Introducing G2.ai, the future of software buying.Try now

Top Free Managed Detection and Response (MDR) Software

Check out our list of free Managed Detection and Response (MDR) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Managed Detection and Response (MDR) Software to ensure you get the right product.

View Free Managed Detection and Response (MDR) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
28 Managed Detection and Response (MDR) Products Available
(806)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000 and the managed service providers (MSPs) that support them. This platform combines advanced technology wi

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 80% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 8.9
    9.3
    Automated remediation
    Average: 8.5
    9.5
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RO
    With all the security tools on the market, I’m usually skeptical—but Huntress EDR felt like a no-brainer. I started with the trial, then signed up... Read review
    Gareth C.
    GC
    Its ease of deployment is what sold Huntress to us. Huntress was so easy to integrate into our RMM with a prebuilt automation script and clear,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    37,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000 and the managed service providers (MSPs) that support them. This platform combines advanced technology wi

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 80% Small-Business
  • 17% Mid-Market
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 8.9
9.3
Automated remediation
Average: 8.5
9.5
Automated investigation
Average: 8.7
RO
With all the security tools on the market, I’m usually skeptical—but Huntress EDR felt like a no-brainer. I started with the trial, then signed up... Read review
Gareth C.
GC
Its ease of deployment is what sold Huntress to us. Huntress was so easy to integrate into our RMM with a prebuilt automation script and clear,... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
37,661 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
(1,065)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 8.9
    9.1
    Automated remediation
    Average: 8.5
    9.1
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
    Verified User in Computer & Network Security
    CC
    Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    82,356 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    626 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 8.9
9.1
Automated remediation
Average: 8.5
9.1
Automated investigation
Average: 8.7
HH
Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
Verified User in Computer & Network Security
CC
Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
82,356 Twitter followers
LinkedIn® Page
www.linkedin.com
626 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(245)4.7 out of 5
Optimized for quick response
13th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.3
    Proactive threat hunting
    Average: 8.9
    9.4
    Automated remediation
    Average: 8.5
    9.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AT
    The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
    GI
    Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.3
Proactive threat hunting
Average: 8.9
9.4
Automated remediation
Average: 8.5
9.3
Automated investigation
Average: 8.7
AT
The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
GI
Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,117 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
(337)4.7 out of 5
Optimized for quick response
14th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Proactive threat hunting
    Average: 8.9
    9.2
    Automated remediation
    Average: 8.5
    9.1
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MJ
    It has Easy deployment and management. Single Lightweight agent. As it has AI/ML powered for real-time scanning it stops modern attacks, suspicious... Read review
    SR
    yes, it's a very useful and very lightweight agent with CPU/RAM usage. A single agent handles many functions. The threat detection is excellent it... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    108,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
9.2
Proactive threat hunting
Average: 8.9
9.2
Automated remediation
Average: 8.5
9.1
Automated investigation
Average: 8.7
MJ
It has Easy deployment and management. Single Lightweight agent. As it has AI/ML powered for real-time scanning it stops modern attacks, suspicious... Read review
SR
yes, it's a very useful and very lightweight agent with CPU/RAM usage. A single agent handles many functions. The threat detection is excellent it... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
108,749 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
(93)4.7 out of 5
10th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Guardz
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

    Users
    • Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 71% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Proactive threat hunting
    Average: 8.9
    8.7
    Automated remediation
    Average: 8.5
    8.4
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AA
    There is so much to like. The straight forward interface. Personally, I love being able to tell clients about their passwords that are compromised... Read review
    IE
    Perfectly align the security offerings with the costs for small and medium businesses. They truly value this. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

Users
  • Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 71% Small-Business
  • 23% Mid-Market
Guardz features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.9
Proactive threat hunting
Average: 8.9
8.7
Automated remediation
Average: 8.5
8.4
Automated investigation
Average: 8.7
AA
There is so much to like. The straight forward interface. Personally, I love being able to tell clients about their passwords that are compromised... Read review
IE
Perfectly align the security offerings with the costs for small and medium businesses. They truly value this. Read review
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
94 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
(292)4.8 out of 5
11th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for ThreatLocker Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Proactive threat hunting
    Average: 8.9
    8.3
    Automated remediation
    Average: 8.5
    8.2
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,622 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    621 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
8.8
Proactive threat hunting
Average: 8.9
8.3
Automated remediation
Average: 8.5
8.2
Automated investigation
Average: 8.7
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Verified User in Transportation/Trucking/Railroad
AT
We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,622 Twitter followers
LinkedIn® Page
www.linkedin.com
621 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

    Users
    No information available
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis MDR features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 8.9
    8.0
    Automated remediation
    Average: 8.5
    8.6
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Retail
    ER
    I like that there's an experience SOC team backing up our internal team. Read review
    AG
    Wider options to integrate multiple platforms. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,464 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

Users
No information available
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 38% Enterprise
Secureworks Taegis MDR features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 8.9
8.0
Automated remediation
Average: 8.5
8.6
Automated investigation
Average: 8.7
Verified User in Retail
ER
I like that there's an experience SOC team backing up our internal team. Read review
AG
Wider options to integrate multiple platforms. Read review
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,803 Twitter followers
LinkedIn® Page
www.linkedin.com
5,464 employees on LinkedIn®
Ownership
LSE:SOPH
(58)4.9 out of 5
8th Easiest To Use in Managed Detection and Response (MDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 84% Small-Business
    • 12% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed ITDR features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Proactive threat hunting
    Average: 8.9
    9.6
    Automated remediation
    Average: 8.5
    9.6
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ronald S.
    RS
    We love the fact that it has reduced the amount of time spent hunting down false positives. This helps with complacency and the alerts and threats... Read review
    Verified User in Information Technology and Services
    AI
    The accuracy and effectiveness of the threat detection has been wonderful. We have had multiple cases where as soon as we deployed ITDR it found... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    37,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 84% Small-Business
  • 12% Mid-Market
Huntress Managed ITDR features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
9.5
Proactive threat hunting
Average: 8.9
9.6
Automated remediation
Average: 8.5
9.6
Automated investigation
Average: 8.7
Ronald S.
RS
We love the fact that it has reduced the amount of time spent hunting down false positives. This helps with complacency and the alerts and threats... Read review
Verified User in Information Technology and Services
AI
The accuracy and effectiveness of the threat detection has been wonderful. We have had multiple cases where as soon as we deployed ITDR it found... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
37,661 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 73% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RocketCyber features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.4
    8.6
    Proactive threat hunting
    Average: 8.9
    8.2
    Automated remediation
    Average: 8.5
    8.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    The price is hard to beat, deployment is relatively easy. Read review
    Kumar R.
    KR
    I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,388 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity ac

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 73% Small-Business
  • 25% Mid-Market
RocketCyber features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.4
8.6
Proactive threat hunting
Average: 8.9
8.2
Automated remediation
Average: 8.5
8.3
Automated investigation
Average: 8.7
Verified User in Information Technology and Services
AI
The price is hard to beat, deployment is relatively easy. Read review
Kumar R.
KR
I like the interface, I liked the customized ability of rocket cyber. I like that it's stable. Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,498 Twitter followers
LinkedIn® Page
www.linkedin.com
5,388 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 8.9
    8.4
    Automated remediation
    Average: 8.5
    8.6
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consulting
    CC
    The price of Todyl makes it very cost-effective. Read review
    DS
    Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 8.9
8.4
Automated remediation
Average: 8.5
8.6
Automated investigation
Average: 8.7
Verified User in Consulting
CC
The price of Todyl makes it very cost-effective. Read review
DS
Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
(119)4.6 out of 5
Optimized for quick response
View top Consulting Services for Blumira Automated Detection & Response
Save to My Lists
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Proactive threat hunting
    Average: 8.9
    5.4
    Automated remediation
    Average: 8.5
    6.3
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • LG
    Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
    Verified User in Utilities
    AU
    Setup was simple. With the free o365 monitoring tools, we were up and running monitoring risky sign ins within minutes. Deploying agents was easy... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.3
Proactive threat hunting
Average: 8.9
5.4
Automated remediation
Average: 8.5
6.3
Automated investigation
Average: 8.7
LG
Setting up a free account only took a few minutes and the basic detections are selected by defualt. There wasn't much that I had to do to get up... Read review
Verified User in Utilities
AU
Setup was simple. With the free o365 monitoring tools, we were up and running monitoring risky sign ins within minutes. Deploying agents was easy... Read review
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
(912)4.6 out of 5
Optimized for quick response
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 8.9
    9.6
    Automated remediation
    Average: 8.5
    9.0
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • TL
    This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
    OF
    I value the centralized visibility ESET PROTECT gives me across the entire organization. It lets me see endpoint health, vulnerabilities, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    277,643 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 8.9
9.6
Automated remediation
Average: 8.5
9.0
Automated investigation
Average: 8.7
TL
This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
OF
I value the centralized visibility ESET PROTECT gives me across the entire organization. It lets me see endpoint health, vulnerabilities, and... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
277,643 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(27)4.8 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Field Effect MDR is a powerful managed detection and response (MDR) solution that delivers comprehensive cybersecurity protection for businesses of all sizes. Purpose-built by world-class security exp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 63% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Field Effect MDR features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Proactive threat hunting
    Average: 8.9
    7.2
    Automated remediation
    Average: 8.5
    9.0
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CL
    Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
    Joe U.
    JU
    Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2016
    HQ Location
    Ottawa
    Twitter
    @fieldeffectsoft
    1,318 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Field Effect MDR is a powerful managed detection and response (MDR) solution that delivers comprehensive cybersecurity protection for businesses of all sizes. Purpose-built by world-class security exp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 63% Small-Business
  • 30% Mid-Market
Field Effect MDR features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.9
Proactive threat hunting
Average: 8.9
7.2
Automated remediation
Average: 8.5
9.0
Automated investigation
Average: 8.7
CL
Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
Joe U.
JU
Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
Seller Details
Company Website
Year Founded
2016
HQ Location
Ottawa
Twitter
@fieldeffectsoft
1,318 Twitter followers
LinkedIn® Page
www.linkedin.com
146 employees on LinkedIn®
(14)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deep

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Mid-Market
    • 43% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepwatch features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Proactive threat hunting
    Average: 8.9
    8.0
    Automated remediation
    Average: 8.5
    9.4
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anil C.
    AC
    It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
    Manoj K.
    MK
    DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepwatch
    Company Website
    Year Founded
    2019
    HQ Location
    Palo Alto, California, United States
    Twitter
    @deepwatch_sec
    920 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    293 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deepwatch is the leader in Precision MDR powered by AI and humans. We amplify human expertise with AI insights to reduce the risks that matter most to your business. Unlike one-size-fits-all MDR, Deep

Users
No information available
Industries
No information available
Market Segment
  • 57% Mid-Market
  • 43% Enterprise
Deepwatch features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.2
Proactive threat hunting
Average: 8.9
8.0
Automated remediation
Average: 8.5
9.4
Automated investigation
Average: 8.7
Anil C.
AC
It is an excellent MDR tool. Overall functionality covers all aspects like SOC, threat hunting, advanced detection and mitigation, vulnerability... Read review
Manoj K.
MK
DeepWatch Managed Detection and Response is a highly cutting-edge technology leverages advanced machine learning and Artificial Intelligence... Read review
Seller Details
Seller
Deepwatch
Company Website
Year Founded
2019
HQ Location
Palo Alto, California, United States
Twitter
@deepwatch_sec
920 Twitter followers
LinkedIn® Page
www.linkedin.com
293 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pondurance features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 8.9
    8.7
    Automated remediation
    Average: 8.5
    8.7
    Automated investigation
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JM
    Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
    Verified User in Hospital & Health Care
    IH
    Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Indianapolis, US
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 23% Enterprise
Pondurance features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 8.9
8.7
Automated remediation
Average: 8.5
8.7
Automated investigation
Average: 8.7
JM
Pondurance is on top of all the SEIM alerts and knowing which alerts to focus on. They have already caught items that would have compromised our... Read review
Verified User in Hospital & Health Care
IH
Flexibility to add new services that aren't currently offered. Tailoring new services upon our request has been great for us and extremely helpful. Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Indianapolis, US
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®