Best Endpoint Detection & Response (EDR) Software

Products Buyer's Guide
8.6
Panda Adaptive Defense 360
★★★★★

Panda Adaptive Defense 360

Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

Meaningful protection on allmy devices - Elias P.

Ease of use
9.0
Support
8.4
Ease of Setup
8.9

Languages supported: German, English, Finnish, French, Hungarian, Italian, Japanese, Portuguese, Russian, Spanish, Swedish

9.0
Symantec Protection Suite Enterprise Edition
★★★★★

Symantec Protection Suite Enterprise Edition

Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.

Extra security for various business platforms - User in Marketing and Advertising

Ease of use
9.4
Support
8.9
Ease of Setup
0.0
8.2
AD Enterprise
★★★★★

AD Enterprise

AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution.

The Enterprise portion of this product needs work... - User in Government Administration

Ease of use
8.3
Support
8.2
Ease of Setup
7.3

Languages supported: English

7.0
BlackBerry Optics
★★★★★

BlackBerry Optics

BlackBerry Optics uses machine learning (ML) and artificial intelligence (AI) to identify and prevent widespread security incidents, providing consistent visibility, targeted threat hunting, and fast incident response.

Great tool, bad overhead - Jereme S.

Ease of use
Support
Ease of Setup
8.8
VMware Carbon Black EDR
★★★★★

VMware Carbon Black EDR

CB Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.

Carbon Black Response Hands of Threat Hunters - Swapnil R.

Ease of use
8.1
Support
9.0
Ease of Setup
8.0

Languages supported: English

9.6
SentinelOne Endpoint Protection Platform
★★★★★

SentinelOne Endpoint Protection Platform

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.

Best Endpoint Protection Tool - Eliud I.

Ease of use
9.1
Support
9.8
Ease of Setup
8.8

Languages supported: English

8.4
Tanium Core Platform
★★★★★

Tanium Core Platform

An enterprise solution that allows you to query and modify your managed computer assets in seconds, regardless of the size of your network.

Great product, but conflicts & repeated aspects have a bill - Jason W. S.

Ease of use
Support
Ease of Setup
8.2
Symantec Endpoint Detection and Response (EDR)
★★★★★

Symantec Endpoint Detection and Response (EDR)

Detect, isolate, and eliminate intrusions across all endpoints using AI, automated incident generation, and unparalleled threat intelligence.

The Symantec Endpoint Detection and Response is the better way to protect the computer from malwares - Luciano AurГ©lio R.

Ease of use
Support
Ease of Setup
6.6
Huntress Labs
★★★★★

Huntress Labs

The endpoint detection and remediation market is a crowded space with several great options for large organizations. However, most require analysts with security expertise, only integrate with enterprise products, and come at a steep price point.

Great service added to the stack - Consultant in Information Technology and Services

Ease of use
Support
Ease of Setup
9.2
IBM Trusteer Rapport
★★★★★

IBM Trusteer Rapport

Helps financial institutions detect and prevent malware infections and phishing attacks, maximizing protection for their customers.

IBM Trusteer protects Your online banking! - Atanas A.

Ease of use
Support
Ease of Setup
10.0
LMNTRIX
★★★★★

LMNTRIX

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response – not incident response. Our approach turns inward and assumes that you're already breached and that ...

LMNTRIX will always win in my playbook! They keep out the Threats, so YOU don't have to sweat! - Henry D.

Ease of use
Support
Ease of Setup

Languages supported: English

9.0
Incydr
★★★★★

Incydr

Next-Gen Data Loss Protection

Code42 Is Super Slow. For 20 Gigs of data, on 400mbps Upload, 5 days. Abundance of CPU and Ram. - Brandon T. B.

Ease of use
9.1
Support
8.8
Ease of Setup
0.0

Languages supported: English

8.4
BlackBerry Protect
★★★★★

BlackBerry Protect

BlackBerry Protect redefines what antivirus can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time.

Great Product once it's tuned. - Administrator in Government Administration

Ease of use
8.6
Support
8.1
Ease of Setup
0.0
9.4
Cortex XDR
★★★★★

Cortex XDR

Traditional antivirus (AV) is not the solution to endpoint security – it's the problem. AV can no longer stop today's threats. Traps™ advanced endpoint protection is the only product offering that replaces AV with “multi-method prevention”: a proprietary combination of malware and exploit prevention methods that pre-emptively block both known and unknown threats

Works and integrates well with Palo Alto NGFW - Mike P.

Ease of use
9.2
Support
9.4
Ease of Setup
9.8
8.2
Bitdefender GravityZone
★★★★★

Bitdefender GravityZone

Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.

A good option for the security of your business. - Hugo M.

Ease of use
8.6
Support
7.9
Ease of Setup
0.0

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.6
Worry Free Services
★★★★★

Worry Free Services

Worry-Free Services infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks.

Best complete security protection solution - Administrator in Chemicals

Ease of use
Support
Ease of Setup
9.6
FortiEDR
★★★★★

FortiEDR

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks.

Complete protection before and after the presence of a threat - Ava H.

Ease of use
Support
Ease of Setup
9.4
Cybereason Defense Platform
★★★★★

Cybereason Defense Platform

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.

Truly a leader in the EDR space! - Nick L.

Ease of use
Support
Ease of Setup
9.6
EnCase Endpoint Security
★★★★★

EnCase Endpoint Security

EnCase Endpoint Security combines two industry-leading products, EnCase Analytics and EnCase Cybersecurity, to detect, validate and prioritize unknown threats, assess the scope and impact of a compromise, and return devices to a trusted state.

Top notch security - User in Law Practice

Ease of use
Support
Ease of Setup
8.6
MVISION Endpoint Security
★★★★★

MVISION Endpoint Security

McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment.

Malware detection and protection tool - Charlotte T.

Ease of use
8.6
Support
8.4
Ease of Setup
8.7
8.6
SanerNow
★★★★★

SanerNow

A platform of Tools for endpoint security and systems management needs. Saner Platform queries systems to find aberrations, and helps systems to retain normality. Saner Queries and Monitors Endpoints, Analyzes the Security Posture, and Responds to Bring Endpoints to an Approved State.

SANER NOW IS EXCELLENT PRODUCT - Dhara B.

Ease of use
8.2
Support
8.7
Ease of Setup
7.6

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 0

9.0
Cisco AMP for Endpoints
★★★★★

Cisco AMP for Endpoints

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even the most advanced threats, including fileless malware and ransomware.

Consums small resource and provide good protection - Joe W.

Ease of use
9.2
Support
8.8
Ease of Setup
8.8
8.8
Microsoft Defender for Endpoint
★★★★★

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.

Microsoft Defender-Underdog amongst Giants - Abhishek A.

Ease of use
8.8
Support
8.7
Ease of Setup
0.0
8.4
FireEye Endpoint Security
★★★★★

FireEye Endpoint Security

FireEye Endpoint Security (HX series) products provide organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise that routinely bypass signature-based and defense-in-depth security systems.

FireEye Endpoint Security is the new standard - Administrator in Primary/Secondary Education

Ease of use
9.0
Support
8.3
Ease of Setup
8.6

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

8.6
N-able N-central
★★★★★

N-able N-central

As networks grow in complexity and scale to thousands or tens of thousands of devices, IT service providers need powerful tools to help them keep up. N-able N-central gives you that power.

it will be fixed in the next release... - Administrator in Computer Networking

Ease of use
7.6
Support
8.6
Ease of Setup
6.8

Languages supported: German, English, French, Dutch, Portuguese, Russian, Spanish

8.0
Proofpoint Enterprise Archive
★★★★★

Proofpoint Enterprise Archive

Proofpoint Enterprise Archive solutions provide automated social media content supervision, remediation, and record retention - all from a common interface.

Proofpoint Email Archiving & Supervision is User friendly & Powerful - Nandhitha R.

Ease of use
8.3
Support
7.9
Ease of Setup
8.5
8.4
N-able Remote Monitoring & Management
★★★★★

N-able Remote Monitoring & Management

Powerful, flexible, and scalable remote monitoring and management tool for IT service providers and MSPs, available through either cloud or on-premises delivery. N-able Remote Monitoring & Management empowers you to manage, monitor and secure your network from within a unified web-based console. This RMM offers a comprehensive suite of best-in-class security services delivered as part of a single integrated platform.

Solarwinds RMM - An Amazing Tool for MSPs and IT pros alike. - Dakarai B.

Ease of use
8.3
Support
8.3
Ease of Setup
8.1

Languages supported: German, English, French, Italian, Spanish

9.8
ESET PROTECT Enterprise
★★★★★

ESET PROTECT Enterprise

ESET Enterprise Inspector is ESET's Endpoint Detection and Response (EDR) tool for identification of anomalous behavior, identification of breaches, risk assessment, and further forensic investigation that features response capabilities to mitigate the discovered threats.

Ease of use - Steve S.

Ease of use
7.9
Support
0.0
Ease of Setup
0.0

Languages supported: Arabic, Bulgarian, Czech, Danish, German, Greek, English, Estonian, Finnish, French, Croatian, Hungarian, Indonesian, Italian, Japanese, Kazakh, Korean, Lithuanian, Dutch, Norwegian, Polish, Portuguese, Romanian, Russian, Slovak, Slovenian, Spanish, Serbian, Swedish, Thai, Turkish, Ukrainian, Vietnamese, Chinese (Simplified), Chinese (Traditional)

9.2
Comodo Endpoint Security Manager
★★★★★

Comodo Endpoint Security Manager

Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

Effective Next Gen AEP - Antivirus Software - Nemi G.

Ease of use
8.3
Support
9.5
Ease of Setup
8.0
B2B Software Guide