Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Safeguard your intellectual property against threats like ransomware and industrial espionage, while also mitigating internal malicious activities. It is crucial to thwart cyberattacks on all endpoints and to track any unauthorized data exfiltration across networks to comply with international privacy and data protection laws. With BlackFog’s cutting-edge on-device data privacy technology, you can avert data loss and breaches effectively. Our solution ensures that user data is not unlawfully collected or transmitted by any device connected to your network, whether on or off. As pioneers in on-device ransomware prevention and data privacy, we extend our services beyond mere threat management. Instead of solely concentrating on perimeter defenses, our proactive approach is designed to prevent data exfiltration directly from your devices. Our specialized enterprise software not only stops ransomware from impacting your organization but also significantly lessens the likelihood of a data breach occurring. Furthermore, you can access detailed analytics and impact assessments in real-time to stay informed about your security posture and make informed decisions. This comprehensive approach empowers organizations to maintain robust data security and foster trust with their clients and stakeholders.

Description

Welcome to the realm of data security tailored for collaborative and remote enterprises. Ensure that approved collaboration tools like Slack and OneDrive are being used correctly. Identify unauthorized applications that could signal deficiencies in the available corporate tools or employee training. Achieve insight into file activities occurring off the corporate network, including uploads to the web and the use of cloud synchronization applications. Swiftly identify, probe, and address instances of data exfiltration carried out by remote workers. Stay informed with activity alerts that are triggered by specific file types, sizes, or quantities. Furthermore, utilize comprehensive user activity profiles to enhance the efficiency of investigations and responses, ensuring a robust security posture in a dynamic work environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
Box
Code42 Incydr
Cortex XDR
Dropbox
Indent
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Tines
iCloud

Integrations

Axonius
Box
Code42 Incydr
Cortex XDR
Dropbox
Indent
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Tines
iCloud

Pricing Details

$19.95/year/user
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

BlackFog

Country

United States

Website

www.blackfog.com

Vendor Details

Company Name

Code42

Founded

2001

Country

United States

Website

www.code42.com

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Alternatives

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike
Coro Reviews

Coro

Coro Cybersecurity
ActivTrak Reviews

ActivTrak

Birch Grove Software