Related Products
|
||||||
About
CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
|
About
Multiple layers of protection for your devices and online privacy. Multi-layered, advanced security helps protect against existing and emerging malware threats to your devices, and help protect your private and financial information when you go online. Browse anonymously and securely with a no-log VPN. Add bank-grade encryption to help keep your information like passwords and bank details secure and private. We monitor and notify you if we find your personal information on the Dark Web. Easily create, store, and manage your passwords, credit card information and other credentials online – safely and securely. Automatic, secure cloud backup for PCs – to store and protect important files and documents against hard drive failures, stolen devices and even ransomware. Get notified if cybercriminals try to use your webcam, and we can help block them.
|
About
OpenText Core Endpoint Protection delivers next-generation, cloud-based security designed to stop ransomware, phishing, and zero-day attacks before they disrupt business operations. Using real-time machine learning and OpenText Threat Intelligence, it continuously identifies threats and blocks malicious behavior across all endpoints. The platform simplifies security management with pre-built policies, easy administration, and seamless integration with leading RMM tools. With cloud-based control, IT teams can monitor and protect devices from anywhere without requiring on-premises oversight. The solution minimizes downtime by preventing infections and enabling rapid isolation and investigation when suspicious activity occurs. For organizations seeking deeper visibility, it integrates seamlessly with OpenText Core EDR to provide advanced threat detection and workflow automation.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Large and mid-sized enterprises across diverse industries, particularly those that require advanced threat detection and response, such as finance, healthcare, manufacturing, technology, and government. It is especially suited for organizations dealing with sensitive data and facing complex cyber threats, often with a large workforce and intricate IT infrastructure
|
Audience
Individuals or small businesses that need a complete VPN solution
|
Audience
OpenText Core Endpoint Protection is ideal for organizations seeking real-time, cloud-based endpoint security that minimizes threats, simplifies management, and supports both remote and on-premises environments
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$39.99 per year
Free Version
Free Trial
|
Pricing
$30 per year
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCrowdStrike
Founded: 2011
United States
www.crowdstrike.com/platform/
|
Company InformationNorton
Founded: 1990
United States
us.norton.com/products
|
Company InformationOpenText
Founded: 1991
Canada
cybersecurity.opentext.com/products/threat-detection/endpoint-protection/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Detection and Response (EDR) Features
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
|||||
Integrations
Armis Centrix
Complyance
Coralogix
Cyware
DatAnswers
DataBahn
Falcon Identity Threat Detection
Falcon X Recon
Hyperproof
IBM Verify
|
Integrations
Armis Centrix
Complyance
Coralogix
Cyware
DatAnswers
DataBahn
Falcon Identity Threat Detection
Falcon X Recon
Hyperproof
IBM Verify
|
Integrations
Armis Centrix
Complyance
Coralogix
Cyware
DatAnswers
DataBahn
Falcon Identity Threat Detection
Falcon X Recon
Hyperproof
IBM Verify
|
||||
|
|
|
|