Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Managed XDR (MDR) Alternatives

4 Managed XDR (MDR) Reviews

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 Managed XDR (MDR) Reviews
4.4 out of 5
4 Managed XDR (MDR) Reviews
4.4 out of 5

Managed XDR (MDR) Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Sathish Kumar T.
ST
IT Support
Information Technology and Services
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Managed XDR (MDR)?

We create a policy easily, block or allow a path, and block a site using a social or business category like that . Review collected by and hosted on G2.com.

What do you dislike about Managed XDR (MDR)?

this software consume more memory usage while update a MDR ? Review collected by and hosted on G2.com.

Jayasurya S.
JS
IT Support
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Managed XDR (MDR)?

It has a lot of information about the end device, which is helpful to secure the organization. Review collected by and hosted on G2.com.

What do you dislike about Managed XDR (MDR)?

Trend Micron need to improve the User interface for the endpoint manager Review collected by and hosted on G2.com.

Arfath P.
AP
Asst IT Manager
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Managed XDR (MDR)?

What we like most about Trend Micro XDR is its web filtering and device management capabilities, which help us effectively manage remote users. Review collected by and hosted on G2.com.

What do you dislike about Managed XDR (MDR)?

The system gets slow during version update Review collected by and hosted on G2.com.

Dineshkumar M.
DM
Senior support engg
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Managed XDR (MDR)?

It helps as a Centralized threat data and a A lower total cost of ownership. Review collected by and hosted on G2.com.

What do you dislike about Managed XDR (MDR)?

Time : it takes time to allign and and very much slill Review collected by and hosted on G2.com.

There are not enough reviews of Managed XDR (MDR) for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ThreatDown Logo
ThreatDown
4.6
(1,016)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
2
ESET PROTECT Logo
ESET PROTECT
4.6
(834)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
3
Huntress Managed EDR Logo
Huntress Managed EDR
4.9
(720)
The Huntress Managed Security Platform combines automated detection with human threat hunters—providing the software and expertise needed to stop advanced attacks.
4
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
5
Sophos MDR Logo
Sophos MDR
4.7
(266)
Sophos provides cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.
6
ThreatLocker Logo
ThreatLocker
4.8
(272)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
7
Alert Logic MDR Logo
Alert Logic MDR
4.5
(253)
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
8
Blackpoint Cyber Logo
Blackpoint Cyber
4.8
(237)
Let Blackpoint's managed SOC team monitor your network so you can focus on running your business.
9
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(208)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
10
eSentire Logo
eSentire
4.7
(195)
eSentire MDR is designed to keep organizations safe from constantly evolving cyberattacks that technology alone cannot prevent.
Show More