Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns.

Description

Managing security consistently across various organizations, ranging from distributed enterprises with multiple branch offices to small and midsize businesses (SMBs) with remote employees, can be quite challenging. For both SMBs and distributed enterprises, it is essential to maintain visibility into network and endpoint event data while also being able to efficiently utilize actionable insights to mitigate threats. The integration of ThreatSync, a vital element of Threat Detection and Response (TDR), plays a key role by gathering event data from the WatchGuard Firebox, Host Sensor, and advanced threat intelligence sources. This data is analyzed through a proprietary algorithm that assigns an in-depth threat score and rank, allowing organizations to prioritize their responses effectively. With its robust correlation engine, ThreatSync facilitates cloud-based threat prioritization, thereby equipping IT teams to address threats swiftly and with confidence. Ultimately, this system collects and correlates threat event data from both the Firebox and Host Sensor, enhancing the overall security posture of the organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
GitLab
Google Cloud Platform
Microsoft Azure
Splunk Cloud Platform
6sense
AWS Fargate
Autotask PSA
Auvik
BlueJeans
ExtremeCloud IQ
GitHub
Kubernetes
OpenShift Cloud Functions
Plixer One
Skyfii IO
Slack
VMware Tanzu
WatchGuard Firebox Cloud

Integrations

Amazon Web Services (AWS)
GitLab
Google Cloud Platform
Microsoft Azure
Splunk Cloud Platform
6sense
AWS Fargate
Autotask PSA
Auvik
BlueJeans
ExtremeCloud IQ
GitHub
Kubernetes
OpenShift Cloud Functions
Plixer One
Skyfii IO
Slack
VMware Tanzu
WatchGuard Firebox Cloud

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Deepfence

Country

United States

Website

deepfence.io/threatstryker/

Vendor Details

Company Name

WatchGuard

Founded

1996

Country

United States

Website

www.watchguard.com/wgrd-products/security-services/threatsync

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Alternatives

ThreatMapper Reviews

ThreatMapper

Deepfence
Silent Armor Reviews

Silent Armor

Silent Breach
ThreatStryker Reviews

ThreatStryker

Deepfence