ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Phone Support
  • 24/7 (Live rep)
  • Chat
No images available

Starting from

A$396.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$4.00/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.7 /5
(1,168)

Ease of Use

4.5/ 5

Features

4.6/ 5

Customer Service

4.4/ 5

Value for Money

4.4/ 5

Overall rating

4.3 /5
(38)

Ease of Use

4.0/ 5

Features

4.1/ 5

Customer Service

4.4/ 5

Value for Money

4.6/ 5

Total features 69

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup and Recovery
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Deployment Management
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Tracking
  • Firewalls
  • For MSPs
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Updates
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support Software
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access/Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Total features 36

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Security
  • Backup Log
  • Backup and Recovery
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Backup
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Backup
  • Continuous Monitoring
  • Data Security
  • Deployment Management
  • Device Management
  • Differential Backup
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Tracking
  • Firewalls
  • For MSPs
  • Fraud Detection
  • IT Asset Management
  • Incident Management
  • Intrusion Detection System
  • Local Server Options
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Updates
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Remote Server Options
  • Remote Support Software
  • Reporting/Analytics
  • Root Cause Analysis
  • Secure Data Storage
  • Sensitive Data Identification
  • Server Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • VM Backup
  • VPN Software
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Access/Restoration
  • Web Threat Management
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • ActivePlatform
  • Autotask PSA
  • Axonius
  • Blumira
  • CYREBRO
  • ConnectWise Automate
  • ConnectWise PSA
  • Datto Workplace
  • Liongard
  • Salesforce Sales Cloud
Not provided by vendor