Average Ratings 3 Ratings
Average Ratings 0 Ratings
Description
Faddom provides real-time application dependency mapping without requiring credentials, agents, or system access. It delivers full visibility into hybrid IT environments, showing how servers, applications, and network flows interact.
With zero disruption, Faddom helps IT teams plan migrations, document infrastructure, improve incident response, and strengthen cybersecurity.
Maps are created within an hour and continuously updated, giving teams confidence and control.
Whether for audits, change planning, or modernization efforts, Faddom offers fast, secure insights that reduce risk and improve decision-making.
Description
This community platform features various 'how-to' articles and troubleshooting resources related to the Falcon Sandbox platform. You can easily explore these published materials by using the navigation menu located on the left side. Before obtaining an API key or downloading malware samples, users must complete the Hybrid Analysis Vetting Process. It's important to remember that adherence to the Hybrid Analysis Terms and Conditions is mandatory, and the samples provided should only be utilized for research purposes. Sharing your user credentials or API key with others is strictly prohibited. In the event that you suspect your API key or user credentials have been compromised, you should inform Hybrid Analysis without delay. Occasionally, vetting requests may be denied if the submitted information is incomplete or lacks the required full real name, business name, or other forms of cybersecurity credential validation. If your request is rejected, you may submit a new vetting request for consideration. Additionally, ensuring that all necessary details are included in your application can help facilitate a smoother vetting process.
API Access
Has API
API Access
Has API
Integrations
7AI
Amazon Web Services (AWS)
Azure Marketplace
BMC Helix CMDB
Blink
Criminal IP
Docker
Dropzone AI
Filigran
Google Cloud Platform
Integrations
7AI
Amazon Web Services (AWS)
Azure Marketplace
BMC Helix CMDB
Blink
Criminal IP
Docker
Dropzone AI
Filigran
Google Cloud Platform
Pricing Details
$0
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Faddom
Founded
2021
Country
Israel
Website
faddom.com
Vendor Details
Company Name
Hybrid Analysis
Country
Germany
Website
www.hybrid-analysis.com
Product Features
Change Management
Approval Workflow
Audit Trail
Automated Notifications
Change Calendar
Change Planning
Compliance Management
Prioritization
Release Management
Task Management
Tracking & Reporting
Training Management
CMDB
Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
Enterprise Architecture
Application Portfolio Management
Architecture Governance
Capability Mapping
Diagramming
Idea Management
Modeling & Simulation
Project Management
Risk Assessment
Transformation Roadmapping
Version Control
Network Mapping
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption