Endpoint Detection & Response
Automatically detect and neutralize known and unknown threats in real time.
The hyper-automated European EDR, in production since 2013
Autonomous remediation & neutralization capability, no human interaction required
TEHTRIS recognized as a Representative Vendor in the 2021 Market Guide for Mobile Threat Defense.
Increased detection & neutralization of attacks in real time : an automated response without last click.
TEHTRIS EDR is one of the pioneers and creators of the EDR wave of the future, the one that aims to be able to install thousands of EDR agents in less than 24 hours, the one that is able to detect stealthy espionage operations without any weapon and without any malware, the one that knows the techniques used by hackers and builds responses in advance… TEHTRIS EDR is a solution provided in SaaS mode, via the cloud, with a willingness to anticipate, prevent, detect, and react at the cybersecurity level.
Our EDR has been in production worldwide since 2013.
Why choose TEHTRIS EDR ?
TEHTRIS EDR includes multiple detection engines capable of detecting the latest and most dangerous advanced threats.
INTEGRATED ARTIFICIAL INTELLIGENCE
In Machine Learning or Deep Learning mode, low-level monitoring provides knowledge of normal behaviors to better distinguish attackers, their tools and methods, providing a strong competitive advantage against traditional or stealth attackers.
TEHTRIS goes further than other solutions, since in the absence of human operators, active defense systems can be configured to respond autonomously 24/7 to even an unknown attack, following predetermined criteria and policies, from raising the alarm to immediate and automatic neutralization.
TEHTRIS EDR offers Automatic Kill and Last Click Termination for real-time remediation without human action.
NEUTRALIZATION & ATTRITION
Direct sanctions are imposed on all attackers, who must take the risk of losing their tools and having their offensive methods stolen, which will then be recognized worldwide.
TEHTRIS EDR takes into account the numerous attacks that continue to arrive, with ever more stealthy and sophisticated aggressions, making field efficiency the priority each time.
TEHTRIS EDR takes into account as a priority the numerous attacks that are a trademark of TEHTRIS, we also work with our customers and partners in Open Innovation processes, where we are enriched by technical and organizational feedback, in order to always provide the best possible service.
In 2013, TEHTRIS invented a cybersecurity engine called “DAS”, referring to more than 15 years of research on active digital security, giving birth to a disruptive HIPS-like agent, an Endpoint Detection and Response long before the arrival of these products and their official names on the market.
LOW CPU & RAM CONSUMPTION
TEHTRIS EDR uses only 1-3% CPU, 90 MB RAM and 50 MB disk space. The information sent to the XDR is about 10 MB/day.
SECURITY & ETHICS by design
TEHTRIS EDR is developed and hosted in France and in Europe, designed natively by our TEHTRIS developers (with no overlay of pre-existing software layers).
Ethically thought from its conception without backdoors, we guarantee the inviolability of the content of the protected files that we do not access.
Your protection optimized by nature, Security & Ethics by design.
ENDPOINT VULNERABILITY AUDIT
Unique functionality to inspect known vulnerabilities in your estate to reduce the exposure surface and support compliance policy.9000 rules included in the engine.
FAST DEPLOYMENT, AVAILABLE CLOUD & ON-PREMISE
Over 20,000 deployable BDUs in less than 24 hours. Choose the deployment that’s right for you: SaaS, On-Premise or Hybrid.
Embedded with TEHTRIS SOAR
(Security Orchestration And Response)
When it comes to cybersecurity, orchestrating events and reacting to threats effectively and quickly is a fundamental challenge. One of the best ways to do this is with powerful automation and artificial intelligence. This is what TEHTRIS offers with its SOAR integrated with the TEHTRIS XDR Platform.
The essential solution for your cybersecurity
For about thirty years, security was limited to a few elementary, relatively simple but effective ways to fight against the whole lot. Symbolically, we remember the summer of 2003 with the MSBlast worm that contaminated millions of Microsoft operating systems. Three security habits were then adopted under Windows: update your system, have a firewall, and use an antivirus.
This model became the dominant design of cybersecurity: a firewall and some tools for the periphery, an antivirus and some options inside. The Internet has thus become populated with so-called “crunchy” networks, i.e. “hard” on the shell (perimeter security) and “soft” on the inside, not to mention the interconnection of all systems: telephones, connected objects, etc. Now, there is a technological debt of cybersecurity and TEHTRIS solutions are precisely designed to fight and defend effectively.
Why combine your EPP with an EDR solution?
We believe in the convergence of EDR and EPP technologies, for a common and calculated mission of endpoint protection, with technical functions that combine. TEHTRIS is part of this transformation logic, offering its EPP agent, recognizing the value of not multiplying technological layers.
Complement the detection capabilities of your EPP with the power of TEHTRIS EDR. EPP blocks known and identified signatures, while EDR neutralizes new malicious or unusual cyberattacks and behavior. Instantly block all complex attacks that will evade EPP, and whose criticality is higher than that addressed by EPP.
Increased efficiency with TEHTRIS UES
TEHTRIS UES is the console that unifies and strengthens the effectiveness of EDR, EPP and MTD solutions. Equipped with powerful and easy-to-use front-end tools, the UES console will provide you with enhanced cybersecurity action capabilities, from temporary crisis operations to regular monitoring.
Supports all the OS of your IT park
|macOS High Sierra||Compatible|
|Windows 8||Untested but designed for compatibility||Compatible|
|Windows Server 2003||Compatible||Untested but designed for compatibility|
|Windows Server 2008||Compatible||Compatible|
|Windows Server 2008 R2||Compatible||Compatible|
|Windows Server 2012||N/A||Compatible|
|Windows Server 2012 R2||N/A||Compatible|
|Windows Server 2016||N/A||Compatible|
|Windows Server 2019||N/A||Compatible|
|Windows XP||Compatible||Untested but designed for compatibility|
|CentOS Linux 5.11||Compatible|
|CentOS Linux 5.3||Compatible|
|CentOS Linux 6.9||Compatible|
|CentOS Linux 7.5||Compatible|
|Ubuntu Linux 14.04 Trusty||Compatible|
|Ubuntu Linux 16.04 Xenial||Compatible|
|Ubuntu Linux 18.04 Bionic||Compatible|
|Ubuntu Linux 8.04 Hardy||Compatible|
MITRE ATT&CK compliance
MITRE ATT&CK is a knowledge base with a model of the behavior of a cyber attacker, reflecting the different phases of the attack life cycle according to the targeted platforms: Windows, Mac, Linux, mobile, etc.
Day to integrate TEHTRIS EDR
Countries where our technologies are deployed to detect and respond to incidents
EDR deployed in the cloud in less than 24 hours
Preserve the sovereignty and integrity of your data
Since 2010, TEHTRIS innovates and improves its cyber defense solution, through the different modules of the TEHTRIS XDR Platform.
Choose the European leader in cyber security!
Do you have an automated remediation function?
TEHTRIS EDR has several features to perform automated remediation, based on predefined parameters, which allows to fight effectively 24/7 against unknown threats, without the risk of depending on a human team that may be missing elements.
Does the EDR contain a vulnerability scan function?
TEHTRIS EDR offers to search for more than 11,000 CVE vulnerabilities, which allows you to discover sometimes totally invisible things, such as machines that are vulnerable because of an old Java engine, Adobe Reader, or Flash, forgotten or installed in “legacy” mode. You can deploy TEHTRIS EDR to audit your IT assets, without consuming excessive resources, and thus have the possibility to ensure the compliance of your assets: patch management policy, risk aversion criteria, etc.
Do you have an application policy type prevention function?
TEHTRIS EDR has several protections against ransomware: the blacklists in our CTI which enrich the choices of EDRs, application security policies to authorize only what you want, Honeytokens-type concepts with fake files that a ransomware will want to destroy while being detected (file-type computer lure), and many behavioral-based mechanisms: attacking certain points on the hard disk, etc.
Do you have protection against lateral attacks?
TEHTRIS EDR has several ways to combat lateral attacks, including the ability to process local logs in the operating system to detect if activity is being attempted remotely. This is a true SIEM tactical, local, capable of knowing whether a session is interactive or not, remote or not, in order to be able to track attacks of this type.
Do you have protection against illegitimate Powershells in an environment where TEHTRIS EDR is used for sytem administration?
TEHTRIS EDR embeds an ultra-sophisticated analysis engine, capable of differentiating between a legitimate product and one that is not, in terms of PowerShell, by analyzing the code executed on the fly so as not to miss any of the many modern and stealthy attacks associated.
News about TEHTRIS EDR
* © 2020 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
** Gartner and Market Guide are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner Innovation Insight for Unified Endpoint Security,Rob Smith, Dionisio Zumerle,12th November 2020,
Gartner Market Guide for Mobile Threat Defense,Dionisio Zumerle, Rob Smith,29th March 2021,
Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates.