Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

In a constantly evolving hybrid landscape, the success of your organization hinges on its workforce, their digital personas, and the devices they use to safeguard and enhance its resources. Malicious actors have devised clever methods to traverse your cloud ecosystems by taking advantage of these identities. To tackle this challenge, you require a cutting-edge, agentless solution for detecting and responding to identity threats, enabling you to identify and neutralize contemporary identity vulnerabilities that are crucial in today’s threat landscape. Proofpoint Identity Threat Defense, formerly known as Illusive, provides you with extensive prevention capabilities and visibility over all your identities, allowing you to address identity vulnerabilities before they escalate into significant threats. Additionally, it empowers you to identify lateral movements within your environments and implement deceptive strategies to thwart threat actors before they can access your organization's valuable assets. Ultimately, the ability to mitigate modern identity risks and confront real-time identity threats seamlessly in one platform is an invaluable advantage for any organization aiming to enhance its security posture.

Description

ThreatKey offers a smooth integration with your external SaaS providers, effectively contextualizing the data present in your ecosystem. By identifying vulnerabilities, ThreatKey provides safe remediation strategies and recommendations to swiftly mitigate risks before any incidents occur. The platform continuously scans and oversees your dynamic environment, promptly alerting you to misconfigurations that might arise within your SaaS application stack. As various teams within your organization embrace new third-party platforms to enhance their efficiency, it’s essential to recognize that SaaS configurations prioritize convenience over security. Ultimately, this empowers teams throughout your company to adopt innovative technologies with the assurance that they are not inadvertently expanding the attack surface. Additionally, ThreatKey Deputy equips modern security teams to proactively manage first-line communications regarding suspicious activities and indicators, fostering a more responsive security posture. This capability not only enhances situational awareness but also streamlines collaboration across departments, ensuring a unified approach to security challenges.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Box
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
GitHub
Google
Google Cloud Platform
IBM QRadar SIEM
Infoblox DDI
Microsoft 365
Microsoft Entra ID
Okta
Palo Alto Networks Next-Generation Firewalls
Slack
Splunk Enterprise
Tanium

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Box
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
GitHub
Google
Google Cloud Platform
IBM QRadar SIEM
Infoblox DDI
Microsoft 365
Microsoft Entra ID
Okta
Palo Alto Networks Next-Generation Firewalls
Slack
Splunk Enterprise
Tanium

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Proofpoint

Founded

2002

Country

United States

Website

www.proofpoint.com/us/illusive-is-now-proofpoint

Vendor Details

Company Name

ThreatKey

Website

www.threatkey.com

Alternatives

Alternatives

Lacework Reviews

Lacework

Fortinet
Baits Reviews

Baits

MokN