Introducing Iru
Skip Navigation

Formerly Kandji

Prevent, detect, and contain attacks in real time through a single, low-overhead agent across Mac and Windows.

Pink radar graphic between the words "Endpoint Detection & Response" on a dark blue background.

All systems, all devices, one endpoint solution

Real-time behavioral analysis, Iru AI, and our leading in-house research team ensure that unknown threats are stopped before lateral movement occurs.

Abstract UI showing a document scanned and a security threat found

Security built for the AI era

Iru AI evolves continuously, modeling millions of detections and endpoint events to spot patterns of malicious or anomalous behavior.

Abstract visual showing Iru doing research in to security threats

Dedicated in-house research

Our security research team tracks emerging techniques and new attack vectors, turning endpoint insights into proprietary models that catch what threat feeds miss.

3 product icons from Iru-- Endpoint Management, Endpoint Detection & Response, and Vulnerability management

Fast to deploy, easy to manage

Reduce security & IT overhead with one lightweight agent, unified with Endpoint Management. A focused UI helps lean teams investigate quickly and respond with confidence.

Top performer in independent tests

Ranked for top macOS malware detection and lightweight footprint.

More zero-day exploits stopped
2.3x
Lower resource usage under peak loads
22%

Every action that’s taken is cataloged and analyzed, turning each detection event into a learning experience, both for your team and for the Iru AI context model.

Product UI shows a Threats table listing threat IDs, statuses, classifications, detection dates, affected devices, and MITRE references. A cursor hovers over a row labeled ‘ThreatID_B_0782,’ marked closed and classified as malicious.
Flexible response to different threats

Protect Mode terminates malicious processes and quarantines files. Detect Mode gives observability without enforcement, ideal for pilots or sensitive cohorts.

Abstract UI showing Malware response being set to Protect, and Potentially unwanted program response being set to Detect
Pipe data to where you need it

Stream EDR events and tenant activity logs to your Amazon S3 bucket for SIEM ingestion, deeper analysis, and workflow triggers.

Abstract visual showing data being migrated to a dashboard
Threat-centric view

Investigate each event with a clear timeline of processes, files, behaviors, and affected hosts and users, so you can easily assess impact.

Simplified UI showing a threat and its description, status, and malware family.
Logo for Planning Center

“Iru allowed us to keep the same IT headcount. With SentinelOne, we may have had to hire a new person to manage the endpoint protection efforts.”

Topher Ohlin

IT Operations Manager at Planning Center

Let your team focus 
on what matters

Iru replaces fragmented tools with one AI-powered platform, so IT & security spend less time chasing tickets and more time improving the business.