Soluciones Endpoint para detección y respuesta

Soluciones Endpoint para detección y respuesta: encuentra el mejor producto para tu empresa utilizando la página Capterra España.

¿Por qué Capterra es gratis?
Netsurion permite a las organizaciones predecir, prevenir, detectar y responder con éxito a las amenazas de ciberseguridad. Su plataforma de gestión de eventos e información de seguridad (SIEM), EventTracker, unifica el aprendizaje automático, la analítica del comportamiento y la orquestación de seguridad, con reconocimiento por 11 años consecutivos en Cuadrante mágico de Gartner en la categoría SIEM. El servicio de seguridad administrado, EventTracker SIEMphonic, ofrece un servicio SIEM de gestión compartida, impulsado por el centro de operaciones de seguridad (SOC) que funciona en horario ininterrumpido. EventTracker EDR también protege los puntos finales críticos de ataques de día cero y malware mutante. Descubre más sobre EventTracker Al proporcionar SIEM, EDR y un SOC en horario ininterrumpido, se entrega protección avanzada contra amenazas y orquestación de seguridad de manera rápida y eficiente. Descubre más sobre EventTracker
Elimina todo tipo de amenazas, incluidos virus, malware, ransomware, rootkits, gusanos y spyware con escaneo opcional con tecnología de la nube para brindar un rendimiento y detección aún mejores. ESET utiliza tecnologías de varias capas que van mucho más allá de las capacidades de un antivirus básico. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota.

Por Trend Micro

(65 opiniones)
Ver perfil
Trend Micro Apex One utiliza una combinación de técnicas avanzadas de protección contra amenazas para eliminar las brechas de seguridad en cualquier actividad del usuario y en cualquier terminal. Constantemente aprende, se adapta y comparte automáticamente la información sobre amenazas en tu entorno. Esta combinación de protección se entrega a través de una arquitectura que utiliza los recursos de terminales de manera más efectiva y, en última instancia, supera a la competencia en cuanto a CPU y utilización de la red. Seguridad de terminal integral automática e intuitiva del líder de confianza.
Ver perfil
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.

Por CrowdStrike

(5 opiniones)
Ver perfil
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Por Jazz Networks

(4 opiniones)
Ver perfil
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.

Por Great Bay Software

(1 opinión)
Ver perfil
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

Por Kaspersky Lab

(1 opinión)
Ver perfil
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

Por Plurilock Security Solutions

(0 opiniones)
Ver perfil
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.

Por Hypori

(0 opiniones)
Ver perfil
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

Por Anakage

(0 opiniones)
Ver perfil
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.

Por Infocyte

(0 opiniones)
Ver perfil
Infocytes platform helps security teams assess, detect, and respond to cyber threats (risks, vulnerabilities, attacks, breaches and more) and streamline cybersecurity operations. Managed security service providers leverage our platform to deliver cost-effective cybersecurity risk assessments, cyber incident response, and managed detection and response services. Reduce risk, maintain compliance, and streamline cybersecurity operations with Infocytethe platform for proactive cybersecurity. Reduce risk, maintain compliance, and streamline cybersecurity operations with Infocytethe platform for proactive cybersecurity.

Por Ziften Technologies

(0 opiniones)
Ver perfil
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

Por DigitalDefense

(0 opiniones)
Ver perfil
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

Por IntSights

(0 opiniones)
Ver perfil
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

Por Palo Alto Networks

(0 opiniones)
Ver perfil
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

Por Cyberbit

(0 opiniones)
Ver perfil
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

Por Cybereason

(0 opiniones)
Ver perfil
Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities. Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities.

Por Tanium

(0 opiniones)
Ver perfil
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

Por Symantec

(0 opiniones)
Ver perfil
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

Por Fidelis Cybersecurity

(0 opiniones)
Ver perfil
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.