Introducing G2.ai, the future of software buying.Try now

Best Endpoint Detection & Response (EDR) Software Solutions - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Endpoint detection and response (EDR) software is the newest member of the endpoint security family. EDR tools combine elements of both endpoint antivirus and endpoint management solutions to detect, investigate, and remove any malicious software that penetrates a network’s devices. EDR solutions give greater visibility of a system’s overall health including each specific device’s state. Companies use these tools to mitigate endpoint penetrations quickly and prevent data loss, theft, or system failures. They are typically used as a complement to larger security systems such as security information and event management (SIEM), vulnerability management, and incident response tools.

The best EDR software solutions record and store system behaviors, employing various data analytics techniques to identify suspicious activities. They also provide contextual information, block malicious actions, and offer remediation suggestions to restore affected systems.

To qualify for inclusion in the Endpoint Detection and Response (EDR) category, a product must:

Alert administrators when devices have been compromised
Search data and systems for the presence of malware
Possess analytics and anomaly detection features
Possess malware removal features

Best Endpoint Detection & Response (EDR) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
113 Listings in Endpoint Detection & Response (EDR) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Shield cannon Advanced EDR is a locally deployed Endpoint Detection and Response solution built to give organizations full visibility into devices within their network. It continuously monitors endpoi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Shield cannon Advanced EDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Shield cannon Advanced EDR is a locally deployed Endpoint Detection and Response solution built to give organizations full visibility into devices within their network. It continuously monitors endpoi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Shield cannon Advanced EDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smart eVision Dashboard empowers all users with actionable insights from enterprise data. View your insights on our unique dashboard presenter: the Cockpit, which can be exported as interactive PPT fi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smart eVision features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smart eVision Dashboard empowers all users with actionable insights from enterprise data. View your insights on our unique dashboard presenter: the Cockpit, which can be exported as interactive PPT fi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Smart eVision features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Managing cloud security at scale is complex. Our AI driven Security Operations Center (SOC) for AWS Cloud simplifies it. With real-time threat detection, automated incident response, and intelligent a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCFirst AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Managing cloud security at scale is complex. Our AI driven Security Operations Center (SOC) for AWS Cloud simplifies it. With real-time threat detection, automated incident response, and intelligent a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SOCFirst AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Koi brings visibility and control to the chaos of modern software ecosystems—discover, assess, and govern everything your teams pull from marketplaces like GitHub, Huggingface, VSCode, Homebrew, and b

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Supply Chain Gateway features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Koi
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Koi brings visibility and control to the chaos of modern software ecosystems—discover, assess, and govern everything your teams pull from marketplaces like GitHub, Huggingface, VSCode, Homebrew, and b

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Supply Chain Gateway features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Koi
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2013, ThinScale works with brands across the CX, healthcare, education, financial services, legal, and government sectors. Our team is 100% remote across the EU, the UK, and North America.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThinScale features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThinScale
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2013, ThinScale works with brands across the CX, healthcare, education, financial services, legal, and government sectors. Our team is 100% remote across the EU, the UK, and North America.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ThinScale features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ThinScale
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dangerous end users with too much privilege. Unused, often obsolete, protocols. Unauthorized software. With Third Wall, you can lock down, enforce policies and passwords, eliminate many gaping vuln

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Third Wall features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Dangerous end users with too much privilege. Unused, often obsolete, protocols. Unauthorized software. With Third Wall, you can lock down, enforce policies and passwords, eliminate many gaping vuln

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Third Wall features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatBook TDP features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Hong Kong, HK
    Twitter
    @ThreatBookLabs
    3,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatBook TDP features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Hong Kong, HK
Twitter
@ThreatBookLabs
3,890 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Time-saving
    2
    Automation
    1
    Compliance Support
    1
    Deployment Ease
    1
    Detection Efficiency
    1
    Cons
    Alert Issues
    1
    Improvement Needed
    1
    Inadequate Reporting
    1
    Inadequate Security
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatKey features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    7.5
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatKey
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Time-saving
2
Automation
1
Compliance Support
1
Deployment Ease
1
Detection Efficiency
1
Cons
Alert Issues
1
Improvement Needed
1
Inadequate Reporting
1
Inadequate Security
1
Ineffective Alerts
1
ThreatKey features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
7.5
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
ThreatKey
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TRAPMINE is an endpoint protection, detection and response platform. Security and IT Operation Teams often look for a single endpoint security platform provides both prevention, antivirus and threat h

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TRAPMINE Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TRAPMINE
    Year Founded
    2016
    HQ Location
    Talinn, EE
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TRAPMINE is an endpoint protection, detection and response platform. Security and IT Operation Teams often look for a single endpoint security platform provides both prevention, antivirus and threat h

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TRAPMINE Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
TRAPMINE
Year Founded
2016
HQ Location
Talinn, EE
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We build endpoint threat detection software to automate collection of all security-relevant events, detection of commodity and advanced attackers, flexible search of collected data, and rapid response

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veramine features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veramine
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We build endpoint threat detection software to automate collection of all security-relevant events, detection of commodity and advanced attackers, flexible search of collected data, and rapid response

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Veramine features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Veramine
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Versive AI Platform was developed to provide large enterprises with solutions that empower their teams to achieve world-class results.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Versive features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    eSentire
    Year Founded
    2001
    HQ Location
    Waterloo, Ontario
    Twitter
    @eSentire
    6,388 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    591 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Versive AI Platform was developed to provide large enterprises with solutions that empower their teams to achieve world-class results.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Versive features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
eSentire
Year Founded
2001
HQ Location
Waterloo, Ontario
Twitter
@eSentire
6,388 Twitter followers
LinkedIn® Page
www.linkedin.com
591 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ziften isa security solution that provides teams with continuous endpoint visibility to view the full context of security landscape, amplify teams abilities, and establish organizational resiliency.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZiftenBI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ziften
    Year Founded
    2009
    HQ Location
    Austin, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ziften isa security solution that provides teams with continuous endpoint visibility to view the full context of security landscape, amplify teams abilities, and establish organizational resiliency.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ZiftenBI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ziften
Year Founded
2009
HQ Location
Austin, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®