Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Pulsedive provides threat intelligence platform and data products that can be used to aid security teams in their threat intelligence research, processing and management. Start by searching any domain, URL, or IP at pulsedive.com. Our community platform allows you to enrich and investigate indicators for compromise (IOCs), analyze threats and query across the Pulsedive database. You can also submit IOCs in bulk. What we do differently - On-demand, perform passive or active scanning of every ingested IOC - Sharing of risk evaluations and factors with our users based upon first-hand observations - Pivot any data property or value Analyze threat infrastructure and properties shared by different threats Our API and Feed products allow for automation and integration of data within security environments. For more information, visit our website.

Description

To safeguard against sophisticated threats, businesses must seamlessly blend their security measures while leveraging appropriate expertise and methodologies. Trellix Helix Connect serves as a cloud-based security operations platform, empowering organizations to manage incidents from the initial alert through to resolution effectively. By gathering, correlating, and analyzing vital data, enterprises can achieve thorough visibility and understanding, thus enhancing their threat awareness significantly. The platform facilitates the easy integration of security functions, minimizing the need for costly and extensive implementation cycles. With the aid of contextual threat intelligence, organizations can make informed and prompt decisions. Employing machine learning, artificial intelligence, and integrated real-time cyber intelligence, it enables the detection of advanced threats. Furthermore, users gain essential insights into who is targeting their organization and the motivations behind such actions. This intelligent and adaptable platform not only equips businesses to anticipate and thwart emerging threats but also helps them to identify root causes and respond promptly to incidents, ensuring a resilient security posture. In a rapidly evolving threat landscape, leveraging such technology becomes crucial for proactive defense.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ActiveScale
Chronicle SOAR
Cyware
DatAnswers
Google Digital Risk Protection
Netreo
NorthStar Navigator
Polarity
SpiderFoot
Swimlane
ThreatConnect Risk Quantifier (RQ)
Varonis Data Security Platform

Integrations

ActiveScale
Chronicle SOAR
Cyware
DatAnswers
Google Digital Risk Protection
Netreo
NorthStar Navigator
Polarity
SpiderFoot
Swimlane
ThreatConnect Risk Quantifier (RQ)
Varonis Data Security Platform

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Pulsedive

Founded

2017

Country

United States

Website

pulsedive.com

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/helix/

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

scoutTHREAT Reviews

scoutTHREAT

LookingGlass Cyber Solutions

Alternatives

CleanINTERNET Reviews

CleanINTERNET

Centripetal
Criminal IP Reviews

Criminal IP

AI SPERA