Related Products
|
||||||
About
Detect files considered malicious based on specific signatures discovered by researchers, publishers and our CTI team. Set up detection alerts on IOCs corresponding to known threats and enrich them with your own IOCs to adapt EDR to your environment. Our R&D team is constantly training its algorithms to enable you to detect binaries that are reputed to be undetectable. Take advantage of 1,200+ detection rules and identify potential new threats not listed by IOCs or in signature databases. An engine developed specifically to counter ransomware. Safeguards your EDR system against unauthorized tampering, ensuring it remains operational. Prevents the download and installation of malicious or vulnerable drivers using our continuously updated list. Receive alerts in case any malicious driver attempts to modify your EDR's monitoring and protection capabilities.
|
About
Advanced managed detection and response to secure the distributed enterprise. Expert guided security operations for early detection and automated response to mitigate risk across the enterprise. Preemptively detect malicious activity and respond to active threats before the endpoint is compromised. Efficiently discover and remediate critical threats and vulnerabilities across the enterprise. Extensive experience across our team has led us to an important realization too often overlooked: each organization has unique aspects and requirements for its cyber solutions. No team is exactly the same and your threats aren’t either. We developed the Squad Delivery Model to foster collaborative, high touch, tailored services that meet your specific needs and requirements.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Security teams looking for a platform that makes it easier to understand alerts and identify their origins
|
Audience
Enterprise security leader (CISO) who is responsible for managing security operations for distributed enterprise
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationHarfangLab
Founded: 2018
France
harfanglab.io/en/
|
Company InformationDeepwatch
Founded: 2019
United States
www.deepwatch.com/managed-detection-response/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Detection and Response (EDR) Features
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
|
||||||
Integrations
Amazon Web Services (AWS)
Filigran
Google Cloud Platform
Microsoft Azure
Mindflow
OVHcloud
OverSOC
Scaleway
|
Integrations
Amazon Web Services (AWS)
Filigran
Google Cloud Platform
Microsoft Azure
Mindflow
OVHcloud
OverSOC
Scaleway
|
|||||
|
|
|