Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
What your clients don't know about cybersecurity can really harm them. Asking questions is the best way to keep your clients safe. ConnectWise Identify Assessment gives you access to a risk assessment backed up by the NIST Cybersecurity Framework. This will reveal risks throughout your client's entire company, not just their networks. You can have meaningful security conversations with clients by having a clear, easily-read risk report. You can choose from two levels of assessment to meet every client's needs, from the Essentials to cover basic information to the Comprehensive Assessment to dig deeper to uncover additional risks. The intuitive heat map displays your client's risk level and prioritizes to address them based on financial impact and probability. Each report contains recommendations for remediation to help you create a revenue-generating plan.
Description
Many cybersecurity tools available today are priced in the thousands and often provide minimal actionable insights. However, Dark Cubed stands apart from the crowd. Our innovative cybersecurity solution is specifically crafted to meet the unique requirements of Managed Service Providers (MSPs), particularly focusing on small to medium-sized businesses. Dark Cubed evaluates the risk level of every IP address that connects to the network and proactively blocks those deemed risky. By leveraging a mix of numerous threat intelligence feeds alongside proprietary analytics that assess the credibility of each feed, historical data regarding the IP’s presence on various lists, and additional criteria, we effectively determine whether an IP should be classified as a high-risk connection. We understand that you may lack the resources to constantly supervise your clients' networks, yet it is vital to be alerted when potential issues arise. For instance, if one of your clients begins to exchange data with a high-risk IP address, our system will promptly send you an alert, ensuring you stay informed and can take necessary action. This level of monitoring not only enhances security but also strengthens the trust your clients place in your services.
API Access
Has API
API Access
Has API
Integrations
Asio by ConnectWise
ConnectWise PSA
Pliant
WatchGuard WIPS
Workspace 365
Integrations
Asio by ConnectWise
ConnectWise PSA
Pliant
WatchGuard WIPS
Workspace 365
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ConnectWise
Founded
1982
Country
United States
Website
www.connectwise.com/platform/security-management/identify
Vendor Details
Company Name
Dark Cubed
Founded
2015
Country
United States
Website
darkcubed.com/about
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption