Best Endpoint Detection and Response (EDR) Software in Germany

Find and compare the best Endpoint Detection and Response (EDR) software in Germany in 2026

Use the comparison tool below to compare the top Endpoint Detection and Response (EDR) software in Germany on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ThreatLocker Reviews
    Top Pick
    See Software
    Learn More
    ThreatLocker Zero Trust Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
  • 2
    Safetica Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information.
  • 3
    Iru Reviews

    Iru

    Iru (formerly Kandji)

    1,278 Ratings
    See Software
    Learn More
    Iru AI reimagines enterprise security and IT management with a unified, AI-driven platform that eliminates tool fragmentation and operational overhead. At its core is the Iru Context Model, a dynamic intelligence layer that connects identity, endpoint, and compliance management into one cohesive ecosystem. The platform offers passwordless authentication, device-bound access policies, and real-time vulnerability detection—creating a trust fabric that safeguards every user and device. Iru’s endpoint suite integrates management, detection, and response capabilities across Apple, Windows, and Android environments for holistic protection. Its Compliance Automation engine continuously maps and updates controls, ensuring organizations remain audit-ready while accelerating deal cycles. By merging automation with contextual intelligence, Iru empowers IT and security teams to make faster, smarter decisions. Companies gain a consolidated view of their infrastructure, reducing zero-day exploit risks and boosting productivity across teams. With a 4.75/5 G2 rating and adoption by thousands of high-growth enterprises, Iru delivers a future-ready foundation for secure, intelligent business operations.
  • 4
    DriveLock Reviews
    The HYPERSECURE Platform by DriveLock is designed to fortify IT systems against cyber threats. Just as securing your home is a given, protecting business-critical data and endpoints should be seamless. DriveLock’s advanced security solutions ensure full lifecycle data protection, combining state-of-the-art technology with deep industry expertise. Unlike traditional security models that rely on patching vulnerabilities, the DriveLock Zero Trust Platform proactively prevents unauthorized access. With centralized policy enforcement, only authorized users and endpoints gain access to essential data and applications—strictly adhering to the never trust, always verify principle.
  • 5
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 6
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 7
    SanerNow Reviews

    SanerNow

    SecPod Technologies

    $50/year/device
    4 Ratings
    SecPod SanerNow, the best unified endpoint security and management platform in the world, powers IT/Security Teams to automate cyber hygiene practices. It uses an intelligent agent-server architecture to ensure endpoint security and management. It provides accurate vulnerability management including scanning, detection, assessment and prioritization. SanerNow can be used on-premise or cloud. It integrates with patch management to automate patching across all major OSs, including Windows, MAC, Linux and a large number of 3rd-party software patches. What makes it different? It now offers other important features such as security compliance management and IT asset management. You can also access software deployment, device control, endpoint threat detection, and response. These tasks can be remotely performed and automated with SanerNow to protect your systems from the new wave of cyberattacks.
  • 8
    TrendAI Vision One Reviews
    TrendAI Vision One™ is a comprehensive AI-powered cybersecurity platform designed to protect enterprises in an increasingly complex threat landscape. Built by Trend Micro, it delivers unified visibility across endpoints, cloud environments, networks, and data systems. The platform leverages advanced AI analytics to identify, prioritize, and respond to security risks based on their potential business impact. It enables organizations to detect threats in real time and automate response workflows for faster mitigation. TrendAI Vision One™ combines capabilities such as extended detection and response (XDR), SIEM, and SOAR into a single integrated solution. It also provides robust protection for AI systems, ensuring secure development, deployment, and governance of AI applications. The platform helps organizations reduce alert fatigue while improving operational efficiency. Its threat intelligence is powered by one of the world’s largest cybersecurity research networks. Businesses can use the platform to proactively manage cyber risk and strengthen resilience. Overall, TrendAI Vision One™ empowers enterprises to innovate securely while staying ahead of modern cyber threats.
  • 9
    Xenex Reviews
    XeneX offers a comprehensive solution that not only features highly adaptable security tools but also ensures round-the-clock access to elite security professionals for ultimate reassurance. The SOC Visibility Triad, as defined by Gartner, presents a multifaceted method for detecting and responding to network threats. XeneX enhances this concept by introducing its cutting-edge SOC-as-a-Service, which progresses from merely presenting data and dashboards to delivering profound clarity and insightful correlations. This service incorporates everything necessary straight out of the box, including the state-of-the-art proprietary XDR+ engine, making it a complete Cloud Security Operations Center (SOC) solution supported by a top-tier global security team that guarantees thorough peace of mind. By employing advanced cross-correlation (XDR) technologies, XeneX elevates the standards of threat detection and response significantly. For further information, continue reading below to discover more about the innovative features and advantages XeneX has to offer.
  • 10
    Splunk Enterprise Reviews
    Splunk Enterprise delivers an end-to-end platform for security and observability, powered by real-time analytics and machine learning. By unifying data across on-premises systems, hybrid setups, and cloud environments, it eliminates silos and gives organizations full visibility. Teams can search and analyze any type of machine data, then visualize insights through customizable dashboards that make complex information clear and actionable. With Splunk AI and advanced anomaly detection, businesses can predict, prevent, and respond to risks faster than ever. The platform also includes powerful streaming capabilities, turning raw data into insights in milliseconds. Built-in scalability allows enterprises to ingest data from thousands of sources at terabyte scale, ensuring reliability at any growth stage. Customers worldwide use Splunk to reduce incident response time, cut operational costs, and drive better outcomes. From IT to security to business resilience, Splunk transforms data into a strategic advantage.
  • 11
    Prey Reviews

    Prey

    Prey

    $1.2 per month
    1 Rating
    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you. TRACKING AND LOCATION • GPS, Wifi Triangulation, and GeoIP Tracking • Control Zones (Geofencing) • Global Device View • Location History DEVICE SECURITY • Remote Screen Lock • Message Alert • Anti-mute Alarm • Control Zone Actions DATA SECURITY • Remote Wipe • File Retrieval • Kill Switch • Factory Reset DEVICE MANAGEMENT • Scheduled Automations • Mass Actions • Enterprise Inventory • Custom Labels and Search • Fleet Status Dashboard • Custom Deployments
  • 12
    Digital Defense Reviews
    Delivering top-tier cybersecurity is not merely about following every new trend that arises. Instead, it requires a steadfast dedication to fundamental technology and impactful innovation. Discover how our solutions for vulnerability and threat management equip organizations like yours with the essential security framework needed to safeguard critical assets. The process of eliminating network vulnerabilities can be straightforward, contrary to the perception some companies may create. You have the opportunity to establish a robust and efficient cybersecurity program that remains budget-friendly and user-friendly. A solid security foundation is all it takes. At Digital Defense, we understand that confronting cyber threats is an unavoidable reality for all businesses. After two decades of crafting patented technologies, we have earned a reputation for developing pioneering threat and vulnerability management software that is not only accessible but also easy to manage and fundamentally strong at its core. Our commitment to innovation ensures that we remain at the forefront of the cybersecurity landscape.
  • 13
    Xcitium Reviews
    Xcitium stands out as the sole comprehensive zero-trust cybersecurity solution, extending its zero-trust approach seamlessly from endpoints to the cloud within a unified interface. It employs a unique detection-less innovation through its patented Kernel-level API virtualization, which significantly diminishes the time threats can operate undetected in your system, effectively bringing that window down to zero. While attacks may unfold in mere minutes or seconds, their effects often take longer to manifest, as intruders require some time to establish a presence and execute their malicious plans. Xcitium proactively interrupts and contains these attacks before they can inflict any harm or achieve their objectives. By providing each endpoint, network, and workload with cutting-edge threat intelligence aimed at identifying cyber threat signatures and payloads, it fortifies defenses against emerging or zero-day threats through its robust static, dynamic, and proprietary behavioral AI technology. This ensures that organizations are not only prepared for existing threats but are also equipped to anticipate and neutralize new ones effectively.
  • 14
    Swascan Reviews
    It scans web sites and web apps to identify and analyze security vulnerabilities. Network Scanner identifies and assists in fixing network vulnerabilities. It analyzes the source code to identify and fix security flaws and weak points. This online tool allows you to evaluate your company's compliance with GDPR. Your employees will benefit from this unique learning opportunity and you can avoid the increasing number of phishing attacks. Consulting activity to assist companies with management, control, and risk evaluation.
  • 15
    Emsisoft Anti-Malware Reviews

    Emsisoft Anti-Malware

    Emsisoft

    $19.99 per device per year
    1 Rating
    They can turn your computer into a remote-controlled, zombie. Your computing power can be sold on the black marketplace to send spam, attack other people or store illegal content. Potentially Unwanted programs that slow down your computer by displaying useless browser toolbars, commercials, and other bulk. Emsisoft Anti-Malware Home detects more malware because it uses two major anti-malware and antivirus technologies. It also scans faster because it uses the combination of these scanners. Any duplicates are avoided, which allows for a minimal impact on memory and overall hardware resources. Emsisoft Anti-Malware Home will block any attempt to access malicious websites and stop access. Emsisoft Anti-Malware Home is the best privacy-conscious filtering system without SSL exploitation.
  • 16
    Carbon Black EDR Reviews
    Carbon Black EDR by Broadcom provides a robust endpoint security solution that combines real-time threat detection, behavioral analysis, and machine learning to protect organizations from sophisticated cyber threats. The platform monitors endpoint activity across networks, offering continuous visibility and automated responses to potential security incidents. By leveraging a cloud-based architecture, Carbon Black EDR ensures seamless scalability and fast deployment, helping organizations mitigate risks, detect threats faster, and respond effectively. It’s ideal for businesses seeking a proactive solution to safeguard their systems from evolving cybersecurity threats.
  • 17
    Fortinet Reviews
    Fortinet stands out as a prominent global entity in the realm of cybersecurity, recognized for its all-encompassing and cohesive strategy aimed at protecting digital infrastructures, devices, and applications. Established in the year 2000, the company offers an extensive array of products and services, which encompass firewalls, endpoint security, intrusion prevention systems, and secure access solutions. Central to its offerings is the Fortinet Security Fabric, a holistic platform that effectively melds various security tools to provide enhanced visibility, automation, and real-time intelligence regarding threats across the entire network. With a reputation for reliability among businesses, governmental bodies, and service providers across the globe, Fortinet places a strong emphasis on innovation, scalability, and performance, thereby ensuring a resilient defense against the ever-evolving landscape of cyber threats. Moreover, Fortinet’s commitment to facilitating digital transformation and maintaining business continuity further underscores its role as a pivotal player in the cybersecurity industry.
  • 18
    Lookout Reviews
    Our goal is to enhance and protect productivity in a world that prioritizes privacy, allowing work and leisure to take place in any location. As everything transitions to the cloud, it is vital that cybersecurity moves with you, safeguarding your information from the endpoint to the cloud environment. The importance of mobility and cloud technology cannot be overstated, as many of us now navigate our professional and personal lives through digital means. Lookout’s solutions offer a platform that merges endpoint and cloud security technologies, customizable for any industry and suitable for a range of organizations, from solo users to expansive global firms and government entities. Cloud access can be managed flexibly, ensuring that security measures do not hinder productivity or diminish user experience. By providing comprehensive visibility and insights, we empower you to protect your data through precise access controls while delivering a smooth and effective user experience. Ultimately, our commitment is to ensure that security and productivity coexist harmoniously in your daily activities.
  • 19
    Automox Reviews
    Automox is a cloud-native solution that is accessible worldwide, providing effective management for OS and third-party patches, security settings, and custom scripts across Windows, Mac, and Linux systems through a user-friendly console. This platform allows IT and SecOps teams to swiftly gain oversight and control over on-premises, remote, and virtual endpoints, eliminating the need for expensive infrastructure deployment. By streamlining these processes, Automox enhances operational efficiency and strengthens security measures across diverse environments.
  • 20
    VIPRE Endpoint Security Reviews

    VIPRE Endpoint Security

    VIPRE Security Group

    $34/seat/year
    VIPRE Endpoint Protection offers robust defense against today’s sophisticated malware, providing ultimate protection without the unnecessary complexity found in other endpoint solutions. Designed to keep your total cost of ownership low, VIPRE combines advanced machine learning, real-time behavioral analysis, and a global threat intelligence network to deliver effective, proactive security. This cloud-based solution combines a modern, streamlined endpoint defense with time-saving efficiencies that help keep your organization running smoothly. VIPRE protects at the file, application, and network level, providing comprehensive malware defense across all attack vectors. It also allows organizations to enforce detailed internet usage policies with granular safeguards that meet employers’ duty-of-care responsibilities. Dynamic, real-time dashboards offer an intuitive, comprehensive view of your endpoint environment, making it easier to monitor security status and take action when needed. VIPRE Endpoint Protection helps safeguard your organization with less complexity and greater efficiency. Available as a core next-generation AV solution, a full EDR solution, or a combined EDR+MDR solution, we have a package that will work for you.
  • 21
    Apozy Airlock Reviews

    Apozy Airlock

    Apozy

    $9/month/user
    Apozy Airlock. The browser endpoint detection platform and response platform that neutralizes all web attacks in just one click. The Internet can be dangerous. It doesn't have it to be. Airlock plugs the gap in the EPP/EDR. It protects your browser and delivers a safe, secure, and lightning-fast internet connection. Airlock is powered by the first visually-aware native browser isolate platform with over 6 petabytes visual data. It prevents web attacks in real-time. Airlock stops spearfishing from happening. Airlock's technology protects anyone clicking on malicious links by sandboxing them.
  • 22
    RG System Reviews

    RG System

    RG System

    $1.50
    RG System is a SaaS IT Management platform for MSPs and IT Professionals. It combines RMM and Data Backup & Restore with Endpoint Security in a centric portal. RG System protects your entire IT infrastructure - servers and workstations - and offers unique Bitdefender GravityZone Business Security integration and Dell EMC Avamar integration. Remote access, patch management and ticketing are all possible from the same web-based interface. You can also manage and secure your IT environments using VMs backup, replication, firewall, and other features. The portal is affordable, simple-to-use, and available on a pay-as-you-go basis. We make IT easy!
  • 23
    Enginsight Reviews

    Enginsight

    Enginsight

    $12.99 per month
    Enginsight is a comprehensive cybersecurity solution crafted in Germany, adept at unifying threat identification and protection measures. Incorporating automated security audits, penetration testing, IDS/IPS, micro-segmentation, vulnerability assessments, and risk analysis, Enginsight equips businesses across scales to seamlessly establish and supervise potent security approaches via a user-friendly dashboard. Automatically examine your systems to instantly discern the security posture of your IT assets. Entirely self-engineered with security by design principles, Enginsight operates independently of third-party tools. Continuously scour your IT landscape to detect devices, generating a real-time depiction of your IT framework. With automatic detection and endless inventory of IP network devices, including categorization, Enginsight serves as an all-encompassing monitor and security shield for your Windows and Linux servers, and endpoint devices such as PCs. Start your 15 day free trial now.
  • 24
    ManageEngine DataSecurity Plus Reviews
    ManageEngine DataSecurity Plus lets you take control of sensitive data. Take a look at the most recent user activity, file activity, as well as access trends. The four Ws of every access are who accessed it, when and from where. The most important events, such as sudden permissions changes, file deletions and renaming events, are those that matter the most. Identify the most active users, most frequently accessed files, as well as the most modified files within your file system. You can set up instant alerts to notify you of sudden spikes in folder or file access or modification events. Receive real-time notifications when multiple attempts are made to access critical files. After business hours, monitor changes to sensitive files. Monitor only critical files, folders and shares. Receive real-time alerts when files are modified in an unauthorized manner. To detect unusual activity and misuse of privileges, configure threshold-based alerts that monitor user-generated events.
  • 25
    WithSecure Elements XDR Reviews
    WithSecure's modular Elements Cloud cyber security platform seamlessly integrates Extended Detection and Response (XDR), Exposure Management (XM) and Co-Security Services into a single unified solution. - WithSecure Elements XDR includes Elements Endpoint Security (your EPP+EDR), Identity Security for Microsoft Entra ID, Collaboration Protection for Microsoft 365, and Cloud Security for Azure as modules. You can flexibly choose which capabilities to include in your Elements XDR solution. - WithSecure Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides visibility into your attack surface and enables the efficient remediation of its highest-impact exposures through a unified view, thanks to our exposure scoring and AI-enabled recommendations. Get one solution for 360° digital exposure management and visibility across your external attack surface and internal security posture, to proactively prevent cyber-attacks. Through our flexible Elements modules made of cutting-edge software and high-quality services, customers can find the optimal solution for their needs. Together, the modules offer end-to-end business and cloud coverage. In today's unpredictable, ever-changing business environment, our all-in-one security platform helps you build and maintain a resilient business. We believe in the European Way of cyber security and we do this together with our partners as the Elements Cloud is really geared to enable WithSecure’s partners to offer robust security products and managed security services to mid-sized and other resource constrained companies.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB