Step up from your current corporate antivirus: More >
For Teams
|
Endpoint Protection
|
Endpoint Detection and Response
|
---|
For Teams
|
Endpoint Protection
|
Endpoint Detection and Response
|
|
---|---|---|---|
Number of devices | 1-9 | 10+ | 10+ |
Operating systems |
Windows
Mac
Android
Chrome
|
Windows
Mac
|
Windows
Mac
|
Threat Remediation | |||
Cleans infected devices | |||
On-demand and scheduled threat scans | |||
Linking Engine/Remediation Engine
Comprehensive malware/artifact removal
|
|||
Cyber Knight Breach Remediation
(MBBR): Dissolvable remediation agent
|
|||
Quarantine
Isolates detected threats for later remediation
|
|||
Forensic Timeliner tool
Forensics tool for Windows environments
|
|||
Discovery and Deployment tool
Unmanaged endpoint discovery and agent deployment
|
|||
Threat prevention | |||
Real-time Virus, malware, spyware protection | |||
Real-time Ransomware protection | |||
"Zero-day", file-less attack protection | |||
Brute force protection
Stops brute force Remote Desktop Protocol (RDP)
attacks
|
|||
Device Control policies
Allow/Block/Read-only control when USB device is
connected
|
|||
Multi-Vector Protection | |||
Web Protection
Helps prevent access to malicious websites, ad
networks, scammer
networks
|
|||
Application Hardening
Reduces vulnerability exploit surface and
proactively detects
fingerprinting attempts used by advanced attacks
|
|||
Exploit Mitigation
Proactively detects and blocks attempts to abuse
vulnerabilities and
remotely execute code on the endpoint
|
|||
Application Behavior Protection
Helps prevent applications from being leveraged to
infect the
endpoint
|
|||
Anomaly Detection Machine Learning
Proactively identifies unknown viruses and malware
via machine
learning techniques
|
|||
Payload Analysis
Anti-malware technology that identifies entire
families of known and
relevant malware with heuristic and behavioral rules
|
|||
Ransomware Mitigation
Detects and blocks ransomware via behavioral
monitoring technology
|
|||
Threat hunting, isolation, and recovery | |||
Suspicious Activity Monitoring
Continuous monitoring and visibility of endpoint
file system events,
network connections, process events, and registry activity
|
|||
Remote Analysis
Silently retrieve suspicious code for remote
investigation and logging
|
|||
Flight Recorder Search
Freeform threat hunting across all devices managed
by EDR
|
|||
Integrated Cloud Sandbox
Observes behaviors and actions of suspicious files,
validating local
Anomaly Detection Machine Learning verdicts
|
|||
Multimode endpoint Isolation
Network, process, and Windows desktop isolation
stops malware from
"phoning home" and locks out remote attackers
|
|||
Aggressive mode
Observes behaviors and actions of suspicious files,
validating local
Anomaly Detection Machine Learning verdicts
|
|||
Windows Ransomware Rollback
Up to 72 hours of protection for files encrypted,
deleted, or
modified by a ransomware attack (Windows platforms only)
|
|||
Management | |||
Cloud-based Nebula platform | |||
Centralized management console | |||
Threat visibility dashboards | |||
Asset management
Collects and displays endpoint details, including
installed
software, updates, startup programs, and more
|
|||
Automated and on-demand reports | |||
Email notifications, Syslog support | |||
Role-based access control (RBAC) | |||
Tamper Protection | |||
Single sign-on with SAML 2.0 support | |||
Active Directory integration | |||
Integration with existing security and management tools | |||
Support | |||
Email, chat, remote technical support | |||
Phone technical support | |||
Premium support packages | AVAILABLE | AVAILABLE | |
Premium Services | |||
Implementation, malware removal service | AVAILABLE | AVAILABLE |
Let us help you choose the right plan for your business in just a few steps.
Help me choose a solutionSelect your language