SoftwareReviews names ThreatDown, Crowdstrike Falcon Platform, and Sophos Intercept X Endpoint as Endpoint Detection & Response Data Quadrant Award Winners.
Data Quadrants are proudly founded in 100% user review data and are free of traditional
"magical" components such as market presence and analyst opinion, which are opaque in nature
and may be influenced by vendor pressure, financial or otherwise.
The SoftwareReviews Data Quadrant evaluates and ranks products based on feedback from IT
and business professionals. The placement of a software in the Data Quadrant indicates its
relative ranking as well as its categorization.
Read The In-Depth Report
A thorough evaluation and ranking of all software in an individual category to compare
software across every dimension.
Note Software product placement is based on the scores provided by users, recency of the reviews, and review volume. Axes are dynamically adjusted based on the minimum and maximum values in the data set.
Evaluate the Complete
Software Experience
When distilled down, the software experience is shaped by both the experience with the software
and the relationship with the vendor. Evaluating enterprise software along these two dimensions
provides a comprehensive understanding of the product and helps identify vendors that can deliver on both.
Product Features and Satisfaction
The satisfaction is captured in the overall satisfaction score, which is driven by the likelihood
of users to recommend the software, combined with user satisfaction across top product features.
Vendor Experience and Capabilities
The vendor relationship is calculated in a weighted average of the satisfaction scores tied to vendor
capabilities (e.g. software implementation, training, customer support, product roadmap) as well as
emotional response ratings toward the vendor (e.g. trustworthy, respectful, fair).
Industry-proven through award-winning protection, ThreatDown powered by Malwarebytes (Formerly Malwarebytes Endpoint Detection and Response) stops attacks against workstations and servers with security that catches what other solutions miss. ThreatDown provides organizations complete, integrated protection through a single, lightweight agent that is incredibly fast to install and easy to manage.
Sophos Intercept X is the world's best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution.
SentinelOne Singularity XDR unifies and extends detection, investigation and response capability across the entire enterprise, providing security teams with centralized end-to-end enterprise visibility, powerful analytics, and automatable response across the technology stack. The solution empowers security teams to see data collected by disparate security solutions from all platforms, including endpoints, cloud workloads, network devices, email, identity, and more, within a single dashboard.
Huntress is a provider of advanced threat detection and actionable cybersecurity information that delivers easy to follow remediation steps into your existing ticketing system. Huntress enables you to find and stop hidden threats that sneak past preventive security tools. By focusing on a specific set of attack surfaces, vulnerabilities and exploits, our platform helps IT service providers protect their customers from persistent footholds, ransomware and other attacks.
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Defender for Endpoint customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.
To stay ahead of fast-moving threats, you need AI-powered endpoint security that continuously learns new attack techniques. Cortex XDR™ offers protection that blocks all malware, exploits and fileless attacks to keep your endpoints safe
Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix (formerly McAfee Mvision) endpoint security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient.
Whether you seek technology that will help you quickly and thoroughly assess your risk, require expert assistance to manage the products for you, or are looking to implement proven security processes, we have you covered.
Kaspersky Endpoint Detection and Response (EDR) Optimum delivers advanced detection, simple investigation and automated response in an easy-to-use package, to protect your business against the latest threats.
Trend Micro Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Micro Vision One prevents the majority of attacks with automated protection.
Kaspersky Endpoint Detection and Response (EDR) Expert provides comprehensive visibility across all endpoints on your corporate network and delivers superior defenses, automating routine EDR tasks and enabling the Analyst to speedily hunt out, prioritize, investigate and neutralize complex threats and APT-like attacks. Kaspersky EDR Expert uses a single agent that can be managed both from a cloud-based single management platform and from an offline console in air-gapped environments, leveraging threat intelligence and incorporating customizable detections.
Carbon Black EDR is an incident response and threat hunting solution designed for security operations center (SOC) teams with offline environments or on-premises requirements. Carbon Black EDR continuously records and stores comprehensive endpoint activity data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. It leverages the VMware Carbon Black Cloud’s aggregated threat intelligence, which is applied to the endpoint activity system of record for evidence and detection of these identified threats and patterns of behavior
For the full list of vendors in this space, click here.
About Gold Medal Awards and Software Reports
SoftwareReviews Gold Medal Awards recognize outstanding vendors in the technology marketplace as evaluated by their users. Gold Medals are the capstone of an in-depth software evaluation report, and awarded using a proprietary, transparent methodology based on a composite satisfaction score that averages four different areas of evaluation: Net Emotional Footprint, Vendor Capabilities, Product Features, and Likeliness to Recommend. The Net Emotional Footprint Score measures user emotional response ratings of the vendor (e.g. trustworthy, respectful, fair).
Software Reports present comprehensive evaluations of software vendors on the above elements. Software buyers can use this data to make more informed, data-driven software purchasing and renewal decisions.
Download
Get Instant Access<br>to this Report
Get Instant Access to this Report
Unlock your first report with just a business email. Register to access our entire library.
Before continuing, please take a moment to review and agree to our policies and indicate your email preferences below:
Please sign in via LinkedIn to access your free .
Signing in also unlocks access to the dynamic version of the Data Quadrant, which plots vendors based on verified user reviews! Customize the Data Quadrant according to the features and sentiments that matter most to you.
Please note: the dynamic version of the Data Quadrant continues to collect data after report publication, and may show new data that will appear in next year's report.
This offer is available until May 31, 2020. These reports are intended for internal strategic use only and are not authorized for redistribution. For permission to reuse content, please contact vendors@softwarereviews.com.