Endpoint Detection and Response | |||||||||||||
Advanced Malware Detection | |||||||||||||
Behavioral Analytics | |||||||||||||
Botnet Detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Cloud-based Sandboxing | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Alert Management Workflow | N/A | N/A | N/A | ||||||||||
Risk Prioritization | N/A | N/A | |||||||||||
Incident Auto-correlation | N/A | N/A | |||||||||||
Incident Visualization | N/A | N/A | N/A | N/A | N/A | ||||||||
File Reputation | N/A | N/A | N/A | N/A | |||||||||
Event History | N/A | N/A | N/A | N/A | N/A | ||||||||
Remediation Task List | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Termination of Malicious Activity | N/A | N/A | |||||||||||
Registry Repair | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
NIC's Disabling | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Platforms |
|
|
|
|
|
|
|
|
|
|
|
|
|
Endpoint Detection and Response |
Advanced Malware Detection |
Behavioral Analytics |
Botnet Detection |
Cloud-based Sandboxing |
Alert Management Workflow |
Risk Prioritization |
Incident Auto-correlation |
Incident Visualization |
File Reputation |
Event History |
Remediation Task List |
Termination of Malicious Activity |
Registry Repair |
NIC's Disabling |
Platforms |