Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

In a constantly evolving hybrid landscape, the success of your organization hinges on its workforce, their digital personas, and the devices they use to safeguard and enhance its resources. Malicious actors have devised clever methods to traverse your cloud ecosystems by taking advantage of these identities. To tackle this challenge, you require a cutting-edge, agentless solution for detecting and responding to identity threats, enabling you to identify and neutralize contemporary identity vulnerabilities that are crucial in today’s threat landscape. Proofpoint Identity Threat Defense, formerly known as Illusive, provides you with extensive prevention capabilities and visibility over all your identities, allowing you to address identity vulnerabilities before they escalate into significant threats. Additionally, it empowers you to identify lateral movements within your environments and implement deceptive strategies to thwart threat actors before they can access your organization's valuable assets. Ultimately, the ability to mitigate modern identity risks and confront real-time identity threats seamlessly in one platform is an invaluable advantage for any organization aiming to enhance its security posture.

Description

Gain unparalleled insight into the fragile ecosystem by observing it from the center of the storm. Act swiftly to prioritize responses and take preemptive measures before any attacks materialize. Benefit from early access to critical vulnerability data that isn't available in the NVD, complemented by a multitude of distinctive fields. Engage in real-time surveillance of exploit Proofs of Concept (PoCs), timelines for exploitation, and activities related to ransomware, botnets, and advanced persistent threats or malicious actors. Utilize internally developed exploit PoCs and packet captures to bolster defenses against initial access vulnerabilities. Seamlessly incorporate vulnerability assessments into current asset inventory systems wherever package URLs or CPE strings can be identified. Dive into VulnCheck, an advanced cyber threat intelligence platform that delivers vital exploit and vulnerability information directly to the tools, processes, programs, and systems that require it to stay ahead of adversaries. Focus on the vulnerabilities that hold significance in light of the current threat landscape, while postponing those deemed less critical. By doing so, organizations can enhance their overall security posture and effectively mitigate potential risks.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Chainguard
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
IBM QRadar SIEM
Infoblox DDI
LogRhythm SIEM
Microsoft 365
Microsoft Azure
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks Next-Generation Firewalls
Splunk Enterprise
Tanium

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Chainguard
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
IBM QRadar SIEM
Infoblox DDI
LogRhythm SIEM
Microsoft 365
Microsoft Azure
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks Next-Generation Firewalls
Splunk Enterprise
Tanium

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Proofpoint

Founded

2002

Country

United States

Website

www.proofpoint.com/us/illusive-is-now-proofpoint

Vendor Details

Company Name

VulnCheck

Country

United States

Website

vulncheck.com

Product Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Alternatives

Baits Reviews

Baits

MokN