---
description: Review of Xcitium Endpoint Detection & Resonse Software: system overview, features, price and cost information. Get free demos and compare to similar programs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Xcitium Endpoint Detection & Resonse | Reviews, Pricing & Demos - SoftwareAdvice AU
---

Breadcrumb: [Home](/) > [Threat Intelligence Platforms](/directory/3995/threat-intelligence/software) > [Xcitium Endpoint Detection & Resonse](/software/345400/comodo-endpoint-security-manager)

# Xcitium Endpoint Detection & Resonse

Canonical: https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager?page=2)

> Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the cybersecurity industry, is a sophisticated solution for monitoring endpoint devices continually. It is engineered not only to detect and respond to serious threats like malware and ransomware but also to provide deep insights into the attack dynamics, pinpoint vulnerabilities, and enhance future defenses.&#10;&#10;The solution operates with an agent installed on endpoint devices, working closely with a central management console and utilizing a cloud-based analytics service. This agent monitors device activities, sending data to the console where potential threats are analyzed.&#10;&#10;EDR platforms, while varying slightly between vendors, generally share key functionalities, including threat detection using behavioral analytics, heuristics, and machine learning to spot suspicious activities. Upon detecting a threat, actions such as quarantining or deleting infected files and isolating the affected device can be executed. These platforms also offer detailed reporting and alerts to facilitate rapid response to threats.&#10;&#10;When choosing an EDR solution, it's crucial to consider its detection and response effectiveness, impact on system performance, and false positive rate. The ideal EDR should maintain high detection rates for all threats while optimizing system performance and minimizing false alerts.&#10;&#10;The advantages of EDR include better visibility of endpoint actions, improved detection, quicker response times, enhanced forensic data for investigations, and lower false positive rates, which strengthen an organization’s cybersecurity stance.&#10;&#10;Implementing EDR involves setting specific security goals, choosing a suitable platform, deploying it, configuring detection rules, and actively managing alerts to respond appropriately to threats.&#10;&#10;Xcitium's EDR emphasizes not just threat detection but also immediate containment within a "ZeroDwell" time environment, advocating for preemptive action against unknown threats by virtualizing them. This approach improves upon traditional EDR capabilities by adding more robust awareness and remediation features.&#10;&#10;In summary, Xcitium's EDR platform provides a thorough, analytical approach to cybersecurity, enabling organizations to proactively manage threats with advanced detection, response, and containment strategies.
> 
> Verdict: Rated **4.3/5** by 39 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.3/5** | 39 Reviews |
| Ease of Use | 3.9/5 | Based on overall reviews |
| Customer Support | 4.4/5 | Based on overall reviews |
| Value for Money | 4.5/5 | Based on overall reviews |
| Features | 4.1/5 | Based on overall reviews |
| Recommendation percentage | 80% | (8/10 Likelihood to recommend) |

## About the vendor

- **Company**: Xcitium
- **Location**: Clifton, US
- **Founded**: 1999

## Commercial Context

- **Starting Price**: USD 4.00
- **Pricing model**: Flat Rate (Free Trial)
- **Target Audience**: Self Employed, 2–10, 11–50, 51–200, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile)
- **Supported Languages**: English
- **Available Countries**: United States

## Features

- API
- Access Controls/Permissions
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Virus
- Application Security
- Behavioral Analytics
- Compliance Management
- Configuration Management
- Continuous Monitoring
- Data Security
- Deployment Management
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Firewalls
- Mobile Device Management

## Support Options

- 24/7 (Live rep)

## Category

- [Threat Intelligence Platforms](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software)

## Related Categories

- [Threat Intelligence Platforms](https://www.softwareadvice.com.au/directory/3995/threat-intelligence/software)
- [Cybersecurity Software](https://www.softwareadvice.com.au/directory/4643/cybersecurity/software)
- [Computer Security Software](https://www.softwareadvice.com.au/directory/4528/security/software)
- [Endpoint Detection and Response Software](https://www.softwareadvice.com.au/directory/3977/edr/software)
- [Network Security Software](https://www.softwareadvice.com.au/directory/4170/network-security/software)

## Alternatives

1. [ManageEngine Endpoint Central](https://www.softwareadvice.com.au/software/117339/manageengine-endpoint-central) — 4.6/5 (1485 reviews)
2. [ACMP Suite](https://www.softwareadvice.com.au/software/449775/ACMP-Inventory) — 4.5/5 (173 reviews)
3. [Iru](https://www.softwareadvice.com.au/software/71745/Iru) — 4.9/5 (477 reviews)
4. [JumpCloud Directory Platform](https://www.softwareadvice.com.au/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (264 reviews)
5. [WebTitan](https://www.softwareadvice.com.au/software/159217/webtitan) — 4.5/5 (276 reviews)

## Reviews

### "Keeps us safe\!" — 5.0/5

> **Robin** | *2 April 2019* | Mental Health Care | Recommendation rating: 10.0/10
> 
> **Pros**: Easy to set up, runs on its own after set up.
> 
> **Cons**: Nothing, really. We have had no trouble with it at all.
> 
> We had a problem with things slipping past our former antivirus software. Comodo One has stopped everything, and keeps our computer safe.

-----

### "Zero Threat\!" — 4.0/5

> **Denissa** | *3 July 2024* | Business Supplies & Equipment | Recommendation rating: 9.0/10
> 
> **Pros**: It's a good idea and best solutions to secure and defend your data against cyberattacks and complications from other malware.
> 
> **Cons**: I have nothing to say against this tools. It's just it is nice to use .
> 
> My overall experience of this kind of software is good. It's essential to its endpoint detection of cyberattacks and it's management also included.

-----

### "Poorly enigineered product" — 2.0/5

> **Brian** | *17 January 2019* | Hospitality | Recommendation rating: 1.0/10
> 
> **Pros**: We really had thought we found a great endpoint protection suite, with some MSP features built-in.&#10;&#10;I think in retrospect the thing we liked most is it looked good in a demo environment
> 
> **Cons**: The product requires way too much configuration, once you're done if they roll out an update hopefully you back up your config or you are going to do it all over again.&#10;You end up with such big holes in you end points just to get things like scheduled tasks to run. Oh you want to read an Adobe document from the internet, you better exclude the temp directory otherwise your going to have errors running Adobe.&#10;They allow you to categorize software to trusted but the comodo rating never changes so if they think its bad and it is say a piece of intellectual software your company  wrote, good luck create all the exclusions you want Comodo will always block the program. Not today or tomorrow but within a few weeks you're going to have to re-allow the software. This is happening on servers without a containment policy.&#10;&#10;We have been is business for over 50 years and worked with lots of AV providers in that time.&#10;&#10;Comodo is not ready for Production use, period. If you explain to them the situation they go directly back to setting exclusions again  and again. As per my previous comments this is not a permanent solution
> 
> In one word Terrible

-----

### "Has a few quirks that need to be worked on but great software" — 4.0/5

> **Verified Reviewer** | *25 July 2018* | Recommendation rating: 7.0/10
> 
> **Pros**: The fact that the base software is free and allows remote access, resource monitoring, patch management, silent software installs,  monitoring and management of not only computers and servers but android and iOS operating systems is amazing.&#13;&#10;&#13;&#10;Remoting into systems you have in your device list is incredibly easy and even supports multiple monitor setups. You can create templates per device type, separate different groups of machines into their own "Companies" to keep different customers grouped together so organization is pretty top notch.&#13;&#10;&#13;&#10;The remote system installation is so quick and simple that even the most computer illiterate people should have zero problem installing it themselves.&#13;&#10;&#13;&#10;Even in the free software you can brand everything to match your company so that it suits your needs.
> 
> **Cons**: Initial setup is confusing. Some of the categories and options are worded strangely to where you at first glance have to guess or navigate around until you can find what you're looking for.  &#13;&#10;&#13;&#10;There have been a quite a few times where I have tried to remotely remove software from machines and for majority of the machines given the uninstall command it works, however there are several left with software that was suppose to be removed. A notification that actually verifies if what you told the software to do succeeded or not would be great but most of the time, once a command is issued it only tells you the command was issued successfully, not that the command actually did what it was suppose to which ends up causing more time to be spent trying to diagnose why the software wasn't removed.&#13;&#10;&#13;&#10; Many of our machines slowed down to unusable levels as the add-ons for real-time monitoring constantly were eating up over 50% of some of our machines system resources. For approximately 5 machines the software worked great but these machines each had over 16gb of ram, solid state drives, and i7 processors. The machines we had issues with ranged from i3 processors to i5 processors with 4-8gb of ram and windows 7/10. &#13;&#10;&#13;&#10;Customer service is nice enough but I feel they don't do more than they are required to do assist customers. I was told to contact different departments 4 times back and forth to cancel the subscription for the add ons and they still haven't been cancelled after 3 weeks.
> 
> From just the free software with no add-ons I am able to monitor and take care of company computers in house and remotely from my desk. When it works as it is suppose to, installing software for employees remotely without needing to walk them through it saves a ton of time. Being able to remote into an employees computer to see what problems they are experiencing instead of relying on screenshots and descriptions is extremely helpful as well.

-----

### "Protect and Manage all your endpoints onsite and offsite from one central portal" — 5.0/5

> **Richard** | *10 November 2017* | Recommendation rating: 10.0/10
> 
> **Pros**: This is a great security software that protects by using Whitelisting instead of Blacklisting.  Regular anti-viruses, during updates, send list of blacklisted items to block. Comodo works by everything being blacklisted except things that are whitelisted by them or by you. They also allow files that are digitally signed. Anything not whitelisted is either sandboxed or blocked. Sandboxed items can run but actually have no access to your computers real hard drive so if it does try to infect your computer, it doesn't have real access to it.
> 
> **Cons**: What i find i like least about the software is that you do have to put a little bit of extra time into some things as it may block legitimate software if it is not digitally signed but you can fix that by manually whitelisting it yourself, which can whitelist that file or software across your whole network if you want. But once you have made up your company whitelist, everything runs smoothly and you feel secure knowing that your end users are protected and your network is too.
> 
> Great, secure anti-virus which is centrally managed.

-----

Page: 1 / 3\
Next: [Next page](https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/network-security/comodo-endpoint-security-manager-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager> |
| en-GB | <https://www.softwareadvice.co.uk/software/345400/comodo-endpoint-security-manager> |
| en-IE | <https://www.softwareadvice.ie/software/345400/comodo-endpoint-security-manager> |
| en-NZ | <https://www.softwareadvice.co.nz/software/345400/comodo-endpoint-security-manager> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"Xcitium Endpoint Detection & Resonse","description":"Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the cybersecurity industry, is a sophisticated solution for monitoring endpoint devices continually. It is engineered not only to detect and respond to serious threats like malware and ransomware but also to provide deep insights into the attack dynamics, pinpoint vulnerabilities, and enhance future defenses.\n\nThe solution operates with an agent installed on endpoint devices, working closely with a central management console and utilizing a cloud-based analytics service. This agent monitors device activities, sending data to the console where potential threats are analyzed.\n\nEDR platforms, while varying slightly between vendors, generally share key functionalities, including threat detection using behavioral analytics, heuristics, and machine learning to spot suspicious activities. Upon detecting a threat, actions such as quarantining or deleting infected files and isolating the affected device can be executed. These platforms also offer detailed reporting and alerts to facilitate rapid response to threats.\n\nWhen choosing an EDR solution, it's crucial to consider its detection and response effectiveness, impact on system performance, and false positive rate. The ideal EDR should maintain high detection rates for all threats while optimizing system performance and minimizing false alerts.\n\nThe advantages of EDR include better visibility of endpoint actions, improved detection, quicker response times, enhanced forensic data for investigations, and lower false positive rates, which strengthen an organization’s cybersecurity stance.\n\nImplementing EDR involves setting specific security goals, choosing a suitable platform, deploying it, configuring detection rules, and actively managing alerts to respond appropriately to threats.\n\nXcitium's EDR emphasizes not just threat detection but also immediate containment within a \"ZeroDwell\" time environment, advocating for preemptive action against unknown threats by virtualizing them. This approach improves upon traditional EDR capabilities by adding more robust awareness and remediation features.\n\nIn summary, Xcitium's EDR platform provides a thorough, analytical approach to cybersecurity, enabling organizations to proactively manage threats with advanced detection, response, and containment strategies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/86b6e2ce-8151-4ea2-b9fb-ff8f503a6831.png","url":"https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager","@id":"https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.3,"bestRating":5,"ratingCount":39},"offers":{"price":"4","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows, Android, Platform ios, Platform ipad"},{"@id":"https://www.softwareadvice.com.au/software/345400/comodo-endpoint-security-manager#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Threat Intelligence Platforms","position":2,"item":"/directory/3995/threat-intelligence/software","@type":"ListItem"},{"name":"Xcitium Endpoint Detection & Resonse","position":3,"item":"/software/345400/comodo-endpoint-security-manager","@type":"ListItem"}]}]}
</script>
