Average Ratings 0 Ratings
Average Ratings 3 Ratings
Description
Our platform, which operates without agents, enables rapid segmentation of network workloads while restricting unauthorized traffic to thwart lateral movement and prevent breaches. Safeguarding IT assets across physical, virtual, and cloud settings is becoming increasingly intricate. Conventional security measures often fall short against advanced threats. By utilizing microsegmentation, we can effectively isolate workloads, oversee east-west traffic, and stop the spread of attackers to vital areas, thereby bolstering overall network security. You can create and implement security policies based on asset classification through the use of hierarchical taxonomies and tagging. Additionally, by enforcing stringent access controls and consistently monitoring service traffic, we align with zero trust principles, crafting a robust and adaptable security framework. The 12Port Horizon boasts an agentless architecture, which streamlines deployment and upkeep in various environments without introducing added complexity, making it a valuable asset for organizations seeking effective security solutions. This approach not only enhances security but also simplifies the management of your network infrastructure.
Description
Faddom provides real-time application dependency mapping without requiring credentials, agents, or system access. It delivers full visibility into hybrid IT environments, showing how servers, applications, and network flows interact.
With zero disruption, Faddom helps IT teams plan migrations, document infrastructure, improve incident response, and strengthen cybersecurity.
Maps are created within an hour and continuously updated, giving teams confidence and control.
Whether for audits, change planning, or modernization efforts, Faddom offers fast, secure insights that reduce risk and improve decision-making.
API Access
Has API
API Access
Has API
Integrations
Oracle Cloud Infrastructure
Active Directory
Amazon Web Services (AWS)
BMC Helix CMDB
Barawave
Cisco Duo
Docker
Google Authenticator
Kubernetes
Microsoft Azure
Integrations
Oracle Cloud Infrastructure
Active Directory
Amazon Web Services (AWS)
BMC Helix CMDB
Barawave
Cisco Duo
Docker
Google Authenticator
Kubernetes
Microsoft Azure
Pricing Details
$15 per month
Free Trial
Free Version
Pricing Details
$0
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
12Port
Founded
2024
Country
United States
Website
www.12port.com
Vendor Details
Company Name
Faddom
Founded
2021
Country
Israel
Website
faddom.com
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
Change Management
Approval Workflow
Audit Trail
Automated Notifications
Change Calendar
Change Planning
Compliance Management
Prioritization
Release Management
Task Management
Tracking & Reporting
Training Management
CMDB
Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
Enterprise Architecture
Application Portfolio Management
Architecture Governance
Capability Mapping
Diagramming
Idea Management
Modeling & Simulation
Project Management
Risk Assessment
Transformation Roadmapping
Version Control
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption