17 years helping Australian businesses choose better software
Extended Detection and Response (XDR) Software
XDR (Extended Detection and Response) platforms enable users to detect and manage security threats across data sources such as endpoints, networks, email systems, cloud servers, and more. Typical features include threat intelligence, machine learning, and endpoint protection. XDR software is related to Cybersecurity and Endpoint Detection and Response.
Read more
Read less
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
"Overall the experience was good, it was a good product that did what we needed. There are lighter,..."
Read the full review
Lucas
Director in Australia
This information was sourced from Intercept X Endpoint
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of Intercept X Endpoint
Pros:
DLP(Data Lost Prevention) features are useful and easy to implement on workstations. Useful Web application filter to implement specific rules to users and/or equipments.
Read more
Cons:
Portal and setup can be confusing with not too much concise and simple documentation.
Read more
This information was sourced from Intercept X Endpoint
"We use S1 in tandem with Huntress and the response we get via monitor is second to none. Sometimes..."
Read the full review
Lucas
Director in Australia
This information was sourced from SentinelOne
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of SentinelOne
Pros:
The support service, which responds rapidly and sorts out the issues within few mail correspondences.
Read more
Cons:
They have multiple consoles and knowing which one hosts which computers can be a bit hard. But they are going down to one console soon.
Read more
This information was sourced from SentinelOne
Who Uses SentinelOne?
Organizations around the world looking for the best cybersecurity solution on the market. Including private and public sectors, scalable to any size...
This information was sourced from Microsoft 365 Defender
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of Microsoft 365 Defender
Pros:
The advantages of this program is that since it comes integrated with Microsoft, it makes an analysis, that you can make it deep or make it fast, towards all your files in your pc.
Read more
Cons:
Can sometimes forget it is on or running because there are not many notifications.
Read more
This information was sourced from Microsoft 365 Defender
Who Uses Microsoft 365 Defender?
DevOps and Security Operations (SecOps) teams
Security engineering teams
IT teams
CISOs and CTOs
Red, Blue, and Purple Teams
CSIRT & forensic...
"Working with and selling Falcon to customers has brought overall threat risk down. The technology..."
Read the full review
Andre
BDM in South Africa
This information was sourced from Falcon
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of Falcon
Pros:
Have used this product for several years across multiple organizations. Have seen good return on investment containing malware outbreaks.
Read more
Cons:
Another thing that you can miss, you cannot run a scan on your computer manually, to find viruses or other malicious files, it is supposed to be monitored all the time through the portal.
Read more
"I think the setup process to get Jamf Protect implemented is a big pro. Being able to work with a..."
Read the full review
Shem
Apple Platform Engineer in US
This information was sourced from Jamf Protect
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of Jamf Protect
Pros:
It allows us to save the budget and avoid unnecessary payment for overpriced data abroad for our colleagues.
Read more
Cons:
Remediation is a little difficult and nothing is built in.
Read more
This information was sourced from Jamf Protect
Who Uses Jamf Protect?
Jamf Protect is built for Mac to protect Mac. It's the ideal solution for security and IT teams looking to improve their overall security posture by...
Austria, Belgium, Canada, Denmark, Finland, France, Germany, India, Ireland, Italy
, Luxembourg, Netherlands, Norway, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 10 others
"It has brought a security posture enhancement. Important audit related demands were fulfilled by..."
Read the full review
Anonymous reviewer
This information was sourced from Cortex XDR
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from verified user reviews of Cortex XDR
Pros:
Cortex made it easy to locate and clean these machines and if needed it made it easy to isolate them until they were cleaned and approved to be put back on our network.
Read more
Cons:
In the beginning the training options for the cloud version were almost non-existent. Even now, our training option was cancelled because of no other applicants for it.
Read more
This information was sourced from Cortex XDR
Who Uses Cortex XDR?
Cloud-based endpoint detection and response platform that enables security teams to protect, respond, and detect attacks leveraging AI and machine...
Australia, Brazil, Canada, China, France, Germany, India, Italy, Japan, Mexico
, North Korea, Singapore, South Korea, Spain, Taiwan, United Kingdom, United States
and 7 others
"No geral eu consigo trabalhar tranquilamente com a plataforma e levar segurança para os clientes em..."
Read the full review
gabriel
Analista de Cyber Security in Brazil
This information was sourced from EcoTrust
Behavioral Analytics
Threat Response
Threat Intelligence
Endpoint Protection Software
AI/Machine Learning
Network Scanning
This information was sourced from EcoTrust
Who Uses EcoTrust?
EcoTrust is ideal for large organizations seeking to enhance their cybersecurity and risk management. Specifically, it's designed for companies with...
This information was sourced from verified user reviews of Vijilan
Pros:
I like the amount of detail in the tickets, so I know what the issue is/where I need to review with just a glance. It then goes into greater detail at the bottom in case I need more.
Read more
Cons:
Some of the alerts can be a bit noisy and don't always give the most detailed information.
Read more
This information was sourced from Vijilan
Who Uses Vijilan?
Managed service providers
IT companies
Value added Resellers
Master agents
Telecom companies
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.