18 years helping Australian businesses choose better software
Endpoint Detection and Response Software
Endpoint Detection And Response (EDR) software helps organizations protect their networks from malicious software that can enter the system via endpoint devices.
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
"Having used the software for more than 3years now, i would highly recommend it to people. it has..."
Read the full review
Martin
IT Technician in Kenya
This information was sourced from TeamViewer Remote
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of TeamViewer Remote
Pros:
The greatest feature is the ease of access to support customers remotely. There was prerequisites to integrate with our existing platform, it was seemless.
Read more
Cons:
It's slow and clunky, often having trouble launching. Their new Web Monitoring product which replaced Monitis is half-baked and missing features, we are unable to use it.
Read more
This information was sourced from TeamViewer Remote
Who Uses TeamViewer Remote?
Remote desktop, remote support, IT management, web monitoring, remote work and web conferencing, Remote access, Augmented reality support, digitizatio...
"Stops a lot of malware sites. Blocks malware popups and does not slow down the computer"
Read the full review
Natan
Coder in Spain
This information was sourced from ESET Endpoint Security
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of ESET Endpoint Security
Pros:
Ease of use, quick installation, frequent database update, integrate seamlessly.
Read more
Cons:
The disadvantages it has are: it analyzes a few files (zip, ace, rar), the options it has been limited. Sometimes has problems detecting compressed programs; some files do not disinfect them.
Read more
This information was sourced from ESET Endpoint Security
Who Uses ESET Endpoint Security?
ESET Endpoint Security offers a cloud-based and on-premises application for any size company that requires comprehensive protection for their devices.
"For several years, WebTitan has supported us with a reliable web filtering tool that has served us..."
Read the full review
Nabila
Human Resources Manager in Malaysia
This information was sourced from WebTitan
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of WebTitan
Pros:
The platform is very easy to use, simple interface easy to navigate.
Read more
Cons:
I cannot seem to get it to show the same list of blocked attempts in the email. I can only get a block count by category along with a unique domain count.
Read more
This information was sourced from WebTitan
Who Uses WebTitan?
This is a business solution for any business that wants a vital security layer at the HTTP and HTTPS layer and wants to control web content.
"PRTG brings a lot of value to our organization and it works well to notify our Department immediatel..."
Read the full review
Adam
Service Desk Manager in US
This information was sourced from PRTG
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of PRTG
Pros:
Overall good product and gives needed visibility.
Read more
Cons:
The interface was a little weird to understand at first. However, I had to find how to add users and groups for alerts.
Read more
This information was sourced from PRTG
Who Uses PRTG?
Paessler and PRTG, are two names inseparably associated with award-winning monitoring. PRTG is the ideal solution for small to enterprise infrastructu...
"Splunk is a powerful and useful monitoring tool. Splunk's efficiency is enhanced by the ability to..."
Read the full review
Shayla
Human Resources Specialist in US
This information was sourced from Splunk Enterprise
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Splunk Enterprise
Pros:
When you need to store, correlate, and search large amounts of data, especially System Log data, there is no tool that even comes close to Splunk. It's power and flexibility is amazing.
Read more
Cons:
So, first time user it can be difficult to use it.
Read more
This information was sourced from Splunk Enterprise
Who Uses Splunk Enterprise?
AI-powered solutions for security and observability that accelerate detection, investigation and response. Supported by an enterprise-class platform...
Australia, Brazil, Canada, China, France, Germany, India, Japan, Mexico, Netherlands
, New Zealand, Singapore, United Kingdom, United States
and 4 others
Languages
Chinese, English, French, German, Italian, Japanese, Korean, Portuguese, Russian, Spanish
, Traditional Chinese
and 1 others
"Bitdefender is a great tool that gives us confidence that our data is safe when our partners browse..."
Read the full review
Diego Martin
Marketing Analyst in Peru
This information was sourced from Bitdefender GravityZone
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Bitdefender GravityZone
Pros:
Multi-tenancy options, APIs advanced integration with several SIEM platforms (we tested the integration with Sumo Logic). The attractive price point (if compared to other EDR vendors).
Read more
Cons:
Customer service at Bitdefender was frustrating to deal with and less than accommodating.
Read more
This information was sourced from Bitdefender GravityZone
Who Uses Bitdefender GravityZone?
Network security system that helps businesses of all sizes protect data from cyber threats with a unified prevention, detection, response, and...
"I continue to use the software at home and recommend to anyone out there to include Webroot in..."
Read the full review
Steven
Operations Support Specialist in US
This information was sourced from Webroot Business Endpoint Protection
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Webroot Business Endpoint Protection
Pros:
I haven't had any virus infections since installing the software. It's easy to navigate through the different functions and set up specific parameters.
Read more
Cons:
Mac integration has been difficult since Catalina. Sometimes endpoint updates have adverse effects on performance.
Read more
This information was sourced from Webroot Business Endpoint Protection
Who Uses Webroot Business Endpoint Protection?
Webroot® Business Endpoint Protection is for any size of organization but because of its high effectiveness and low management overheads is particular...
"This is a very comprehensive solution to maximize security and generate robust protection against..."
Read the full review
Derek
IT Analyst in US
This information was sourced from Safetica
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Safetica
Pros:
It is easy to use and it has lots of features.
Read more
Cons:
The user/equipment maintenance is difficult to manage, for example removing a device and after a while it gets synced again not sure if it’s An AD sub issue, or the agent reporting back automatically.
Read more
This information was sourced from Safetica
Who Uses Safetica?
Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it.
With advanced data discovery, context-aware...
This information was sourced from verified user reviews of Automox
Pros:
Automox is still rapidly building and evolving their product to meet the needs of the community and progress is very transparent.
Read more
Cons:
There's no way to do bandwidth capping for downloads. There doesn't seem to be any uninstall prevention.
Read more
This information was sourced from Automox
Who Uses Automox?
We serve mid-to-enterprise ITOps teams struggling with few resources and little time with an appetite to slash cost, reduce complexity, and win back...
This information was sourced from WatchGuard Endpoint Security
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of WatchGuard Endpoint Security
Pros:
Easy operation of the tool from an integrated console.
Read more
Cons:
If the machine is re-imaged, even if the ID is the same , it's very difficult to get the software to recognise this, this can result in duplicate licences.
Read more
This information was sourced from WatchGuard Endpoint Security
Who Uses WatchGuard Endpoint Security?
WatchGuard Endpoint Security delivers the technologies required to stop advanced cyberattacks on endpoints, including next-gen antivirus, EDR,...
"We use S1 in tandem with Huntress and the response we get via monitor is second to none. Sometimes..."
Read the full review
Lucas
Director in Australia
This information was sourced from SentinelOne
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of SentinelOne
Pros:
The support service, which responds rapidly and sorts out the issues within few mail correspondences.
Read more
Cons:
They have multiple consoles and knowing which one hosts which computers can be a bit hard. But they are going down to one console soon.
Read more
This information was sourced from SentinelOne
Who Uses SentinelOne?
Organizations around the world looking for the best cybersecurity solution on the market. Including private and public sectors, scalable to any size...
This information was sourced from Microsoft 365 Defender
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Microsoft 365 Defender
Pros:
The advantages of this program is that since it comes integrated with Microsoft, it makes an analysis, that you can make it deep or make it fast, towards all your files in your pc.
Read more
Cons:
Can sometimes forget it is on or running because there are not many notifications.
Read more
This information was sourced from Microsoft 365 Defender
Who Uses Microsoft 365 Defender?
DevOps and Security Operations (SecOps) teams
Security engineering teams
IT teams
CISOs and CTOs
Red, Blue, and Purple Teams
CSIRT & forensic...
"We feel that we've been able to significantly improve our organization's awareness across the board..."
Read the full review
Bill
CTO in US
This information was sourced from Orca Security
Anomaly/Malware Detection
Whitelisting/Blacklisting
Prioritization
Remediation Management
Continuous Monitoring
This information was sourced from verified user reviews of Orca Security
Pros:
Their dashboards provide an intuitive, easy to digest view of the current state of application security without being swamped by alerts and information.
Read more
Cons:
Lack of on-prem/legacy scanning is a real bummer.
Read more
This information was sourced from Orca Security
Who Uses Orca Security?
Large and medium sized enterprises as well as 'born in the cloud' companies in industries such as SaaS, FinTech, retail, internet, media, ad tech,...
Australia, Austria, Belgium, Canada, Czechia, Denmark, Finland, France, Germany, Hong Kong SAR China
, India, Ireland, Israel, Italy, Japan, Luxembourg, Malaysia, Netherlands, New Zealand, Norway, Poland, Portugal, Qatar, Singapore, Slovakia, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 22 others
Argentina, Australia, Bolivia, Brazil, Canada, Chile, Colombia, Ecuador, Falkland Islands, France
, French Guiana, Germany, Guyana, India, Ireland, Israel, Italy, Mexico, Netherlands, New Zealand, Paraguay, Peru, Philippines, Singapore, South Africa, Suriname, United Arab Emirates, United States, Uruguay, Venezuela
and 20 others
What is endpoint detection and response (EDR) software?
Endpoint detection and response (EDR)
software helps organizations continuously monitor, investigate, and respond to active threats that target network endpoints.
An effective EDR system should include the following capabilities:
Network breaches are becoming more prevalent and most of the breaches are initiated via endpoints such as desktops, mobile devices, or servers. A well-implemented EDR strategy offers tremendous benefits, such as:
Real-time protection against new threats:
AV-Test, an IT security company, registers over
350,000
new malware and potentially unwanted applications every day. EDR software collects endpoint data that offer granular visibility around patterns, behavior, and other clues to identify and highlight potentially harmful applications and new malware in real time. Availability of real-time information can help IT teams safeguard networks from both existing and new threats.
Proactive cyber defense using data analytics:
EDR solutions are not just restricted to securing endpoints and networks—they also help in investigating threats. EDR solutions continuously monitor online and offline endpoints, and collect data on historical events that can be used to map out guidelines to prevent future incidents. These solutions also provide intelligent feeds to IT security teams that can help them avoid critical damage before it’s too late.
Typical features of EDR software
Alerts/notifications:
Send alerts and notify critical stakeholders whenever the solution discovers a threat or anomaly in the network.
Anomaly/malware detection:
Scan and detect potentially dangerous and harmful software that can disrupt or damage an endpoint or gain unauthorized access to a network.
Reporting/analytics:
View and track metrics related to network security.
Remediation management:
Identify and implement steps to restore systems to optimal conditions.
Behavioral analytics:
Continuously track the behavior of the systems connected to a network to check for anomalies.
Continuous monitoring:
Continuously assess and monitor system health and application usage.
Considerations when purchasing endpoint detection and response software
Basic vs. high-end EDR solution:
EDR software typically begins by collecting, storing, and analyzing large amounts of data which it uses to offer security insights to IT teams. Basic solutions may simply collect data and present the information on the screen; the decision to quarantine or delete infected files depends on the in-house security experts. Advanced solutions, on the other hand, may analyze the scan results and then self-clean the system.
Cloud vs. on-premise:
Cloud deployment of the software offers benefits such as a lower upfront cost, faster service delivery, and remote management. But it stores your data on third-party servers, which limits your control over your data. If you’re willing to share your business and security data with a third-party service provider, opt for cloud-based option; otherwise, go with on-premise deployment.
Relevant EDR software trends
EDR market to grow:
The EDR market is expected to grow at almost
50% annually through 2020
, and most large enterprises will have EDR capabilities by 2025.The growth will be driven by the fact that current EDR implementation spans only 40 million endpoints; there are over 711 million desktops, laptops and other devices that can still utilize this software.
EPP and EDR to consolidate:
Endpoint protection platforms (EPP)
will consolidate with EDR in the near future, triggered by businesses no longer solely relying on protection solutions; they need more advanced solutions that can detect and respond to live threats while constantly protecting the networks. Approximately
40% of EDR
deployments are using both EDR and EPP from the same vendor. Going forward, vendors will bundle their EPP and EDR offerings into one consolidated application.
Machine learning and AI
:
EDR applications collect huge amount of data every minute. It’s not possible for humans to manage and analyze such volume of data. That's why vendors are now adding AI capabilities to their solutions to speed up the scanning process and proactively detect threats. Machine learning helps identify new practices of attacks and update the application based on ever-changing user and endpoint behavior.
Sorting details
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.