Managed Detection and Response (MDR) offers a single autonomous agent while providing two packages to cover deployment of different sizes and security requirements.
Executive Summary
Managed Detection and Response (MDR) offers a single autonomous agent while providing two packages to cover deployment of different sizes and security requirements.
MDR Core has all endpoint security essential features in place, including prevention, detection and response. Everything you need to keep your assets safe.
MDR Complete adds more capability to MDR Core such as threat hunting and Deep Visibility (EDR)
The Endpoint Protection Platform (EPP) unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation
Multi-layered AI-powered protection to replace Anti-Virus Products
Core | Complete | |
---|---|---|
Static AI Pre Execution protection for known and unknown file based malware | ![]() | ![]() |
Behavioral AI Agent side behaviour monitoring covering any attack vector, including unknown exploits and bypass attempts of traditional AV | ![]() | ![]() |
Documents,Scripts Behavioral AI engine built to detect and mitigate malicious code and scripts in documents | ![]() | ![]() |
Fileless,Exploits Behavioral AI engine capable of detecting fileless attack and exploits | ![]() | ![]() |
Lateral Movement Behavioral AI engine focused on discovering attempts coming from another device over the network. | ![]() | ![]() |
PUP macOS engine to protect from potentially unwanted programs | ![]() | ![]() |
Windows XP, 7, 8, 8.1, 10
Mac OSX 10.9.x, 10.10.x, 10.11x, macOS
10.12x macOS 10.13 (High Sierra)
CentOS 6.5, 7.0, 7.2
Red Hat Enterprise Linux 6.5, 7.0, 7.2
Ubuntu 12.04, 14.04, 16.04, 16.10
openSUSE 42.2
Windows Server 2003, 2008, 2008 R2, 2012,
2012 R2, 2016
CentOS 6.5, 7.0, 7.2
Red Hat Enterprise Linux 6.5, 7.0, 7.2
Ubuntu 12.04, 14.04, 16.04, 16.10
SUSE Linux Enterprise Server 12SP1
Oracle Linux 6.5 – 6.9, 7.0+
Amazon Linux (AMI) 2016.09+, 2017.03+
Citrix XenApp, XenDesktop
Microsoft Hyper-V
Oracle VirtualBox
VMware vSphere
VMware Workstation
VMware Fusion
VMware Horizon
Protection
Visibility
Simplicity
Automation
Prevent attacks
Pre-execution
Constantly monitor and map
each running process for
incongruous behaviors
Automate remediation and
response…even rollback