2026 Best Software Awards are here!See the list

Top Free Managed Detection and Response (MDR) Software

Check out our list of free Managed Detection and Response (MDR) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Managed Detection and Response (MDR) Software to ensure you get the right product.

View Free Managed Detection and Response (MDR) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
29 Managed Detection and Response (MDR) Products Available
(857)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Huntress Managed EDR
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Huntress, we believe that enterprise-grade endpoint security shouldn’t just be for big security teams with the most resources. When basic defenses don't cut it, Huntress Managed EDR levels the cybe

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 79% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 9.0
    9.3
    Automated remediation
    Average: 8.5
    9.5
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    AF
    The interface is straightforward and easy to use, and whenever I need assistance, I receive quick, human responses. Overall, it’s a solid experience. Read review
    Verified User in Computer & Network Security
    AC
    Huntress provides information to the community about cyber-attacks and methodologies used by threat actors. The reports are clear and detailed with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    38,428 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    859 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Huntress, we believe that enterprise-grade endpoint security shouldn’t just be for big security teams with the most resources. When basic defenses don't cut it, Huntress Managed EDR levels the cybe

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 79% Small-Business
  • 17% Mid-Market
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 9.0
9.3
Automated remediation
Average: 8.5
9.5
Automated investigation
Average: 8.7
Verified User in Financial Services
AF
The interface is straightforward and easy to use, and whenever I need assistance, I receive quick, human responses. Overall, it’s a solid experience. Read review
Verified User in Computer & Network Security
AC
Huntress provides information to the community about cyber-attacks and methodologies used by threat actors. The reports are clear and detailed with... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
38,428 Twitter followers
LinkedIn® Page
www.linkedin.com
859 employees on LinkedIn®
(1,074)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    9.1
    Automated remediation
    Average: 8.5
    9.1
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
    Verified User in Computer & Network Security
    CC
    Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    86,315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    613 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
9.1
Automated remediation
Average: 8.5
9.1
Automated investigation
Average: 8.7
HH
Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
Verified User in Computer & Network Security
CC
Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
86,315 Twitter followers
LinkedIn® Page
www.linkedin.com
613 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(247)4.7 out of 5
Optimized for quick response
13th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.3
    Proactive threat hunting
    Average: 9.0
    9.4
    Automated remediation
    Average: 8.5
    9.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AT
    The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
    GI
    Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.3
Proactive threat hunting
Average: 9.0
9.4
Automated remediation
Average: 8.5
9.3
Automated investigation
Average: 8.7
AT
The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
GI
Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,128 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
(382)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    9.0
    Proactive threat hunting
    Average: 9.0
    9.2
    Automated remediation
    Average: 8.5
    9.0
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Bibek M.
    BM
    The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
    MN
    CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    109,192 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 42% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
9.0
Proactive threat hunting
Average: 9.0
9.2
Automated remediation
Average: 8.5
9.0
Automated investigation
Average: 8.7
Bibek M.
BM
The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
MN
CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
109,192 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
(96)4.7 out of 5
10th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Guardz
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

    Users
    • Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 71% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Proactive threat hunting
    Average: 9.0
    8.7
    Automated remediation
    Average: 8.5
    8.4
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • IE
    Perfectly align the security offerings with the costs for small and medium businesses. They truly value this. Read review
    Scott R.
    SR
    Guardz allows me to cover almost all the bases for my clients from one location. It is simple to understand and allows me to talk with my clients... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    104 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

Users
  • Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 71% Small-Business
  • 22% Mid-Market
Guardz features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.9
Proactive threat hunting
Average: 9.0
8.7
Automated remediation
Average: 8.5
8.4
Automated investigation
Average: 8.7
IE
Perfectly align the security offerings with the costs for small and medium businesses. They truly value this. Read review
Scott R.
SR
Guardz allows me to cover almost all the bases for my clients from one location. It is simple to understand and allows me to talk with my clients... Read review
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
104 Twitter followers
LinkedIn® Page
www.linkedin.com
153 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    • President
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    8.5
    Automated remediation
    Average: 8.5
    8.7
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
    Dakarai B.
    DB
    The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
  • President
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 8% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
8.5
Automated remediation
Average: 8.5
8.7
Automated investigation
Average: 8.7
Verified User in Information Technology and Services
AI
One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
Dakarai B.
DB
The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
(294)4.8 out of 5
15th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for ThreatLocker Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Proactive threat hunting
    Average: 9.0
    8.3
    Automated remediation
    Average: 8.5
    8.2
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,693 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
8.8
Proactive threat hunting
Average: 9.0
8.3
Automated remediation
Average: 8.5
8.2
Automated investigation
Average: 8.7
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Verified User in Transportation/Trucking/Railroad
AT
We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,693 Twitter followers
LinkedIn® Page
www.linkedin.com
658 employees on LinkedIn®
(72)4.8 out of 5
6th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed fo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed ITDR features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Proactive threat hunting
    Average: 9.0
    9.6
    Automated remediation
    Average: 8.5
    9.6
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Katherine D.
    KD
    We love Huntress Managed ITDR for a multitude of reasons. Huntress analyzes issues quicker than anyone else we've used, which is saying something... Read review
    jordane c.
    JC
    -Product Support has far exceeded my exceptions in comparison to any other vendor we utilize. Top support -Decent documentation that makes the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    38,428 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    859 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed fo

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 17% Mid-Market
Huntress Managed ITDR features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
9.5
Proactive threat hunting
Average: 9.0
9.6
Automated remediation
Average: 8.5
9.6
Automated investigation
Average: 8.7
Katherine D.
KD
We love Huntress Managed ITDR for a multitude of reasons. Huntress analyzes issues quicker than anyone else we've used, which is saying something... Read review
jordane c.
JC
-Product Support has far exceeded my exceptions in comparison to any other vendor we utilize. Top support -Decent documentation that makes the... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
38,428 Twitter followers
LinkedIn® Page
www.linkedin.com
859 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

    Users
    No information available
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis MDR features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    8.0
    Automated remediation
    Average: 8.5
    8.6
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Retail
    ER
    I like that there's an experience SOC team backing up our internal team. Read review
    AG
    Wider options to integrate multiple platforms. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,735 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

Users
No information available
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 38% Enterprise
Secureworks Taegis MDR features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
8.0
Automated remediation
Average: 8.5
8.6
Automated investigation
Average: 8.7
Verified User in Retail
ER
I like that there's an experience SOC team backing up our internal team. Read review
AG
Wider options to integrate multiple platforms. Read review
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,735 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 73% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RocketCyber features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.4
    8.6
    Proactive threat hunting
    Average: 9.0
    8.1
    Automated remediation
    Average: 8.5
    8.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    The price is hard to beat, deployment is relatively easy. Read review
    Kumar R.
    KR
    I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,512 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 73% Small-Business
  • 25% Mid-Market
RocketCyber features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.4
8.6
Proactive threat hunting
Average: 9.0
8.1
Automated remediation
Average: 8.5
8.3
Automated investigation
Average: 8.7
Verified User in Information Technology and Services
AI
The price is hard to beat, deployment is relatively easy. Read review
Kumar R.
KR
I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,442 Twitter followers
LinkedIn® Page
www.linkedin.com
5,512 employees on LinkedIn®
(41)4.8 out of 5
Optimized for quick response
12th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Field Effect MDR is a powerful managed detection and response (MDR) solution that delivers comprehensive cybersecurity protection for businesses of all sizes. Purpose-built by world-class security exp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Field Effect MDR features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Proactive threat hunting
    Average: 9.0
    7.6
    Automated remediation
    Average: 8.5
    9.1
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CL
    Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
    Joe U.
    JU
    Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2016
    HQ Location
    Ottawa
    Twitter
    @fieldeffectsoft
    1,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    148 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Field Effect MDR is a powerful managed detection and response (MDR) solution that delivers comprehensive cybersecurity protection for businesses of all sizes. Purpose-built by world-class security exp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Small-Business
  • 29% Mid-Market
Field Effect MDR features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
9.2
Proactive threat hunting
Average: 9.0
7.6
Automated remediation
Average: 8.5
9.1
Automated investigation
Average: 8.7
CL
Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
Joe U.
JU
Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
Seller Details
Company Website
Year Founded
2016
HQ Location
Ottawa
Twitter
@fieldeffectsoft
1,316 Twitter followers
LinkedIn® Page
www.linkedin.com
148 employees on LinkedIn®
(123)4.6 out of 5
Optimized for quick response
View top Consulting Services for Blumira Automated Detection & Response
Save to My Lists
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 37% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Proactive threat hunting
    Average: 9.0
    5.4
    Automated remediation
    Average: 8.5
    6.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LG
    Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
    Verified User in Utilities
    AU
    Setup was simple. With the free o365 monitoring tools, we were up and running monitoring risky sign ins within minutes. Deploying agents was easy... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 37% Small-Business
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.3
Proactive threat hunting
Average: 9.0
5.4
Automated remediation
Average: 8.5
6.3
Automated investigation
Average: 8.7
LG
Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
Verified User in Utilities
AU
Setup was simple. With the free o365 monitoring tools, we were up and running monitoring risky sign ins within minutes. Deploying agents was easy... Read review
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(926)4.6 out of 5
Optimized for quick response
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Proactive threat hunting
    Average: 9.0
    9.7
    Automated remediation
    Average: 8.5
    9.1
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FP
    It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
    SG
    I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    276,980 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.4
9.5
Proactive threat hunting
Average: 9.0
9.7
Automated remediation
Average: 8.5
9.1
Automated investigation
Average: 8.7
FP
It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
SG
I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
276,980 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(17)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deep

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepwatch features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Proactive threat hunting
    Average: 9.0
    8.1
    Automated remediation
    Average: 8.5
    9.5
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anil C.
    AC
    It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
    Manoj K.
    MK
    DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepwatch
    Company Website
    Year Founded
    2019
    HQ Location
    Palo Alto, California, United States
    Twitter
    @deepwatch_sec
    917 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deep

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Deepwatch features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.2
Proactive threat hunting
Average: 9.0
8.1
Automated remediation
Average: 8.5
9.5
Automated investigation
Average: 8.7
Anil C.
AC
It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
Manoj K.
MK
DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
Seller Details
Seller
Deepwatch
Company Website
Year Founded
2019
HQ Location
Palo Alto, California, United States
Twitter
@deepwatch_sec
917 Twitter followers
LinkedIn® Page
www.linkedin.com
238 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pondurance features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 9.0
    8.7
    Automated remediation
    Average: 8.5
    8.7
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JM
    Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
    Verified User in Hospital & Health Care
    IH
    Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Indianapolis, US
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 23% Enterprise
Pondurance features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 9.0
8.7
Automated remediation
Average: 8.5
8.7
Automated investigation
Average: 8.7
JM
Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
Verified User in Hospital & Health Care
IH
Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Indianapolis, US
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®