A real-time tool for checking for threats on a organizations network endpoints. Often includes:
Features
- Continuous monitoring
- Data collection
- Malware Signature checks
- Behavioral analysis to check network activity for outliers
- IoC detection
- Alerting
- Forensic analysis
- Response to threats and instant remediation
- Endpoint visibility