Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Similar to how a compass directs adventurers, Compass IT Compliance steers your organization through the intricate landscape of cybersecurity and regulatory requirements. With our specialized knowledge, we help you maintain your trajectory, safeguarding your innovations and speeding up your path to success. As cybercriminals become increasingly sophisticated and adopt a wider range of strategies, business leaders can no longer depend solely on conventional tools such as firewalls and antivirus programs for comprehensive security. Collaborating with our team allows you to pinpoint essential solutions that will effectively reduce your risks while ensuring adherence to the regulations pertinent to your sector. We aim to empower your business, making compliance not just a requirement, but a strategic advantage.

Description

In the ever-evolving landscape of today’s world, security transcends the mere reinforcement of static barriers; it has become essential to vigilantly monitor and embrace change. It is crucial to conduct an ongoing assessment of your attack surface by employing the strategies and tactics utilized by actual attackers. Maintaining vigilance over your fluid attack surface is vital to ensure uninterrupted protection. Achieving comprehensive coverage necessitates the use of multiple scanning tools. Let's sift through the vast amount of data to identify key insights from the results. Our innovative technology empowers you to tailor and implement your own actions sourced from various inputs, allowing you to automate the import of results into your repository seamlessly. With over 85 plugins, a user-friendly Faraday-Cli, a RESTful API, and a versatile framework for developing custom agents, our platform provides a distinct avenue for establishing your own automated and collaborative security ecosystem. This approach not only enhances efficiency but also fosters collaboration among teams, elevating the overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

GitLab
Jira
QuickBooks Online
ServiceNow
SolarWinds Web Help Desk

Integrations

GitLab
Jira
QuickBooks Online
ServiceNow
SolarWinds Web Help Desk

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$640 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Compass IT Compliance

Founded

2010

Country

United States

Website

www.compassitc.com

Vendor Details

Company Name

Faraday

Founded

2001

Country

United States

Website

faradaysec.com

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Alternatives

Alternatives