Home / Security Operations and Automation / Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Advanced threat detection and rapid incident response for your endpoints.

Try these 304 AI Endpoint Detection and Response (EDR) Tools

Minerva Labs
Free

Minerva Labs View Minerva Labs

MInerva Labs, now part of Rapid7, offers a unique, patent-pending solution designed to neutralize advanced malware threats before they can impact your network. By keeping malware in a dormant state, it provides security professionals with crucial time for remediation without immediate risk. Minerva seamlessly integrates with existing security infrastructure, enhancing their effectiveness by providing actionable intelligence and accelerating eradication efforts.

Patent-pending malware dormancy technology
Proactive threat containment
Deferred risk mitigation
Miradore
Free

Miradore View Miradore

Miradore provides a cloud-based device management platform designed to empower IT Service Providers and IT departments to effectively secure, manage, and control their endpoints. With a focus on cost-efficiency, Miradore offers robust solutions that simplify device administration, enhance security posture, and improve overall IT operational efficiency for businesses worldwide. Trusted by over 10,000 companies across 160 countries, Miradore is the go-to solution for streamlining device management and reducing cyber risk.

Cloud-based device management
Endpoint security and compliance
Remote device management and support
MobileIron
Free

MobileIron View MobileIron

MobileIron, now part of Ivanti, offers a robust Enterprise Mobility Management (EMM) solution designed to empower IT organizations with comprehensive mobile security. This platform provides end-to-end protection for corporate data, securing sensitive information both at rest on devices and applications, and in motion as it traverses networks and cloud storage. MobileIron enables secure access and management of mobile endpoints, ensuring data integrity and compliance across the enterprise.

Enterprise Mobility Management (EMM)
Mobile Device Security
Application Management
Ministry of Defence Georgia - Cyber Security Bureau
Free

Ministry of Defence Georgia - Cyber Security Bureau View Ministry of Defence Georgia - Cyber Security Bureau

The Cyber Security Bureau of the Ministry of Defence of Georgia is dedicated to establishing and advancing robust, secure, and efficient Information and Communication Technology (ICT) systems for the Civil Office. Our primary objective is to ensure the integrity, confidentiality, and availability of critical defense information through advanced cybersecurity strategies and technological implementation.

Development of secure ICT systems for defense
Implementation of advanced cybersecurity strategies
Ensuring information integrity, confidentiality, and availability
Morphisec
Free

Morphisec View Morphisec

Morphisec delivers proactive, prevention-first cybersecurity that stops advanced threats like ransomware and zero-days before they execute, safeguarding your endpoints and cloud environments. Leveraging patented Moving Target Defense technology, Morphisec offers a unique approach that effectively bypasses traditional signature- and behavior-based detection methods, enhancing existing security stacks. Protect millions of endpoints globally by preventing sophisticated, evasive, and unknown attacks with a simple, automated solution.

Prevention-first cybersecurity stopping advanced attacks
Patented Moving Target Defense technology
Stops unknown and evasive threats that bypass traditional defenses
Mosyle
Free

Mosyle View Mosyle

Mosyle provides an industry-leading Apple Unified Platform designed for businesses and educational institutions to comprehensively manage and secure their Apple devices and networks. Its unique, single-platform integration of five essential applications streamlines deployment, management, and protection for all Apple devices, enabling unparalleled efficiency and cost-effectiveness. With exceptional customer support, Mosyle redefines Apple device management with a powerful, automated, and affordable approach that surpasses traditional solutions.

Comprehensive Apple Device Management
Integrated Security Solutions
Automated Deployment and Configuration
MSAB
Free

MSAB View MSAB

MSAB is a global leader in mobile forensic technology, dedicated to the specialized recovery of data from mobile devices. With a legacy beginning in 1984, MSAB offers unparalleled expertise and advanced solutions trusted by law enforcement and government agencies worldwide to uncover critical digital evidence. Our extensive global presence ensures reliable support and cutting-edge tools for forensic investigations across more than 100 countries.

Advanced data extraction from mobile devices
Comprehensive forensic analysis tools
Support for a wide range of mobile platforms and models
N-able
Free

N-able View N-able

N-able provides enterprise-grade monitoring, security, and business management solutions designed to empower IT professionals and Managed Service Providers (MSPs) in overcoming complex IT challenges. Our flexible platform and robust integrations streamline the monitoring, management, and protection of end-customer systems, data, and networks. With a comprehensive suite of security, automation, and backup/recovery solutions, N-able simplifies intricate IT ecosystems, enabling partners to deliver exceptional value and achieve scalable success through extensive support and growth resources.

Comprehensive IT Monitoring and Management
Advanced Endpoint Security Solutions
Integrated Risk Management Platform
National Centre for Cyber Security (NCCS) - Pakistan
Free

National Centre for Cyber Security (NCCS) - Pakistan View National Centre for Cyber Security (NCCS) - Pakistan

The National Centre for Cyber Security (NCCS) in Pakistan is a pivotal institution dedicated to advancing cybersecurity research and leadership in safeguarding national cyberspace. Through specialized labs, NCCS focuses on critical areas such as smart device security, network cyber defense, and advanced digital forensics for social media, computers, and mobile devices, thereby enhancing the nation's resilience against evolving cyber threats.

Cyber Security Research and Development
National Cyberspace Defense Leadership
Smart Devices Security Research
National Cyber League (NCL)
Free

National Cyber League (NCL) View National Cyber League (NCL)

The National Cyber League (NCL) offers a dynamic cybersecurity training and competition platform designed to cultivate and validate essential skills. Leveraging high-fidelity simulation environments, NCL integrates learning objectives seamlessly within its 'Gymnasiums' for skill development and 'Stadium' for competitive play. This dual approach allows participants to acquire knowledge and then immediately apply and demonstrate their expertise in a challenging, gamified setting, receiving individualized performance feedback through comprehensive NCL Scouting Reports.

High-fidelity cybersecurity simulation environments
Integrated learning objectives for skill development
Gamified competitive individual and team play
NATO Communications and Information Agency (NCIA)
Free

NATO Communications and Information Agency (NCIA) View NATO Communications and Information Agency (NCIA)

The NATO Communications and Information Agency (NCIA) Cyber Security Service Line is the central authority for comprehensive cyber security lifecycle management within NATO. It offers specialized services spanning scientific, technical, acquisition, operational, maintenance, and sustainment support for NATO's Information and Communication Technologies. The Service Line integrates the NATO Computer Incident Response Capability (NCIRC) Technical Centre to proactively defend, detect, respond to, and recover from cyber threats, ensuring the secure operation of Alliance activities.

Comprehensive cyber security lifecycle management
Specialized technical and operational support
Acquisition and sustainment expertise
Neon Cyber
Free

Neon Cyber View Neon Cyber

Neon Cyber transforms the browser into your organization's most effective security perimeter, directly addressing the dynamic risk presented by your workforce. By deploying a lightweight agent within the browser, Neon offers real-time visibility, control, and protection against sophisticated threats like phishing, credential stuffing, and session hijacking. This innovative approach minimizes SaaS sprawl and generative AI exposure, enabling proactive risk mitigation and compliance enforcement at the point of user action, not after the fact.

Real-time threat detection and blocking in the browser
Lightweight browser agent for seamless deployment
Proactive anti-phishing and credential misuse prevention
NetWitness
Free

NetWitness View NetWitness

NetWitness provides a comprehensive, highly scalable threat detection and response platform designed to empower security teams in rapidly identifying and neutralizing sophisticated cyber threats. By integrating unparalleled visibility with applied threat intelligence and advanced user behavior analytics, NetWitness enables the proactive detection, prioritization, and investigation of threats, while automating response actions. This allows security analysts to significantly enhance their efficiency and maintain a critical advantage against business-impacting attacks.

Comprehensive Threat Detection and Response
Unparalleled Network and Endpoint Visibility
Advanced Threat Intelligence Integration
Netwrix
Free

Netwrix View Netwrix

Netwrix provides comprehensive visibility and control over sensitive data, identities, and infrastructure, enabling organizations to proactively reduce breach risk and minimize attack impact. By eliminating security blind spots and simplifying complex environments, IT teams can detect, respond to, and recover from threats more efficiently, strengthening overall security and compliance posture.

Sensitive data discovery and classification
Security and compliance monitoring
Identity and access management
Nexthink
Free

Nexthink View Nexthink

Nexthink empowers IT departments to optimize the digital workplace by harmonizing employee experience with robust security and operational efficiency. Leveraging real-time endpoint analytics and sentiment feedback, Nexthink provides actionable insights to proactively identify and resolve issues, reduce costs, and enhance end-user productivity. Its advanced forensic capabilities also offer unparalleled depth for security incident investigations, complementing existing security investments.

Real-time Endpoint Analytics
End-User Feedback Integration
Proactive IT Operations
NinjaOne
Free

NinjaOne View NinjaOne

NinjaOne is a comprehensive IT management platform designed for IT and MSP teams seeking to streamline endpoint management, patching, and support. Leveraging its capabilities, over 17,000 customers across 80+ countries automate IT operations, achieve cost efficiencies, and mitigate risks. NinjaOne empowers organizations to enhance their security posture by providing essential endpoint hardening, visibility, control, and tools necessary for deploying foundational security strategies and reducing attack surfaces. The platform serves as a critical first layer of defense, enabling enterprises to build robust, multi-layered security architectures.

Unified Endpoint Management
Automated Patch Management
Remote Monitoring and Management
North Pole Security
Free

North Pole Security View North Pole Security

North Pole Security's Workshop is the premier endpoint protection platform engineered exclusively for macOS environments. It proactively defends against sophisticated threats, ensuring your business operations remain uninterrupted and users maintain peak productivity. Workshop empowers organizations to granularly manage security policies and approval workflows for different teams, striking an optimal balance between robust security, compliance requirements, and user efficiency.

Next-Generation Endpoint Protection for macOS
Proactive Threat Prevention and Detection
Streamlined User Experience with No Bottlenecks
NPCore
Free

NPCore View NPCore

NPCore delivers advanced, behavior-based defense solutions specifically engineered to combat unknown Advanced Persistent Threats (APTs) and ransomware. Leveraging a proprietary two-level protection strategy across network and endpoint, NPCore, established in 2008, provides unparalleled threat detection and response capabilities. Their flagship product, 'Zombie ZERO,' has been successfully deployed for government, financial, university, and enterprise clients, safeguarding critical assets against sophisticated cyberattacks.

Real-time APT and Ransomware Detection
Network-Level Behavioral Analysis
Endpoint-Level Behavioral Protection
Nucleon Security
Free

Nucleon Security View Nucleon Security

Nucleon Endpoint Detection and Response (EDR) is a next-generation, single-agent solution designed to safeguard your organization's valuable assets. By integrating advanced multilayer Zero-Trust principles with cutting-edge artificial intelligence, Nucleon proactively blocks sophisticated threats, prevents sensitive data exfiltration, and effectively manages system vulnerabilities. This platform provides unparalleled protection, ensuring the integrity and security of your digital environment.

Next-generation EDR with a single agent
Multilayer Zero-Trust technology integration
Advanced Artificial Intelligence for threat detection
Nukke
Free

Nukke View Nukke

Nukke delivers comprehensive, cloud-based cybersecurity solutions designed to safeguard your business's digital infrastructure. Our expert team collaborates with you to engineer tailored security strategies, leveraging cutting-edge technology to protect sensitive data and ensure regulatory compliance. With proactive threat management and continuous audits, Nukke provides centralized command and control, empowering administrators to secure your entire PC fleet from anywhere.

Customized cybersecurity solutions
Cloud-based centralized management
Cutting-edge threat protection
ObserveIT
Free

ObserveIT View ObserveIT

ObserveIT, now part of Proofpoint, is a leading user activity monitoring solution designed to empower organizations in identifying and mitigating insider threats. Its lightweight, easy-deploy endpoint solution provides visual monitoring and rapid investigation capabilities, enabling precise identification and proactive protection against malicious or negligent user behavior. By capturing full-screen video of policy violations and offering real-time user education, ObserveIT significantly reduces security incidents and investigation times from days to minutes.

Real-time User Activity Monitoring
Full-Screen Video Capture
Insider Threat Detection
Octiga
Free

Octiga View Octiga

Octiga empowers Small and Medium-sized Enterprises (SMEs) with simple, affordable, and automated cybersecurity solutions, eliminating the need for costly consultants. Our Microsoft 365 Security Suite integrates seamlessly with your existing environment, addressing the critical security risks within the platform users interact with daily. Octiga provides a comprehensive, end-to-end approach to Microsoft 365 security, ensuring robust protection and streamlined operations.

Automated Microsoft 365 Security: Seamless integration requiring no technical expertise.
Guided Configuration for Prevention: Enhance security posture and compliance with expert guidance.
Real-time Monitoring & Detection: Proactively identify and alert on emerging threats and risks.
Octo
Free

Octo View Octo

Octo, an IBM Company, empowers Federal Government agencies to overcome complex challenges and accelerate technological adoption. We specialize in modernizing and innovating through advanced capabilities in Artificial Intelligence, DevSecOps, Cloud and Infrastructure, Data Management and Analytics, and Cybersecurity. Our expert team leverages state-of-the-art cyber solutions and deep federal knowledge to proactively defend against evolving threats, ensuring tailored strategies that protect sensitive data and mitigate risk for each unique agency requirement.

Artificial Intelligence & Machine Learning
DevSecOps & Cloud Native Architectures
Cloud & Infrastructure Modernization
OffSec
Free

OffSec View OffSec

OffSec is the global leader in penetration testing training, setting the standard for excellence with a curriculum focused on replicating real-world adversarial tactics. Our rigorous, hands-on approach equips cybersecurity professionals with the offensive mindset and technical expertise necessary to develop effective defensive strategies. Beyond technical skills, OffSec fosters critical thinking and a 'Try Harder' ethos, empowering individuals and organizations to proactively identify and remediate vulnerabilities.

Industry-leading penetration testing training
Simulates real-world attacker techniques and methods
Develops offensive mindset and critical thinking