Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 4 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Heimdal Next-Gen Endpoint Antivirus (NGAV) is a NGAV solution that offers unparalleled threat intelligence, EDR and forensics as well as firewall integration. Our tool uses signature-based code scanning technology to monitor the activity of your files to protect your endpoints from malware, ransomware and other types threats. Heimdal Next Generation Endpoint Antivirus lets you perform file scans in real time, as a permanent process. To detect suspicious activity, you can also run scheduled or on-demand scans of your endpoints. Our solution uses signature-based codes scanning, real time cloud scanning, and backdoor analytics to monitor the activity in your organization's files to protect your endpoints.

Description

Trellix Endpoint Security (HX) enables rapid and precise forensic investigations throughout numerous endpoints. By implementing a comprehensive security framework, you can safeguard and strengthen your workforce across all endpoints. Trellix's Endpoint Security solutions leverage proactive threat intelligence and robust defenses throughout every stage of the attack lifecycle, enhancing your organization's safety and resilience. In today's ever-evolving threat landscape, it is crucial to maintain the security of your endpoints. Discover how our cohesive suite of endpoint protection technologies equips you with actionable intelligence, machine learning capabilities, and more, allowing you to consistently monitor threats and prevent attacks. The essence of endpoint security lies in the protection of data and workflows related to each device connected to your network. Endpoint protection platforms (EPP) function by scrutinizing files as they infiltrate the network, ensuring a safer digital environment for all users. By investing in advanced security solutions, organizations can stay one step ahead of potential cyber threats and enhance their overall security posture.

Description

VirusTotal evaluates files and URLs using more than 70 antivirus solutions and blocklisting services, alongside various analytical tools to derive insights from the analyzed content. Users can conveniently choose a file from their device through their web browser and upload it to VirusTotal for examination. The platform supports multiple methods for file submission, such as its main public web interface, desktop uploaders, browser extensions, and a programmable API, with the web interface receiving the highest priority for scanning among these options. Submissions can be automated in any programming language by utilizing the HTTP-based public API. VirusTotal is instrumental in uncovering harmful content and also plays a role in recognizing false positives, which are legitimate items incorrectly flagged as malicious by certain scanners. Additionally, URLs can be submitted through various means, including the VirusTotal website, browser extensions, and the API, ensuring flexibility for users. This comprehensive approach allows VirusTotal to serve as an essential resource for cybersecurity efforts.

API Access

Has API

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Screenshots View All

Integrations

ANY.RUN
Admin By Request Endpoint Privilege Management
Airlock Digital
BackBox
BeyondTrust Cloud Privilege Broker
Conifers CognitiveSOC
Criminal IP
FileVoyager
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
Graylog
Joe Sandbox
Kadabra
Microland
Symantec Network Forensics
ThreatConnect Threat Intelligence Platform
Trellix Data Encryption
Trellix XDR
Uptycs

Integrations

ANY.RUN
Admin By Request Endpoint Privilege Management
Airlock Digital
BackBox
BeyondTrust Cloud Privilege Broker
Conifers CognitiveSOC
Criminal IP
FileVoyager
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
Graylog
Joe Sandbox
Kadabra
Microland
Symantec Network Forensics
ThreatConnect Threat Intelligence Platform
Trellix Data Encryption
Trellix XDR
Uptycs

Integrations

ANY.RUN
Admin By Request Endpoint Privilege Management
Airlock Digital
BackBox
BeyondTrust Cloud Privilege Broker
Conifers CognitiveSOC
Criminal IP
FileVoyager
Forcepoint Trusted Gateway System
Genian NAC
Google Digital Risk Protection
Graylog
Joe Sandbox
Kadabra
Microland
Symantec Network Forensics
ThreatConnect Threat Intelligence Platform
Trellix Data Encryption
Trellix XDR
Uptycs

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Heimdal®

Founded

2014

Country

Denmark

Website

heimdalsecurity.com

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/endpoint-security-hx/

Vendor Details

Company Name

VirusTotal

Country

United States

Website

support.virustotal.com/hc/en-us/articles/115002126889-How-it-works

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Product Features

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike

Alternatives

eScan Reviews

eScan

MicroWorld Technologies
Sangfor Athena EPP Reviews

Sangfor Athena EPP

Sangfor Technologies
RAV Endpoint Protection Reviews

RAV Endpoint Protection

Reason Cybersecurity