icon

Elastic Endgame

Stop threats in their tracks

Elastic protects your endpoints with an autonomous agent that’s easy to use, built for speed, and stops threats at the earliest stages of attack.

Download free Elastic Security in Kibana
Elastic Endgame graphic

Cultivate the skills and procedures that enable successful threat hunting with this guidebook.

View free guidebook

Learn how your security team can benefit from our resource-based pricing model.

Read more

Make sense of how each security vendor performed in MITRE ATT&CK® evals.

View the results in Kibana

Endpoint protection mapped to MITRE ATT&CK®

Integrating Elastic Endgame with a comprehensive security operations solution that supports numerous use cases
Ransomware prevention

Ransomware prevention

With behavior-based detection, MalwareScore®, and exploit prevention, Elastic stops ransomware and other destructive attacks before encryption occurs.
Phishing prevention

Phishing prevention

The industry’s only on-endpoint phishing prevention blocks the execution of malicious Microsoft Office documents and PDFs with machine learning.
Fileless attack prevention

Fileless attack prevention

Injection protection stops in-memory attacks like reflective DLL and shellcode injection. Detect and block PowerShell scripts and .NET reflection attacks.
Malware prevention

Malware prevention

MalwareScore® blocks unknown attacks against Windows and macOS hosts with machine  learning and other signatureless methods.
Exploit prevention

Exploit prevention

Block attempts to exploit vulnerabilities — even zero-day vulnerabilities and kernel exploits designed to elevate privileges — before malicious code can execute.
Autonomous user-defined response

Autonomous user-defined response

The first autonomous prevention and detection engine able to invoke response actions on an endpoint without cloud connectivity.

Validated by the best

More than just endpoint protection

Streamline how you secure your organization with integrated endpoint protection and SIEM.

One Solution, Many Use Cases

Unified protection with Elastic Security

Ship rich endpoint data from the same agent already deployed to protect your endpoints. Further streamline your security stack by performing prevention, detection, and response with one solution, Elastic Security.

Scalable & Fast

Perform total attack (way, way) lookback

Laptops wander, cloud instances shut down — but investigators still need visibility. Threats often incubate for over 100 days, exceeding the data retention period for most SOCs. Elastic enables the central analysis of months or even years of endpoint data, appreciably improving your security posture.

Ready For Hybrid Environments

Works just about anywhere

From submarines to Starbucks, attacks can happen anywhere. Elastic accounts for hybrid environments by locating prevention and detection logic on the endpoint, making it as effective in a Faraday cage as when connected to the cloud. Go even further against advanced attacks with centralized detection.

Focus On What Matters

Licensing that doesn’t get in the way

With flexible licensing from Elastic, you can focus on securing your organization. No per-endpoint pricing. No high-stakes device count guesstimates. No artificial data retention caps. Just use Elastic as you see fit and make adjustments as your needs evolve.

Here's how we stack up

ELASTIC ENDGAME

CARBON BLACKCB Defense

CROWDSTRIKEFalcon

MITRE ATT&CK®-aligned prevention and detection

Additional products required

Signatureless malware and ransomware prevention

Fileless attack prevention

Security data collection

Threat hunting visualizations

Advanced kernel-level prevention

Additional products required
Additional products required

Autonomous user-defined response

Online and offline protection

Cloud only
Cloud lookup required

On-prem and cloud management options

MITRE ATT&CK®-aligned prevention and detection

Signatureless malware and ransomware prevention

Fileless attack prevention

Security data collection

Threat hunting visualizations

Advanced kernel-level prevention

Autonomous user-defined response

Online and offline protection

On-prem and cloud management options

ELASTIC ENDGAME

CARBON BLACKCB Defense

CROWDSTRIKEFalcon

Additional products required
Additional products required
Additional products required
Cloud only
Cloud lookup required

Trusted, used, and loved by