Finding software can be overwhelming. Software Advice has helped hundreds of companies choose the right MDR service provider to manage security operations.

Showing 1-20 of 30 products

CloudJacketX

CloudJacketX manages, detects, and responds to ongoing cybersecurity threats. It can be deployed on-premise, virtually, in the cloud or a hybrid combination. It can protect any size organization against data breaches by leveraging... Read more

Price:

Platforms: MacWinLinux
Deployments: CloudOn premise
Business Size:
Learn More

SafeGuard Cyber

SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the information shared over digital channels. Whether digital messaging occurs on a collaboration channel like Slack, a chat... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Cipher

CipherBox is a Managed Detection & Response solution that provides your company with protection from cyber threats. Get alerts when threats to your digital environment arise and let Cipher act to notify you and mitigate them. Respond... Read more

Price:

Platforms: MacWinLinux
Deployments: CloudOn premise
Business Size:
Learn More

Kaspersky Endpoint Security

Kaspersky Endpoint Security is cloud-based and on-premise security suite that includes protection and management applications which enable organizations to enforce IT policy, defend against malware attacks and manage overall IT operations.... Read more

Platforms: MacWinLinux
Deployments: On premise
Business Size:
Learn More

ESET Endpoint Security

ESET Endpoint Security is an on-premise and cloud-based anti-malware and security suite for small, midsize and large businesses. Primary functionality includes anti-malware, remote management, endpoint security, file security, firewall,... Read more

Platforms: Win
Deployments: On premise
Business Size:
Learn More

Netwrix Auditor

Netwrix Auditor is a security solution that allows administrators to manage server log files, security events and syslogs across the company network. The solution alerts administrators in real time on critical events. It allows administrators... Read more

Platforms: MacWinLinux
Deployments: CloudOn premise
Business Size:
Learn More

Trend Micro Enterprise Security Suite

Trend Micro's Enterprise Security Suite(ESS) is a security management solution that offers in-solution or managed endpoint detection and response. Trend Micro's ESS offers endpoint security, internet gateway, mail server and file server... Read more

Platforms: MacWinLinux
Deployments: On premise
Business Size:
Learn More

Infocyte

Infocyte is a cloud-based endpoint security solution that helps businesses monitor, analyze and respond to cyber threats. It allows users to enumerate/catalog assets, applications or hosts available on a network and identify unauthorized... Read more

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Forcepoint Web Security

Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and other sectors with protection against web threats including viruses, malware, data loss and phishing attacks. The... Read more

Price:

Platforms: MacWinLinux
Deployments: CloudOn premise
Business Size:
Learn More

Dark Web ID

Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about stolen... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Perimeter 81

Perimeter 81 is a cloud-based solution, which enables organizations of all sizes to provide secure access to cloud environments, applications and on-premise resources for both on-site and remote workforce. Features include two-factor... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Jazz Platform

Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses with threat detection and response automation. Key features include data protection, image capture, forensic analysis,... Read more

Price:

Platforms: MacWinLinux
Deployments: CloudOn premise
Business Size:
Learn More

Threat Detection Marketplace

Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats.... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

SecureWorks

Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, Red Cloak Threat Detection and Response (TDR), to help businesses detect adversaries across endpoints, networks and... Read more

Price:

Platforms:
Deployments: Cloud
Business Size:
Learn More

Device Control Plus

Device Control Plus is an enterprise solution from ManageEngine that monitors and controls the different peripheral devices that connect to endpoints across a business IT network. It can extend control over a variety of external devices... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

insightIDR

insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

FireEye Endpoint Security

FireEye Endpoint Security is a cloud-based solution that regularly monitors endpoints for malware and other online threats. The platform enables users to analyze intrusion activities and create real-time responses to address them.... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Cynet 360

Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully integrated solution for endpoint security, vulnerability management, deception, threat intelligence, network analytics... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Arctic Wolf Managed Detection and Response

Arctic Wolf Managed Detection and Response is a SOC-as-a-service solution that helps businesses monitor, detect and respond to cyber threats. It allows users to automatically collect, retain, analyze and search log data from existing... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Blackpoint MDR

Blackpoint MDR offers managed detection and response (MDR) services, which helps businesses monitor network security and identify threats across organizations. Engineers can implement security operations through network visualization,... Read more

Price:

Platforms: MacWinLinux
Deployments: Cloud
Business Size:
Learn More

Buyers guide


Last Updated: October 29, 2020

Companies today can process data and derive business insights faster by leveraging advanced technologies such as 5G, IoT, data analytics, machine learning, and cloud. However, as technology grows, so does the threat of cybercrime.

Fortunately, there are now better security technologies, such as endpoint security software, and services to help organizations prevent cyber attacks. Managed detection and response (MDR) is such a service, which moves away from the traditional, reactive model and takes on a more proactive approach at mitigating cyber threats.

MDR service providers employ teams of security engineers and analysts that use the latest technologies to constantly monitor and proactively search for threats to a business’s networks and host devices.

This buyers guide explains in detail what MDR services exactly are, their common offerings, and key considerations.

Let’s get started!

Here’s what we’ll cover:

What is managed detection and response (MDR)?

MDR is a security service delivery model that combines threat detection with proactive investigations to preempt cyber attacks. MDR service providers continuously monitor an organization’s networks and host devices to detect suspicious patterns in user behavior and application threats, in real-time.

MDR service providers have security engineers and analysts who respond to potential threats and analyze the vulnerabilities in organizational systems to preempt future cyberattacks.

Common offerings of MDR services

MDR service providers help businesses detect and respond to threats faster. Let’s look at these more closely.

Monitoring and detection A team of security experts uses proprietary security technology stacks, consisting of SIEM and EDR solutions, to detect threats across a client’s network and endpoint devices.
Incident response The provider takes reactive actions, such as blocking an IP address from accessing the network or killing a process on an endpoint server or device, to contain security incidents.
Threat hunting The provider collects security data, such as logs from network firewall and intrusion detection systems, and performs deep analysis to proactively identify threats.
Client portal Clients can access reports confirming threats and read security recommendations via a self-service portal. The portal may also include a ticketing workflow for raising service requests.

What type of client are you?

The type of MDR service provider your organization needs depends on the maturity of your security operations.

  • Low IT security maturity: These clients don't have an in-house team of IT security experts nor have they made significant investments in security solutions. They can set up threat detection and response capabilities by outsourcing to an MDR services provider, especially one that also offers security products.
  • Moderate IT security maturity: These clients have made sporadic investments in threat detection technologies and may also have a small team managing an in-house SOC. Their MDR requirements emphasize scaling existing IT security capabilities. They should ensure their existing security technologies integrate seamlessly with the MDR services provider's technology stack.
  • Substantial IT security maturity: These clients have a fully-functional in-house SOC with significant investments in security technologies and may even be using an MSSP. Their MDR requirements are focused on bridging the gaps in their current capabilities. They might want to look for specialist MDR services providers that cater to specific business use cases.

Key considerations

Examine your business needs: Conduct a meeting of key stakeholders to understand what parts of your IT environment (on-premises assets, SaaS tools, certain workflows) need monitoring and what are the most critical threats your organization faces. Defining and documenting the reasons on why you need MDR services will help craft relevant questions while exploring options on the market.

Understand service level agreements (SLAs): SLAs perform two functions. The first is to confirm the legal formalities, such as determining that the ownership of security data remains with you and not the vendor. Second, SLAs ensure that you hold the vendor liable for quality, such as providing timely support services. Ensuring that you have well-defined SLAs ensures that you have set the right expectations from the MDR service provider.