---
description: Discover the best MDR Services Software in New Zealand. Compare top MDR Services Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best MDR Services Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [MDR Services Software](https://www.softwareadvice.co.nz/directory/3944/mdr-services/software)

# MDR Services Software

Canonical: https://www.softwareadvice.co.nz/directory/3944/mdr-services/software

-----

## Products

1. [NordVPN](https://www.softwareadvice.co.nz/software/39151/nordvpn) — 4.6/5 (1391 reviews) — NordVPN is a computer security software designed to help businesses encrypt internet connectivity to securely access ...
2. [ESET Endpoint Security](https://www.softwareadvice.co.nz/software/134149/eset-endpoint-security) — 4.7/5 (1169 reviews) — ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This ver...
3. [Netwrix Auditor](https://www.softwareadvice.co.nz/software/142030/netwrix-auditor) — 4.5/5 (212 reviews) — Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwr...
4. [Perimeter 81](https://www.softwareadvice.co.nz/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
5. [Trend Micro Smart Protection Complete Suite](https://www.softwareadvice.co.nz/software/139345/trend-micro-smart-protection-complete-suite) — 4.1/5 (75 reviews) — Trend Micro's Enterprise Security Suite(ESS) is a security management solution that offers in-solution or managed end...
6. [ConnectWise SIEM](https://www.softwareadvice.co.nz/software/118233/perch-security) — 4.6/5 (52 reviews) — ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to...
7. [Blackpoint MDR](https://www.softwareadvice.co.nz/software/318796/blackpoint) — 4.8/5 (36 reviews) — Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was establ...
8. [Dark Web ID](https://www.softwareadvice.co.nz/software/426822/dark-web-id) — 3.7/5 (30 reviews) — Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizati...
9. [Forcepoint Web Security](https://www.softwareadvice.co.nz/software/159421/forcepoint-web-security) — 4.4/5 (10 reviews) — Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and ...
10. [Jazz Platform](https://www.softwareadvice.co.nz/software/149539/jazz-platform) — 5.0/5 (6 reviews) — Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses ...
11. [Cynet 360](https://www.softwareadvice.co.nz/software/61393/cynet-360) — 4.8/5 (5 reviews) — Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully int...
12. [Threat Detection Marketplace](https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace) — 5.0/5 (4 reviews) — Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security infor...
13. [InsightIDR](https://www.softwareadvice.co.nz/software/98135/insightidr) — 4.3/5 (3 reviews) — insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to stre...
14. [Prophaze WAF](https://www.softwareadvice.co.nz/software/185797/prophaze-waf) — 5.0/5 (2 reviews) — Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcar...
15. [SafeGuard Cyber](https://www.softwareadvice.co.nz/software/112509/safeguard-cyber) — 5.0/5 (2 reviews) — SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the informa...
16. [Secureworks](https://www.softwareadvice.co.nz/software/149167/secureworks) — 5.0/5 (2 reviews) — Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, R...
17. [Arctic Wolf Managed Detection and Response](https://www.softwareadvice.co.nz/software/379366/managed-detection-and-response) — 3.0/5 (2 reviews) — Arctic Wolf Managed Detection and Response is a SOC-as-a-service solution that helps businesses monitor, detect and r...
18. [Critical Insight](https://www.softwareadvice.co.nz/software/98069/critical-insight-mdr) — 5.0/5 (1 reviews) — Critical Insight MDR provides managed detection and response (MDR) services to businesses, allowing them to identify ...
19. [ManageEngine Application Control Plus](https://www.softwareadvice.co.nz/software/435540/manageengine-application-control-plus) — 5.0/5 (1 reviews) — Application Control Plus helps you monitor and regulate different applications installed on managed endpoints on a ce...
20. [CloudJacket MXDR](https://www.softwareadvice.co.nz/software/183664/cloudjacketx) — 5.0/5 (1 reviews) — CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solu...
21. [CipherBox](https://www.softwareadvice.co.nz/software/187537/cipher) — 5.0/5 (1 reviews) — CipherBox is a Managed Detection \&amp; Response solution that provides your company with protection from cyber threat...
22. [NetWitness](https://www.softwareadvice.co.nz/software/141850/netwitness) — 5.0/5 (1 reviews) — RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mi...
23. [IBM Security MDR](https://www.softwareadvice.co.nz/software/400905/ibm-security-mdr) (0 reviews) — IBM Security MDR is a managed detection and response service solution that helps IT professionals identify and mitiga...
24. [UnderDefense MAXI](https://www.softwareadvice.co.nz/software/419277/underdefense-mdr) (0 reviews) — UnderDefense MAXI is a holistic security-as-a-service powerhouse that combines AI-native technology with expert-led, ...

## Related Categories

- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Endpoint Detection and Response Software](https://www.softwareadvice.co.nz/directory/3977/edr/software)
- [SIEM Tools](https://www.softwareadvice.co.nz/directory/4725/siem/software)
- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [XDR (Extended Detection & Response) Software](https://www.softwareadvice.co.nz/directory/4754/xdr-software/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/3944/mdr-services/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/3944/mdr-services/software> |
| en | <https://www.softwareadvice.com/security/mdr-services-comparison/> |
| en-AU | <https://www.softwareadvice.com.au/directory/3944/mdr-services/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/3944/mdr-services/software> |
| en-IE | <https://www.softwareadvice.ie/directory/3944/mdr-services/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/3944/mdr-services/software> |
| fr | <https://www.softwareadvice.fr/directory/3944/mdr-services/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@type":"WebSite","@id":"https://www.softwareadvice.co.nz/#website","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"MDR Services Software","description":"Discover the best MDR Services Software in New Zealand. Compare top MDR Services Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software","about":{"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"MDR Services Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best MDR Services Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"NordVPN","position":1,"description":"NordVPN is a computer security software designed to help businesses encrypt internet connectivity to securely access personal information using a virtual private network. It offers a kill switch module, which allows administrators to protect online data in real time.\n\nManagers can hide IP addresses to secure online identity, browsing history, and other online activities while using public Wi-Fi. NordVPN enables teams to protect systems against phishing scams, malware content, and distributed denial-of-service (DDoS) attacks. Additionally, operators can utilize the onion over VPN feature to secure devices against untrustworthy internet service providers (ISPs) and third-party breaches in accordance with the no-logs policy.\n\nNordVPN provides split tunneling functionality, letting businesses protect specific applications and programs while sharing files. Pricing is based on monthly and annual subscriptions and support is extended via email, FAQs, chatbot, and video tutorials.\n\nUpgrade your security level with NordVPN's add-ons:\n- use NordPass to protect your passwords, credit cards, and other sensitive data\n- get NordLocker to keep your data in encrypted cloud storage\n- enable Incogni to remove your personal information from third-parties databases.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89142a33-e9c6-47a8-ab7a-dabf56005343.png","url":"https://www.softwareadvice.co.nz/software/39151/nordvpn","@type":"ListItem"},{"name":"ESET Endpoint Security","position":2,"description":"ESET Endpoint Security software offers robust cybersecurity solutions for organizations with 250+ employees. This versatile application, available both as a cloud-based and on-premises solution, provides comprehensive internet security and malware protection. Trusted by businesses worldwide, ESET leverages advanced cloud sandbox technology to safeguard mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. Key features include file, bot, and mail protection, remote device management, virtualization security, firewall configuration, and web control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1b5a4629-d4eb-49f6-966e-66b8bfe234da.jpeg","url":"https://www.softwareadvice.co.nz/software/134149/eset-endpoint-security","@type":"ListItem"},{"name":"Netwrix Auditor","position":3,"description":"Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwrix solutions empower you with total control over what's going on in your hybrid IT environment by delivering actionable intelligence about changes, access, and configurations. Netwrix solutions empower you to minimize risk and detect threats in a timely manner to prevent data breaches, as well as demonstrate compliance with GDPR, PCI DSS, HIPAA, SOX, GLBA, FISMA, NIST, FERPA, CJIS, NERC CIP, ISO/IEC 27001, and other security standards.\n\n\nThe solution can be deployed either in the cloud or on-premise. Support is provided via a knowledge base, customer portal, email, and phone. Netwrix has a subscription licensing model. Most applications are licensed per user.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aa9469ea-1d2c-4fc5-a0da-56d5cf1273d3.png","url":"https://www.softwareadvice.co.nz/software/142030/netwrix-auditor","@type":"ListItem"},{"name":"Perimeter 81","position":4,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.co.nz/software/230245/perimeter-81","@type":"ListItem"},{"name":"Trend Micro Smart Protection Complete Suite","position":5,"description":"Trend Micro's Enterprise Security Suite(ESS) is a security management solution that offers in-solution or managed endpoint detection and response. Trend Micro's ESS offers endpoint security, internet gateway, mail server and file server security within a suite. Included as an add-on, Managed XDR is a managed detection and response service solution that helps businesses monitor, analyze and respond to cyber threats.\n\n\nTrend Micro's ESS web protection functionality includes anti-malware, web and messaging security, application control and URL filtering. It also offers server protection, vulnerability scanning and centralized management. The product also features email and collaboration security for Office 365 and cloud sharing tools, such as Dox, Dropbox, SharePoint and OneDrive.\n\n\nTrend Micro’s ESS provides consolidated reporting and threat statistics, which help users in managing total security costs. Other features include data loss prevention tools for data security and mobile device management for devices connected to a network. The vendor offers online and phone support.\n\n\nTrend Micro's Managed XDR service component conducts root cause analysis to recognize vectors, dwell time, spread and impacts across attacks. Trend Micro's analysts uses AI-enabled technology to correlate, analyze and prioritize threat data from multiple sources such as endpoints, emails, networks, servers, Internet of Things (IoT) devices and more. Additionally, analysts can generate incident reports and provides detailed remediation options and custom cleanup tools, facilitating recovery from threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6d91b122-c150-4a37-b03f-465b2841df11.png","url":"https://www.softwareadvice.co.nz/software/139345/trend-micro-smart-protection-complete-suite","@type":"ListItem"},{"name":"ConnectWise SIEM","position":6,"description":"ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities, which assist administrators with evaluating threat alerts, logs and related information.\n\n\nConnectWise SIEM allows enterprises to detect potential threats, security issues and malicious activities across the network and connected devices via a unified portal. IT professionals can gain visibility into Windows logs, active assets, HIPAA and PCI DSS compliance, networking status and other metrics via a dashboard. Additionally, users can evaluate issues, instance and other events through real-time alerts and store the information in a repository for future reference.\n\n\nConnectWise SIEM supports integration with a variety of third-party applications such as G Suite, Microsoft teams, Cisco, Salesforce, Bitdefender, Freshdesk, and more. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34dcfe8-0d4f-4a8b-8316-e96618c26019.png","url":"https://www.softwareadvice.co.nz/software/118233/perch-security","@type":"ListItem"},{"name":"Blackpoint MDR","position":7,"description":"Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber experience and knowledge of malicious tradecraft to help MSPs safeguard their infrastructure and operations. \n\nOffering the only world-class, nation state-grade cybersecurity ecosystem, Blackpoint serves the MSP community using its own proprietary security operations and incident response platform, SNAP-Defense, which is available as a product or as a True Managed Detection and Response (MDR) service. Blackpoint not only detects breaches earlier than any other solution on the market, but its dedicated MDR security analysts work 24x7 to combine network visualization, insider threat monitoring, anti-malware, traffic analysis, and endpoint security in one rapidly deployed service to monitor and detain threats before it's too late.  \n \nIn addition to its MDR services, Blackpoint is launching LogIC, its new logging with integrated compliance service to help MSPs and their clients satisfy cyber compliance requirements, including assessments and audits. With simple push-button setup, LogIC’s hyper-efficient logging architecture and self-service web application allows you to generate compliance reports and manage all aspects of event and log collection. Streamline how you prepare for audits and know exactly where you are already covered without compromising your security posture.  \n \nBlackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community. The mission? Provide absolute, unified detection and response services for MSPs of all sizes to combat a constantly changing threat landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d48533f-1f0d-4bcb-be5c-794399a68dab.png","url":"https://www.softwareadvice.co.nz/software/318796/blackpoint","@type":"ListItem"},{"name":"Dark Web ID","position":8,"description":"Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about stolen credentials and organizational data to help businesses identify potential security breaches. Features include threat monitoring and response, real-time data analysis and validation, security alerts, and more.\n\n\nDark Web ID assists MSP and internal IT teams with monitoring the transfer of stolen credentials across hidden chat rooms, private websites, P2P networks, social media platforms, black market sites, and more. With threat response, Dark Web IT will alert organizations when customer or employee credentials are found and take the necessary action to inform teams before any breaches occur.\n\n\nDark Web ID provides flexible threat reporting and is able to integrate with third-party cybersecurity platforms using an integrated API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6de1646f-1b5d-40f7-ada6-4494ba1c0a0c.png","url":"https://www.softwareadvice.co.nz/software/426822/dark-web-id","@type":"ListItem"},{"name":"Forcepoint Web Security","position":9,"description":"Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and other sectors with protection against web threats including viruses, malware, data loss and phishing attacks. The CASB functionality enables administrators to gain visibility and control of cloud applications across the organization.\n\n\nFeatures of Forcepoint Web Security include reputation analysis, predictive analytics, behavioral sandboxing, content classification, reporting and more. It comes with an integrated data theft defense module, which enables IT teams to automatically detect and intercept data theft attempts for file passwords, data leaks and optical character recognition of text within images. Additionally, stakeholders can utilize the content engine to analyze web page content, contextual profiles, active scripts and website links.\n\n\nThe Forcepoint Web Security’s data loss prevention (DLP) platform provides added outbound protection against data theft, maintaining regulatory compliance. Pricing is available on request and support is extended via online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/42979554-8c31-44b8-a8b4-5255af86f9fc.png","url":"https://www.softwareadvice.co.nz/software/159421/forcepoint-web-security","@type":"ListItem"},{"name":"Jazz Platform","position":10,"description":"Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses with threat detection and response automation. Key features include data protection, image capture, forensic analysis, multi-factor authentication and policy violation reporting.\n\n\nThe application enables engineers to monitor users, devices and network behavior for abnormal actions using machine learning technology. Organizations can define security policies and enforce secured cyber practices over remote internet connections, USB storage devices, data sharing, file uploads and more. It allows administrators to track employee activities and record events in a logical sequence within activity feeds. Moreover, supervisors can display on-screen alarm messages to users and lock computer systems in event of threats.\n\n\nJazz Platform offers integration with various third-party applications such as Slack, G Suite, Splunk, Office 365, IBM QRadar and more. Support for the solution is provided through email and pricing is available on request.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17843bcd-67c1-4f4c-a83c-ce0c5d84b94c.png","url":"https://www.softwareadvice.co.nz/software/149539/jazz-platform","@type":"ListItem"},{"name":"Cynet 360","position":11,"description":"Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully integrated solution for endpoint security, vulnerability management, deception, threat intelligence, network analytics and user and entity behavior analytics. Cynet 360 is a cloud-based endpoint security solution that gives allows IT professionals to mointor and control, prevent and detect and orchestrate responses for security breaches. Cynet MDR services, Cyops, includes a 24/7 SOC team to complement Cynet 360 and ensure that every security event is resolved and managed.\n\n\nWith Cynet 360, organizations can deploy a comprehensive security effort to block threats on all systems including malware, insider threats, ransomware, data exfiltration and more. Cynet can be implemented across hundreds to thousands of endpoints. The solution is managed through a single dashboard and a single agent for a consolidated approach and the ability to respond to breaches with automated remediation.  \n\n\nCynet also offers 24/7 continuous monitoring by a cyber SWAT team, including incident response, forensic investigations, threat hunting and malware analysis.  \n\n\nPricing is per endpoint per year. Support is available via email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39539da3-d29a-4613-8a4c-663ebebcc8a4.png","url":"https://www.softwareadvice.co.nz/software/61393/cynet-360","@type":"ListItem"},{"name":"Threat Detection Marketplace","position":12,"description":"Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats. Professionals can conduct automated audits and generate technical reports related to data quality issues, detection rules coverage and more.\n\n\nIT technicians can access MITRE ATT&CK, a global repository of resources and techniques, to create use cases for cloud security monitoring, data integration with Amazon Elastic Container Service (ECS) and other processes. Threat Detection Marketplace provides a dashboard, which can be utilized by enterprises to gain an overview of impacted devices and audit results.\n\n\nThreat Detection Marketplace facilitates integration with several third-party cybersecurity applications including Elastic Stack, Qradar, Splunk and ArcSight. Pricing is available on request and support is extended via live chat and an inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8bcf7c9-a8c4-44ce-b54b-ba2cfa5200fd.png","url":"https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace","@type":"ListItem"},{"name":"InsightIDR","position":13,"description":"insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can utilize log entry query language (LEQL), visual charts/graphs to find and view anomalies.\n\n\nKey features of insightIDR include file integrity or network monitoring, auditing, threat intelligence and compliance management. It allows businesses to analyze data, manage logs and detect risks or threats using attacker behavior analytics. Additionally, it helps users secure credentials or detect insider threats using machine learning technologies and user behavior analytics (UBA).\n\n\ninsightIDR facilitates integration with various third-party systems such as Microsoft Azure, Microsoft Office 365, Amazon Web Services (AWS), FireEye, Salesforce and more. The solution is available on monthly subscriptions and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e882035b-e2b2-4909-94fa-0ec411f53ff7.png","url":"https://www.softwareadvice.co.nz/software/98135/insightidr","@type":"ListItem"},{"name":"Prophaze WAF","position":14,"description":"Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcare, manufacturing, fintech and more protect Kubernetes clusters on-premise and on the cloud. Key features include AI firewall, DDoS protection, compliance management, virtual patching, incident management and API security. \n\n\nDevOps teams using Prophaze WAF can receive holistic protection from application vulnerabilities such as data leaks, rate anomaly, malware attacks, exploit bots, zero-day attacks, misconfigured servers, fileless attacks, and scraping bots among others. The system detects anomalies and protocol IPs in traffic flows via machine language behavior analysis and block DDoS traffic whilst letting valid requests flow through. Additionally, it automatically deploys virtual patching to API, web applications and microservices. \n\n\nProphaze WAF offers multi-tenancy capabilities, which allow organizations to secure data of multiple users on a database and shared application. The system can be deployed in private clouds or on-premise on AWS, Microsoft Azure and Google Cloud. Support is extended via an online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e689cbe6-8218-48e6-836c-5b4edeff0ef4.png","url":"https://www.softwareadvice.co.nz/software/185797/prophaze-waf","@type":"ListItem"},{"name":"SafeGuard Cyber","position":15,"description":"SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the information shared over digital channels. Whether digital messaging occurs on a collaboration channel like Slack, a chat channel like WhatsApp, or social media channel like Twitter, you and your enterprise are secure and compliant with SafeGuard Cyber.\n\n\nSafeGuard Cyber provides unmatched visibility into third-party cloud applications and dark corners of the web where vulnerable data resides. SafeGuard Cyber enables organizations to take immediate action at scale allowing real-time protection and mitigation via our machine learning policy engine. Safeguard Cyber's account-based approach fits into natural human workflows without compromising security.\n\n\nToday's innovative CISOs also acknowledge that a great deal of business communication is now conducted outside the network perimeter. Marketing, sales, and intra-organizational communications do still take place over email. But they have moved partially, if not wholly, over to the third-party cloud channels that are now crucial for both growth and internal operations. The increased use of these external and internal cloud channels means that the organizational threat surface has expanded.\n\n\nMalware, spear-phishing, ransomware, and social engineering are just a few threat vectors that originate outside of the network perimeter, and with SafeGuard Cyber your enterprise gains visibility and reduces risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2ddedc93-ca17-46d5-bf6f-f363650741aa.png","url":"https://www.softwareadvice.co.nz/software/112509/safeguard-cyber","@type":"ListItem"},{"name":"Secureworks","position":16,"description":"Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, Red Cloak Threat Detection and Response (TDR), to help businesses detect adversaries across endpoints, networks and cloud environments. SecureWorks security analysts work 24/7 to provide threat intelligence to investigate, validate and contain threats.\n\n\nSecureWorks analysts to hunt for persistence mechanisms, threat actor tactics and anomalous user activities, network communications or application usage. SecureWORKS uses behavioral analytics to detect unknown threats including file-less malware, reducing futile responses. Additionally, the threat engagement manager provides periodic reviews and reports, improving security measures across the organization.\n\n\nSecureWorks lets businesses detect and respond to malicious activities across Amazon Web Services (AWS), Office 365 and Azure environments. Pricing is available on request and support is extended via phone, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63541483-52a1-44b9-b461-3380e112465c.jpeg","url":"https://www.softwareadvice.co.nz/software/149167/secureworks","@type":"ListItem"},{"name":"Arctic Wolf Managed Detection and Response","position":17,"description":"Arctic Wolf Managed Detection and Response is a SOC-as-a-service solution that helps businesses monitor, detect and respond to cyber threats. It allows users to automatically collect, retain, analyze and search log data from existing networks, systems and applications.\n\nArctic Wolf Managed Detection and Response lets businesses utilize Windows-based event logs and sysmon monitoring methods to identify malicious files/traffic, bad IP addresses/domains and east/west traffic movements. It enables users to track malicious user activity across cloud services, SaaS applications, IaaS infrastructures and SecaaS services. Additionally, users can conduct investigations to detect, escalate responses and contain critical security incidents.\n\nArctic Wolf Managed Detection and Response lets businesses generate operational metrics, categorize assets and gain insights into threat detection and response processes via a unified platform. Pricing is available on request and support is extended via phone, email, documentation and other measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fab66981-9bd7-4797-9b34-9eb934e6876b.png","url":"https://www.softwareadvice.co.nz/software/379366/managed-detection-and-response","@type":"ListItem"},{"name":"Critical Insight","position":18,"description":"Critical Insight MDR provides managed detection and response (MDR) services  to businesses, allowing them to identify and mitigate potential cyber threats. By integrating machines with human intelligence, the application automatically collects data from on-premise, cloud or hybrid environments.\n\n\nCritical Insights security analysts are able to monitor endpoint threats and send prioritized alerts across security operations centers (SOCs). Businesses can provide security analysts with a detailed network diagram to view connected ports/devices and grant access approval to specific individuals during cybersecurity incidents. Additionally, it lets users create incident action plans and perform assessments to test PCI-DSS compliance.\n\n\nCritical Insight MDR facilitates integration with Microsoft Office 365, Amazon Web Services (AWS) and Microsoft Azure, helping service providers retrieve and access audit logs. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7dca94cf-6beb-40ea-bbb6-2f02b95ac14c.png","url":"https://www.softwareadvice.co.nz/software/98069/critical-insight-mdr","@type":"ListItem"},{"name":"ManageEngine Application Control Plus","position":19,"description":"Application Control Plus helps you monitor and regulate different applications installed on managed endpoints on a centralized platform. The solution effectively prevents certain unsafe applications from entering an enterprise's IT network.\n\nSome examples of unsafe applications which can compromise network security when left unmonitored include end-of-life applications, remote desktop sharing and apps that operate on a peer-to-peer architecture. Furthermore, it restricts usage of applications that hinder employee productivity such as games and social media apps.\n\nApplication Control Plus automates generation and maintenance of application whitelists, enabling users complete control over applications allowed to install on systems. Additionally, users can prevent certain executables from getting installed in network by adding them to the application blacklist.\n\nThe product also features a built-in flexibility regulator and integrated endpoint privilege management to aid during the application control process.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e3fdf8e2-d6ba-4972-892b-55f6d622e2c2.png","url":"https://www.softwareadvice.co.nz/software/435540/manageengine-application-control-plus","@type":"ListItem"},{"name":"CloudJacket MXDR","position":20,"description":"CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solution—empowering you with complete threat detection and rapid response across your entire environment. Our U.S.-based Security Operations Center (SOC) operates around the clock, processing billions of alerts daily and escalating less than 0.01%. The result? Your team stays focused on real threats—not noise. CloudJacket integrates seamlessly with your existing infrastructure, whether on-prem, in the cloud, or hybrid—including AWS, Azure, and Google Cloud, and aids in meeting regulatory requirements such as HIPAA, PCI DSS, TSC, and NIST.\nLess alert fatigue. Faster response. Stronger security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.softwareadvice.co.nz/software/183664/cloudjacketx","@type":"ListItem"},{"name":"CipherBox","position":21,"description":"CipherBox is a Managed Detection & Response solution that provides your company with protection from cyber threats. Get alerts when threats to your digital environment arise and let Cipher act to notify you and mitigate them. Respond to and fix vulnerabilities quickly with proactive vulnerability alerting. Keep your brand reputation intact with typo squatting domain protection to stop phishing using your brand.\n\n\nThreat Intelligence is integrated into CipherBox. The intelligence is a combination of proprietary, third party and publicly available sources. Bringing this intelligence into your organization keeps your company protected against the latest tactics by adversaries. The intelligence and protection extend to common Cloud applications like AWS, Azure and other technologies.\n\n\nThe solution is managed by Cipher and ideal for medium-sized companies looking to safeguard their company. Cipher has a 24x7 Security Operations Center (SOC) ready to support customers. CipherBox, in conjunction with other activities, can help companies maintain compliance and stop common threats like data breaches and ransomware.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ac5a950-92cf-4446-a3e2-67cc9efe2e12.png","url":"https://www.softwareadvice.co.nz/software/187537/cipher","@type":"ListItem"},{"name":"NetWitness","position":22,"description":"RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mitigate and prevent cyber threats using various risk management programs. Professionals can monitor current capabilities/gaps across processes and develop remediation strategies on a digital roadmap.\n\n\nRSA allows businesses to create tailored action plans in accordance with NIST Cybersecurity Framework's (CSF) guidelines and recommendations. Managers can perform intentional cyberattacks to monitor the performance of technical/operational controls and flag high-risk areas using multiple scoring methodologies. Additionally, users can create incident response (IR) plans and conduct walkthrough exercises for teams across security operations centers (SOC).\n\n\nRSA enables enterprises to detect endpoint threats and create IR retainer portfolios for customers. Pricing is available on request and support is extended via live chat, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbb5b6a6-b738-4611-9921-dee346cfa04b.png","url":"https://www.softwareadvice.co.nz/software/141850/netwitness","@type":"ListItem"},{"name":"IBM Security MDR","position":23,"description":"IBM Security MDR is a managed detection and response service solution that helps IT professionals identify and mitigate endpoint threats across networks. IBM's threat analysts can monitor the root cause of issues, configure security policies and develop remediation strategies using a digital roadmap.\n\n\nIBM Security MDR allows businesses to gain visibility across threat landscapes by integrating security and non-security data sources. Users can manage the organizational structure of security operation centers (SOCs) and perform regular tests across applications via artificial intelligence (AI) technology. Additionally, it lets managers grant access to specific individuals and generate performance reports in compliance with industry regulations.\n\n\nIBM Security MDR analysts are able to create incident response (IR) plans and implement security controls across the system. Pricing is available on request and support is extended via live chat, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89fb80cf-f977-470e-8c29-4588f003727c.png","url":"https://www.softwareadvice.co.nz/software/400905/ibm-security-mdr","@type":"ListItem"},{"name":"UnderDefense MAXI","position":24,"description":"UnderDefense MAXI is a holistic security-as-a-service powerhouse that combines AI-native technology with expert-led, proactive threat hunting to stop stealthy threats like supply chain attacks, ransomware, and cloud compromises. The platform is developed for teams of any size to efficiently monitor, detect, and respond to threats 24/7 across cloud, hybrid, and on-premise environments. By consolidating all tools into one interface, we've achieved a 100% success rate against ransomware and reduced mean-time-to-contain to 15 minutes. Our award-winning MDR service provides full threat context in 2 minutes, eliminating the alert fatigue and false positives that overwhelm security teams.\nMAXI AI SOC: 24/7 continuous monitoring with 1500+ pre-built correlation rules, automated threat detection across networks, endpoints, cloud, and users. Reduces false positives by 90% while catching stealthy threats like lateral movement, privilege escalation, and data exfiltration.\nMAXI AI Pentest: Continuous vulnerability discovery combining automated scanning with certified ethical hackers for deep security assessments. Identifies and remediates weaknesses in applications, infrastructure, and cloud environments before attackers exploit them.\nMAXI Compliance: Helps clients achieve and maintain ISO 27001 and SOC 2 certification on autopilot. Automated evidence collection, continuous control monitoring, and always-audit-ready documentation eliminate the regulatory burden and manual compliance work.\nCustomer support is ensured by professional SOC specialists 24/7 via live chat and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/801f8138-c7e6-4fc8-bd54-90a9bae613a7.png","url":"https://www.softwareadvice.co.nz/software/419277/underdefense-mdr","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/3944/mdr-services/software#itemlist","numberOfItems":24}
</script>
