About
CybelAngel is the world-leading digital risk protection platform that detects and resolves external threats before these wreak havoc. Because more data is being shared, processed or stored outside the firewall on cloud services, open databases and connected devices, the digital risk to enterprises has never been greater. Organizations worldwide rely on CybelAngel to discover, monitor and resolve external threats across all layers of the Internet, keeping their critical assets, brand and reputation secure.
|
About
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters.
Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution.
Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation.
Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.
|
About
Identify complex security vulnerabilities and sensitive data exposures to reduce risk of security incidents and provide assurance to your customers. Bad actors are constantly finding new ways to compromise companies' systems, and new vulnerabilities are reintroduced every time a company pushes new code/product. Inspectiv's vigilant security researchers ensure your security testing evolves as the security landscape evolves. Fixing web and mobile application security vulnerabilities can be challenging, but the right guidance can help expedite remediation. Inspectiv simplifies the process of receiving and escalating vulnerability disclosures, and provides your team with clear, concise, and actionable vulnerability reports. Each vulnerability report demonstrates impact and provides clear remediation steps. Reports provide high level translation of risk to execs, detail to your engineers, and auditable references that integrate with ticketing systems.
|
About
Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Companies interested in a powerful digital risk protection platform
|
Audience
Enterprises looking for proactive cyber defense with targeted and actionable threat intelligence: Retail, eCommerce, Finance, Media, Gaming, Entertainment, and other digital enterprises
|
Audience
Vulnerability detection platform for security teams
|
Audience
Organizations of all sizes that want to protect from digital risks
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationCybelAngel
Founded: 2007
United States
cybelangel.com
|
Company InformationCyberint
Founded: 2011
Israel
cyberint.com
|
Company InformationInspectiv
United States
www.inspectiv.com
|
Company InformationZeroFox
Founded: 2013
United States
www.zerofox.com/platform/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Email Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting
Risk Management Features
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
|
||||
Integrations
AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
|
Integrations
AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
|
Integrations
AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
|
Integrations
AriLinc
Axonius
Azure Marketplace
Check Point IPS
Cortex XSOAR
Elastic Observability
Filigran
IBM QRadar SIEM
Jira
Jira Work Management
|
|||
|
|
|
|
|