Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.8 /5
(34)

Ease of Use

4.6/ 5

Features

4.5/ 5

Customer Service

4.9/ 5

Value for Money

4.5/ 5

Overall rating

4.3 /5
(3)

Ease of Use

4/ 5

Features

4.7/ 5

Customer Service

3.3/ 5

Value for Money

4.3/ 5

Total features 28

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavioral Analytics
  • Cloud Application Security
  • Cloud Backup
  • Collaboration Tools
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Customizable Reports
  • Customization
  • DDoS Protection Software
  • Dashboard Creation
  • Data Analysis Tools
  • Data Collection
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deployment Management
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • IT Asset Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Issue Management
  • Load Balancing Tools
  • Log Access
  • Log Management
  • Mobile Access
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Next-Generation Firewall
  • Policy Management
  • Prioritization
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Threat Intelligence
  • Threat Response
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 90

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavioral Analytics
  • Cloud Application Security
  • Cloud Backup
  • Collaboration Tools
  • Compliance Management
  • Configuration Management
  • Continuous Monitoring
  • Customizable Reports
  • Customization
  • DDoS Protection Software
  • Dashboard Creation
  • Data Analysis Tools
  • Data Collection
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deployment Management
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • IT Asset Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Issue Management
  • Load Balancing Tools
  • Log Access
  • Log Management
  • Mobile Access
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Next-Generation Firewall
  • Policy Management
  • Prioritization
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Threat Intelligence
  • Threat Response
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • Malwarebytes for Business
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • Proofpoint Email Protection
  • SentinelOne
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection
  • Zscaler
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • Malwarebytes for Business
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • Proofpoint Email Protection
  • SentinelOne
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection
  • Zscaler