About

CybelAngel is the world-leading digital risk protection platform that detects and resolves external threats before these wreak havoc. Because more data is being shared, processed or stored outside the firewall on cloud services, open databases and connected devices, the digital risk to enterprises has never been greater. Organizations worldwide rely on CybelAngel to discover, monitor and resolve external threats across all layers of the Internet, keeping their critical assets, brand and reputation secure.

About

Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.

About

Identify complex security vulnerabilities and sensitive data exposures to reduce risk of security incidents and provide assurance to your customers. Bad actors are constantly finding new ways to compromise companies' systems, and new vulnerabilities are reintroduced every time a company pushes new code/product. Inspectiv's vigilant security researchers ensure your security testing evolves as the security landscape evolves. Fixing web and mobile application security vulnerabilities can be challenging, but the right guidance can help expedite remediation. Inspectiv simplifies the process of receiving and escalating vulnerability disclosures, and provides your team with clear, concise, and actionable vulnerability reports. Each vulnerability report demonstrates impact and provides clear remediation steps. Reports provide high level translation of risk to execs, detail to your engineers, and auditable references that integrate with ticketing systems.

About

Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies interested in a powerful digital risk protection platform

Audience

Enterprises looking for proactive cyber defense with targeted and actionable threat intelligence: Retail, eCommerce, Finance, Media, Gaming, Entertainment, and other digital enterprises

Audience

Vulnerability detection platform for security teams

Audience

Organizations of all sizes that want to protect from digital risks

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CybelAngel
Founded: 2007
United States
cybelangel.com

Company Information

Cyberint
Founded: 2011
Israel
cyberint.com

Company Information

Inspectiv
United States
www.inspectiv.com

Company Information

ZeroFox
Founded: 2013
United States
www.zerofox.com/platform/

Alternatives

Alternatives

Alternatives

Alternatives

Lantern

Lantern

MokN
Tenable One

Tenable One

Tenable
Qualys VMDR

Qualys VMDR

Qualys

Categories

Categories

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Email Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Risk Management Features

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Integrations

AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
Multi-Domain Security Management
Okta
Samplead
SecurityHQ
Siemplify
Splunk IT Service Intelligence
ThreatConnect Risk Quantifier (RQ)
ThreatConnect Threat Intelligence Platform
ThreatQ
WatchTower Security Management App

Integrations

AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
Multi-Domain Security Management
Okta
Samplead
SecurityHQ
Siemplify
Splunk IT Service Intelligence
ThreatConnect Risk Quantifier (RQ)
ThreatConnect Threat Intelligence Platform
ThreatQ
WatchTower Security Management App

Integrations

AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
Multi-Domain Security Management
Okta
Samplead
SecurityHQ
Siemplify
Splunk IT Service Intelligence
ThreatConnect Risk Quantifier (RQ)
ThreatConnect Threat Intelligence Platform
ThreatQ
WatchTower Security Management App

Integrations

AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
Multi-Domain Security Management
Okta
Samplead
SecurityHQ
Siemplify
Splunk IT Service Intelligence
ThreatConnect Risk Quantifier (RQ)
ThreatConnect Threat Intelligence Platform
ThreatQ
WatchTower Security Management App
Claim CybelAngel and update features and information
Claim CybelAngel and update features and information
Claim Cyberint Argos Platform and update features and information
Claim Cyberint Argos Platform and update features and information
Claim Inspectiv and update features and information
Claim Inspectiv and update features and information
Claim ZeroFox and update features and information
Claim ZeroFox and update features and information