Management Options

On premises / Cloud
On premises / Cloud
Cloud
Types of Endpoints Protected

Consistent, next-gen defenses across any type of endpoints

Security Technologies

Extend Security with Compatible Products

Charged Add-ons
Compatible Products
Available Services

Professional Services

Empower your organization with optimal security configuration, protection and tailored services.
Available
Available
Available

Premium Support

Choose the Silver, Gold or Platinum Premium Enterprise Support packages, depending on the response times and the types of proactive services necessary for your organization.
Available
Available
Available
Details
Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
Covers servers and desktops. Servers should account for less than 30% of total units
Covers servers and desktops. Servers should account for less than 30% of total units

Management Options

On premises / Cloud
On premises / Cloud
On premises / Cloud
Types of Endpoints Protected

Consistent, next-gen defenses across any type of endpoints

Security Technologies

Prevention Modules
Detection and Response Modules
Hardening and Risk Analytics Modules

Extend Security with Compatible Products

Available Add Ons
Compatible Products
Available Services

Managed Detection and Response Service Pack

Staffed by our experienced security analysts and using an award-winning suite of technology, the MDR service monitors detailed telemetry to quickly and effectively respond to malicious activities, actively removing the threat to reduce dwell time and limit any damage.
Available (Cloud Console Only)
Available when EDR add-on is present

Professional Services

Empower your organization with optimal security configuration, protection and tailored services.
Available
Available
Available

Premium Support

Choose the Silver, Gold or Platinum Premium Enterprise Support packages, depending on the response times and the types of proactive services necessary for your organization.
Available
Available
Available
Details
Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
A la carte licensing

FUNCTIONALITY

Risk Analytics

Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list.
yes
yes
yes

Local and Cloud Machine Learning

Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.
yes
yes
yes

Cloud Threat Intelligence

Threat intelligence including information about malicious URLs, patterns, websites, etc collected and updated in 3 seconds using the Bitdefender Global Protective Network of over 500 Million endpoints
yes
yes
yes

Exploit Defense

Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.
yes
yes
yes

Web Content Control

Restrict user access to potentially malicious websites or web categories such as gambling
yes
yes
yes

Network Attack Defense

Protect against threats that exploit network vulnerabilities such as Brute Force Attacks or Password Stealers
yes
yes
yes

Web Threat Protection

Scans incoming web traffic, including SSL, http and https traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages.
yes
yes
yes

Firewall

Endpoints are protected with fully featured two-way firewall with Intrusion Detection, critical for protecting remote devices.
yes
yes
yes

Device Control

Threats are often introduced into the company via removable devices. Choose which devices to allow to run and decide what will be blocked or scanned automatically.
yes
yes
yes

Process Inspector (Automatic Detection)

Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it.Formerly known as Advanced Threat Control (ATC).
yes
yes
yes

Security for Mobile

On-device mobile security solution for iOS, Android and ChromeOS devices
yes Add-on
yes Add-on

Full Disk Encryption

Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault).
yes Add-on
yes Add-on

Patch Management

Manual and automatic Patching of Windows and 3rd party applications that mitigates application vulnerablities and risks of exploit attacks
yes Add-on
yes Add-on

Cloud-hosted email security and antispam

Protect Office 365 or other cloud and on-prem. email systems, detect executive impersonation, stop spam, phishing, advanced attacks before they reach users.
yes Add-on
yes Add-on

Security for Virtualized Environments

Optimized protection for virtual desktops or servers that
yes Add-on
yes Add-on

Security for AWS

VM Protection that is integrated with Amazon Web Services and optimized for peak performce
yes Add-on
yes Add-on

Exchange on-prem antispam and security

Email Antispam and Antimalware protection for organizations hosting their Exchange server
yes Add-on
yes Add-on

HyperDetect (Tunable Machine Learning)

Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more.
yes Add-on (Advanced Threat Security)

Fileless Attack Defense

Protects against script-based attacks that execute in memory using tools such as PowerShell or Command Prompt
yes Add-on (Advanced Threat Security)

Sandbox Analyzer

Automatically analyze suspicious files by detonating in a safe cloud environment delivering a verdict and full visibility and context into threat actions
yes Add-on (Advanced Threat Security)

Incident Visualization

Visual representation of each step in an attack that helps understand impact, identify potential protection gaps and support compliance
yes Available as Add-on and as Standalone product compatible with competitive AV/EPP (Endpoint Detection and Response)

Prioritized Alerts Investigation

See suspicious activity as alerts that leverage MITRE events and investigate potential breaches
yes Available as Add-on and as Standalone product compatible with competitive AV/EPP (Endpoint Detection and Response)

Incident response

Respond to incidents with options such as Endpoint Isolation which disconects a system from the network or Live Response which enables remote connection and log gathering from the impacted endpoint
yes Available as Add-on and as Standalone product compatible with competitive AV/EPP (Endpoint Detection and Response)

Anomaly Defense

Baselines system resources to spotlight unusual behavior based on MITRE threat techniques and Bitdefender’s own research.
yes Available as Add-on and as Standalone product compatible with competitive AV/EPP (Endpoint Detection and Response)

Extended Detection and Response

Out-of-the-box, fulfills the incident responders’ needs to integrate additional telemetry sources, deliver contextualized security incidents, and more comprehensive response capabilities.
yes Available as an add-on. Requires Advanced Threat Security and Endpoint Detection and Response add-ons