Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Threat Simulator operates without direct interaction with your production servers or endpoints; rather, it utilizes isolated software endpoints throughout your network to securely assess your active security measures. Our malware and attack simulator, Dark Cloud, interfaces with these endpoints to rigorously evaluate your security framework by replicating the complete cyber kill chain, which includes phishing, user behavior, malware delivery, infection processes, command and control operations, and lateral movement tactics. As a frontrunner in application and security testing, our Application and Threat Intelligence (ATI) Research Center ensures that Threat Simulator remains equipped with the most current threats. With a comprehensive database exceeding 50 million records, we analyze and catalog millions of new threats each month. Thanks to our ongoing updates from our threat feed, you can consistently emulate the most pertinent and pressing cyber security threats and attacks. Understanding and mitigating risks also requires a deep knowledge of potential adversaries. Thus, staying informed about emerging trends in cyber threats is crucial for effective defense strategies.

Description

Leverage a centralized security management platform that enables the orchestration and oversight of all your endpoints through a unified console. Streamline your defense strategy by consolidating various endpoints with built-in controls, thereby minimizing reliance on multiple security tools. This all-encompassing platform empowers security operations teams to effectively plan and expand their operational models while taking advantage of seamless API integrations. With features like Threat Intelligence Exchange (TIE) and Advanced Threat Defense (ATP) integrations, it enhances sandboxing capabilities, facilitating the early detection and prevention of cyber threats. Positioned at the leading edge of the XDR evolution, we have introduced an innovative unified experience that transforms security management. Additionally, by fostering open partnerships, you can automate the orchestration of security policies for greater efficiency. This collaborative approach not only enhances security but also streamlines operations across the organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Microsoft Defender XDR

Integrations

Microsoft Defender XDR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Keysight Technologies

Founded

2014

Country

United States

Website

www.keysight.com/mx/en/products/network-security/breach-defense/threat-simulator.html

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/epo/

Product Features

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Alternatives

Alternatives