Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,278 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,699 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • Guardz Reviews & Ratings
    117 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Safetica Reviews & Ratings
    409 Ratings
    Company Website

What is Symantec EDR?

Quickly spot and mitigate security threats by leveraging thorough endpoint visibility and sophisticated detection analytics, which greatly reduces the average remediation time. Address the cybersecurity skills gap while boosting the efficiency of Security Operations Centers (SOC) through comprehensive automation and smooth integrations for sandboxing, SIEM, and orchestration. Equip security teams with the unmatched expertise and worldwide capabilities of Symantec’s Managed Endpoint Detection and Response services. Deploy Endpoint Detection and Response (EDR) solutions across multiple platforms such as Windows, macOS, and Linux, using either the EDR that works in conjunction with Symantec Endpoint Protection (SEP) or a temporary agent. With robust endpoint visibility, adeptly identify and proactively pursue threats for swift resolution, regardless of their complexity. Instantly detect advanced attack methodologies through behavioral policies that are continuously updated by Symantec professionals, ensuring defenses are strong and current against new threats. This proactive strategy not only fortifies organizational security but also cultivates resilience against potential future cyber threats, enhancing overall security posture. Moreover, the integration of state-of-the-art technologies allows for a more dynamic response to the ever-evolving landscape of cyber risks.

What is Sandfly Security?

Recognized for its ability to secure vital infrastructure globally, Sandfly delivers agentless Linux security that removes the necessity for endpoint agents, resulting in a streamlined user experience. Its deployment is instant, emphasizing system stability while maintaining high-security standards. As an agentless solution, Sandfly is crafted to monitor Linux systems efficiently and securely. It protects a diverse array of Linux environments, spanning from modern cloud setups to older devices, regardless of their distribution or processor architecture. Beyond traditional Endpoint Detection and Response (EDR) functionalities, Sandfly adeptly oversees SSH credentials, uncovers weak passwords through thorough audits, identifies unauthorized changes via drift detection, and offers customizable modules to tackle new and evolving threats. This holistic strategy ensures optimal safety, efficiency, and compatibility throughout Linux systems. In addition, Sandfly distinguishes itself in the marketplace by offering extensive support for various Linux distributions and processor types, such as AMD, Intel, Arm, MIPS, and POWER CPUs, making it a versatile choice for organizations. Ultimately, with Sandfly, organizations can confidently enhance their Linux security posture, ensuring it meets the demands of their multifaceted technological environments while remaining adaptable to future challenges.

Media

Media

Integrations Supported

AWS Hybrid Cloud
Akamai Cloud
Amazon Web Services (AWS)
Blink
CA Auditor for z/OS
CentOS
CyberArk Conjur
Docker
Fedora
Google Cloud Platform
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Raspberry Pi OS
Rocky Linux
SUSE Enterprise Storage
Splunk APM
Ubuntu

Integrations Supported

AWS Hybrid Cloud
Akamai Cloud
Amazon Web Services (AWS)
Blink
CA Auditor for z/OS
CentOS
CyberArk Conjur
Docker
Fedora
Google Cloud Platform
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Raspberry Pi OS
Rocky Linux
SUSE Enterprise Storage
Splunk APM
Ubuntu

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/info/endpoint-security/detection-and-response

Company Facts

Organization Name

Sandfly Security

Company Location

New Zealand

Company Website

sandflysecurity.com

Categories and Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Popular Alternatives

Popular Alternatives

SanerNow Reviews & Ratings

SanerNow

SecPod Technologies