Introducing G2.ai, the future of software buying.Try now

Top Free Managed Detection and Response (MDR) Software

Check out our list of free Managed Detection and Response (MDR) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Managed Detection and Response (MDR) Software to ensure you get the right product.

View Free Managed Detection and Response (MDR) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
30 Managed Detection and Response (MDR) Products Available
(749)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 81% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 8.9
    9.3
    Automated remediation
    Average: 8.6
    9.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MB
    EDR was an easy sell to my clients as more often then not, all we had to do was deploy a trial and almost immediately EDR detected threats that the... Read review
    David M.
    DM
    Huntress has taken the stress out of managing a client antivirus solution. Through real world protections we have full trust in the EDR platform.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    35,762 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    603 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 81% Small-Business
  • 17% Mid-Market
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 8.9
9.3
Automated remediation
Average: 8.6
9.5
Automated investigation
Average: 8.8
MB
EDR was an easy sell to my clients as more often then not, all we had to do was deploy a trial and almost immediately EDR detected threats that the... Read review
David M.
DM
Huntress has taken the stress out of managing a client antivirus solution. Through real world protections we have full trust in the EDR platform.... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
35,762 Twitter followers
LinkedIn® Page
www.linkedin.com
603 employees on LinkedIn®
(1,039)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 8.9
    9.0
    Automated remediation
    Average: 8.6
    9.1
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Roberto B.
    RB
    The product do not effect much the performance of the PC, and it worked fine blocking alle the tread whit very litle false positive. Support is... Read review
    Peter Z.
    PZ
    Awesome security software. used free one for 20 years. Recently got it for our organization, and couldn't be more happier. It has great protection,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    81,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    678 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 8.9
9.0
Automated remediation
Average: 8.6
9.1
Automated investigation
Average: 8.8
Roberto B.
RB
The product do not effect much the performance of the PC, and it worked fine blocking alle the tread whit very litle false positive. Support is... Read review
Peter Z.
PZ
Awesome security software. used free one for 20 years. Recently got it for our organization, and couldn't be more happier. It has great protection,... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
81,803 Twitter followers
LinkedIn® Page
www.linkedin.com
678 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(216)4.7 out of 5
Optimized for quick response
19th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    9.3
    Proactive threat hunting
    Average: 8.9
    9.4
    Automated remediation
    Average: 8.6
    9.2
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    AC
    This cybersecurity product/platform stands out for its ease of implementation and operation, delivering outcomes as promised by the vendor and... Read review
    SL
    We use this solution in our SOC because tt is easy to implement and integrate with existing security infrastructures, providing real-time... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.4
9.3
Proactive threat hunting
Average: 8.9
9.4
Automated remediation
Average: 8.6
9.2
Automated investigation
Average: 8.8
Verified User in Computer & Network Security
AC
This cybersecurity product/platform stands out for its ease of implementation and operation, delivering outcomes as promised by the vendor and... Read review
SL
We use this solution in our SOC because tt is easy to implement and integrate with existing security infrastructures, providing real-time... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
(284)4.8 out of 5
12th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Proactive threat hunting
    Average: 8.9
    8.2
    Automated remediation
    Average: 8.6
    8.1
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
    DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
8.7
Proactive threat hunting
Average: 8.9
8.2
Automated remediation
Average: 8.6
8.1
Automated investigation
Average: 8.8
Verified User in Information Technology and Services
AI
We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,217 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(297)4.7 out of 5
15th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    9.0
    Proactive threat hunting
    Average: 8.9
    9.0
    Automated remediation
    Average: 8.6
    9.0
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RB
    The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
    Rajat Kumar B.
    RB
    Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
9.0
Proactive threat hunting
Average: 8.9
9.0
Automated remediation
Average: 8.6
9.0
Automated investigation
Average: 8.8
RB
The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
Rajat Kumar B.
RB
Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(47)4.6 out of 5
Optimized for quick response
14th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 53% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis MDR features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 8.9
    8.0
    Automated remediation
    Average: 8.6
    8.6
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Retail
    ER
    I like that there's an experience SOC team backing up our internal team. Read review
    AG
    Wider options to integrate multiple platforms. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

Users
No information available
Industries
  • Financial Services
Market Segment
  • 53% Mid-Market
  • 36% Enterprise
Secureworks Taegis MDR features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 8.9
8.0
Automated remediation
Average: 8.6
8.6
Automated investigation
Average: 8.8
Verified User in Retail
ER
I like that there's an experience SOC team backing up our internal team. Read review
AG
Wider options to integrate multiple platforms. Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
(38)4.4 out of 5
26th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 74% Small-Business
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RocketCyber features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.4
    8.6
    Proactive threat hunting
    Average: 8.9
    8.1
    Automated remediation
    Average: 8.6
    8.3
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    The price is hard to beat, deployment is relatively easy. Read review
    Kumar R.
    KR
    I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 74% Small-Business
  • 24% Mid-Market
RocketCyber features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.4
8.6
Proactive threat hunting
Average: 8.9
8.1
Automated remediation
Average: 8.6
8.3
Automated investigation
Average: 8.8
Verified User in Information Technology and Services
AI
The price is hard to beat, deployment is relatively easy. Read review
Kumar R.
KR
I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
(65)4.7 out of 5
20th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz provides an AI-native Unified Detection and Response platform designed for MSPs to secure and insure small businesses. Our platform protects critical assets, including M365/Google Workspace ide

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 82% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Proactive threat hunting
    Average: 8.9
    8.7
    Automated remediation
    Average: 8.6
    8.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MM
    Guardz comes budled with several different features for my customers, all of which would cost far more if I were to attempt to tool them... Read review
    AA
    There is so much to like. The straight forward interface. Personally, I love being able to tell clients about their passwords that are compromised... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    50 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz provides an AI-native Unified Detection and Response platform designed for MSPs to secure and insure small businesses. Our platform protects critical assets, including M365/Google Workspace ide

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 82% Small-Business
  • 15% Mid-Market
Guardz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.4
8.8
Proactive threat hunting
Average: 8.9
8.7
Automated remediation
Average: 8.6
8.5
Automated investigation
Average: 8.8
MM
Guardz comes budled with several different features for my customers, all of which would cost far more if I were to attempt to tool them... Read review
AA
There is so much to like. The straight forward interface. Personally, I love being able to tell clients about their passwords that are compromised... Read review
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
50 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(35)4.9 out of 5
8th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 94% Small-Business
    • 3% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed ITDR features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Proactive threat hunting
    Average: 8.9
    9.4
    Automated remediation
    Average: 8.6
    9.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ronald S.
    RS
    We love the fact that it has reduced the amount of time spent hunting down false positives. This helps with complacency and the alerts and threats... Read review
    Verified User in Information Technology and Services
    AI
    The accuracy and effectiveness of the threat detection has been wonderful. We have had multiple cases where as soon as we deployed ITDR it found... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    35,762 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    603 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 94% Small-Business
  • 3% Mid-Market
Huntress Managed ITDR features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
9.5
Proactive threat hunting
Average: 8.9
9.4
Automated remediation
Average: 8.6
9.5
Automated investigation
Average: 8.8
Ronald S.
RS
We love the fact that it has reduced the amount of time spent hunting down false positives. This helps with complacency and the alerts and threats... Read review
Verified User in Information Technology and Services
AI
The accuracy and effectiveness of the threat detection has been wonderful. We have had multiple cases where as soon as we deployed ITDR it found... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
35,762 Twitter followers
LinkedIn® Page
www.linkedin.com
603 employees on LinkedIn®
(43)4.7 out of 5
24th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Proactive threat hunting
    Average: 8.9
    8.3
    Automated remediation
    Average: 8.6
    8.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consulting
    CC
    The price of Todyl makes it very cost-effective. Read review
    DS
    Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
8.9
Proactive threat hunting
Average: 8.9
8.3
Automated remediation
Average: 8.6
8.5
Automated investigation
Average: 8.8
Verified User in Consulting
CC
The price of Todyl makes it very cost-effective. Read review
DS
Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
(117)4.6 out of 5
Optimized for quick response
27th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    7.9
    Proactive threat hunting
    Average: 8.9
    6.7
    Automated remediation
    Average: 8.6
    7.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    Blumira only takes a few clicks to set up alerting about overseas logins, odd logins, etc. If you don't have time to putz with setup, this is the... Read review
    LG
    Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
7.9
Proactive threat hunting
Average: 8.9
6.7
Automated remediation
Average: 8.6
7.5
Automated investigation
Average: 8.8
Verified User in Information Technology and Services
AI
Blumira only takes a few clicks to set up alerting about overseas logins, odd logins, etc. If you don't have time to putz with setup, this is the... Read review
LG
Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(22)4.7 out of 5
Optimized for quick response
21st Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Field Effect MDR features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Proactive threat hunting
    Average: 8.9
    7.4
    Automated remediation
    Average: 8.6
    8.8
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CL
    Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
    Joe U.
    JU
    Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2016
    HQ Location
    Ottawa
    Twitter
    @fieldeffectsoft
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 27% Mid-Market
Field Effect MDR features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
8.7
Proactive threat hunting
Average: 8.9
7.4
Automated remediation
Average: 8.6
8.8
Automated investigation
Average: 8.8
CL
Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
Joe U.
JU
Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
Seller Details
Company Website
Year Founded
2016
HQ Location
Ottawa
Twitter
@fieldeffectsoft
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
(865)4.6 out of 5
Optimized for quick response
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 8.9
    9.2
    Automated remediation
    Average: 8.6
    10.0
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • GI
    Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
    IA
    ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    286,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,870 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 44% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 8.9
9.2
Automated remediation
Average: 8.6
10.0
Automated investigation
Average: 8.8
GI
Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
IA
ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
286,399 Twitter followers
LinkedIn® Page
www.linkedin.com
1,870 employees on LinkedIn®
(57)4.7 out of 5
11th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(10)4.8 out of 5
17th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pondurance features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 8.9
    8.5
    Automated remediation
    Average: 8.6
    8.5
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JM
    Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
    Verified User in Hospital & Health Care
    IH
    Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Indianapolis, US
    LinkedIn® Page
    www.linkedin.com
    132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 30% Enterprise
Pondurance features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 8.9
8.5
Automated remediation
Average: 8.6
8.5
Automated investigation
Average: 8.8
JM
Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
Verified User in Hospital & Health Care
IH
Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Indianapolis, US
LinkedIn® Page
www.linkedin.com
132 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kunal H.
    KH
    It was helpful for forensics investigation. Read review
    MK
    I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Kunal H.
KH
It was helpful for forensics investigation. Read review
MK
I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Glass, Ceramics & Concrete
    AG
    The interface is simple compared to other AV software and software patch management. Read review
    KK
    I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    261 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Glass, Ceramics & Concrete
AG
The interface is simple compared to other AV software and software patch management. Read review
KK
I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,124 Twitter followers
LinkedIn® Page
www.linkedin.com
261 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ContraForce Security Service Delivery Platform (SSDP) transforms how managed security services are delivered by allowing service providers to jumpstart a new line of security services, improve th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ContraForce Security Service Delivery Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Paul H.
    PH
    It is a highly cost-effective way to ensure our SaaS environment is monitored. M365 is a critical business function for any company, and ensuring... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    McKinney, US
    Twitter
    @ContraForceSec
    22 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ContraForce Security Service Delivery Platform (SSDP) transforms how managed security services are delivered by allowing service providers to jumpstart a new line of security services, improve th

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ContraForce Security Service Delivery Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Paul H.
PH
It is a highly cost-effective way to ensure our SaaS environment is monitored. M365 is a critical business function for any company, and ensuring... Read review
Seller Details
Year Founded
2021
HQ Location
McKinney, US
Twitter
@ContraForceSec
22 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Utilities
    EU
    24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Utilities
EU
24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

    Users
    • CEO
    Industries
    • Computer & Network Security
    Market Segment
    • 87% Small-Business
    • 13% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rotate features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Proactive threat hunting
    Average: 8.9
    10.0
    Automated remediation
    Average: 8.6
    10.0
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yahel N.
    YN
    Even without an IT department, Rotate makes me feel like I have a whole team of security professionals watching my back. Furthermore, their... Read review
    Verified User in Consulting
    AC
    The onboarding was so smooth. Since then, I've been getting alerts on what's most important while knowing my business is safe. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rotate
    Year Founded
    2023
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks.

Users
  • CEO
Industries
  • Computer & Network Security
Market Segment
  • 87% Small-Business
  • 13% Mid-Market
Rotate features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Proactive threat hunting
Average: 8.9
10.0
Automated remediation
Average: 8.6
10.0
Automated investigation
Average: 8.8
Yahel N.
YN
Even without an IT department, Rotate makes me feel like I have a whole team of security professionals watching my back. Furthermore, their... Read review
Verified User in Consulting
AC
The onboarding was so smooth. Since then, I've been getting alerts on what's most important while knowing my business is safe. Read review
Seller Details
Seller
Rotate
Year Founded
2023
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gradient Cyber features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Proactive threat hunting
    Average: 8.9
    10.0
    Automated remediation
    Average: 8.6
    10.0
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Gabe E.
    GE
    Their helpfulness and professionalism. They are one of the best players in the market Read review
    Verified User in Computer Software
    CC
    We have been using Gradient's CISO Advisory services in my previous company for a few months, and their services have been very valuable. Having... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Southlake, Texas
    Twitter
    @GradientCyber
    122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Gradient Cyber features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Proactive threat hunting
Average: 8.9
10.0
Automated remediation
Average: 8.6
10.0
Automated investigation
Average: 8.8
Gabe E.
GE
Their helpfulness and professionalism. They are one of the best players in the market Read review
Verified User in Computer Software
CC
We have been using Gradient's CISO Advisory services in my previous company for a few months, and their services have been very valuable. Having... Read review
Seller Details
Year Founded
2017
HQ Location
Southlake, Texas
Twitter
@GradientCyber
122 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wirespeed is the world's fastest & easiest to use MDR. Onboard in minutes, integrate in seconds, verdicts in milliseconds, secure now. Wirespeed is built with decades of cybersecurity expertis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wirespeed features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Proactive threat hunting
    Average: 8.9
    9.4
    Automated remediation
    Average: 8.6
    8.9
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ken H.
    KH
    We switched our Security Operations provider from an industry leader to Wirespeed, and I have never been happier. Wirespeed provides us with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wirespeed
    Year Founded
    2024
    HQ Location
    N/A
    LinkedIn® Page
    linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wirespeed is the world's fastest & easiest to use MDR. Onboard in minutes, integrate in seconds, verdicts in milliseconds, secure now. Wirespeed is built with decades of cybersecurity expertis

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
Wirespeed features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Proactive threat hunting
Average: 8.9
9.4
Automated remediation
Average: 8.6
8.9
Automated investigation
Average: 8.8
Ken H.
KH
We switched our Security Operations provider from an industry leader to Wirespeed, and I have never been happier. Wirespeed provides us with... Read review
Seller Details
Seller
Wirespeed
Year Founded
2024
HQ Location
N/A
LinkedIn® Page
linkedin.com
3 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deepwatch® is the pioneer of AI- and human-driven MDR. The Deepwatch Platform enables lean security teams—regardless of skill level—to enhance their organization's cyber resilience and maintain regula

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepwatch features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anil C.
    AC
    It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
    Manoj K.
    MK
    DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepwatch
    Company Website
    Year Founded
    2019
    HQ Location
    Tampa, US
    Twitter
    @deepwatch_sec
    899 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    360 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deepwatch® is the pioneer of AI- and human-driven MDR. The Deepwatch Platform enables lean security teams—regardless of skill level—to enhance their organization's cyber resilience and maintain regula

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Deepwatch features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Anil C.
AC
It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
Manoj K.
MK
DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
Seller Details
Seller
Deepwatch
Company Website
Year Founded
2019
HQ Location
Tampa, US
Twitter
@deepwatch_sec
899 Twitter followers
LinkedIn® Page
www.linkedin.com
360 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    7.5
    Proactive threat hunting
    Average: 8.9
    4.2
    Automated remediation
    Average: 8.6
    5.0
    Automated investigation
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    - Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
    Verified User in Computer & Network Security
    UC
    Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
7.5
Proactive threat hunting
Average: 8.9
4.2
Automated remediation
Average: 8.6
5.0
Automated investigation
Average: 8.8
Verified User in Financial Services
UF
- Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
Verified User in Computer & Network Security
UC
Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
Entry Level Price:$3,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
    • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
    • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
  • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
  • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
BlackFog features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
0 ratings
Save to My Lists
Entry Level Price:Starting at $4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AirMDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AirMDR
    Year Founded
    2023
    HQ Location
    Menlo Park, US
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AirMDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AirMDR
Year Founded
2023
HQ Location
Menlo Park, US
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eye Security protects small and medium-sized European enterprises from cyber threats and insures businesses from the high costs that follow after a successful attack. One platform to control cyber r

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Eye Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Den Haag, Zuid-Holland
    Twitter
    @eyesecurity_
    125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eye Security protects small and medium-sized European enterprises from cyber threats and insures businesses from the high costs that follow after a successful attack. One platform to control cyber r

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Eye Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Den Haag, Zuid-Holland
Twitter
@eyesecurity_
125 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogicHub features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    CC
    Price Automated Detection in addition to workbook automation Self run or a hosted version Read review
    Martin Spencer S.
    MS
    - Out-of-the-box integrations (with option to request for new ones or build one yourself) - Ability to express playbook logic in Spark SQL -... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, US
    Twitter
    @devo_Inc
    6,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 27% Mid-Market
LogicHub features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Computer & Network Security
CC
Price Automated Detection in addition to workbook automation Self run or a hosted version Read review
Martin Spencer S.
MS
- Out-of-the-box integrations (with option to request for new ones or build one yourself) - Ability to express playbook logic in Spark SQL -... Read review
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, US
Twitter
@devo_Inc
6,240 Twitter followers
LinkedIn® Page
www.linkedin.com
604 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Office Protect features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    UC
    The best part of Office Protect is that it makes securing your Microsoft 365 easy by automating key protections, providing real-time alerts, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SherWeb
    Year Founded
    1998
    HQ Location
    Sherbrooke, Quebec
    Twitter
    @SherWeb
    2,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,039 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at th

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Office Protect features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Computer Software
UC
The best part of Office Protect is that it makes securing your Microsoft 365 easy by automating key protections, providing real-time alerts, and... Read review
Seller Details
Seller
SherWeb
Year Founded
1998
HQ Location
Sherbrooke, Quebec
Twitter
@SherWeb
2,413 Twitter followers
LinkedIn® Page
www.linkedin.com
1,039 employees on LinkedIn®
Entry Level Price:Starting at $4,300.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OKIOK MDR is a fully managed, SaaS-based Detection and Response solution ensuring around-the-clock monitoring of all your endpoints and critical IT infrastructure. Leveraging cutting-edge technology a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OKIOK MDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okiok
    Year Founded
    1973
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

OKIOK MDR is a fully managed, SaaS-based Detection and Response solution ensuring around-the-clock monitoring of all your endpoints and critical IT infrastructure. Leveraging cutting-edge technology a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OKIOK MDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Okiok
Year Founded
1973
LinkedIn® Page
www.linkedin.com