15 years helping New Zealand businesses
choose better software
XDR (Extended Detection & Response) Software
XDR (Extended Detection and Response) platforms enable users to detect and manage security threats across data sources such as endpoints, networks, email systems, cloud servers, and more. Typical features include threat intelligence, machine learning, and endpoint protection. XDR software is related to Cybersecurity and Endpoint Detection and Response. Read more Read less
26 results
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning
Features
- Threat Response
- Threat Intelligence
- Endpoint Protection Software
- AI/Machine Learning
- Behavioural Analytics
- Network Scanning