Nestec partner portal

All important information at your fingertips. Access the partner portal or register if you don't have an account open.

Offers, Invoices, Licenses

All important documents in one place. You can download your offers, invoices, and licenses at any time.

Online orders

You can order all your licenses directly through nestec web-SHOP.

NESTEC Partner Login

Stay registered

N-able EDR (Endpoint Detection & Response)

Protect your organization from ransomware attack!

Defend yourself against ransomware, zero-day attacks, and the relentless onslaught of shifting online threats.

 

N-able® Endpoint Detection and Response helps prevent, detect, and respond to the latest threats to customer endpoints. If an attack succeeds and a breach occurs, automated rollback ensures recovery is fast and customer downtime is minimal.

Choose your preferred version

With N-able EDR you can choose the version that fits best to your security offering. There are three versions available:

 

SentinelOne EDR - Control
SentinelOne EDR - Complete
SentinelOne EDR - Vigilance

 

Each version provides unique set of features. COMPLETE is basic EDR offering that includes multiple Ai engines, sophisticated features for network and device control, rogue device discovery and much more. It helps you detect, mitigate and recover from most advanced threats. In case you need additional expertise and deeper insight into your environment you can go for a Complete version that comes with Threat hunting features. Threat hunting is done by SentinelOne Watchtower team. All incidents and suspicious behavior is reported back to you. It is up to you to take neccessary actions. If you feel this is taking to much of your time or you just do not feel comfortable handling this in-house you can always go for Vigilance Respond version. Vigilance Respond offering includes fully managed EDR (MDR), it comes with 24/7 managed SOC services that do the heavy lifting for you. With N-able MDR offering you can rest assured that your clients are in good hands.


BENEFITS:

  • Policy-driven protection before, during, and after cyberattacks, even when endpoints are offline

  • Customized reports present customer risk as key findings and executive insights

  • Get users back to work quickly after an attack

  • Respond to threats immediately at the endpoint

  • View summary or detailed information about threats in a single dashboard

  • Role-based Permissions

  • Automate the response for quick containment of threats

  • Protect against today’s latest threats without waiting for recurring scans or updates to signature definitions

  • Reduce the time it takes to deliver an effective response


Good riddance ransomware...Sentinel One smokes the competition!

SentinelOne (S1) EPP is by far the most superior EDR platform I have seen or worked with in my 14+ years in Cyber Security. Like most organizations, we spent a few weeks deliberating over the best NGAV/EDR solution...

READ FULL REVIEW


FEATURES

 

PREVENT CYBERATACKS

  • Near real-time file analysis: The system can analyze files continuously, replacing time-intensive recurring scans.

  • Signatureless approach: Fight back against the latest threats without having to wait for daily definition updates.

  • Offline protection: Artificial intelligence data is stored on the endpoint to keep it protected while offline—and to help you avoid waiting for signature updates, or waiting for the endpoint to connect to the cloud to check against reputation scores.

  • Machine learning: The system uses machine learning to determine how to best respond to threats and adjusts those responses over time.

  • Autonomous action: Leverage policy-based endpoint protection to neutralize threats at the endpoint automatically.

 

DETECT THREATS

  • Behavioral artificial intelligence engines: Harness eight AI engines that analyze multiple data points to identify threats and determine if a response is necessary.

  • Near real-time alerts: Discover threat activity quickly with alerts whenever a threat is detected or neutralized.

  • Easy-to-use dashboard: View threat information at a glance via a single view that includes quick links to key remediation actions.

  • Executive insight and key findings: See aggregated data on threats—current number of active threats, number of threats found in a specified time period—and review threats and fixes over time.

  • Forensics: See an overview and the storyline of an attack, so you can quickly understand the threat.

  • Threat summaries: Review information on specific threats, such as dates they were identified, dates they were reported, and their file names. Summaries also include links to the Google threat database and VirusTotal websites for more information.

  • Raw data report: Dig into the details on threat information, including timing, activities taken by the file, and its SHA1 hash.

 

RESPOND EFECTIVELY THROUGH AUTOMATION

  • Custom policies: Use policy-driven protection tailored to your customer, which allows/blocks USB, allows/blocks endpoint traffic, and specifies the best automated response.

  • Custom policies: Use policy-driven protection tailored to your customer, which allows/blocks USB, allows/blocks endpoint traffic, and specifies the best automated response.

  • Enhanced quarantine: Select the “Disconnect from Network” option to prevent machines from further infecting the network.

  • Automatic rollback: Attacks are automatically contained and neutralized, and compromised files are automatically replaced by the last known healthy version (Windows OS only).


PROTECT YOURSELF FROM RANSOMWARE
WITH N-ABLE EDR!

Request a LIVE DEMO!

 

edr

 

 

All shown prices are netto prices, PDV is not included. << Please login to nestec Partner portal to see your own prices! >>