Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CYRISMA is a complete ecosystem for cyber risk assessment and mitigation. With multiple high-impact cybersecurity tools rolled into one easy-to-use, multi-tenant SaaS product, CYRISMA enables you to manage your own and your clients' cyber risk in a holistic manner. Platform capabilities include (everything included in the price): -- Vulnerability and Patch Management -- Secure Configuration Scanning (Windows, macOS, Linux) -- Sensitive data discovery scanning; data classification and protection (data scans cover both on-prem systems and cloud apps including Microsoft Office 365 and Google Workspace) -- Dark web monitoring -- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials) -- Active Directory Monitoring (both on-prem and Azure) -- Microsoft Secure Score -- Cyber risk quantification in monetary terms -- Cyber risk score cards and industry comparison -- Complete cyber risk assessment and reporting -- Cyber risk mitigation Request a demo today to see CYRISMA in action!

Description

IBM Guardium Data Protection implements a zero trust security model by identifying and categorizing sensitive information throughout the organization. It offers continuous monitoring of data activities and employs sophisticated analytics on user behaviors to detect any anomalies associated with sensitive information. Built on a highly scalable framework, Guardium provides comprehensive visibility into both structured and unstructured data across various storage environments, including on-premises, private, and public cloud settings, as well as within containers. With a unified interface, users can establish access rules, oversee user interactions with secured data, and effectively identify, investigate, and address vulnerabilities and threats in real time within their data landscape. This approach not only enhances security but also empowers organizations to maintain compliance with data protection regulations. By leveraging these capabilities, businesses can foster a more secure data environment that adapts to emerging threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM Guardium
Oracle Cloud Marketplace

Integrations

IBM Guardium
Oracle Cloud Marketplace

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CYRISMA

Founded

2018

Country

United States

Website

cyrisma.com

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/guardium-data-protection

Product Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Product Features

Database Monitoring

Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting

Alternatives

Qualys VMDR Reviews

Qualys VMDR

Qualys
SISA Radar Reviews

SISA Radar

SISA Information Security