Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
In PolySwarm, a unique multiscanner, financial stakes are involved, where threat detection engines support their assessments with monetary commitments at the artifact level, such as files or URLs, and face financial incentives or penalties based on how accurate their evaluations are. This sophisticated process is managed by automated software that operates in nearly real-time. Users can submit artifacts to PolySwarm's network using either an API or a web user interface. The system then provides crowdsourced intelligence, which includes the determinations from different engines along with a final score known as PolyScore, back to the user. The bounty funds and the assertions made by the engines serve as a reward mechanism, held securely in an Ethereum smart contract. Engines that correctly identify threats earn the initial bounty from the enterprise, along with the funds contributed by the engines that made incorrect assessments, thus fostering a competitive environment that emphasizes accuracy and reliability. This innovative approach not only incentivizes precision but also ensures that users receive trustworthy threat intelligence swiftly.
Description
WildFire® employs near real-time analytics to identify novel, targeted malware and advanced persistent threats, ensuring the safety of your organization. It offers sophisticated file analysis features to safeguard applications such as web portals and can seamlessly integrate with SOAR tools among other resources. By utilizing WildFire’s distinct malware analysis capabilities across various threat vectors, your organization can achieve uniform security results through an API. You can select flexible file submission options and adjust query volumes based on your needs, all without the necessity of a next-generation firewall. Take advantage of top-tier advanced analysis and prevention engine capabilities, coupled with regional cloud deployments and a distinctive network effect. Additionally, WildFire merges machine learning, dynamic and static evaluations, alongside a specially designed analysis environment, to uncover even the most intricate threats throughout different stages and attack vectors, thus enhancing your overall security posture. With its comprehensive approach, WildFire ensures that organizations remain resilient against evolving cyber threats.
API Access
Has API
API Access
Has API
Integrations
Chronicle SOAR
Criminal IP ASM
Cyberstanc Scrutiny
Palo Alto Networks Strata
ThreatConnect Risk Quantifier (RQ)
ThreatQ
Integrations
Chronicle SOAR
Criminal IP ASM
Cyberstanc Scrutiny
Palo Alto Networks Strata
ThreatConnect Risk Quantifier (RQ)
ThreatQ
Pricing Details
$299 per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PolySwarm
Founded
2017
Country
United States
Website
polyswarm.io
Vendor Details
Company Name
Palo Alto Networks
Country
United States
Website
www.paloaltonetworks.com/products/secure-the-network/wildfire
Product Features
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption