Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • 24/7 (Live rep)
  • Chat
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • 24/7 (Live rep)
  • Chat
No images available

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$4.00/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Overall rating

4.3 /5
(38)

Ease of Use

4.0/ 5

Features

4.1/ 5

Customer Service

4.4/ 5

Value for Money

4.6/ 5

Total features 8

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Behavioral Analytics
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Data Security
  • Deployment Management
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Root Cause Analysis
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting

Total features 36

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Behavioral Analytics
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Data Security
  • Deployment Management
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Root Cause Analysis
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting