Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 1 Rating

Total
ease
features
design
support

Description

We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.

Description

Our XDR (Extended Detection & Response) cyber security platform provides deep visibility into your endpoints, servers, clouds, and digital supply chains and allows for threat detection. The platform is delivered to you as a fully managed service, supported by our 24x7 security operations. This allows for the quickest enrollment time and low cost. Our platform is the foundation for effective cyber threat detection, response services, and prevention. The platform provides deep visibility, advanced threat detection, sophisticated behavioral analytics, and automated threat hunting. It adds efficiency to your security operations capabilities. Our platform uses AI-empowered machine intelligence to detect suspicious and unusual behavior, revealing even the most obscure threats. The platform detects real threats with high fidelity and helps investigators and SOC analysts to focus on the important things.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Amplify
Armis Centrix
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
LogRhythm SIEM
Microsoft 365
Microsoft Defender Antivirus
Microsoft Defender XDR
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft Defender for IoT
Microsoft Defender for Office 365
Palo Alto Networks Threat Prevention
Prisma Cloud
Qualys Container Security
SentinelOne Singularity
Splunk Cloud Platform
Splunk Enterprise

Integrations

AWS Amplify
Armis Centrix
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
LogRhythm SIEM
Microsoft 365
Microsoft Defender Antivirus
Microsoft Defender XDR
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft Defender for IoT
Microsoft Defender for Office 365
Palo Alto Networks Threat Prevention
Prisma Cloud
Qualys Container Security
SentinelOne Singularity
Splunk Cloud Platform
Splunk Enterprise

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$5 per user per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Kroll

Founded

1972

Country

United States

Website

www.kroll.com/en/services/cyber-risk/

Vendor Details

Company Name

ThreatDefence

Founded

2014

Country

Australia

Website

threatdefence.com

Product Features

Breach and Attack Simulation (BAS)

Have your system controls undergone testing? Are you aware if they are prepared to effectively tackle current attack trends? Kroll's exclusive FAST Attack Simulations leverage unmatched incident forensic expertise alongside top-tier security frameworks to create tailored breach simulations suited to your specific environment.

Cyber Risk Management

Address all aspects of the current and future threat environment with insights from Kroll’s Cyber Risk specialists. Leveraging intelligence gathered from over 3,000 incident response cases annually, Kroll’s solutions for protection, detection, and response significantly enhance your cybersecurity stance right away.

Cybersecurity

We combine comprehensive response capabilities with frontline intelligence gathered from more than 3,000 incidents managed annually, along with extensive cybersecurity knowledge, to safeguard, identify, and address cyber threats effectively.

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Digital Forensics

With a track record of managing over 3,000 security incidents annually, Kroll's team of digital forensics specialists excels in the comprehension, analysis, and safeguarding of data throughout the investigative process. When faced with a security breach, Kroll’s experts are well-equipped to conduct thorough investigations and secure critical data, aiding in the collection of evidence and the maintenance of business operations.

Incident Management

Kroll's top-tier security experts respond swiftly to more than 3,000 incidents annually, equipped with the knowledge and tools to manage every phase of an incident, from legal obligations to breach alerts. Rest assured during emergencies with our dedicated support.

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Kroll stands as the premier global provider of incident response services, boasting unparalleled knowledge and cutting-edge threat intelligence to safeguard against, identify, and react to cyber threats. Regardless of the nature of data breaches or cyber offenses, Kroll possesses the necessary experience and resources—both personnel and technological—to act swiftly. They excel at identifying, isolating, and protecting critical data while thoroughly investigating the digital footprint, no matter where it may lead.

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Managed Detection and Response (MDR)

Combat cyber threats effectively with Kroll Responder's managed detection and response service. Backed by experienced incident response specialists and cutting-edge threat intelligence, Kroll Responder MDR offers unparalleled security solutions. With 24/7 monitoring, proactive detection of targeted attacks, and comprehensive incident management, we ensure your digital landscape is safeguarded and threats are swiftly contained and eliminated.

Penetration Testing

Assess your cybersecurity measures against genuine threats. Kroll offers top-tier penetration testing services that combine cutting-edge threat intelligence, extensive experience from numerous cybersecurity evaluations conducted annually, and a skilled team of certified professionals. This forms the basis of our advanced and adaptable strategy.

Security Risk Assessment

Our Cybersecurity Risk Evaluations encompass a comprehensive examination of the organization's information security framework, covering everything from policies and procedures to technical safeguards, as well as the involvement of personnel, processes, and technologies. We carry out a range of discussions with key internal stakeholders from both technical and business sectors to pinpoint opportunities for enhancement aimed at advancing the maturity of the organization's information security strategy, utilizing the NIST Cybersecurity framework as a reference point.

Threat Intelligence

Kroll's cyber threat intelligence offerings are powered by real-time incident response insights and a skilled team of top-tier analysts dedicated to proactively identifying and addressing threats. Our experts integrate Kroll’s technical intelligence, thorough analytical research, and investigative skills to enhance your security awareness, ensuring you receive specialized triage, investigation, and remediation assistance.

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives