Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Feroot believes businesses and their customers deserve to be able engage in a secure and safe online experience. Feroot's mission is to secure web applications on the client side so that users are able to engage in online environments safely, whether it's using an ecommerce website for purchasing, or accessing internet-based health services, or transferring money between financial accounts. Our products help companies uncover supply chain risk and protect their client side attack surface. Feroot Inspector allows businesses to scan, monitor and enforce security controls in order to prevent data loss incidents caused by JavaScript, third-parties and configuration weaknesses. Our data protection capabilities reduce the time and labor intensive code reviews and threats analysis, and remove ambiguity related to client-side security detection and response.

Description

Effortless one-click security evaluations for cloud and SaaS applications ensure your tools are safeguarded by identifying problems such as file leaks, misconfigurations, and unusual activities. By linking your applications, you gain immediate visibility into how internal documents and sensitive data are shared, accessed, and configured. With a user-friendly dashboard that outlines user permissions, you can easily manage access and apply security best practices in just a few clicks. By swiftly identifying risky settings and misconfigurations that could lead to breaches, you can proactively avert security incidents. The risk of unauthorized access increases when there is uncertainty about who has access to which resources in your SaaS environment. Vectrix scans streamline the process of reviewing user access and permissions, managing onboarding and offboarding procedures, exporting user access reports, and much more, making security management hassle-free. Furthermore, maintaining a clear overview of user access not only enhances security but also fosters a culture of accountability within your organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Slack
AWS Glue
Amazon Web Services (AWS)
Cloudflare
Datadog
Dropbox
GitHub
Google Cloud Platform
Google Workspace
Jira
JupiterOne
Microsoft 365
Okta
PagerDuty
Salesforce
ServiceNow
Splunk Enterprise
Sumo Logic
Zoom

Integrations

Slack
AWS Glue
Amazon Web Services (AWS)
Cloudflare
Datadog
Dropbox
GitHub
Google Cloud Platform
Google Workspace
Jira
JupiterOne
Microsoft 365
Okta
PagerDuty
Salesforce
ServiceNow
Splunk Enterprise
Sumo Logic
Zoom

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Feroot Security

Founded

2017

Country

Canada

Website

www.feroot.com

Vendor Details

Company Name

Vectrix

Founded

2020

Country

United States

Website

www.vectrix.io

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Alternatives

Alternatives

Feroot Reviews

Feroot

Feroot Security