Contact Details

McAfee Corp.

Located in United States, California, San Jose

Founded in 1987

Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to MVISION EDR

SentinelOne Active EDR

SentinelOne Active EDR

No ratings yet!
Falcon Insight

Falcon Insight

No ratings yet!
Blackberry optics

Blackberry optics

No ratings yet!
Cisco Secure Endpoint

Cisco Secure Endpoint

No ratings yet!
Cortex XDR

Cortex XDR

No ratings yet!
Cynet 360

Cynet 360

No ratings yet!
Sophos Intercept X

Sophos Intercept X

No ratings yet!
Apex One

Apex One

No ratings yet!
Binary Defense MDR

Binary Defense MDR

No ratings yet!
FireEye Endpoint Security

FireEye Endpoint Security

No ratings yet!
View all alternatives

What is MVISION EDR?

Show Less

Contact Details

McAfee Corp.

Located in United States, California, San Jose

Founded in 1987

Top Industries Represented

Data from Grid Report for Endpoint Detection and Response (Edr) Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

MVISION EDR Pricing

Check out our offers for each of our packages to get best out of the software

Visit us on our website to know more

Get a custom quote

MVISION EDR Features

Primary Features

Prioritization

Prioritization is the process by which most critical vulnerabilities are ranked in order of importance.

Reporting/Analytics

Reporting summarizes and organizes data in easily digestible ways while analytics enables questioning and exploring that data further.

Whitelisting/Blacklisting

Whitelisting is a security procedure companies take that limits user access to only trusted content defined by network owners. Blacklisting blocks specific sites, users and applications from accessing a network or device.

Policy Management

Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.

Vulnerability Scanning

Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

Real Time Monitoring

Real-time monitoring is the process of collecting and storing performance metrics for data as it traverses your network. It involves polling and streaming data from infrastructure devices so that you know how your networks, applications, and services are performing.

Secondary Features

  • Device Management
  • Maintenance Scheduling
  • Compliance Tracking
  • Third Party Integrations
  • Configuration Management

Compare with Similar Products

SentinelOne Active EDR

SentinelOne Active EDR

Falcon Insight

Falcon Insight

Blackberry optics

Blackberry optics

Cisco Secure Endpoint

Cisco Secure Endpoint

Cortex XDR

Cortex XDR

Cynet 360

Cynet 360

Sophos Intercept X

Sophos Intercept X

Apex One

Apex One

Binary Defense MDR

Binary Defense MDR

FireEye Endpoint Security

FireEye Endpoint Security

Show Comparisons