What is Falcon Insight?
Show LessFeatured In
Best Endpoint Detection and Response 2021Best For User Type
- Breach Protection
- Unparalleled Visibility
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Endpoint Detection and Response (Edr) Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Falcon Insight Pricing View vendors pricing
Check out our offers for each of our packages to get best out of the software
PRO
₹8.99
per endpoint/month
Replace legacy AV with market-leading NGAV and integrated threat intelligence and immediate response
ENTERPRISE
₹15.99
per endpoint/month
Unified NGAV, EDR, managed threat hunting and integrated threat intelligence
PREMIUM
₹18.99
per endpoint/month
Full endpoint protection with threat hunting and expanded visibility
COMPLETE
Custom Price
On request
Endpoint protection delivered as-a-service and backed with a Breach Prevention Warranty up to $1M.
Visit us on our website to know more
Get a custom quote
Falcon Insight Features
Primary Features
Behavioral Analytics
EDR uses behavioral analysis to analyze and connect the activity of individual users on your system.
Prioritization
Prioritization is the process by which most critical vulnerabilities are ranked in order of importance.
Reporting/Analytics
Reporting summarizes and organizes data in easily digestible ways while analytics enables questioning and exploring that data further.
Endpoint Management
Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Real Time Monitoring
Real-time monitoring is the process of collecting and storing performance metrics for data as it traverses your network. It involves polling and streaming data from infrastructure devices so that you know how your networks, applications, and services are performing.
Activity Dashboard
It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoint devices
Secondary Features
- Activity Tracking
- Maintenance Scheduling
- Compliance Tracking
- Status Tracking
- Third Party Integrations
- Api
Compare with Similar Products
SentinelOne Active EDR
Blackberry optics
MVISION EDR
Cisco Secure Endpoint
Cortex XDR
Cynet 360
Sophos Intercept X
Apex One
Binary Defense MDR
FireEye Endpoint Security