Symantec Endpoint Detection and Response

Symantec Endpoint Detection and Response

Symantec Endpoint Detection and Response is designed to meticulously identify and analyze event data generated by managed devices. With its Endpoint Activity Recorder, it effectively detects intricate threats across files, folders, and processes, allowing organizations to respond swiftly to potential security incidents and enhance their overall cybersecurity posture.

Top Symantec Endpoint Detection and Response Alternatives

1

Broadcom

A global technology leader, Broadcom Inc. offers DX Application Performance...

By: Broadcom From United States
2

Network Detection and Response

Network Detection and Response (NDR) is a cloud-based cybersecurity service designed to expedite attack detection and response across various infrastructures, including IoT and 5G.

By: Verizon From United States
3

Mobile Defense

Mobile Defense offers robust protection against threats from malicious Wi-Fi hotspots and risky applications on employee-owned devices.

By: Proofpoint From United States
4

Comodo

This cloud-native cybersecurity platform offers state-of-the-art scanning and continuous monitoring to ensure robust protection against internet threats.

By: Comodo From United States
5

VMware Carbon Black App Control

VMware Carbon Black App Control effectively locks down critical servers and systems, preventing unauthorized changes and ensuring compliance with regulatory mandates.

By: Broadcom From United States
6

Trustwave EPS

Trustwave EPS offers robust cybersecurity protection with 24/7 threat detection and incident response.

By: TrustWave From United States
7

Cisco Adaptive Security Device Manager (ASDM)

This intuitive application features setup wizards that guide users through the management of firewall devices...

By: Cisco From United States
8

Imperva Sonar

By automating workflows and enhancing incident response, it empowers organizations to securely navigate digital transformation...

By: Imperva From United States
9

HP Wolf Security

Its unique features include CPU-enforced malware prevention, remote device management, and continuous anomaly monitoring...

By: HP From United States
10

Jamf Protect

It offers robust threat detection, compliance controls, and remediation capabilities...

By: Jamf From United States
11

DeepArmor

By intercepting threats before execution, it eliminates reliance on post-infection tactics, streamlining security processes and...

By: SparkCognition From United States
12

ManageEngine Browser Security Plus

It enhances visibility into browser usage, hardens configurations, controls extensions, and ensures compliance, effectively mitigating...

By: ManageEngine From United States
13

Proofpoint Mobile Defense

Proofpoint Mobile Defense safeguards corporate data by detecting and mitigating these threats, ensuring that sensitive...

By: Proofpoint From United States
14

Unified Endpoint Manager

It enables effective user profile management and automated OS patching, enhancing security and minimizing downtime...

By: Ivanti From United States
15

OneSite

It simplifies complex workflows, enabling organizations to swiftly remediate vulnerabilities without additional infrastructure...

By: Adaptiva From United States