---
description: Page 3 - Compare the top Endpoint Detection And Response (EDR) software & providers for Indian businesses. Filter by price, feature or user rating to make software selection fast and easy.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 3 - Endpoint Detection And Response (EDR) software - Compare Prices & Top Sellers - Capterra India
---

Breadcrumb: [Home](/) > [Endpoint Detection And Response (EDR) software](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software) > [Page 3](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3)

# Endpoint Detection And Response (EDR) software

Canonical: https://www.capterra.in/directory/31695/endpoint-detection-and-response/software

Page: 3 / 5\
Prev: [Previous page](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=2)\
Next: [Next page](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=4)

> Endpoint Detection And Response (EDR) software helps organizations protect their networks from malicious software that can enter the system via endpoint devices.

-----

## Products

1. [Enginsight](https://www.capterra.in/software/183883/enginsight) — 5.0/5 (6 reviews) — Enginsight EDR: More than just EDR. Provides host-based IDS/IPS, vulnerability scanning, auto-pentesting and micro-segmentation for com
2. [Jazz Platform](https://www.capterra.in/software/189135/jazz-platform) — 5.0/5 (6 reviews) — Machine learning \&amp; policy engine provide threat detection \&amp; response. Also used for threat hunting \&amp; automated security training.
3. [Uptycs](https://www.capterra.in/software/202557/uptycs) — 4.7/5 (6 reviews) — Uptycs unified CNAPP and XDR secures your enterprise from endpoint through cloud, eliminating tool, team, and infrastructure silos.
4. [Heimdal XDR](https://www.capterra.in/software/1025292/heimdal-extended-detection-and-response-xdr) — 4.8/5 (6 reviews) — Heimdal's XDR platform brings together and streamlines more than 12 security tools on the same dashboard.
5. [Inky](https://www.capterra.in/software/153507/inky) — 4.2/5 (5 reviews) — INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing.
6. [Cynet 360](https://www.capterra.in/software/177290/cynet-360) — 4.8/5 (5 reviews) — Cynet All-in-One includes the industry's top performing EDR - with a perfect 100% detection score in the 2023 MITRE ATT\&amp;CK Evaluation.
7. [Axonius](https://www.capterra.in/software/178568/axonius-cybersecurity-asset-management-platform) — 5.0/5 (5 reviews) — Axonius: A comprehensive system of record for digital assets, from hardware and software to cloud, user identities, and SaaS apps.
8. [Symantec Endpoint Detection and Response](https://www.capterra.in/software/189152/symantec-edr) — 3.6/5 (5 reviews) — Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
9. [Beyond DLP](https://www.capterra.in/software/201615/beyond-dlp) — 4.8/5 (5 reviews) — BeyondDLP Enables A Safe Data Experience A unique \&amp; Proactive Data Loss \&amp; Leakage Prevention solution to protect your data - anywhere.
10. [NACVIEW](https://www.capterra.in/software/1026915/nacview) — 4.2/5 (5 reviews) — NACVIEW is a modern, easy to implement and integrate network access control solution.
11. [Cybereason](https://www.capterra.in/software/189145/cybereason-platform) — 5.0/5 (4 reviews) — The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
12. [FortiEDR](https://www.capterra.in/software/202942/fortiedr) — 4.5/5 (4 reviews) — FortiEDR is an endpoint security software that provides real-time threat detection and automated response against advanced attacks.
13. [Threat Detection Marketplace](https://www.capterra.in/software/207176/threat-detection-marketplace) — 5.0/5 (4 reviews) — SOC Prime TDM is a SaaS community delivering threat detection content that can be used across various SIEM formats and EDR solutions.
14. [Heimdal Ransomware Encryption Protection](https://www.capterra.in/software/1013930/heimdal-ransomware-encryption-protection) — 4.8/5 (4 reviews) — A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks.
15. [Comodo](https://www.capterra.in/software/1042231/comodo) — 4.8/5 (4 reviews) — Comodo offers endpoint protection and threat prevention solutions for businesses, consumers, and everything in between.
16. [Quadrant XDR](https://www.capterra.in/software/1049353/sagan) — 5.0/5 (4 reviews) — Quadrant combines the best security technology and talent in a single XDR solution.
17. [BIMA](https://www.capterra.in/software/1063789/bima) — 5.0/5 (4 reviews) — BIMA by Perisai merges EDR, NDR, XDR, and SIEM features for a holistic cybersecurity approach. For specifics, consult Perisai directly.
18. [InsightIDR](https://www.capterra.in/software/172929/insightidr) — 4.3/5 (3 reviews) — InsightIDR is your threat detection \&amp; response solution. Find \&amp; respond to all of the top attack vectors behind breaches.
19. [Arctic Wolf SOC-as-a-Service](https://www.capterra.in/software/201891/soc-as-a-service) — 3.7/5 (3 reviews) — A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
20. [condignum](https://www.capterra.in/software/216021/condignum) — 5.0/5 (3 reviews) — cloud-based SaaS solution to design, manage and optimise security requirements for your use cases and IT Security Challenges.
21. [TEHTRIS XDR Platform](https://www.capterra.in/software/1052644/tehtris-xdr) — 4.3/5 (3 reviews) — Endpoint security solution that neutralizes known and unknown threats, without human interaction.
22. [Cisco Secure Cloud Analytics](https://www.capterra.in/software/178532/stealthwatch-cloud) — 4.5/5 (2 reviews) — Protect your cloud assets and private network. Improve security and incident response across the distributed network.
23. [TeamViewer DEX](https://www.capterra.in/software/198596/tachyon) — 4.0/5 (2 reviews) — Autonomous DEX: A personalized digital experience for every user.
24. [ManageEngine DataSecurity Plus](https://www.capterra.in/software/201796/datasecurity-plus) — 4.0/5 (2 reviews) — Protect the integrity and privacy of sensitive data throughout its life cycle—during storage, transit, and use.
25. [Myra Security](https://www.capterra.in/software/217452/web-application-security) — 4.5/5 (2 reviews) — Cloud-based security solutions protecting businesses from DDoS, data leaks, and cyberattacks while ensuring high compliance standards.

-----

Page: 3 / 5\
Prev: [Previous page](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=2)\
Next: [Next page](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.capterra.in/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.in/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.in/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.in/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.in/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.in/directory/31695/endpoint-detection-and-response/software)
- [All Categories](https://www.capterra.in/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra India","address":{"@type":"PostalAddress","addressLocality":"Mumbai","addressRegion":"MH","postalCode":"400051","streetAddress":"Gartner India Research & Advisory Services Pvt. Ltd. Raheja Towers 2nd Floor C-30 G- Block Bandra East Mumbai 400051 India"},"description":"Capterra India helps businesses find the best software. With verified reviews, prices & features, our interactive tool makes software selection fast & easy.","email":"info.india@gartner.com","url":"https://www.capterra.in/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.in/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/@CapterraIndia"]},{"name":"Capterra India","url":"https://www.capterra.in/","@type":"WebSite","@id":"https://www.capterra.in/#website","publisher":{"@id":"https://www.capterra.in/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.in/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Endpoint Detection And Response (EDR) software","description":"Page 3 - Compare the top Endpoint Detection And Response (EDR) software & providers for Indian businesses. Filter by price, feature or user rating to make software selection fast and easy.","url":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3","about":{"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#webpage","mainEntity":{"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#itemlist"},"isPartOf":{"@id":"https://www.capterra.in/#website"},"inLanguage":"en-IN","publisher":{"@id":"https://www.capterra.in/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Detection And Response (EDR) software","position":2,"item":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3","@type":"ListItem"}],"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Endpoint Detection And Response (EDR) software - Compare Prices &amp; Top Sellers - Capterra India","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Enginsight","position":1,"description":"Enginsight's EDR software goes far beyond conventional solutions. It offers host-based intrusion detection and prevention, combined with vulnerability scanning and automated pentesting. Micro-segmentation further strengthens network security. This tool is ideal for organizations looking for a comprehensive, proactive security strategy while efficiently protecting their IT infrastructure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f4c9feb-2874-42ea-8d73-f275223c7f0c.png","url":"https://www.capterra.in/software/183883/enginsight","@type":"ListItem"},{"name":"Jazz Platform","position":2,"description":"Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17843bcd-67c1-4f4c-a83c-ce0c5d84b94c.png","url":"https://www.capterra.in/software/189135/jazz-platform","@type":"ListItem"},{"name":"Uptycs","position":3,"description":"The Uptycs unified CNAPP and XDR platform helps businesses looking to enhance their cybersecurity across cloud and on-prem environments. One solution provides you with asset inventory, audit, compliance, vulnerability scanning, and threat detection and response. Eliminate tool, team, and infrastructure silos to reduce response times to breaches and attacks. Uptycs helps you make better risk decisions about vulnerabilities and threats. Shift your cybersecurity up with Uptycs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/233d3187-84ec-4451-a902-6d711accffa8.png","url":"https://www.capterra.in/software/202557/uptycs","@type":"ListItem"},{"name":"Heimdal XDR","position":4,"description":"Heimdal’s XDR platform unifies over 12 advanced security tools into one intuitive dashboard, helping teams detect, respond, and stay compliant faster. Listed on the Tidal Cyber Registry, it maps directly to MITRE ATT&CK for full threat visibility.\n\nChoose only what you need with its modular design:\n\n• Patch & Asset Management\n• DNS Security (Endpoint & Network)\n• Privileged Access Management (PEDM, PASM, App Control)\n• Endpoint Detection & Response (NGAV, Firewall, XTP, RAP, REP (Ransomware Encryption Protection ))\n• Email Protection (365, ATP, Fraud Prevention)\n\nBy correlating intelligence across endpoints, networks, emails, and cloud, Heimdal XDR delivers faster detection, quicker response, and eliminates tool fatigue—all in one seamless, unified platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9e07a1f2-5cca-4ac3-8635-83c0c8f077bf.png","url":"https://www.capterra.in/software/1025292/heimdal-extended-detection-and-response-xdr","@type":"ListItem"},{"name":"Inky","position":5,"description":"INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ce20b118-3d06-435e-8912-0a562f9e88dd.png","url":"https://www.capterra.in/software/153507/inky","@type":"ListItem"},{"name":"Cynet 360","position":6,"description":"Cynet All-in-One includes the essential security technologies you need to protect your organization – including your endpoints, users, email, network, SaaS and Cloud apps - in one automated, simplified platform that delivers enterprise-grade protections with less manual effort and lower cost.\n\nCynet All-in-One includes the industry's top performing EDR solution that is easy to use and highly effective while generating industry low false positive alerts. Cynet was the top performing participant in the most widely respected independent evaluation of endpoint security solutions - the 2023 MITRE Engenuity ATT&CK Evaluation: Enterprise. Cynet outperformed 29 of the top endpoint security vendors in detecting 100% of the threats and providing rich information for 100% of the alerts generated during a two-day attack simulation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39539da3-d29a-4613-8a4c-663ebebcc8a4.png","url":"https://www.capterra.in/software/177290/cynet-360","@type":"ListItem"},{"name":"Axonius","position":7,"description":"Axonius delivers a system of record for a diverse range of digital assets including hardware, software, cloud, user identities, SaaS applications, and others.\n\nGet a credible, comprehensive inventory of all assets, their relationships, and dependencies.\n\nDiscover security coverage gaps, risks, vulnerabilities, and optimization opportunities.\n\nAutomatically validate and enforce policies, and simplify workflows across departments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68039c5f-2ebb-48b8-a0c8-06706c50dcf7.png","url":"https://www.capterra.in/software/178568/axonius-cybersecurity-asset-management-platform","@type":"ListItem"},{"name":"Symantec Endpoint Detection and Response","position":8,"description":"Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f15d6c7b-c020-4099-8b6d-eaddaf16eaae.png","url":"https://www.capterra.in/software/189152/symantec-edr","@type":"ListItem"},{"name":"Beyond DLP","position":9,"description":"ITsMine provides safety and protection to your shared and distributed work environment, along with regulatory compliance. ITsMine’s technology overcomes the major challenges and complexities of current data security solutions by automatically constructing “Safe Zones.\" \nITsMine is agentless, API-based, and can be deployed in approximately 30 minutes. Proactively protecting against internal and external threats; while covering data at rest, in motion, and in use. Inside and beyond the company.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1cdc8485-2ab3-4a4e-b590-7967beccfb18.png","url":"https://www.capterra.in/software/201615/beyond-dlp","@type":"ListItem"},{"name":"NACVIEW","position":10,"description":"NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbfd1efe-c27a-495c-baae-b11642012433.jpeg","url":"https://www.capterra.in/software/1026915/nacview","@type":"ListItem"},{"name":"Cybereason","position":11,"description":"The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/724a35ea-1570-4dfb-9e5d-7edb13441614.png","url":"https://www.capterra.in/software/189145/cybereason-platform","@type":"ListItem"},{"name":"FortiEDR","position":12,"description":"FortiEDR is an endpoint detection and response solution that provides real-time advanced threat protection for Windows, MacOS, and Linux endpoints. It integrates capabilities like customizable incident response playbooks, vulnerability assessments, and remote remediation to automatically stop breaches. FortiEDR delivers online and offline protection for endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/abcd7848-5988-4194-8fb7-1a82760a477a.png","url":"https://www.capterra.in/software/202942/fortiedr","@type":"ListItem"},{"name":"Threat Detection Marketplace","position":13,"description":"SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their SIEM, EDR, NSM and SOAR tools in use. TDM aggregates over 65,000 SIEM & EDR rules, parsers and search queries, and other content mapped directly to the MITRE ATT&CK® framework and compatible with your EDR solution in use, including Microsoft Defender ATP, Carbon Black, CrowdStrike, and Qualys.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8bcf7c9-a8c4-44ce-b54b-ba2cfa5200fd.png","url":"https://www.capterra.in/software/207176/threat-detection-marketplace","@type":"ListItem"},{"name":"Heimdal Ransomware Encryption Protection","position":14,"description":"Heimdal’s Ransomware Encryption Protection (REP) is a signatureless solution that detects and blocks malicious encryption attempts in real-time.  \nIt operates on behavioral analysis - triggers detections based on rules that mimic ransomware behavior - and processes kernel events for I/O reads, writes, directory enumeration, and file execution.  \nThreat hunters can review incident details such as timestamps, tree diagrams with process callbacks, PowerShell scripts, computed MD5 hash, enumeration of read or write operations performed, command-line arguments, malicious process signatures, etc. \n\nKey benefits: \nDetect processes that launch file encryptions \nRansomware Rollback option allows you to revert to a restore point before the encryption \nKill and stop any ransomware outbreaks \nHighly Advanced Kernel detection \nWorks signatureless  \nTrack attacker origin \nAutomatic Device Isolation on Infection \nRansomware Rollback option allows you to revert to a restore point before the encryption","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68e14fb1-f297-42fe-b8d9-b517e327d9cf.png","url":"https://www.capterra.in/software/1013930/heimdal-ransomware-encryption-protection","@type":"ListItem"},{"name":"Comodo","position":15,"description":"Comodo offers endpoint protection and threat prevention solutions for businesses, consumers, and everything in between. It protects users against malware and zero-day attacks (both known and unknown), safeguards their data by preventing keyloggers and malicious email attachments from reaching their systems, and includes a sandbox tool that can detect when applications attempt to perform suspicious behaviors on the user's machine.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/32bcfc13-23e1-4524-bfad-d838ea9c4aeb.png","url":"https://www.capterra.in/software/1042231/comodo","@type":"ListItem"},{"name":"Quadrant XDR","position":16,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWe leverage our own proprietary technology (Quadrant XDR), operated by seasoned security analysts around the clock. We differentiate by being best at the “R” in XDR - response is where we excel. Significantly improve mean time to remediate by eliminating internal escalation and hand-off, achieved via Sagan, powered by a flat analyst org in our SOC.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.capterra.in/software/1049353/sagan","@type":"ListItem"},{"name":"BIMA","position":17,"description":"BIMA by Peris.ai stands as a comprehensive cybersecurity framework, ingeniously weaving together elements of EDR, NDR, XDR and SIEM to offer a unified defense mechanism. It's crafted to embody the best of these distinct security approaches, providing an integrated solution. For a detailed exploration of BIMA's conformity with traditional EDR, NDR, XDR and SIEM functionalities, direct consultation with Peris.ai's official resources is recommended to ensure a thorough understanding of its encompassing features and capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7367a3f6-d166-4e8b-90a3-ebc9cf001fd1.png","url":"https://www.capterra.in/software/1063789/bima","@type":"ListItem"},{"name":"InsightIDR","position":18,"description":"InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.\nInsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e882035b-e2b2-4909-94fa-0ec411f53ff7.png","url":"https://www.capterra.in/software/172929/insightidr","@type":"ListItem"},{"name":"Arctic Wolf SOC-as-a-Service","position":19,"description":"A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0f1be447-980c-4820-9711-632d1cde786d.png","url":"https://www.capterra.in/software/201891/soc-as-a-service","@type":"ListItem"},{"name":"condignum","position":20,"description":"Security Requirements out of the box.\nCondignum is the cloud-based SaaS solution to design, manage and optimise security requirements for your use cases and IT Security Challenges.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0a7e21f6-caf5-4fb1-b65f-ad4a20cdea9b.png","url":"https://www.capterra.in/software/216021/condignum","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":21,"description":"XDR / EDR OPTIMUS neutralizes known and unknown threats, without human interaction. It includes real-time monitoring and the collection of endpoint security data with an automated threat response mechanism.\nIt can be deployed in a pre-configured mode to quickly secure your entire IT infrastructure (office and industrial), and advanced security options are available.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.capterra.in/software/1052644/tehtris-xdr","@type":"ListItem"},{"name":"Cisco Secure Cloud Analytics","position":22,"description":"Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b6572487-f99e-421e-8097-788c4a5c588f.jpeg","url":"https://www.capterra.in/software/178532/stealthwatch-cloud","@type":"ListItem"},{"name":"TeamViewer DEX","position":23,"description":"The TeamViewer DEX platform is a cloud-native, real-time, autonomous DEX solution that fixes digital worker experience issues before they impact users. It removes friction from IT operations, improves compliance, reduces costs, and helps IT deliver personalized digital experiences by bringing the user front and center in the decision-making process. ​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d4bec9c9-f4d3-45ff-9a4e-3c66cd639cef.png","url":"https://www.capterra.in/software/198596/tachyon","@type":"ListItem"},{"name":"ManageEngine DataSecurity Plus","position":24,"description":"Reinforce your measures to secure organizational data in all its states—at rest, in use, and in motion—with ManageEngine DataSecurity Plus. DataSecurity Plus is a unified data visibility and security platform that audits file changes in real time, triggers instant responses to critical events, shuts down ransomware intrusions, and helps organizations comply with numerous IT regulations. \nAnalyze file storage and security permissions, delete junk files, and detect file security vulnerabilities. DataSecurity Plus helps you assess the risks associated with sensitive data storage by locating and classifying files containing PII, PCI, and ePHI. Prevent data leaks via USBs, email, printers, and web applications; monitor file integrity; and audit cloud application usage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0da2ce73-022c-43fa-8e7b-31d04a48737f.png","url":"https://www.capterra.in/software/201796/datasecurity-plus","@type":"ListItem"},{"name":"Myra Security","position":25,"description":"Myra Security offers cloud-based cybersecurity solutions that safeguard digital applications and infrastructures against DDoS attacks, zero-day-exploits, malicious bots, and other threats.\n\nDesigned for organizations with high security and compliance demands, Myra offers a suite of protective tools including Web Application Firewall (WAF), DDoS Protection, Secure DNS, Bot Management, EU CAPTCHA and more. The platform ensures GDPR compliance, business continuity during attacks, and real-time threat intelligence.\n\nBusinesses across finance, healthcare, public sector, insurance, and e-commerce rely on Myra to secure critical services and maintain performance under pressure. Myra solves the growing challenge of securing complex digital ecosystems while simplifying implementation and meeting compliance requirements. Whether mitigating threats or ensuring availability during peak traffic, Myra provides a reliable, enterprise-grade shield for digital assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/56061aa1-77f9-45f0-a664-0153d9f4f2b8.png","url":"https://www.capterra.in/software/217452/web-application-security","@type":"ListItem"}],"@id":"https://www.capterra.in/directory/31695/endpoint-detection-and-response/software?page=3#itemlist","numberOfItems":25}
</script>
