Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

FFRI Security
Free

FFRI Security View FFRI Security

FFRI Security is at the forefront of researching and developing advanced solutions to prevent sophisticated cyber-attacks and breaches. Their flagship product, FFRI yarai, offers next-generation endpoint security leveraging Proactive Heuristic Technology to effectively terminate ransomware and neutralize Advanced Persistent Threats. With a multi-layered, five-core protection engine and a hybrid security approach, FFRI provides in-depth endpoint defense, complemented by the Tines security automation platform designed to enhance the effectiveness and efficiency of security teams by automating manual tasks.

Next-Generation Endpoint Security
Proactive Heuristic Technology
Ransomware Termination
Fidelis Security
Free

Fidelis Security View Fidelis Security

Fidelis Security, now part of PartnerOne, delivers a comprehensive Extended Detection and Response (XDR) platform designed to empower Security Operations Centers (SOCs). Our solution offers unparalleled contextual visibility and deep digital forensics to rapidly detect, hunt, and respond to advanced threats, safeguarding your most sensitive data. By intelligently correlating information across the entire threat lifecycle, Fidelis Elevate provides actionable insights to proactively neutralize both known and emerging cyber risks.

Extended Detection and Response (XDR) Capabilities
Deep Digital Forensics and Investigations
Contextual Visibility Across Your Environment
FileWave
Free

FileWave View FileWave

FileWave provides a unified platform for comprehensive endpoint management across macOS, Windows, iOS, Android, and Chromebook devices. Streamline app deployment, device configuration, and security posture management with a single solution, reducing complexity and increasing IT efficiency. By consolidating management tools, FileWave enhances visibility, strengthens security, lowers operational costs, and empowers end-user productivity.

Cross-platform endpoint management (macOS, Windows, iOS, Android, ChromeOS)
Application deployment and inventory
Device configuration and compliance
FireEye
Free

FireEye View FireEye

FireEye, now part of Trellix, offers a cloud-native Extended Detection and Response (XDR) platform designed to enhance existing security investments. By unifying visibility and leveraging advanced frontline intelligence, it empowers organizations to detect, protect, and respond to sophisticated cyber threats more effectively. This integrated approach simplifies threat detection, investigation, and incident response, elevating analyst capabilities and strengthening overall security posture.

Extensible Cloud-Based XDR Platform
Enhanced Visibility Across Security Solutions
Advanced Threat Detection and Correlation
FixMeStick
Free

FixMeStick View FixMeStick

FixMeStick is the world's leading USB-based solution for deep computer malware removal. This advanced device scans and cleans your system before your operating system loads, effectively eradicating persistent viruses, spyware, trojans, and rootkits that traditional antivirus software frequently misses. Its automatic update functionality and dedicated customer support ensure your computer remains protected with minimal effort.

Pre-boot system scan for comprehensive malware eradication
Removes stubborn viruses, spyware, trojans, and rootkits
Bypasses active infections that traditional antiviruses miss
Flotek
Free

Flotek View Flotek

Flotek empowers Small and Medium Enterprises (SMEs) with innovative, cost-effective cloud technologies and robust cybersecurity solutions. Specializing in next-generation AI-powered endpoint protection, data backup, and disaster recovery, Flotek ensures your business operates with confidence and clarity. Our certified Cyber Essentials and Cyber Essentials Plus packages provide essential, government-standard cybersecurity, safeguarding against common threats with rapid-response incident resolution and complete device visibility.

Next-generation AI-based anti-malware, antivirus, and endpoint protection
Comprehensive backup, recovery, and disaster recovery solutions
Cyber Essentials and Cyber Essentials Plus government-standard certification
Force Majeure
Free

Force Majeure View Force Majeure

Force Majeure offers unparalleled expertise in cybersecurity, incident response, and digital forensics, built upon a foundation of over a decade of specialized experience. Our elite team comprises seasoned cyber analysts and seasoned veterans from top-tier intelligence and cyber units, dedicated to safeguarding your critical digital assets. We provide comprehensive solutions for proactive defense and swift recovery from complex cyber threats.

Comprehensive Cybersecurity Solutions
Expert Incident Response
Advanced Digital Forensics
Forensic IT
Free

Forensic IT View Forensic IT

Forensic IT, now part of Spirit Technology Solutions, offers specialized Digital Forensics and Incident Response (DFIR) services to businesses and public sector organizations. We provide rapid, expert intervention for cyber incidents, conduct in-depth investigations to pinpoint breach origins and scope, and meticulously collect legally admissible evidence. Our proactive offerings include critical infrastructure security consultancy and training, leveraging a veteran team with diverse law enforcement, engineering, and military backgrounds to deliver robust cybersecurity outcomes.

Specialized Digital Forensics
Rapid Incident Response Deployment
Comprehensive Breach Investigation
Fortra
Free

Fortra View Fortra

Fortra delivers comprehensive cybersecurity and automation solutions designed to tackle today's most complex challenges. With a people-first approach and a portfolio of best-in-class products, Fortra empowers organizations with integrated, scalable solutions for endpoint management and security, fostering enhanced efficiency and collaboration between IT and security teams to drive positive change in cybersecurity.

Comprehensive Cybersecurity Solutions
Automation Capabilities
People-First Support Model
Foundation Futuristic Technologies (FFT)
Free

Foundation Futuristic Technologies (FFT) View Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT) is a distinguished global leader in advanced computer forensics and digital investigation solutions. Leveraging decades of profound domain expertise, FFT empowers law enforcement and organizations worldwide with comprehensive solutions for complex digital investigations. Our offerings span standalone and turnkey systems for computer forensics, mobile forensics, incident response, eDiscovery, and information assurance, ensuring robust data protection and recovery capabilities.

Comprehensive Digital Investigation Solutions
Expertise in Computer Forensics
Advanced Mobile Forensics Capabilities
Global Digital Forensics (GDF)
Free

Global Digital Forensics (GDF) View Global Digital Forensics (GDF)

Global Digital Forensics (GDF) is a premier provider of digital forensics and e-Discovery services, backed by nearly three decades of unparalleled expertise. We empower organizations to navigate the complexities of cyber incidents, offering comprehensive solutions that span data breach response, robust cyber security assessments, penetration testing, and proactive threat remediation. GDF partners with leading companies to provide end-to-end support, from initial protection and intricate investigations to effective remediation, evidence presentation, and prosecution in both civil and criminal cyber forensic matters.

Comprehensive Digital Forensics Investigations
End-to-End e-Discovery Services
Expert Data Breach Response and Recovery
Global EPIC
Free

Global EPIC View Global EPIC

Global EPIC is a comprehensive platform designed to empower cybersecurity professionals with proactive solutions for significant cyber risk reduction. It unites advanced endpoint management and security, streamlined data protection, and world-leading single-step multi-factor authentication to deliver immediate improvements in security posture and measurable ROI. By fostering greater efficiency and collaboration between IT management and security teams, Global EPIC offers a robust defense against ransomware, insider threats, and sophisticated cyberattacks for organizations worldwide.

Proactive Security Solutions
Integrated Endpoint Management and Security
Single-Step Multi-Factor Authentication (MFA)
GoTo
Free

GoTo View GoTo

GoTo empowers organizations of all sizes to connect, collaborate, and manage their IT infrastructure seamlessly and securely, from any location. As Zoho Corporation's IT management division, GoTo, through its suite of solutions including ManageEngine and Locklizard, offers flexible, enterprise-grade tools designed to prevent unauthorized access, protect sensitive data, and eliminate the complexity of IT management and cyber threats. Partner with GoTo for an easy, secure, and integrated approach to business operations.

Secure remote collaboration and meeting solutions
Comprehensive IT management and monitoring tools
Robust PDF document protection and DRM
Grayshift
Free

Grayshift View Grayshift

Grayshift, now part of Magnet Forensics, is the premier provider of lawful mobile device digital forensics solutions. Our purpose-built technology empowers law enforcement and government agencies to accelerate critical investigations and enhance public safety through swift, comprehensive data extraction. Grayshift's innovative GrayKey technology delivers unparalleled on-device access and control, trusted by over 1000 agencies globally.

Lawful Access to Mobile Devices
Comprehensive Data Extraction
Timely Investigation Resolution
GuardiCore
Free

GuardiCore View GuardiCore

GuardiCore, now part of Akamai, is a leader in internal data center and cloud security, providing real-time visibility and automated response to illicit activity. Its innovative solution leverages threat deception and application-level network visualization to swiftly detect and mitigate breaches within complex virtual environments, transforming security from months to minutes.

Real-time visibility into data center and cloud activity
Automated breach detection and attack mitigation
Threat deception techniques
Gytpol
Free

Gytpol View Gytpol

Gytpol is a leading Endpoint Configuration Security (ECS) solution that automates the validation, remediation, and ongoing securing of IT policies and infrastructure across on-premise and cloud environments. Gytpol Validator proactively identifies and rectifies security misconfigurations and compliance gaps on endpoints, ensuring robust security posture and adherence to best practices. Partner with Gytpol to leverage our deep expertise and proven methodologies for comprehensive endpoint security and continuous compliance assurance.

Automated Endpoint Configuration Security (ECS) validation
Proactive detection of policy misconfigurations and vulnerabilities
Automated remediation of security issues and compliance gaps
H-11 Digital Forensics
Free

H-11 Digital Forensics View H-11 Digital Forensics

H-11 Digital Forensics is a premier provider of advanced digital forensic solutions, dedicated to pioneering advancements in Cyber Security, Information Protection, eDiscovery, and Digital Forensic Investigation. Since 2006, we have been committed to delivering unparalleled digital forensic training, cutting-edge products, and expert services. Our accredited training programs equip professionals with the most current and effective methodologies in Cyber Security, Mobile Device Forensics, and Digital Forensics, ensuring they are prepared to tackle evolving digital threats.

Expert Digital Forensic Training Programs
Comprehensive Forensic Products
Professional Forensic Services
Hackurity.io
Free

Hackurity.io View Hackurity.io

Hackurity.io emerges as a proactive IT security innovator, established in 2021 to address the inherent fragmentation and reactivity in the industry. Our mission is to empower businesses with unwavering confidence in their digital and connected environments by providing a comprehensive, all-in-one security solution. We move beyond traditional, post-breach patching to offer continuous, automated protection, ensuring your valuable data remains secure against evolving cyber threats.

Fully automated 24/7/365 infrastructure vulnerability scanning
Integrated penetration testing capabilities
All-in-one VulPen Engine
Harel Mallac Technologies
Free

Harel Mallac Technologies View Harel Mallac Technologies

Harel Mallac Technologies is a leading Mauritian ICT organization empowering medium and large enterprises across Africa with robust technological solutions. Leveraging an extensive network of ICT specialists and advanced infrastructure solutions, we architect highly available, scalable, secure, and cost-effective IT environments to drive operational excellence and sustainable growth. Our integrated approach, complemented by advanced endpoint management and security capabilities, fosters greater efficiency and seamless collaboration between IT management and security teams.

Pan-African ICT specialist network
Advanced Infrastructure Services (AIS)
Highly available IT environment architecture
HarfangLab
Free

HarfangLab View HarfangLab

HarfangLab EDR is a cutting-edge endpoint security solution developed by former ANSSI cyber intelligence experts, designed to empower organizations of all sizes to proactively detect and neutralize advanced cyber threats. Leveraging artificial intelligence, behavioral analytics, and integrated threat intelligence, our platform provides robust protection and helps maintain digital independence. HarfangLab EDR seamlessly integrates with existing security infrastructure, including network probes, SIEM/SOAR solutions, and threat intelligence feeds, to deliver comprehensive visibility and rapid response capabilities.

Advanced Threat Detection with AI and Behavioral Analytics
Developed by Former National Cyber Intelligence Experts
Streamlined Endpoint Visibility and Control
Havoc Shield
Free

Havoc Shield View Havoc Shield

Havoc Shield is a comprehensive information security platform designed to protect growing teams navigating the complexities of a remote workforce. It provides robust solutions to manage and mitigate risks inherent in blurred work-from-home boundaries, consumer-grade networks, and mixed-use devices. Even without extensive internal cybersecurity expertise, Havoc Shield empowers organizations to proactively secure their expanding digital perimeter against evolving cyber threats.

All-in-one information security platform
Remote workforce security focus
Risk assessment for home network environments
HEROIC Cybersecurity
Free

HEROIC Cybersecurity View HEROIC Cybersecurity

HEROIC Cybersecurity offers an AI-powered Unified Cybersecurity Platform designed to intelligently protect individuals and organizations from evolving cyber threats. Safeguard your data, devices, and cloud services against hackers and breaches, with proactive threat intelligence and comprehensive security services. Our expert team simulates real-world attacks to identify vulnerabilities and provide actionable insights for strengthening your security posture.

AI-Powered Unified Cybersecurity Platform
Proactive Data, Device, and Cloud Protection
Breached Credential Scanning
Hexnode MDM
Free

Hexnode MDM View Hexnode MDM

Hexnode MDM is a multi-award-winning Unified Endpoint Management (UEM) solution designed to empower organizations in securely managing diverse endpoints, including mobile devices and desktops. It simplifies the complexities of BYOD (Bring Your Own Device), COPE (Corporate Owned, Personally Enabled), application, and content management, enabling seamless enterprise mobility without compromising security. Hexnode MDM provides an intuitive and highly configurable platform to oversee your entire device fleet, enhancing productivity and operational efficiency.

Unified Endpoint Management (UEM) for mobile and desktops
Secure BYOD, COPE, and corporate-owned device management
Application and content deployment and management
HoxHunt
Free

HoxHunt View HoxHunt

Hoxhunt provides an automated, adaptive cybersecurity training platform designed to significantly reduce an organization's susceptibility to phishing attacks. By continuously simulating sophisticated phishing threats tailored to individual employee skill levels, Hoxhunt empowers your workforce to become a robust first line of defense. This data-driven approach ensures employees effectively identify and report even the most advanced attacks, drastically lowering the probability of successful breaches.

Automated phishing simulation and training
Adaptive difficulty based on employee skill
Real-time feedback and reinforcement