for Sweden
Governmental CERT responsibilities
Broad constituency support (public & private sectors)
CERT.ar
Free

CERT.ar View CERT.ar

CERT.ar serves as Argentina's national Computer Emergency Response Team, dedicated to the technical and administrative management of cybersecurity incidents within the National Public Sector. Our mission is to proactively identify and address potential cyber threats impacting government systems and networks, thereby enhancing prevention, protection, and overall resilience. We are committed to safeguarding critical national infrastructure and citizen data through expert incident response and continuous improvement of cybersecurity posture.

National incident response for public sector cybersecurity.
Proactive cyber threat identification and analysis.
Enhancement of prevention and protection strategies.
Certo Software
Free

Certo Software View Certo Software

Certo Software stands at the forefront of dedicated mobile security, specializing in safeguarding your digital life. Recognizing that traditional PC antivirus solutions fall short for today's sophisticated mobile threats, Certo's products are meticulously engineered for paramount mobile protection. Leverage our extensive expertise in spyware detection and robust endpoint security to ensure your devices are secure and your peace of mind is restored.

Advanced Mobile Threat Detection
Real-time Spyware Scanning
Comprehensive Endpoint Security
Cimcor
Free

Cimcor View Cimcor

Cimcor is a trusted innovator in security, integrity, and compliance software, dedicated to safeguarding critical IT infrastructure for corporate, government, and military clients worldwide. Their flagship product, CimTrak, provides real-time monitoring and robust protection for physical, network, and virtual assets, offering unparalleled situational awareness of all changes. With advanced file integrity monitoring and automated response capabilities, CimTrak ensures continuous IT asset security and compliance.

Real-time File Integrity Monitoring (FIM)
Comprehensive Change Detection (Who, What, When, How)
Automated Response to Detected Changes
Circadence
Free

Circadence View Circadence

Circadence delivers the market's sole fully immersive, AI-powered cybersecurity training platform, Project Ares®. This patent-pending solution leverages advanced virtual reality and real-time threat intelligence to create dynamic, mission-specific training environments. Teams can practice critical skills and hone tactics using authentic tools and scenarios within realistic, interactive simulations, moving beyond traditional classroom limitations for unparalleled readiness.

Fully Immersive Training Environment
AI-Powered Threat Simulation
Patent-Pending Technology
ClearShark
Free

ClearShark View ClearShark

ClearShark, now part of Optiv, is a leading U.S. Public Sector cybersecurity advisor specializing in resilient, integrated solutions for highly secure networks. Since 2001, they have empowered government agencies with cutting-edge security technologies and expert professional services, including extensive government contracting knowledge. ClearShark's proactive approach delivers zero-day threat protection, next-generation firewalls, advanced logging, and full packet capture to defend against evolving cyber threats.

Customized and integrated cybersecurity solutions
Expertise in U.S. Public Sector and government contracting
Zero-day threat protection
Codeproof Technologies
Free

Codeproof Technologies View Codeproof Technologies

Codeproof Technologies provides a robust SaaS enterprise mobility solution designed to secure, deploy, and manage mobile applications and data across a diverse range of devices, including smartphones, tablets, and IoT. Built on an elastic cloud stack, our platform offers flexible, scalable, and secure mobility operations, enabling centralized Mobile Application Management, Mobile Content Management, and Mobile Device Management through an intuitive cloud console. Empower your organization with comprehensive control and enhanced security for your mobile ecosystem.

Centralized Mobile Application Management (MAM)
Comprehensive Mobile Content Management (MCM)
Robust Mobile Device Management (MDM)
Cognna
Free

Cognna View Cognna

Cognna is a next-generation cybersecurity platform engineered to deliver stress-free threat defense. Our innovative solution seamlessly integrates advanced AI-driven analytics with expert human oversight to proactively detect, prevent, and rapidly resolve cyber threats. We empower organizations with the comprehensive tools and actionable insights needed to maintain robust security postures and safeguard critical assets against evolving sophisticated adversaries.

Proactive Threat Detection and Prevention
AI-Powered Security Analytics
Expert Human Analysis and Oversight
CommuniTake
Free

CommuniTake View CommuniTake

CommuniTake empowers organizations to achieve superior mobile security and operational efficiency through its comprehensive suite of solutions. Specializing in endpoint protection, remote access, and mobile device management, CommuniTake Intact Mobile Security offers robust defense against cyber threats while ensuring optimal device performance and facilitating seamless remediation. Our modular approach and deep expertise in mobile operating systems and security architecture cater to diverse enterprise needs, delivering cost-effective and secure mobile enablement.

Advanced Mobile Endpoint Protection Platform (EPP)
In-depth defense against mobile cyber-attacks
Seamless device performance and remediation
ComoNExT Innovation Hub
Free

ComoNExT Innovation Hub View ComoNExT Innovation Hub

ComoNExT Innovation Hub is a comprehensive platform designed to unify IT management and security operations. By integrating advanced endpoint management, robust security solutions, and critical data protection, it fosters seamless collaboration between IT and security teams. ComoNExT empowers businesses to proactively defend against evolving cyber threats, including ransomware and insider attacks, while ensuring regulatory compliance and operational efficiency.

Integrated Endpoint Management and Security
Proactive Threat Protection (Ransomware, Insider Threats, Hackers)
Real-time Security Information and Intelligence Sharing
Compugen Systems Inc (CSI)
Free

Compugen Systems Inc (CSI) View Compugen Systems Inc (CSI)

Compugen Systems Inc. is a leading IT service delivery partner dedicated to achieving your strategic business outcomes. We integrate advanced Modern Workspace and Hybrid IT solutions with comprehensive managed, professional, and field services to transform ambitious goals into tangible successes. Our proprietary Cybersecurity Lifecycle Framework (CLF) offers a robust, multi-layered approach to security, guiding organizations through the entire threat lifecycle from detection to response, ensuring business continuity and regulatory compliance.

Modern Workspace Solutions
Hybrid IT Services
Managed IT Services
Computacenter
Free

Computacenter View Computacenter

Computacenter is a premier independent technology partner, empowering large enterprises and public sector organizations to achieve their digital transformation goals. We specialize in the end-to-end sourcing, transformation, and management of IT infrastructure, ensuring robust security and operational efficiency in today's dynamic digital landscape. Our comprehensive DigitalTrust security portfolio, including advanced solutions from market leaders like XYPRO for HPE Non-Stop environments, addresses critical challenges from endpoint protection to sophisticated cyber defense.

End-to-end IT Infrastructure Solutions
Digital Transformation Services
Comprehensive Managed Services
ConnectWise
Free

ConnectWise View ConnectWise

ConnectWise offers a unified platform engineered to optimize how Technology Service Providers (TSPs) deliver managed services. Our intelligent software and expert services empower you to streamline business operations, enhance service delivery, bolster client security with advanced endpoint and network detection, and cultivate your staff's expertise. Leverage ConnectWise Fortify™ for robust protection against evolving cyber threats like business email compromise and ransomware, backed by a 24/7 global Security Operations Center (SOC) for comprehensive, ongoing risk assessment and mitigation.

Unified platform for end-to-end managed service delivery
Intelligent software and expert services for business efficiency
Advanced endpoint and network detection and response (EDR/NDR)
Conntour
Free

Conntour View Conntour

Conntour empowers governments and large corporations to unlock the full potential of their security camera networks. Our advanced AI-powered platform enables intuitive natural language querying for unprecedented insight into video footage, allowing users to instantly find specific events, set proactive alerts, and perform complex data analysis. Designed to overcome the limitations of traditional surveillance systems, Conntour offers unparalleled customization, drastically reducing manual review time and improving real-time threat detection.

Natural Language Video Search
Customizable Event Alerts
Automated Data Extraction from Footage
Continuum
Free

Continuum View Continuum

Continuum is a leading IT management platform designed exclusively for Managed IT Services Providers (MSPs). It empowers MSPs to comprehensively manage, maintain, and back up on-premise and cloud-based infrastructure, including servers, desktops, and mobile devices, for their small- and medium-sized business clients. As a channel-exclusive partner, Continuum's success is intrinsically linked to its partners' growth, fostering a collaborative ecosystem focused on mutual achievement and client satisfaction.

On-premise and cloud server management
Desktop and mobile device endpoint management
Integrated backup and disaster recovery
ContraForce
Free

ContraForce View ContraForce

ContraForce delivers comprehensive threat detection and response by providing unified visibility across cloud, network, endpoints, and user identities. Our AI-powered platform empowers Security and SOC teams with extended detection and response (XDR) capabilities, enabling autonomous threat hunting and real-time risk mitigation to proactively defend your digital estate against evolving cyberattacks.

Unified Visibility Across Cloud, Network, and Endpoints
AI-Powered Extended Detection and Response (XDR)
Real-time Threat Blocking and Mitigation