2026 Best Software Awards are here!See the list

Best Managed Detection and Response (MDR) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Managed detection and response (MDR) software provides security monitoring and mitigation solutions for businesses. MDR providers proactively monitor their customers’ networks, endpoints, and other IT resources for security incidents. Upon detection of threats, the MDR provider will investigate and resolve issues without requiring direct response from their client. Companies use MDR services to protect themselves against web-based threats without requiring the use of dedicated onsite security staff.

MDR is conceptually related to both incident response software and endpoint detection and response software. However, MDR software solves the same issues in the form of a managed service. They require less hands-on work for businesses and provide peace of mind without additional staffing and security solutions.

To qualify for inclusion in the Managed Detection and Response (MDR) category, a product must:

Monitor client networks, endpoints, and the cloud for security incidents
Resolve threats on the client’s behalf
Provide these managed services without the need for client assistance
Show More
Show Less

Featured Managed Detection and Response (MDR) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
121 Listings in Managed Detection and Response (MDR) Available
(504)4.7 out of 5
3rd Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Sophos MDR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Managed Detection and Response (MDR) is a fully managed service delivered by experts who detect and respond to cyberattacks targeting your computers, servers, networks, cloud workloads, email a

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Manufacturing
    Market Segment
    • 63% Mid-Market
    • 21% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sophos MDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    22
    Continuous Monitoring
    21
    Ease of Use
    21
    Peace of Mind
    13
    Response Time
    13
    Cons
    Expensive
    8
    Communication Issues
    7
    Limited Customization
    7
    Integration Issues
    6
    Poor Reporting
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos MDR features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 9.0
    9.1
    Automated remediation
    Average: 8.6
    9.3
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,752 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Managed Detection and Response (MDR) is a fully managed service delivered by experts who detect and respond to cyberattacks targeting your computers, servers, networks, cloud workloads, email a

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Manufacturing
Market Segment
  • 63% Mid-Market
  • 21% Enterprise
Sophos MDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
22
Continuous Monitoring
21
Ease of Use
21
Peace of Mind
13
Response Time
13
Cons
Expensive
8
Communication Issues
7
Limited Customization
7
Integration Issues
6
Poor Reporting
6
Sophos MDR features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 9.0
9.1
Automated remediation
Average: 8.6
9.3
Automated investigation
Average: 8.7
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,752 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
(859)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Huntress Managed EDR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Huntress, we believe that enterprise-grade endpoint security shouldn’t just be for big security teams with the most resources. When basic defenses don't cut it, Huntress Managed EDR levels the cybe

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 79% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Huntress Managed EDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    158
    Ease of Use
    125
    Threat Detection
    92
    Protection
    75
    Continuous Monitoring
    70
    Cons
    Improvements Needed
    20
    Lack of Customization
    17
    Poor Reporting
    17
    Alert Issues
    15
    Integration Issues
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 9.0
    9.3
    Automated remediation
    Average: 8.6
    9.5
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    38,889 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    859 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Huntress, we believe that enterprise-grade endpoint security shouldn’t just be for big security teams with the most resources. When basic defenses don't cut it, Huntress Managed EDR levels the cybe

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 79% Small-Business
  • 17% Mid-Market
Huntress Managed EDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
158
Ease of Use
125
Threat Detection
92
Protection
75
Continuous Monitoring
70
Cons
Improvements Needed
20
Lack of Customization
17
Poor Reporting
17
Alert Issues
15
Integration Issues
15
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 9.0
9.3
Automated remediation
Average: 8.6
9.5
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
38,889 Twitter followers
LinkedIn® Page
www.linkedin.com
859 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(276)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Arctic Wolf
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

    Users
    • IT Manager
    • IT Director
    Industries
    • Hospital & Health Care
    • Financial Services
    Market Segment
    • 71% Mid-Market
    • 19% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arctic Wolf Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    58
    Threat Detection
    47
    Cybersecurity
    28
    Ease of Use
    27
    Alerts
    22
    Cons
    Expensive
    10
    False Positives
    7
    Learning Curve
    7
    Cybersecurity Risks
    6
    Dashboard Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arctic Wolf features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    8.3
    Automated remediation
    Average: 8.6
    9.0
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Eden Prairie, MN
    Twitter
    @AWNetworks
    4,449 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,272 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

Users
  • IT Manager
  • IT Director
Industries
  • Hospital & Health Care
  • Financial Services
Market Segment
  • 71% Mid-Market
  • 19% Enterprise
Arctic Wolf Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
58
Threat Detection
47
Cybersecurity
28
Ease of Use
27
Alerts
22
Cons
Expensive
10
False Positives
7
Learning Curve
7
Cybersecurity Risks
6
Dashboard Issues
5
Arctic Wolf features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
8.3
Automated remediation
Average: 8.6
9.0
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Eden Prairie, MN
Twitter
@AWNetworks
4,449 Twitter followers
LinkedIn® Page
www.linkedin.com
3,272 employees on LinkedIn®
(283)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Managed Detection and Response (MDR) software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown

    Users
    • IT Manager
    • CTO
    Industries
    • Financial Services
    • Legal Services
    Market Segment
    • 58% Mid-Market
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • eSentire Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Response Time
    32
    Customer Support
    26
    SOC Services
    21
    Staff Expertise
    21
    Continuous Monitoring
    18
    Cons
    Communication Issues
    17
    Inefficient Alert System
    9
    Expensive
    8
    Portal Issues
    8
    Poor Reporting
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eSentire features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    8.5
    Automated remediation
    Average: 8.6
    8.9
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    eSentire
    Company Website
    Year Founded
    2001
    HQ Location
    Waterloo, Ontario
    Twitter
    @eSentire
    6,419 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    619 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown

Users
  • IT Manager
  • CTO
Industries
  • Financial Services
  • Legal Services
Market Segment
  • 58% Mid-Market
  • 23% Enterprise
eSentire Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Response Time
32
Customer Support
26
SOC Services
21
Staff Expertise
21
Continuous Monitoring
18
Cons
Communication Issues
17
Inefficient Alert System
9
Expensive
8
Portal Issues
8
Poor Reporting
6
eSentire features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
8.5
Automated remediation
Average: 8.6
8.9
Automated investigation
Average: 8.7
Seller Details
Seller
eSentire
Company Website
Year Founded
2001
HQ Location
Waterloo, Ontario
Twitter
@eSentire
6,419 Twitter followers
LinkedIn® Page
www.linkedin.com
619 employees on LinkedIn®
(384)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    113
    Threat Detection
    103
    Ease of Use
    98
    Security
    97
    Detection
    86
    Cons
    Expensive
    54
    Complexity
    39
    Learning Curve
    35
    Limited Features
    31
    Pricing Issues
    29
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    9.0
    Proactive threat hunting
    Average: 9.0
    9.2
    Automated remediation
    Average: 8.6
    9.0
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    109,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 42% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
113
Threat Detection
103
Ease of Use
98
Security
97
Detection
86
Cons
Expensive
54
Complexity
39
Learning Curve
35
Limited Features
31
Pricing Issues
29
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.4
9.0
Proactive threat hunting
Average: 9.0
9.2
Automated remediation
Average: 8.6
9.0
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
109,556 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
(127)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Managed Detection and Response (MDR) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Red Canary provides managed detection and response (MDR), finding and stopping threats before business impact. You get a security operations platform and 24x7 service that proactively monitors for mal

    Users
    • Security Analyst
    • Security Engineer
    Industries
    • Manufacturing
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Red Canary Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    40
    Threat Detection
    26
    Reliability
    20
    Alert Management
    16
    Features
    15
    Cons
    Inefficient Alert System
    13
    Communication Issues
    7
    Expensive
    6
    Difficult Navigation
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Canary features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Proactive threat hunting
    Average: 9.0
    8.8
    Automated remediation
    Average: 8.6
    8.8
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Denver, Colorado
    Twitter
    @redcanary
    29,897 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    406 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Red Canary provides managed detection and response (MDR), finding and stopping threats before business impact. You get a security operations platform and 24x7 service that proactively monitors for mal

Users
  • Security Analyst
  • Security Engineer
Industries
  • Manufacturing
  • Financial Services
Market Segment
  • 57% Enterprise
  • 38% Mid-Market
Red Canary Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
40
Threat Detection
26
Reliability
20
Alert Management
16
Features
15
Cons
Inefficient Alert System
13
Communication Issues
7
Expensive
6
Difficult Navigation
4
Integration Issues
4
Red Canary features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.7
Proactive threat hunting
Average: 9.0
8.8
Automated remediation
Average: 8.6
8.8
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2013
HQ Location
Denver, Colorado
Twitter
@redcanary
29,897 Twitter followers
LinkedIn® Page
www.linkedin.com
406 employees on LinkedIn®
(1,071)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Managed Detection and Response (MDR) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatDown Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    99
    Features
    68
    Security
    59
    Threat Detection
    56
    Customer Support
    54
    Cons
    Poor Customer Support
    23
    Lack of Clarity
    22
    Missing Features
    20
    False Positives
    18
    Communication Issues
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    9.1
    Automated remediation
    Average: 8.6
    9.1
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    86,817 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    613 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 42% Mid-Market
ThreatDown Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
99
Features
68
Security
59
Threat Detection
56
Customer Support
54
Cons
Poor Customer Support
23
Lack of Clarity
22
Missing Features
20
False Positives
18
Communication Issues
16
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
9.1
Automated remediation
Average: 8.6
9.1
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
86,817 Twitter followers
LinkedIn® Page
www.linkedin.com
613 employees on LinkedIn®
(933)4.6 out of 5
Optimized for quick response
15th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for ESET PROTECT
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ESET PROTECT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    95
    Protection
    79
    Reliability
    71
    Security
    64
    Centralized Management
    58
    Cons
    Learning Curve
    32
    Difficult Configuration
    31
    Not User-Friendly
    25
    Lack of Clarity
    23
    Difficult Navigation
    20
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Proactive threat hunting
    Average: 9.0
    9.8
    Automated remediation
    Average: 8.6
    9.4
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    276,812 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Small-Business
  • 46% Mid-Market
ESET PROTECT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
95
Protection
79
Reliability
71
Security
64
Centralized Management
58
Cons
Learning Curve
32
Difficult Configuration
31
Not User-Friendly
25
Lack of Clarity
23
Difficult Navigation
20
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.4
9.6
Proactive threat hunting
Average: 9.0
9.8
Automated remediation
Average: 8.6
9.4
Automated investigation
Average: 8.7
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
276,812 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed fo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 77% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Huntress Managed ITDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Continuous Monitoring
    23
    Threat Detection
    22
    Alert Management
    12
    Easy Integrations
    12
    Customer Support
    11
    Cons
    Inadequate Detection
    5
    Inefficient Alert System
    5
    Limited Control
    4
    Portal Issues
    4
    UX Improvement
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed ITDR features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Proactive threat hunting
    Average: 9.0
    9.6
    Automated remediation
    Average: 8.6
    9.6
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    38,889 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    859 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hackers aren’t wasting time breaking into your networks the hard way—they’re using infostealers to grab credentials, session cookies, and access tokens in seconds. Huntress Managed ITDR is designed fo

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 77% Small-Business
  • 16% Mid-Market
Huntress Managed ITDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Continuous Monitoring
23
Threat Detection
22
Alert Management
12
Easy Integrations
12
Customer Support
11
Cons
Inadequate Detection
5
Inefficient Alert System
5
Limited Control
4
Portal Issues
4
UX Improvement
4
Huntress Managed ITDR features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.4
9.5
Proactive threat hunting
Average: 9.0
9.6
Automated remediation
Average: 8.6
9.6
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
38,889 Twitter followers
LinkedIn® Page
www.linkedin.com
859 employees on LinkedIn®
(257)4.7 out of 5
9th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Blackpoint Cyber
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blackpoint Cyber is the forerunner in the managed detection and response space, leveraging our proprietary ecosystem to help our partners fight back and win against cyberthreats. We have served the co

    Users
    • President
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 82% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blackpoint Cyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    19
    Threat Detection
    17
    Deployment Ease
    14
    Setup Ease
    13
    SOC Services
    13
    Cons
    Expensive
    5
    Integration Issues
    5
    Poor Reporting
    5
    Portal Issues
    5
    Difficult Navigation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blackpoint Cyber features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Proactive threat hunting
    Average: 9.0
    9.0
    Automated remediation
    Average: 8.6
    9.2
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Denver, Colorado, United States
    Twitter
    @blackpointus
    1,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    194 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blackpoint Cyber is the forerunner in the managed detection and response space, leveraging our proprietary ecosystem to help our partners fight back and win against cyberthreats. We have served the co

Users
  • President
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 82% Small-Business
  • 17% Mid-Market
Blackpoint Cyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
19
Threat Detection
17
Deployment Ease
14
Setup Ease
13
SOC Services
13
Cons
Expensive
5
Integration Issues
5
Poor Reporting
5
Portal Issues
5
Difficult Navigation
3
Blackpoint Cyber features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.4
Proactive threat hunting
Average: 9.0
9.0
Automated remediation
Average: 8.6
9.2
Automated investigation
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
Denver, Colorado, United States
Twitter
@blackpointus
1,520 Twitter followers
LinkedIn® Page
www.linkedin.com
194 employees on LinkedIn®
(248)4.7 out of 5
Optimized for quick response
14th Easiest To Use in Managed Detection and Response (MDR) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cynet Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Features
    36
    Threat Detection
    34
    Customer Support
    32
    Security
    31
    Cons
    Limited Customization
    11
    Feature Limitations
    10
    Lack of Customization
    10
    Limited Features
    10
    Missing Features
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.3
    Proactive threat hunting
    Average: 9.0
    9.4
    Automated remediation
    Average: 8.6
    9.3
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    329 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Features
36
Threat Detection
34
Customer Support
32
Security
31
Cons
Limited Customization
11
Feature Limitations
10
Lack of Customization
10
Limited Features
10
Missing Features
10
Cynet features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.3
Proactive threat hunting
Average: 9.0
9.4
Automated remediation
Average: 8.6
9.3
Automated investigation
Average: 8.7
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,128 Twitter followers
LinkedIn® Page
www.linkedin.com
329 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

    Users
    No information available
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Secureworks Taegis MDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Immediate Response
    2
    24/7 Availability
    1
    Customer Support
    1
    Dashboard Usability
    1
    Easy Integrations
    1
    Cons
    Difficult Navigation
    1
    Implementation Challenges
    1
    Integration Issues
    1
    Learning Curve
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis MDR features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.1
    Proactive threat hunting
    Average: 9.0
    8.0
    Automated remediation
    Average: 8.6
    8.6
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,752 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks® Taegis™ MDR is an industry-leading solution that harnesses the power of AI with human expertise to deliver 24/7 threat monitoring, detection, investigation, and response capabilities. By

Users
No information available
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 38% Enterprise
Secureworks Taegis MDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Immediate Response
2
24/7 Availability
1
Customer Support
1
Dashboard Usability
1
Easy Integrations
1
Cons
Difficult Navigation
1
Implementation Challenges
1
Integration Issues
1
Learning Curve
1
Limited Features
1
Secureworks Taegis MDR features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.1
Proactive threat hunting
Average: 9.0
8.0
Automated remediation
Average: 8.6
8.6
Automated investigation
Average: 8.7
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,752 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
Ownership
LSE:SOPH
(473)4.8 out of 5
11th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for ThreatLocker Platform
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    92
    Threat Detection
    87
    Ease of Use
    75
    Security
    71
    Protection
    69
    Cons
    Learning Curve
    44
    Difficult Learning Curve
    30
    Difficult Configuration
    16
    Difficult Navigation
    14
    Training Required
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Proactive threat hunting
    Average: 9.0
    8.3
    Automated remediation
    Average: 8.6
    8.2
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,732 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    677 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Small-Business
  • 33% Mid-Market
ThreatLocker Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
92
Threat Detection
87
Ease of Use
75
Security
71
Protection
69
Cons
Learning Curve
44
Difficult Learning Curve
30
Difficult Configuration
16
Difficult Navigation
14
Training Required
13
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.4
8.8
Proactive threat hunting
Average: 9.0
8.3
Automated remediation
Average: 8.6
8.2
Automated investigation
Average: 8.7
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,732 Twitter followers
LinkedIn® Page
www.linkedin.com
677 employees on LinkedIn®
(98)4.7 out of 5
10th Easiest To Use in Managed Detection and Response (MDR) software
View top Consulting Services for Guardz
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

    Users
    • Owner
    • Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 71% Small-Business
    • 21% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Guardz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Security
    49
    Features
    37
    Easy Setup
    28
    Threat Detection
    28
    Cons
    Limited Features
    13
    Integration Issues
    8
    Lack of Features
    8
    Limited Customization
    8
    Insufficient Information
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Proactive threat hunting
    Average: 9.0
    8.7
    Automated remediation
    Average: 8.6
    8.4
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

Users
  • Owner
  • Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 71% Small-Business
  • 21% Mid-Market
Guardz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Security
49
Features
37
Easy Setup
28
Threat Detection
28
Cons
Limited Features
13
Integration Issues
8
Lack of Features
8
Limited Customization
8
Insufficient Information
7
Guardz features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.9
Proactive threat hunting
Average: 9.0
8.7
Automated remediation
Average: 8.6
8.4
Automated investigation
Average: 8.7
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
110 Twitter followers
LinkedIn® Page
www.linkedin.com
153 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra's Alert Logic Managed Detection and Response (MDR) is designed to help organizations enhance their cybersecurity posture by providing continuous monitoring, threat detection, and incident respo

    Users
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Alert Logic, A LevelBlue Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    6
    Visibility
    6
    Deployment Ease
    4
    Setup Ease
    4
    SOC Services
    4
    Cons
    Learning Curve
    6
    Expensive
    5
    Complex Configuration
    1
    Deployment Issues
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alert Logic, A LevelBlue Company features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Proactive threat hunting
    Average: 9.0
    8.3
    Automated remediation
    Average: 8.6
    8.2
    Automated investigation
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,602 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra's Alert Logic Managed Detection and Response (MDR) is designed to help organizations enhance their cybersecurity posture by providing continuous monitoring, threat detection, and incident respo

Users
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 35% Enterprise
Alert Logic, A LevelBlue Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
6
Visibility
6
Deployment Ease
4
Setup Ease
4
SOC Services
4
Cons
Learning Curve
6
Expensive
5
Complex Configuration
1
Deployment Issues
1
Difficult Navigation
1
Alert Logic, A LevelBlue Company features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.4
8.7
Proactive threat hunting
Average: 9.0
8.3
Automated remediation
Average: 8.6
8.2
Automated investigation
Average: 8.7
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,602 Twitter followers
LinkedIn® Page
www.linkedin.com
1,738 employees on LinkedIn®

Learn More About Managed Detection and Response (MDR) Software

What is the best MDR software for financial services firms?

Based on expert G2 reviews, these are some of the top Managed Detection and Response (MDR) software for financial services firms:

These services offer 24/7 monitoring, threat hunting, cloud security, endpoint detection and response (EDR), and incident response solutions to protect financial service firms and institutions, to fit the company's needs and protect it against cyberattacks.

Which MDR solutions are best for startups?

For startup companies looking for the best MDR solutions, there are several good options recommended by G2 users:

  • Red Canary: Focuses on offering constant support with a user-friendly interface.
  • Defendify: An all-in-one platform that focuses on simplified cybersecurity solutions for small businesses with limited security resources.
  • Cynet: An all-in-one cybersecurity platform designed to be scalable and adaptable for growing businesses.
  • Huntress: Specializes in protecting small to mid-sized businesses by offering ongoing support, 24/7 monitoring, and threat hunting capabilities.
  • Blumira: Praised for its focus on SMBs, and offers automated detection and response services.