Endpoint Detection and Response
Advanced Malware Detection
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Behavioral Analytics
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Botnet Detection
N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
Cloud-based Sandboxing
N/AN/AN/AN/AAvaliableAvaliableN/AN/AN/AN/AAvaliableAvaliableAvaliable
Alert Management Workflow
AvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliable
Risk Prioritization
AvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Incident Auto-correlation
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliable
Incident Visualization
AvaliableN/AN/AN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliable
File Reputation
N/AN/AAvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Event History
N/AAvaliableN/AN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliable
Remediation Task List
AvaliableAvaliableN/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/AAvaliable
Termination of Malicious Activity
N/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliable
Registry Repair
N/AN/AAvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/AN/AAvaliable
NIC's Disabling
N/AN/AAvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliableN/AAvaliable
Platforms
  • Linux
  • macOS
  • Windows
  • Linux
  • macOS
  • Windows
  • Linux
  • macOS
  • Windows
  • Windows
  • Windows Server 2003-2016
  • Linux
  • macOS
  • Windows
  • Linux
  • macOS
  • Windows
  • Android
  • iOS
  • Windows
  • Android
  • Linux
  • macOS
  • Windows
  • Android
  • iOS
  • Linux
  • macOS
  • Windows
  • Android
  • iOS
  • macOS (limited)
  • Windows
  • Linux
  • macOS
  • Windows
  • macOS
  • Windows
  • Linux
  • macOS
  • Windows
Endpoint Detection and Response
Advanced Malware Detection
Behavioral Analytics
Botnet Detection
Cloud-based Sandboxing
Alert Management Workflow
Risk Prioritization
Incident Auto-correlation
Incident Visualization
File Reputation
Event History
Remediation Task List
Termination of Malicious Activity
Registry Repair
NIC's Disabling
Platforms