Endpoint protection is the continuous search, detection, analysis and elimination of threats with the support of an experienced technical team.
This is what our EDR solution does
Your most sensitive data resides on your endpoints and in the cloud, and it only takes seconds for attackers to infect an endpoint and cause damage to your company.
Endpoint Detection and Response helps you protect what matters by fortifying every device on your network with autonomous, real-time protection.
In collaboration with SentinelOne, Claranet offers its customers a next-gen Endpoint Detection and Response solution that enables you to prevent, detect and eliminate known and unknown threats with a single click.
The service offers:
- Detection of security incidents
- Containment of the security incident right at the starting point
- Investigation and analysis of security incidents
- Guidance on how to help in the event of a security incident
EDR services
Security is the be-all and end-all, which is why we offer different service levels to suit the needs of your company, your team and your expertise:
Endpoint Detection and Response licence - Install and manage the software licence yourself.
Endpoint Detection and Response as a Service - Software licence, installation and configuration of the service as well as provision of support – Monday to Friday between 8 am and 6 pm.
Managed Endpoint Detection and Response - Full endpoint detection and response analysis, including outside of business hours, incident handling and analyst-driven threat hunting. Monthly reporting and access to tickets is via an online portal.
Features of Endpoint Detection and Response
The next generation of antivirus
Detects malware and malicious activities which are often missed by conventional antivirus solutions
Simple provision
For Windows, Linux and MacOS; on-site, in the cloud or as a hybrid solution
Rollback
Rapid restoration to a pre-attack state without having to pay expensive ransoms
Search for threats
To identify command-and-control servers and application attacks
Analyst-driven research
Hazard assessment and measures for containment and rollback
Isolation
Of infected computers to prevent the spread and cost of malicious attacks