2023-02-27T08:20:00Z

Are there endpoint protection platforms that offer threat-hunting or SOC services?

Hello community, 

Please share with the community what your thoughts are based on your personal experience.

Thank you.

Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
  • 5
  • 88
2
PeerSpot user
2 Answers
Nikki Webb - PeerSpot reviewer
Global Channel Manager at Custodian360
Consultant
Top 20
2023-03-15T12:04:01Z
Mar 15, 2023

Yes, there are endpoint protection platforms that offer threat-hunting or SOC (Security Operations Center) services, and Custodian360 is one of them.


Endpoint protection platforms (EPPs) are security solutions that are installed on endpoint devices to detect, prevent, and respond to cyber threats. Threat-hunting is a proactive approach to cybersecurity that involves actively searching for threats and vulnerabilities that might have evaded traditional security measures. SOC services involve monitoring and analysing security events to identify and respond to security incidents.


Custodian360 is a comprehensive endpoint protection platform that offers both threat-hunting and SOC services. It uses a combination of signature-based and behavior-based detection to detect and respond to cyber threats in real-time. The platform has a built-in threat-hunting engine that continuously scans endpoints for signs of compromise, and it also has a team of expert analysts who perform manual threat-hunting to identify and respond to advanced threats.


Custodian360's SOC services include 24/7 monitoring and analysis of security events, incident response, and forensic investigation. The platform also provides detailed reporting and analytics to help organisations understand their security posture and identify areas for improvement.


In summary, Custodian360 is an endpoint protection platform that offers threat-hunting and SOC services, making it an ideal solution for organisations that want comprehensive protection against cyber threats.

Search for a product comparison in EPP (Endpoint Protection for Business)
LW
Content Editor at PeerSpot
Consultant
2023-03-14T14:21:22Z
Mar 14, 2023

Endpoint protection platforms (EPPs) have evolved beyond traditional antivirus software to offer advanced threat detection and response capabilities. Many EPPs also offer threat-hunting or SOC services to provide organizations with real-time visibility into security incidents and remediation recommendations.


Among the EPP providers that offer these services are the following, and, obviously, this is just a sample but, hopefully, also a good start:




  • CrowdStrike Falcon Complete

  • Kaspersky Endpoint Security has an Endpoint Detection and Response

  • McAfee (Trellix) Endpoint Security Managed Detection and Response (MDR)

  • Palo Alto Networks Unit 42 MDR Service for Cortex XDR

  • SentinelOneVigilance Respond

  • Sophos MDR

  • Symantec (Broadcom) Endpoint Protection Managed Endpoint Detection and Response

  • Trend Micro Apex One Managed XDR

  • VMware Carbon Black MRDR




Sophos MDR is interesting in that it leverages other providers' cybersecurity technologies including telemetry from AWS, Check Point, CrowdStrike, Darktrace, Fortinet, PAN, and others.

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
735,432 professionals have used our research since 2012.
Related Questions
NV
Content Editor at a tech company with 51-200 employees
Aug 16, 2023
Hi community, Why is Endpoint Protection for Business (EPP) important for companies? Share your thoughts with the rest of the community.
See 2 answers
NV
Content Editor at a tech company with 51-200 employees
Jul 20, 2023
Endpoint Protection for Business (EPP) is important for companies because:-It helps protect the company's sensitive data and intellectual property from cyber threats.-It safeguards the company's network and endpoints from malware, viruses, ransomware, and other malicious attacks.-It reduces the risk of data breaches and the associated financial and reputational damages.-It ensures compliance with industry regulations and data protection laws.-It enhances the overall security posture of the company by providing real-time threat intelligence and proactive defense mechanisms.-It minimizes the potential downtime caused by security incidents, thus improving productivity.-It offers centralized management and monitoring capabilities, allowing IT teams to efficiently handle security incidents and respond promptly.-It provides visibility into endpoint activities, enabling the detection and prevention of suspicious or unauthorized behavior.-It helps in identifying vulnerabilities and weaknesses in the company's network and endpoints, allowing for timely patching and remediation.-It offers peace of mind to both the company and its customers, knowing that their data and systems are well-protected.
Harish (Kumar) - PeerSpot reviewer
Cyber Security and IT Head at Aeren
Aug 16, 2023
 Endpoint Protection for Business (EPP) is crucial because it safeguards a company's computers, devices, and data from cyber threats like malware and ransomware. It detects and blocks malicious activities, prevents data breaches, ensures business continuity, and helps maintain employee productivity. EPP's real-time monitoring, threat detection, and centralized management contribute to a strong defense against evolving cyber risks, reducing potential financial losses and protecting a company's reputation.
NV
Content Editor at a tech company with 51-200 employees
Jul 20, 2023
Hi community, When evaluating Endpoint Protection for Business (EPP) solutions, what aspects are the most important to look for? Share your thoughts with the rest of the community.
See 1 answer
NV
Content Editor at a tech company with 51-200 employees
Jul 20, 2023
The most important aspects to look for when evaluating Endpoint Protection for Business (EPP) solutions include:-Effectiveness in detecting and preventing malware and other threats-Advanced threat detection capabilities, such as behavior-based analysis and machine learning-Real-time monitoring and response capabilities-Centralized management and reporting features-Compatibility with different operating systems and devices-Integration with other security solutions and tools-Scalability to accommodate the organization's growth-Ease of deployment and user-friendly interface-Regular updates and timely patching to address emerging threats-Strong customer support and service level agreements
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technology products and we want your vote! If there’s a technology solution that’s really impressed you, here’s an opportunity to recognize that. It’s easy: go to the PeerSpot voting site, complete the brief voter registration form, review the list of nominees and vote. Get your colleagues to vote, too! ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important. 1) Does the solution employ Foundational Tech...
EB
Director of Community at PeerSpot (formerly IT Central Station)
Feb 4, 2022
Hi dear community members, This is our latest community digest. It helps you catch up on recent contributions by community members. Comment below with your feedback and suggestions! Trending What are the Top 5 cybersecurity trends in 2022? What are the main benefits of modern IT Asset Discovery tools? Tip Post an educational article from your Home feed and receive 20 point...
See 1 comment
reviewer1577907 - PeerSpot reviewer
Manager at PeerSpot
Feb 4, 2022
Thank you, these community Spotlights are very handy!
EB
Director of Community at PeerSpot (formerly IT Central Station)
Nov 19, 2021
Hi community members, Spotlight #2 is our fresh bi-weekly community digest for you. It covers cybersecurity, IT and DevOps topics. Check it out and comment below with your feedback! Trending What are the pros and cons of internal SOC vs SOC-as-a-Service? Join The Moderator Team at IT Central Station (soon to be PeerSpot)! Questions Share your experience with other peers by ans...
Related Articles
Ariel Lindenfeld - PeerSpot reviewer
Director of Community at PeerSpot
Aug 21, 2022
PeerSpot User's Choice Award 2022
We’re launching an annual User’s Choice Award to showcase the most popular B2B enterprise technol...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
8 Questions to Ask While Selecting an Endpoint Security Solution for Your Business
If you’re weighing your options for endpoint security solutions, there are many options out there...
Download Free Report
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
DOWNLOAD NOW
735,432 professionals have used our research since 2012.