Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

OpenText Core EDR serves as a comprehensive solution for endpoint detection and response, merging endpoint protection, security information and event management (SIEM), security orchestration, automation, and response (SOAR), alert triage, and vulnerability assessment into a singular platform, thereby removing the necessity of juggling multiple security tools. Its lightweight agent, equipped with pre-configured policies, allows for swift deployment within minutes and simplifies management across various devices without the need for intricate scripting. By effectively correlating events from endpoints, networks, and identities in real time, the integrated SIEM and SOAR playbooks highlight suspicious activities and automatically direct actions for containment, remediation, and investigation. The system is fortified with continuous, global threat intelligence that facilitates real-time monitoring, which is crucial for detecting malware, ransomware, zero-day vulnerabilities, and other sophisticated threats before they can proliferate, allowing for the prompt isolation or remediation of affected endpoints. This capability not only enhances security but also empowers organizations to respond proactively to emerging threats and maintain a resilient cybersecurity posture.

Description

For more than ten years, we have gathered, consolidated, and provided intelligence on domains, IPs, and DNS to enhance the transparency and security of the Internet. Our data feeds and APIs have been essential for improving the functionalities of various commercial security platforms, including SIEM, SOAR, TIP, and ASM, while also facilitating critical cybersecurity processes like threat detection and response (TDR), third-party risk management (TPRM), and identity access management (IAM). Numerous law enforcement agencies, managed security service providers (MSSPs), and security operations centers (SOCs) utilize our intelligence to defend against sophisticated persistent threats (APT), combat cybercrime, and gain exceptional visibility into their networks. Additionally, Fortune 1000 companies alongside small and medium-sized businesses (SMBs) depend on our data to safeguard their digital assets, enhance their brand protection strategies, identify phishing attempts and fraud, and keep a vigilant watch on the worldwide domain activity landscape. This reliance on our services not only strengthens their cybersecurity frameworks but also fosters a safer digital environment for all users.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Google Digital Risk Protection

Integrations

Google Digital Risk Protection

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

cybersecurity.opentext.com/products/threat-detection/endpoint-detection-response/

Vendor Details

Company Name

WhoisXML API

Country

United States

Website

whoisxmlapi.com

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Whois DB Reviews

Whois DB

Whoisdb.co Domain Database
PURVEYOR Reviews

PURVEYOR

COUNTERVEIL