Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Maltego can be used by many users, including security professionals, forensic investigators and investigative journalists as well as researchers. You can easily gather information from disparate data sources. All information can be automatically linked and combined into one graph. Automately combine disparate data sources using point-and-click logic. Our intuitive graphical user interface allows you to enrich your data. You can detect patterns even in the largest graphs using entity weights. You can annotate your graph and then export it for further use. Maltego defaults to using our public Transform server. We have learned over the years that flexibility is important in choosing the right infrastructure for enterprise users.

Description

Safeguard your SaaS applications from breaches, threats, and data leaks seamlessly. In just a few minutes, you can secure essential SaaS platforms like Workday, Salesforce, Office 365, G Suite, GitHub, Zoom, and more, using data-driven insights, vigilant monitoring, and effective remediation strategies. As businesses increasingly transition their critical operations to SaaS, security teams often struggle with a lack of cohesive visibility necessary for swift threat detection and response. They face challenges in addressing fundamental inquiries: Who has access to these applications? Who holds privileged user status? Which accounts have been compromised? Who is sharing files with external parties? Are the applications set up in accordance with industry best practices? It is crucial to enhance SaaS security measures. Obsidian provides a streamlined yet robust security solution designed specifically for SaaS applications, focusing on unified visibility, ongoing monitoring, and advanced security analytics. By utilizing Obsidian, security teams can effectively safeguard against breaches, identify potential threats, and take prompt actions in response to incidents within their SaaS environments, ensuring a comprehensive approach to security management.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Videoma Intelion
Blink
Box
Cisco Duo
Criminal IP
Dropbox
Filigran
GitHub
Google Digital Risk Protection
HoverNotes
IPQS Device Fingerprinting
Kasm Workspaces
Microsoft 365
Microsoft Azure
Polonious
Salesforce
Tisane
Workday HCM
Zoom
Zoom Rooms

Integrations

Videoma Intelion
Blink
Box
Cisco Duo
Criminal IP
Dropbox
Filigran
GitHub
Google Digital Risk Protection
HoverNotes
IPQS Device Fingerprinting
Kasm Workspaces
Microsoft 365
Microsoft Azure
Polonious
Salesforce
Tisane
Workday HCM
Zoom
Zoom Rooms

Pricing Details

€5000 per user per year
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Maltego Technologies

Founded

2017

Country

Germany

Website

www.maltego.com/product-features/

Vendor Details

Company Name

Obsidian Security

Founded

2017

Country

United States

Website

www.obsidiansecurity.com

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Alternatives

Sn1per Professional Reviews

Sn1per Professional

Sn1perSecurity
FortiInsight Reviews

FortiInsight

Fortinet
Media Sonar Reviews

Media Sonar

Media Sonar Technologies