Step up from your current corporate antivirus: Save 50% >
|
Endpoint Protection
|
Endpoint Detection and Response
|
|---|
|
Endpoint Protection
|
Endpoint Detection and Response
|
||
|---|---|---|---|
| Number of devices | 10+ | 10+ | |
| Operating systems |
Windows
Mac
|
Windows
Mac
|
|
| Threat Remediation | |||
| Cleans infected devices | |||
| On-demand and scheduled threat scans | |||
|
Linking Engine/Remediation Engine
Comprehensive malware/artifact removal
|
|||
|
Malwarebytes Breach Remediation
(MBBR): Dissolvable remediation agent
|
|||
|
Quarantine
Isolates detected threats for later remediation
|
|||
|
Forensic Timeliner tool
Forensics tool for Windows environments
|
|||
|
Discovery and Deployment tool
Unmanaged endpoint discovery and agent deployment
|
|||
| Threat prevention | |||
| Real-time Virus, malware, spyware protection | |||
| Real-time Ransomware protection | |||
| "Zero-day", file-less attack protection | |||
|
Brute force protection
Stops brute force Remote Desktop Protocol (RDP)
attacks
|
|||
|
Device Control policies
Allow/Block/Read-only control when USB device is
connected
|
|||
| Multi-Vector Protection | |||
|
Web Protection
Helps prevent access to malicious websites, ad
networks, scammer
networks
|
|||
|
Application Hardening
Reduces vulnerability exploit surface and
proactively detects
fingerprinting attempts used by advanced attacks
|
|||
|
Exploit Mitigation
Proactively detects and blocks attempts to abuse
vulnerabilities and
remotely execute code on the endpoint
|
|||
|
Application Behavior Protection
Helps prevent applications from being leveraged to
infect the
endpoint
|
|||
|
Anomaly Detection Machine Learning
Proactively identifies unknown viruses and malware
via machine
learning techniques
|
|||
|
Payload Analysis
Anti-malware technology that identifies entire
families of known and
relevant malware with heuristic and behavioral rules
|
|||
|
Ransomware Mitigation
Detects and blocks ransomware via behavioral
monitoring technology
|
|||
| Threat hunting, isolation, and recovery | |||
|
Suspicious Activity Monitoring
Continuous monitoring and visibility of endpoint
file system events,
network connections, process events, and registry activity
|
|||
|
Remote Analysis
Silently retrieve suspicious code for remote
investigation and logging
|
|||
|
Flight Recorder Search
Freeform threat hunting across all devices managed
by EDR
|
|||
|
Integrated Cloud Sandbox
Observes behaviors and actions of suspicious files,
validating local
Anomaly Detection Machine Learning verdicts
|
|||
|
Multimode endpoint Isolation
Network, process, and Windows desktop isolation
stops malware from
"phoning home" and locks out remote attackers
|
|||
|
Aggressive mode
Observes behaviors and actions of suspicious files,
validating local
Anomaly Detection Machine Learning verdicts
|
|||
|
Windows Ransomware Rollback
Up to 72 hours of protection for files encrypted,
deleted, or
modified by a ransomware attack (Windows platforms only)
|
|||
| Management | |||
| Cloud-based Nebula platform | |||
| Centralized management console | |||
| Threat visibility dashboards | |||
|
Asset management
Collects and displays endpoint details, including
installed
software, updates, startup programs, and more
|
|||
| Automated and on-demand reports | |||
| Email notifications, Syslog support | |||
| Role-based access control (RBAC) | |||
| Tamper Protection | |||
| Single sign-on with SAML 2.0 support | |||
| Active Directory integration | |||
| Integration with existing security and management tools | |||
| Support | |||
| Email, chat, remote technical support | |||
| Phone technical support | |||
| Premium support packages | AVAILABLE | AVAILABLE | |
| Premium Services | |||
| Implementation, malware removal service | AVAILABLE | AVAILABLE | |
Let us help you choose the right plan for your business in just a few steps.
Help me choose a solutions



Select your language