Search
Close this search box.
Search
Close this search box.
Search
Close this search box.

Microsoft Defender For Endpoint P1 [New Commerce Experience]

Product Attributes: ,

Cost and Price

Determined by Usage

$3.00

Prices exclude tax (GST, VAT, etc)

SKU MST-NCE-131-C100 Category Tags ,
Billing Model: Bill Ahead
Billing Unit: User
Trial: No
Partner Shell: No
Support: Pax8 Supported
Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection) delivers preventative protection, post-breach detection, automated investigation, and response. This solution uses a combination of technology built into Windows 10 and Microsoft’s robust cloud service. Endpoint behavioral sensors are embedded in Windows 10. These sensors collect and process behavioral signals from the operating system and sends this sensor data to your private, isolated, cloud instance of Microsoft Defender for Endpoint. Cloud security analytics leverages big-data, machine-learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats. And finally, threat intelligence is generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Microsoft Defender for Endpoint to identify attacker tools, techniques, and procedures, and generate alerts when these are observed in collected sensor data. Microsoft Defender for Endpoint directly integrates with various Microsoft solutions, including Intune, Office 365 ATP, Azure ATP, Azure Security Center, Skype for Business, and Microsoft Cloud App Security.

Features

  • Threat and vulnerability management
  • Endpoint detection and response
  • Automated investigation and remediation
  • Centralized configuration and administration
  • Microsoft threat experts

Benefits

  • Detect and respond to advanced attacks with behavioral monitoring
  • Eliminate risks and reduce your attack surface
  • Elevate your security teams and streamline workflows