17 years helping South African businesses
choose better software
XDR Software
XDR (Extended Detection and Response) platforms enable users to detect and manage security threats across data sources such as endpoints, networks, email systems, cloud servers, and more. Typical features include threat intelligence, machine learning, and endpoint protection. XDR software is related to Cybersecurity and Endpoint Detection and Response. Read more Read less
36 results
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning
Features
- Behavioral Analytics
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Network Scanning