Skip Navigation

See Covalence in Action

Get strong security without the complexity.

Covalence deploys in minutes to identify vulnerabilities and threats, and keep you safe from attacks with its revolutionary, holistic approach to cyber security. 

Complete Coverage

End-to-end protection.

Backed by sophisticated technology and human intelligence, Covalence delivers best-in-class cyber security, clear and accurate alerts, and a greater return on investment. 

Covalence Endpoint Icon

01

Endpoint security

With support for all major platforms—including server, desktop, and mobile operating systems—Covalence detects and resolves attacks and vulnerabilities on your endpoints.

How it works
Network Icon

02

Network security

Covalence combines best-in-class network threat monitoring technology with hands-on, 24/7 support from cyber security experts to identify and resolve network-based threats.

How it works
Cloud Icon

03

Cloud security

Access in-depth monitoring and threat protection for the cloud-based services you use every day, including Microsoft 365, Google Workspace, Azure, AWS, Dropbox, Box.com, and more.

How it works
Covalence - 24/7 Protection

Managed Cyber Security

Focus on your business. We’ll handle your cyber security.

Rest assured that Covalence is working 24x7 to monitor your systems for cyber threats, respond to and triage security incidents, and strengthen your defence.

Learn more
Covalence - 24/7 Protection
FE-Covalence-Image-03

ALL-IN-ONE DEFENCE

Who says you need dozens of solutions to be secure?

Thanks to its holistic approach, Covalence deploys in minutes, giving you complete protection almost instantly—no add-ons or modules needed. 

Learn more
Covalence Protection Icon

Ransomware Protection

Shield your business from malware with best-in-class defence.

Covalence blocks malware attacks, including ransomware and advanced persistent threats, to keep your operations running.

Learn more
Covalence Protection Icon
Covalence Radar Icon

Risk Reduction

Minimize your cyber security risks.

Align with regulatory and compliance standards to mitigate cyber risk, putting world-class vulnerability scanning, threat monitoring, and active response to work for your business.

Learn more
Field Effect Partner Program

Partner Program

Grow your MSP or MSSP business with top-tier tech and support.

Join our Partner Program today and start providing your clients with the industry’s best cyber security, reducing their costs and increasing your profits.

Explore Partner Program
Covalence Partner Program
Field Effect’s depth of cyber security knowledge and background in incident handling are impressive. We know we’re in great hands.
Scott McMullen
Manager of Network Security – CIRA
I have not only gained an amazing monitoring, detection, and response solution, but a team of cyber experts by my side.
Keith Chabot
IT Director – Marcil Lavallée
With Covalence, we have a great cyber security solution that is cost-effective and really easy to use.
Florian Maerzendorfer
Co-Founder and CEO – FiP.S

Customer Stories

Trusted by businesses big and small.

View all customer stories

A Complete Solution

MDR has never been this complete or easy.

Monitoring Capabilities

Interested in some tech talk? See what’s under the hood.

Covalence provides advanced sensors, monitoring, and integrations at a fraction of the footprint and cost of unnecessarily complex cyber security tools.

  • Supports Windows, Linux, macOS, iOS/iPadOS, and Android.
  • Identifies lateral movement within a network.
  • Continuously identifies and analyzes software vulnerable to remote code execution.
  • Monitors Windows Event Log Telemetry for login events and malware installation.
  • Network-wide detection and analysis of PowerShell script execution and other scripting engines.
  • Built-in active response capabilities.
  • Easily integrates with third-party endpoint agents for consolidated threat alerting.
  • Threat intelligence-backed Indicators of Compromise (IoC) blacklists.
  • Inspects content for threats.
  • Detects anomaly and node behaviour deviation.
  • Machine learning analytics identify new and unknown anomalies.
  • Monitors Internet of Things (IoT) devices.
  • Captures and rewinds network traffic during suspicious or confirmed incidents.
  • Discovers and inspects protocol.
  • Identifies weak, misconfigured, or outdated protocols and communications.
  • Supports regulatory and industry standards compliance (e.g., NIST CSF, Canadian Centre for Cyber Security Baseline Controls, ISO 27001, and more).
  • Full capture (bit-level) analysis.
  • Supports network summarization technologies (e.g., IPFix, NetFlow, sFlow, pFlow).
  • Outshines security information and event management (SIEM) solutions in both functionality and cost.
  • Covers a growing list of cloud-based platforms, including Microsoft 365, Google Workspace, Microsoft Azure, Amazon AWS, Dropbox, Box.com, and more.
  • Monitors for and identifies active threats to cloud systems.
  • Prevents business email compromise (BEC).
  • Implements user and entity behaviour analytics (UEBA).
  • Automatically locks compromised accounts.
  • Alerts of important security-related configuration changes.
  • Delivers complete endpoint functionality for iOS and Android.
  • Analyzes per-app network traffic and DNS.
  • Monitors installed app activity to detect malware.
  • Integrates with RESTful API for alerts and threat management.
  • Integrates with existing tools and business workflows.
  • Integrates and add-ons available for third-party products.