Coro Secures $100 Million Funding Round to Drive Aggressive Growth to Transform Cybersecurity for SMEs Read more

Start a Trial 
Watch a Demo
Contact Sales
Become a Partner
Compliance Survey
Get Support

Start a Free Trial

Try Coro for Free for the Next 30 Days

"*" indicates required fields

Hidden
Name
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.
Coro Platform

Watch a Demo

Explore our collection of recorded product demonstrations to witness Coro in action.

"*" indicates required fields

Hidden
Name
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.
See how much time you could save with Coro guarding your business:
Instantly handle 95%+ of email threats
Monitor cloud app security from a single dashboard
Protect devices across the threat landscape
Prevent data loss with a deceivingly simple solution

Contact Sales

Receive comprehensive information about our product, pricing, and technical details straight from our specialists.

"*" indicates required fields

Hidden
Name
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.
Modules

Become a partner today

Turn your cybersecurity business into a revenue center

"*" indicates required fields

Hidden
Name
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.
Modules

Build Your Compliance Report

Does your business satisfy security regulations? Take the survey to learn how your industry, services, and location can impact your compliance posture.
Take the Compliance Survey

Endpoint Protection

Advanced endpoint detection and response (EDR), next-gen antivirus (NGAV), data governance, WiFi phishing protection, and centralized control of device posture - all on one, easy-to-use security platform. Plus, our MDR team can back you up!
Get Started
Endpoint Protection Suite

Included Modules and Add-ons

Proven, Enterprise-Grade Endpoint Security

Coro's Endpoint Protection Suite records and logs all endpoint activity, analyzing all activity related to data movement to detect anomalies, including human error, and automatically remediate most incidents.
Endpoint Security

Device Posture

Apply device posture policies to users or groups and determine the remediation action for vulnerabilities

Next-gen Antivirus

Advanced threat protection (ATP) analyzes both static files and running processes for anomalies and suspicious behavior

Allow/Block Lists

Create lists of files, folders, and processes to allow or block, protecting your endpoints from known threats and vulnerabilities
EDR
Module Endpoint Security

Endpoint Detection & Response

Reboot or shut down devices remotely, isolate infected devices from the network, or block specific processes
WIFI PHISHING

WiFi Phishing

Guard endpoints outside the LAN by preventing connections to suspicious WiFi access points
ENDPOINT DATA GOVERNANCE
Module Endpoint Data Governance

Endpoint Data Governance

Protect sensitive data from unauthorized access, use, disclosure, modification, or destruction
Get StartedExplore Our Endpoint Protection Modules

Managed Services

Managed Detection & Response

Elevate your organization’s defenses by combining the power of the Coro platform and EDR solution with the expertise of dedicated security professionals.
Learn more about MDR
Coro MDR

Pricing

Start for as Little as $6/Month

Our pricing is straightforward and simple. Choose our pre-defined suite for Endpoint Protection for $6, or speak with our sales team to build your own package.
Pricing Details
Starts at
$6
Per endpoint/per month
NIST Guidelines for Endpoint Protection

Align Your Endpoint Security with NIST Guidelines

Coro Endpoint Security helps automate much of the work involved in conforming to security best practices. We consult NIST guidelines, as well as other frameworks, throughout the development process. 

Category
Feature Name
Description
NIST Reference
Device
Malware and ransomware
Anti-virus (AV) for signature-based detection and remediation of files with high-risk content
NIST SP 800-83
Advanced threat protection
Next-generation anti-virus (NGAV) for behavioral analysis-based detection of processes exhibiting high-risk behaviors and their real-time remediation.
NIST SP 800-61
Device security posture
Detection of security vulnerabilities of the endpoint devices and enforcement of device security postures.
NIST SP 800-53
Secured local backups
Secured local snapshots of data for post-breach data recovery
NIST SP 800-53
Data governance over endpoint drives
Data loss prevention (DLP) for regulatorily and business-sensitive data
NIST SP 800-83, NIST SP 800-94
Endpoint Security (EDR)
Endpoint Data Collection
Collecting and analyzing endpoint data to detect and respond to security incidents.
NIST SP 800-83
Breach localization and analysis
Extended detection and response (EDR) for post-breach analysis of endpoint activities across the organization
NIST SP 800-61, NIST SP 800-53
Incident Investigation
Investigating security incidents by analyzing data collected from endpoints to understand the scope and impact of the incident.
NIST SP 800-61
Incident Containment and Remediation
Automated and manual actions to contain and remediate security incidents on affected endpoints.
NIST SP 800-61, NIST SP 800-184, NIST SP 800-53
MDR
SOC & MDR Assistance Hub
Offer responsive customer support to assist with issues and questions.
NIST SP 800-61, NIST SP 800-53 , NIST SP 800-83
Incident Reporting
A tailored made report to communicate post-bridge security vulnerabilities.
NIST SP 800-61, NIST SP 800-53 , NIST SP 800-83
General
Usability
Provide a user-friendly interface for ease of use and quick incident analysis. Include comprehensive documentation and training materials.
NIST SP 800-70
Integration with SIEM
Integrating with Security Information and Event Management (SIEM) tools.
NIST SP 800-137, NIST SP 800-190
Audit and activity logs
Referencing and archiving for audit of all system activities for a period of seven years.
NIST SP 800-53
Category
Device
Feature Name
Malware and ransomware
Description
Anti-virus (AV) for signature-based detection and remediation of files with high-risk content
NIST Reference
NIST SP 800-83
Category
Device
Feature Name
Advanced threat protection
Description
Next-generation anti-virus (NGAV) for behavioral analysis-based detection of processes exhibiting high-risk behaviors and their real-time remediation.
NIST Reference
NIST SP 800-61
Category
Device
Feature Name
Device security posture
Description
Detection of security vulnerabilities of the endpoint devices and enforcement of device security postures.
NIST Reference
NIST SP 800-53
Category
Device
Feature Name
Secured local backups
Description
Secured local snapshots of data for post-breach data recovery
NIST Reference
NIST SP 800-53
Category
Device
Feature Name
Data governance over endpoint drives
Description
Data loss prevention (DLP) for regulatorily and business-sensitive data
NIST Reference
NIST SP 800-83, NIST SP 800-94
Category
Endpoint Security (EDR)
Feature Name
Endpoint Data Collection
Description
Collecting and analyzing endpoint data to detect and respond to security incidents.
NIST Reference
NIST SP 800-83
Category
Endpoint Security (EDR)
Feature Name
Breach localization and analysis
Description
Extended detection and response (EDR) for post-breach analysis of endpoint activities across the organization
NIST Reference
NIST SP 800-61, NIST SP 800-53
Category
Endpoint Security (EDR)
Feature Name
Incident Investigation
Description
Investigating security incidents by analyzing data collected from endpoints to understand the scope and impact of the incident.
NIST Reference
NIST SP 800-61
Category
Endpoint Security (EDR)
Feature Name
Incident Containment and Remediation
Description
Automated and manual actions to contain and remediate security incidents on affected endpoints.
NIST Reference
NIST SP 800-61, NIST SP 800-184, NIST SP 800-53
Category
MDR
Feature Name
SOC & MDR Assistance Hub
Description
Offer responsive customer support to assist with issues and questions.
NIST Reference
NIST SP 800-61, NIST SP 800-53 , NIST SP 800-83
Category
MDR
Feature Name
Incident Reporting
Description
A tailored made report to communicate post-bridge security vulnerabilities.
NIST Reference
NIST SP 800-61, NIST SP 800-53 , NIST SP 800-83
Category
General
Feature Name
Usability
Description
Provide a user-friendly interface for ease of use and quick incident analysis. Include comprehensive documentation and training materials.
NIST Reference
NIST SP 800-70
Category
General
Feature Name
Integration with SIEM
Description
Integrating with Security Information and Event Management (SIEM) tools.
NIST Reference
NIST SP 800-137, NIST SP 800-190
Category
General
Feature Name
Audit and activity logs
Description
Referencing and archiving for audit of all system activities for a period of seven years.
NIST Reference
NIST SP 800-53

Compliance Survey

Does your business satisfy security regulations?

Learn how your industry, services, and location can impact your compliance posture.
Build Your Compliance Report

Enterprise-Grade Security Designed for You

Coro Cybersecurity received an AAA Rating from SE Labs for Enterprise Advanced Security Protection. Download the report 

Download the Report
SE Labs for Enterprise Advanced Security Protection

Recognized as a Leading Cybersecurity Company

Join over 3,000 organizations who chose the fastest-growing cyber company in North America.
Check

Compliance Survey

Does your business satisfy security regulations?

Learn how your industry, services, and location can impact your compliance posture.
Build Your Compliance Report

Coro Cybersecurity News

Expand knowledge in cybersecurity
Coro was built on a simple principle: Enterprise-grade security should be accessible to every business. We believe the more businesses we protect, the more we protect our entire economic outlook.
Copyright 2023 © Coro Cybersecurity All Rights Reserved
chevron-down