TEHTRIS MDR Protection
New in the Shop: TEHTRIS Licenses – MDR & EDR from One Source
You can now get TEHTRIS security solutions directly from us – from Endpoint Detection & Response (EDR) to Managed Detection & Response (MDR). TEHTRIS stands for a practical, European XDR architecture that merges signals from endpoints, network, email and cloud, prioritizes risk and orchestrates response. The result: attacks are detected earlier and contained faster.
Which licenses do we offer?
1) TEHTRIS Cyberia PROTECT – EDR Agent
- What it is: A powerful EDR agent that continuously monitors endpoints, detects suspicious behavior and initiates countermeasures (e.g., kill process, isolate host, block IOC/domain).
- Who it’s for: Companies that want to strengthen detection and containment directly on the endpoint – from SMB to enterprise.
- Benefits: Deeper endpoint visibility, rapid containment, seamless integration into the TEHTRIS XDR platform.
2) TEHTRIS CYBERSPHERE MDR – Extension
- What it is: An MDR add-on that augments existing TEHTRIS setups (e.g., with EDR) with 24/7 monitoring, triage and response orchestration.
- Who it’s for: Organizations already using TEHTRIS that want to professionalize defense with a managed service.
- Benefits: Fast time-to-value, clear responsibilities, measurable reduction of MTTD/MTTR.
How it works in practice
The EDR agent (Cyberia PROTECT) collects telemetry, detects anomalies and can isolate endpoints if needed. The MDR team (CYBERSPHERE MDR) monitors events around the clock, correlates signals from multiple sources (endpoint, network, email, cloud), evaluates risk in context (role, criticality, exposure) and activates predefined playbooks – e.g., end session, revoke tokens, block hash/domain or move emails to quarantine. Critical actions ideally run with a short approval from your team (human-in-the-loop).
Which package fits your needs?
- Fast start on endpoints: Cyberia PROTECT – EDR
- Maximum relief & 24/7 protection: MDR Bundle (MDR + EDR)
- Already using TEHTRIS and want 24/7 coverage: CYBERSPHERE MDR – Extension
MDR Compared: TEHTRIS vs. Sophos
Considering Managed Detection & Response (MDR) and deciding between TEHTRIS and Sophos? The table below summarizes the key differences – practical, vendor-neutral and focused on MDR (without XDR feature scope). Details vary by license/region; we’re happy to advise.
| Criterion | TEHTRIS MDR | Sophos MDR |
|---|---|---|
| Coverage & operations | 24/7 SOC, incident triage & containment; EU-focused operations. | 24/7 SOC, incident triage & active response; operated by Sophos MDR (global, incl. EU). |
| Data residency & hosting | Hosting in France/Germany possible; GDPR-aligned, option for customer-proximate hosting. | Cloud management via Sophos Central (AWS; EU regions available); regional data residency selection. |
| Playbooks & automation | Embedded SOAR, extensive response playbooks; human-in-the-loop for critical actions. | Standardized MDR playbooks, live response; approval workflows for fleet-wide actions. |
| Detection & hunting | ML-based analytics, anomaly detection; YARA usable directly on endpoints; native threat intel & sandbox. | Blend of rules + ML with analyst hunting; YARA used in detection pipelines; SophosLabs threat intelligence. |
| Signal sources & logs | Broad ingestion of endpoint, network, mail and cloud signals; log correlation and analysis in the platform. | Deep integration of Sophos telemetry (endpoints/firewall, etc.); connect external sources via integrations/APIs. |
| Customizability | Fine-grained policies and response rules tailored to your environment. | Fast standard rollout with proven playbooks; customization via policies & integrations. |
| Legacy / specialized environments | Broad OS coverage, including older/specialized systems (depending on module). | Focus on current Windows/macOS/Linux versions; legacy support partly limited. |
| Data protection & IP protection | European vendor; positioned to protect customer IP with no access to file contents. | Data usage per Sophos product/region policies; EU regions available. |
| Containment actions (examples) | Isolate host, kill processes, revoke accounts/tokens, block hash/domain, mail quarantine — with approval. | Isolate host, live response, account/password actions, network/mail actions — with approval. |
Note: These points reflect typical product/service positioning. Exact features, SLAs and data flows depend on your license, region and configuration. We’re happy to review this with you for your use case.
FAQ – quick answers
Can I start with EDR and add MDR later?
Yes — the MDR service can be added as an extension (CYBERSPHERE MDR – Extension).
How fast can we go live?
Usually quickly: deploy the agent, set baseline policies, define approval loops — then tighten step by step.
Do you support selection & onboarding?
Absolutely. We help from package selection through onboarding to handover into steady-state operations.