Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
Avast Small Office Protection is a cybersecurity software designed to help small businesses ensure protection from cyber-attacks and ransomware. The application enables organizations to secure various devices including laptops, mobiles, PCs, and tablets and block viruses, malware, spyware, and other online threats in real-time.
Avast Small Office Protection is a cybersecurity software designed to help small businesses ensure protection from cyber-attacks and ransomware. The...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
No images available

Starting from

US$4.00/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$139.99/year

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.3 /5
(38)

Ease of Use

4.0/ 5

Features

4.1/ 5

Customer Service

4.4/ 5

Value for Money

4.6/ 5

Overall rating

4.5 /5
(39)

Ease of Use

4.5/ 5

Features

4.3/ 5

Customer Service

4.2/ 5

Value for Money

4.5/ 5

Total features 36

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Automatic User/Device Recognition
  • Behavioral Analytics
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Data Management
  • Data Security
  • Deployment Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Root Cause Analysis
  • Security Management
  • Server Monitoring
  • Software Management
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting
  • Wireless Internet Access Control

Total features 20

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Automatic User/Device Recognition
  • Behavioral Analytics
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Data Management
  • Data Security
  • Deployment Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • Mobile Device Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Security Software
  • Patch Management
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Monitoring
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Root Cause Analysis
  • Security Management
  • Server Monitoring
  • Software Management
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting
  • Wireless Internet Access Control