What Integrates with ThreatConnect Risk Quantifier (RQ)?

Find out what ThreatConnect Risk Quantifier (RQ) integrations exist in 2024. Learn what software and services currently integrate with ThreatConnect Risk Quantifier (RQ), and sort them by reviews, cost, features, and more. Below is a list of products that ThreatConnect Risk Quantifier (RQ) currently integrates with:

  • 1
    Twilio Reviews
    Top Pick

    Twilio

    Twilio

    $0.0085 per min
    1,200 Ratings
    See Software
    Learn More
    Use the language you already love to prototype ideas quickly, develop production-ready communications applications, and run serverless applications on one API-powered platform. Twilio is a single fully-programmable platform with flexible APIs for any channel, built-in intelligence, and global infrastructure to support you at scale. Quickly integrate powerful APIs to start building solutions for SMS and WhatsApp messaging, voice, video, and email. Browse documentation and SDKs in multiple coding languages, including Ruby, Python, PHP, Node.js, java, and C#, or jumpstart your first project with our open source code templates to quickly build production-ready communications apps. Consult our community of over 9 million developers for guidance and inspiration on your next project. Sign up and start building today.
  • 2
    Sumo Logic Reviews

    Sumo Logic

    Sumo Logic

    $270.00 per month
    2 Ratings
    Sumo Logic is a cloud-based solution for log management and monitoring for IT and security departments of all sizes. Integrated logs, metrics, and traces allow for faster troubleshooting. One platform. Multiple uses. You can increase your troubleshooting efficiency. Sumo Logic can help you reduce downtime, move from reactive to proactive monitoring, and use cloud-based modern analytics powered with machine learning to improve your troubleshooting. Sumo Logic Security Analytics allows you to quickly detect Indicators of Compromise, accelerate investigation, and ensure compliance. Sumo Logic's real time analytics platform allows you to make data-driven business decisions. You can also predict and analyze customer behavior. Sumo Logic's platform allows you to make data-driven business decisions and reduce the time it takes to investigate operational and security issues, so you have more time for other important activities.
  • 3
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 4
    Splunk Cloud Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 5
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 6
    Palo Alto Networks NGFW Reviews
    Our ML-Powered physical appliances allow you to see everything, including IoT and reduce errors through automatic policy recommendations. VM-Series is the virtualized version our ML-Powered NGFW. It protects both your private and public clouds with segmentation and proactive threats prevention. CN-Series is the containerized version our ML-Powered NGFW that prevents sophisticated network-based threats spreading beyond Kubernetes boundaries.
  • 7
    VMware Carbon Black EDR Reviews
    Threat hunting and incident response solutions provide continuous visibility in offline, disconnected, and air-gapped environments using threat intelligence and customizable detections. You can't stop something you don't see. Investigative tasks that normally take days or weeks can now be completed in minutes. VMware Carbon Black®, EDR™, collects and visualizes detailed information about endpoint events. This gives security professionals unprecedented visibility into their environments. Never hunt the same threat twice. VMware Carbon Black EDR is a combination of custom and cloud-delivered threat intelligence, automated watchlists, and integrations with other security tools to scale your hunt across large enterprises. No more need to reimagine your environment. In less than an hour, an attacker can compromise your environment. VMware Carbon Black EDR gives VMware the ability to respond and correct in real-time from anywhere in the world.
  • 8
    Playbook Reviews
    Your team is exceptional and operates at a speed that only the best minds can match. Why is product development so slow? Project drift is the leading cause of project delays. It's a complicated process. Designs can be complicated, teams are scattered, and everyone is busy. The work is often invisible. Is your project management tool ensuring everyone is moving the critical work forward? Complex problems require powerful tools. Playbook is that tool. It makes project information visible, actionable, and predictable so you can get there on-time, every time.
  • 9
    Tanium Reviews
    The world's most important organizations are empowered to manage and protect mission-critical networks. Our data model is able to collect new, ad-hoc information on the fly in seconds. This allows customers, partners, and Tanium to quickly build capabilities on this extensible platform. Our unique architecture collects and distributes data to millions in seconds with no infrastructure. Allow decision-making right where data is generated: at the endpoint. Our agent uses minimal endpoint resources and bandwidth, while fitting on the firmware for the smallest chips. Tanium can expand your capabilities without expanding its footprint. Our platform is best demonstrated in action. This is how we have found customers can understand what we do. Tanium's CEO and co-founder Orion Hindawi will lead you through a keyboard tour to demonstrate the power of Tanium. Instantly track down every IT asset that you own.
  • 10
    Apache Kafka Reviews

    Apache Kafka

    The Apache Software Foundation

    1 Rating
    Apache Kafka®, is an open-source distributed streaming platform.
  • 11
    Jira Service Management Reviews

    Jira Service Management

    Atlassian

    $20 per user per month
    6 Ratings
    Jira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change.
  • 12
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 13
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 14
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 15
    Zoom Reviews
    Top Pick

    Zoom

    Zoom Video Communications

    $14.99 per user per month
    568 Ratings
    Zoom Meetings & Chat allows for enterprise video conferencing that includes real-time messaging and content sharing. Video conferencing and messaging made easy across all devices. Facilitate adoption with meeting capabilities that make it simple to join, start, and collaborate on any device. Zoom Meetings syncs to your calendar system and provides enterprise-grade video conferencing on both mobile and desktop. All-hands meetings, internal and external communications, trainings, and all-hands meetings can all be done through one platform. With support for up to 1000 participants and 49 videos per screen, HD video and audio can be added to your meetings. Multi-participants can share their screens simultaneously, and co-annotate to make it more interactive. End-to-end encryption of all meetings, role-based security, password protection and waiting rooms. You can also place attendees on hold. You can record your meetings locally or to cloud with searchable transcripts. Zoom offers HIPAA-compliant healthcare plans.
  • 16
    Malwarebytes Reviews
    Top Pick

    Malwarebytes

    Malwarebytes

    $47.22 per user per year
    13 Ratings
    Cyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus.
  • 17
    Slack Reviews
    Top Pick

    Slack

    Slack

    $6.67 per user per month
    219 Ratings
    Slack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging.
  • 18
    Jira Software Reviews
    Top Pick
    Jira Software from Atlassian is the best software development tool for teams building great products and planning. Jira is trusted by thousands of teams and provides a wide range tools to plan, track, release and release world-class software. It also captures and organizes issues, assigns work, and follows team activity. It integrates with the most popular developer tools to provide end-to-end traceability.
  • 19
    Microsoft Teams Reviews
    Top Pick

    Microsoft Teams

    Microsoft

    $12.50 per user per month
    196 Ratings
    Teams of engaged people work together to solve today's complex business challenges. We have created an online guide to help you and your team learn the secrets of teamwork. There are no limits to what you can accomplish when you have a place where you can create and make decisions together as a team. Teams allows you to bring everything together in one shared workspace. You can chat, meet, share documents, and use business apps. Your team can get on the same page using group chat, online meetings and calling. Microsoft 365 (formerly Office 365), apps such as Word, Excel, PowerPoint and SharePoint allow you to collaborate on files. To keep your business moving forward, add in your favorite Microsoft apps as well as third-party services. Microsoft 365 provides end-to-end security and administrative control. Teams is for all types of groups. Start with the no-obligation, free version. As part of the best-in class suite of productivity tools, you can also get Team.
  • 20
    Kaspersky Endpoint Security Reviews

    Kaspersky Endpoint Security

    Kaspersky Lab

    $40.00/one-time/user
    2 Ratings
    You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
  • 21
    Symantec Endpoint Protection Reviews
    Symantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft.
  • 22
    Trellix Endpoint Security Reviews
    Intelligent endpoint protection will help you to future-proof your defenses. An integrated security framework protects all endpoints, giving you the ability to empower your workforce. Trellix Endpoint Security solutions (ENS) apply proactive threat intelligence to defend your organization throughout the attack lifecycle. This will make it safer and more resilient. Learn why Gartner®, formerly McAfee Enterprise, named Trellix a Magic Quadrant™, Leader. Keep your endpoints safe in today's dynamic threat environment. Discover how our integrated suite provides you with the power of actionable Intelligence, machine learning, and other endpoint protection technologies to help you monitor threats and prevent attacks.
  • 23
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust.
  • 24
    Microsoft Defender Antivirus Reviews
    Microsoft Defender Antivirus, the next-generation protection component for Microsoft Defender for Endpoint, is Microsoft Defender Antivirus. This protection combines machine learning, big data analysis, threat resistance research, and the Microsoft Cloud Infrastructure to protect devices within your enterprise. Next-generation protection services will include the following capabilities. Behavior-based, real-time, and heuristic protection includes always-on scanning using file- and process behavior monitoring and other Heuristics (also known to be real-time protection). It includes blocking and detecting apps that might not be considered malware but are unsafe. Cloud-delivered protection includes near-instant detection of emerging threats and blocking them, dedicated protection, and product updates. This includes updates related to Microsoft Defender Antivirus.
  • 25
    Cisco Umbrella Reviews
    Are you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement.
  • 26
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 27
    Mandiant Threat Intelligence Reviews
    Mandiant Threat Intelligence module gives organizations of all sizes visibility to the latest threats right from the frontlines. Get started today. Mandiant Threat Intelligence provides security professionals unparalleled visibility and expertise into the threats that are important to their business. Over 300 intelligence and security professionals from 22 countries have compiled our threat intelligence. They have conducted undercover adversarial searches, malicious infrastructure reconstructions, and actor identification processes. This knowledge is part of the Mandiant Intel Grid. Threat Intelligence can either be delivered as a technology or operated side-by-side by your team. You can improve your defenses by understanding the motivations, behaviors, and cybercrime actors that target your organization.
  • 28
    Cybereason Reviews
    Together, we can stop cyber attacks at every stage of the battle, from the enterprise to the endpoint. Cybereason provides high-fidelity convictions and visibility of known and unknown threats, so that defenders can harness the power of true prevention. Cybereason provides deep context and correlations across the entire network to enable threat hunters to detect and deter stealthy operations. Cybereason dramatically reduces the time it takes for defenders investigate and resolve attacks using both automated and guided remediation. Cybereason analyzes over 80 million events per second, which is 100x more than other solutions available. To eliminate emerging threats in minutes, rather than days, reduce investigation time by up to 93%.
  • 29
    CrowdStrike Falcon Reviews
    The Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful.
  • 30
    ServiceNow Security Operations Reviews
    Use SOAR (security orchestration automation and response) and risk-based vulnerability control to overcome threats and vulnerabilities. Say hello to a secure digital transformation. Smart workflows and context help you speed up incident response. MITRE ATT&CK can be used to investigate threats and close any gaps. Risk-based vulnerability management can be applied to your infrastructure and applications. Collaborative workspaces are a great way to manage IT risks and remediate them. With role-based dashboards, reporting and analytics, you can get an executive view of key metrics. Increase visibility into your security posture, team performance, and other key metrics. Security Operations groups key applications in scalable packages that can adapt to your changing needs. You can quickly identify and prioritize high-impact threats and assess your security status in real time. Collaboration workflows and repeatable processes in security, risk and IT allow you to respond faster.
  • 31
    AlienVault USM Reviews

    AlienVault USM

    AT&T Cybersecurity

    AlienVault®, Unified Security Management®, (USM), is used by hundreds of MSSPs around the world to create successful managed security and compliance services. AlienVault USM provides multiple security capabilities and continuously updated threat intelligence in one platform. It allows MSSPs to centralize threat detection, incident response and compliance management across both cloud and on-premises environments. AlienVault USM was designed to meet the needs of today's dynamic MSSP market. It is highly scalable and cost-effective and easy to deploy and maintain. It allows MSSPs to quickly grow their managed security service offerings to meet customer security goals and minimize their risk and expense.
  • 32
    LogRhythm NextGen SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 33
    Exabeam Reviews
    From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools. Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.
  • 34
    Trellix Helix Reviews
    Organizations need to integrate security and use the right expertise and processes to protect themselves against advanced threats. Trellix Helix, a cloud-hosted security operation platform that allows organizations take control of all incidents from alert to fix, is available through Trellix Helix. You can gain comprehensive visibility and control over your entire enterprise by gathering, correlating, and analysing critical data to increase threat awareness. Integrate security functions quickly and easily without costly and lengthy cycles. Contextual threat intelligence allows you to make informed and efficient decisions. Advanced threats can be detected using machine learning, AI, and integrated real-time cybersecurity intelligence. Get critical context about who and why they are targeting your organization. A smart platform that adapts to changing circumstances will allow you to predict and prevent new threats, identify root causes, and respond quickly.
  • 35
    VMRay Reviews
    VMRay provides technology partners and enterprises worldwide with the best-in-class, scalable and automated malware analysis and detection systems that significantly reduce their vulnerability to malware-related threats and attacks.
  • 36
    ZeroFox Reviews
    Social media and digital presence are a major part of many people's engagement strategies. Organizations spend a lot of money on them. Security teams must be able to understand and address the risks presented by digital platforms, which are the largest unsecured IT network on the planet. This 2 minute overview video will show you how ZeroFox Platform works. The ZeroFox Platform protects your brand, cyber, and physical security on social media and digital platforms. You can assess your organization's digital risk exposure on a wide range of platforms where cyberattacks occur. The ZeroFox mobile app puts the powerful protection of ZeroFox at your fingertips wherever and whenever you need.
  • 37
    Infoblox DDI Reviews
    The Internet of Things (IoT) is rapidly changing the network landscape. This is due to trends in hybrid and multicloud migration, security and SDN, NFV and IPv6 adoption. All organizations need specialized solutions to simplify and optimize the network management tasks of DNS, DHCP, and IP address management. These critical network services are collectively known as DDI and make all network interactions possible. Infoblox appliances and applications are uniquely able support all your DDI needs, both now and in the future. You need to centralize control over advanced DDI services at your site while seamlessly integrating with cloud or virtualization platforms. We've got you covered. You can dramatically improve the network in branch and remote locations by managing DDI in cloud. Check. You want to see all network assets across the infrastructure in one place? You got it. You can do DDI.
  • 38
    Fidelis Network Reviews

    Fidelis Network

    Fidelis Cybersecurity

    Advanced threats require deep inspection, extraction and analysis of all content moving across the wire in real time. Fidelis network detection & response bi-directionally scans all protocols and ports to collect rich metadata that can be used for machine-learning and other powerful machine-learning analyses. You can have full visibility and network coverage with direct, internal, web, and email sensors. To help security teams stay ahead of the curve, identified attacker TTPs are mapped against MITRE ATT&CK™. Threats can hide, but they can't run. To map your cyber terrain, automatically profile and classify IT assets. This includes legacy systems, enterprise IoT, and shadow IT. Integrating with Fidelis' endpoint response and detection solution, you can create a software asset inventory that is correlated with known vulnerabilities, including CVE and KB Links, as well security hygiene for patches, and endpoint status.
  • 39
    IBM X-Force Exchange Reviews
    Actionable threat intelligence integrates with your security tools to speed up your security investigations. IBM X-Force Exchange, a cloud-based threat information platform, allows you to share, consume and act on threat intelligence. It allows you to quickly research the latest global security threats and aggregate actionable intelligence. You can also consult with experts and share your findings with other peers. IBM X-Force Exchange is a combination of human- and machine-generated Intelligence to help users stay ahead. You can quickly access and share information about threats using the depth and breadth IBM X-Force research. You can programatically access information by using STIX, TAXII and a RESTful API that supports JSON format. Integrate intelligence with security operations for near-real-time decision making. Your company can quickly scale and adapt to changing business requirements by using IBM Cloud offerings.
  • 40
    Trellix Malware Analysis Reviews
    Malware analysis is an important part in preventing and detecting future attacks. Cyber security experts can use malware analysis tools to analyze the attack lifecycle and extract important forensic details that will enhance their threat intelligence. The AX series products for malware analysis provide a secure environment in which to test, replay and characterize advanced malicious activities. Malware Analysis shows the entire cyber attack lifecycle, starting with the initial exploit and malware execution path and ending at callback destinations and subsequent binary download attempts. This information will help you to plan future prevention strategies. Stop attacks spreading using auto-generated local attack profile, which can be instantly shared throughout the Trellix ecosystem. A simple interface allows you to load suspicious files and file sets.
  • 41
    Qualys WAS Reviews
    A robust cloud solution that continuously discovers web apps and detects vulnerabilities and misconfigurations. It's fully cloud-based and easy to deploy and maintain. It can scale to millions of assets. WAS catalogs all web applications in your network, even unknown ones. It scales from a few apps to thousands. Qualys WAS allows you to tag your apps with your own labels. These labels can be used to control reporting and limit access. WAS' dynamic deep scan covers all apps within your perimeter, your internal environment, under active development, and APIs that support mobile devices. It can also be used to detect vulnerabilities such as SQLi and XSS in public cloud instances. Supported are complex, progressive, and authenticated scans. WAS supports programmatic scanning of SOAP API services and REST API services. This allows WAS to test IoT services as well as APIs used in mobile apps and modern mobile architectures.
  • 42
    Censys Reviews
    Censys Attack Surface Management is a continuous discovery tool that uncovers unknown assets, from Internet services to cloud storage buckets. It also comprehensively checks all public-facing assets for security or compliance issues regardless of their location. Cloud services allow companies to be agile and innovative, but they also expose them to security risks from hundreds of cloud accounts and projects that span dozens more providers. Non-IT employees frequently create unmanaged cloud accounts, resulting in blind spots for security teams. Censys ASM provides comprehensive security coverage for all your Internet assets, regardless of where they are located or what account they are. Censys continuously uncovers unknown assets, ranging from Internet service to storage buckets. It provides you with an inventory and security problem analysis of all public-facing assets.
  • 43
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 44
    Check Point IPS Reviews
    Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are.
  • 45
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 46
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 47
    Qualys TruRisk Platform Reviews
    Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors.
  • 48
    Archer Reviews

    Archer

    RSA Security

    Based on decades of experience and hundreds upon hundreds of deployments in all areas of risk management. No matter if your organization has an advanced Risk Management function, it can consolidate visibility or start with one area. A platform that is specifically designed for risk analysis and management will help you increase efficiency and coordination among stakeholders. Archer facilitates a common understanding of risks, making it easier for everyone to work together to manage them. The use of the same metrics, policies, and taxonomies to manage all risk data improves visibility, collaboration, and efficiency. Archer is a comprehensive solution for integrated risk management. Get a demo to see it in action. Explore the UI to see how the features, dashboards and capabilities can best address your unique compliance and risk challenges, regardless of whether you use our SaaS or on-premises offering.
  • 49
    Securonix UEBA Reviews
    Many attacks today are designed to evade signature-based defenses such as file hash matching or malicious domain lists. To infiltrate their targets, they use slow and low tactics such as time-triggered or dormant malware. There are many security products on the market that claim to use advanced analytics and machine learning to improve detection and response. All analytics are not created equally. Securonix UEBA uses advanced machine learning and behavior analysis to analyze and correlate interactions among users, systems, applications and data. Securonix UEBA is lightweight, nimble and easy to deploy. It detects advanced insider threats and cloud data compromise. Your security team can respond quickly, accurately, efficiently, and effectively to threats thanks to the built-in automated response playbooks.
  • 50
    SearchLight Reviews

    SearchLight

    Digital Shadows

    SearchLight protects you against external threats by continuously identifying your assets exposed and providing enough context to understand the risk and offer options for remediation. SearchLight is used by hundreds of organizations to reduce their digital risk. While some providers specialize in certain areas such as social media or the dark web, SearchLight's breadth of resources and service is unrivaled. Digital Shadows SearchLight™, a service that integrates with industry leaders, is available to all. We provide end-to-end protection for customers, greater insight into security events and simplified incident processing, allowing organizations to manage all aspects of their digital risk. SearchLight has four main stages. Each stage is an extension of your team. We help you configure your key assets, collect data from difficult-to-reach sources and analyze and identify risk factors to mitigate the impact.
  • Previous
  • You're on page 1
  • 2
  • Next