What Integrates with ThreatConnect Risk Quantifier (RQ)?
Find out what ThreatConnect Risk Quantifier (RQ) integrations exist in 2024. Learn what software and services currently integrate with ThreatConnect Risk Quantifier (RQ), and sort them by reviews, cost, features, and more. Below is a list of products that ThreatConnect Risk Quantifier (RQ) currently integrates with:
-
1
Cisco Umbrella
Cisco
1,110 RatingsAre you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement. -
2
Twilio
Twilio
$0.0085 per min 1,246 RatingsUse the language you already love to prototype ideas quickly, develop production-ready communications applications, and run serverless applications on one API-powered platform. Twilio is a single fully-programmable platform with flexible APIs for any channel, built-in intelligence, and global infrastructure to support you at scale. Quickly integrate powerful APIs to start building solutions for SMS and WhatsApp messaging, voice, video, and email. Browse documentation and SDKs in multiple coding languages, including Ruby, Python, PHP, Node.js, java, and C#, or jumpstart your first project with our open source code templates to quickly build production-ready communications apps. Consult our community of over 9 million developers for guidance and inspiration on your next project. Sign up and start building today. -
3
The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
-
4
Powerful Security Information and Event Management (SIEM) Cyberattacks are a 24/7 fact. The attack surface is growing exponentially due to the complexity and growth in the enterprise estate - Infrastructure and Applications, VMs, Cloud, Endpoints, and IoT. Security becomes everyone's problem when there is a shortage of skills and limited resources. However, visibility, event correlation, and remediation are all the responsibility of others. Security management requires visibility. This includes all devices and infrastructure in real-time. But also context. What devices are a threat? What is their capability to manage the threat that your business faces. Not the noise multiple security tools make. Security management gets more complicated. Endpoints, IoT and Infrastructure, Security Tools, Applications and VM's, Cloud - there are so many things to protect and monitor that it is becoming increasingly difficult.
-
5
Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
-
6
Sumo Logic
Sumo Logic
$270.00 per month 2 RatingsSumo Logic is a cloud-based solution for log management and monitoring for IT and security departments of all sizes. Integrated logs, metrics, and traces allow for faster troubleshooting. One platform. Multiple uses. You can increase your troubleshooting efficiency. Sumo Logic can help you reduce downtime, move from reactive to proactive monitoring, and use cloud-based modern analytics powered with machine learning to improve your troubleshooting. Sumo Logic Security Analytics allows you to quickly detect Indicators of Compromise, accelerate investigation, and ensure compliance. Sumo Logic's real time analytics platform allows you to make data-driven business decisions. You can also predict and analyze customer behavior. Sumo Logic's platform allows you to make data-driven business decisions and reduce the time it takes to investigate operational and security issues, so you have more time for other important activities. -
7
Cybereason
Cybereason
2 RatingsTogether, we can stop cyber attacks at every stage of the battle, from the enterprise to the endpoint. Cybereason provides high-fidelity convictions and visibility of known and unknown threats, so that defenders can harness the power of true prevention. Cybereason provides deep context and correlations across the entire network to enable threat hunters to detect and deter stealthy operations. Cybereason dramatically reduces the time it takes for defenders investigate and resolve attacks using both automated and guided remediation. Cybereason analyzes over 80 million events per second, which is 100x more than other solutions available. To eliminate emerging threats in minutes, rather than days, reduce investigation time by up to 93%. -
8
DomainTools
DomainTools
2 RatingsConnect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface. -
9
Splunk Cloud Platform
Splunk
1 RatingSplunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance. -
10
VMware Carbon Black EDR
Broadcom
1 RatingThreat hunting and incident response solutions provide continuous visibility in offline, disconnected, and air-gapped environments using threat intelligence and customizable detections. You can't stop something you don't see. Investigative tasks that normally take days or weeks can now be completed in minutes. VMware Carbon Black®, EDR™, collects and visualizes detailed information about endpoint events. This gives security professionals unprecedented visibility into their environments. Never hunt the same threat twice. VMware Carbon Black EDR is a combination of custom and cloud-delivered threat intelligence, automated watchlists, and integrations with other security tools to scale your hunt across large enterprises. No more need to reimagine your environment. In less than an hour, an attacker can compromise your environment. VMware Carbon Black EDR gives VMware the ability to respond and correct in real-time from anywhere in the world. -
11
Your team is exceptional and operates at a speed that only the best minds can match. Why is product development so slow? Project drift is the leading cause of project delays. It's a complicated process. Designs can be complicated, teams are scattered, and everyone is busy. The work is often invisible. Is your project management tool ensuring everyone is moving the critical work forward? Complex problems require powerful tools. Playbook is that tool. It makes project information visible, actionable, and predictable so you can get there on-time, every time.
-
12
The world's most important organizations are empowered to manage and protect mission-critical networks. Our data model is able to collect new, ad-hoc information on the fly in seconds. This allows customers, partners, and Tanium to quickly build capabilities on this extensible platform. Our unique architecture collects and distributes data to millions in seconds with no infrastructure. Allow decision-making right where data is generated: at the endpoint. Our agent uses minimal endpoint resources and bandwidth, while fitting on the firmware for the smallest chips. Tanium can expand your capabilities without expanding its footprint. Our platform is best demonstrated in action. This is how we have found customers can understand what we do. Tanium's CEO and co-founder Orion Hindawi will lead you through a keyboard tour to demonstrate the power of Tanium. Instantly track down every IT asset that you own.
-
13
Apache Kafka
The Apache Software Foundation
1 RatingApache Kafka®, is an open-source distributed streaming platform. -
14
Jira Service Management
Atlassian
$20 per user per month 6 RatingsJira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change. -
15
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
16
PagerDuty
PagerDuty
44 RatingsPagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits. -
17
Microsoft 365
Microsoft
$5 per user per month 103 RatingsMicrosoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you -
18
Slack
Slack
$6.67 per user per month 241 RatingsSlack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging. -
19
Zoom
Zoom Communications
$14.99 per user per month 571 RatingsZoom Meetings & Chat allows for enterprise video conferencing that includes real-time messaging and content sharing. Video conferencing and messaging made easy across all devices. Facilitate adoption with meeting capabilities that make it simple to join, start, and collaborate on any device. Zoom Meetings syncs to your calendar system and provides enterprise-grade video conferencing on both mobile and desktop. All-hands meetings, internal and external communications, trainings, and all-hands meetings can all be done through one platform. With support for up to 1000 participants and 49 videos per screen, HD video and audio can be added to your meetings. Multi-participants can share their screens simultaneously, and co-annotate to make it more interactive. End-to-end encryption of all meetings, role-based security, password protection and waiting rooms. You can also place attendees on hold. You can record your meetings locally or to cloud with searchable transcripts. Zoom offers HIPAA-compliant healthcare plans. -
20
Jira
Atlassian
Free 44 RatingsJira is a project management tool that allows you to plan and track the work of your entire team. Atlassian's Jira is the #1 tool for software development teams to plan and build great products. Jira is trusted by thousands of teams. It offers a range of tools to help plan, track, and release world-class software. It also allows you to capture and organize issues, assign work, and follow team activity. It integrates with leading developer software for end-toend traceability. Jira can help you break down big ideas into manageable steps, whether they are small projects or large cross-functional programs. Organize your work, create milestones and dependencies, and more. Linking work to goals allows everyone to see how their work contributes towards company objectives, and to stay aligned with what's important. Your next step, suggested by AI. Atlassian Intelligence automatically suggests tasks to help you get your big ideas done. -
21
Malwarebytes
Malwarebytes
$47.22 per user per year 12 RatingsCyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus. -
22
Microsoft Teams
Microsoft
$12.50 per user per month 188 RatingsTeams of engaged people work together to solve today's complex business challenges. We have created an online guide to help you and your team learn the secrets of teamwork. There are no limits to what you can accomplish when you have a place where you can create and make decisions together as a team. Teams allows you to bring everything together in one shared workspace. You can chat, meet, share documents, and use business apps. Your team can get on the same page using group chat, online meetings and calling. Microsoft 365 (formerly Office 365), apps such as Word, Excel, PowerPoint and SharePoint allow you to collaborate on files. To keep your business moving forward, add in your favorite Microsoft apps as well as third-party services. Microsoft 365 provides end-to-end security and administrative control. Teams is for all types of groups. Start with the no-obligation, free version. As part of the best-in class suite of productivity tools, you can also get Team. -
23
CrowdStrike Falcon
CrowdStrike
8 RatingsThe Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful. -
24
You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
-
25
Symantec Endpoint Protection
Broadcom
2 RatingsSymantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft. -
26
Palo Alto Networks NGFW
Palo Alto Networks
2 RatingsOur ML-Powered physical appliances allow you to see everything, including IoT and reduce errors through automatic policy recommendations. VM-Series is the virtualized version our ML-Powered NGFW. It protects both your private and public clouds with segmentation and proactive threats prevention. CN-Series is the containerized version our ML-Powered NGFW that prevents sophisticated network-based threats spreading beyond Kubernetes boundaries. -
27
Trellix Endpoint Security HX performs targeted, fast forensic investigations on thousands of endpoints. Protect and empower your employees with an integrated security system that protects all endpoints. Trellix Endpoint Security Solutions apply proactive threat intelligence, defenses and protections across the entire attack cycle to keep your organization more resilient and safer. Keep your endpoints safe in today's dynamic threats landscape. Discover how our integrated suites of endpoint protection technology can help you monitor threats and avert them by combining machine learning and actionable intelligence. Endpoint security is a practice that involves safeguarding data and workflows on the devices that connect to the network. Endpoint protection platforms (EPPs) examine files as they enter your network.
-
28
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust. -
29
Microsoft Defender Antivirus
Microsoft
2 RatingsMicrosoft Defender Antivirus, the next-generation protection component for Microsoft Defender for Endpoint, is Microsoft Defender Antivirus. This protection combines machine learning, big data analysis, threat resistance research, and the Microsoft Cloud Infrastructure to protect devices within your enterprise. Next-generation protection services will include the following capabilities. Behavior-based, real-time, and heuristic protection includes always-on scanning using file- and process behavior monitoring and other Heuristics (also known to be real-time protection). It includes blocking and detecting apps that might not be considered malware but are unsafe. Cloud-delivered protection includes near-instant detection of emerging threats and blocking them, dedicated protection, and product updates. This includes updates related to Microsoft Defender Antivirus. -
30
ServiceNow
ServiceNow
$100 per month 1 RatingDigitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise. -
31
LogRhythm SIEM
Exabeam
We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost. -
32
Mandiant Threat Intelligence
Mandiant
Mandiant Threat Intelligence module gives organizations of all sizes visibility to the latest threats right from the frontlines. Get started today. Mandiant Threat Intelligence provides security professionals unparalleled visibility and expertise into the threats that are important to their business. Over 300 intelligence and security professionals from 22 countries have compiled our threat intelligence. They have conducted undercover adversarial searches, malicious infrastructure reconstructions, and actor identification processes. This knowledge is part of the Mandiant Intel Grid. Threat Intelligence can either be delivered as a technology or operated side-by-side by your team. You can improve your defenses by understanding the motivations, behaviors, and cybercrime actors that target your organization. -
33
WatchTower Security Management App
Check Point
You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface. -
34
Multi-Domain Security Management
Check Point
Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains. -
35
ServiceNow Security Operations
ServiceNow
Use SOAR (security orchestration automation and response) and risk-based vulnerability control to overcome threats and vulnerabilities. Say hello to a secure digital transformation. Smart workflows and context help you speed up incident response. MITRE ATT&CK can be used to investigate threats and close any gaps. Risk-based vulnerability management can be applied to your infrastructure and applications. Collaborative workspaces are a great way to manage IT risks and remediate them. With role-based dashboards, reporting and analytics, you can get an executive view of key metrics. Increase visibility into your security posture, team performance, and other key metrics. Security Operations groups key applications in scalable packages that can adapt to your changing needs. You can quickly identify and prioritize high-impact threats and assess your security status in real time. Collaboration workflows and repeatable processes in security, risk and IT allow you to respond faster. -
36
AlienVault USM
AT&T Cybersecurity
AlienVault®, Unified Security Management®, (USM), is used by hundreds of MSSPs around the world to create successful managed security and compliance services. AlienVault USM provides multiple security capabilities and continuously updated threat intelligence in one platform. It allows MSSPs to centralize threat detection, incident response and compliance management across both cloud and on-premises environments. AlienVault USM was designed to meet the needs of today's dynamic MSSP market. It is highly scalable and cost-effective and easy to deploy and maintain. It allows MSSPs to quickly grow their managed security service offerings to meet customer security goals and minimize their risk and expense. -
37
Exabeam
Exabeam
From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools. Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products. -
38
VMRay
VMRay
VMRay provides technology partners and enterprises worldwide with the best-in-class, scalable and automated malware analysis and detection systems that significantly reduce their vulnerability to malware-related threats and attacks. -
39
ZeroFox
ZeroFox
Social media and digital presence are a major part of many people's engagement strategies. Organizations spend a lot of money on them. Security teams must be able to understand and address the risks presented by digital platforms, which are the largest unsecured IT network on the planet. This 2 minute overview video will show you how ZeroFox Platform works. The ZeroFox Platform protects your brand, cyber, and physical security on social media and digital platforms. You can assess your organization's digital risk exposure on a wide range of platforms where cyberattacks occur. The ZeroFox mobile app puts the powerful protection of ZeroFox at your fingertips wherever and whenever you need. -
40
Infoblox DDI
Infoblox
The Internet of Things (IoT) is rapidly changing the network landscape. This is due to trends in hybrid and multicloud migration, security and SDN, NFV and IPv6 adoption. All organizations need specialized solutions to simplify and optimize the network management tasks of DNS, DHCP, and IP address management. These critical network services are collectively known as DDI and make all network interactions possible. Infoblox appliances and applications are uniquely able support all your DDI needs, both now and in the future. You need to centralize control over advanced DDI services at your site while seamlessly integrating with cloud or virtualization platforms. We've got you covered. You can dramatically improve the network in branch and remote locations by managing DDI in cloud. Check. You want to see all network assets across the infrastructure in one place? You got it. You can do DDI. -
41
Tenable One
Tenable
Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring. -
42
Transform your security infrastructure into a collaborative platform. Operationalize threat intelligence data real-time, providing protection to all points of your enterprise in the event of new threats. Use Data Exchange Layer (DXL), to instantly share threat information to all connected security systems, even third-party solutions. Unknown files can be detected for faster protection and lower costs. Broader threat intelligence allows for more accurate file execution decisions. Policies can be customized based on risk tolerance. You can make better decisions to handle potentially malicious and never-before-seen files. You can combine threat information from Trellix Global Threat Intelligence, third-parties, and locally collected data from security solutions and share it. DXL, an open communication framework, connects disparate security products. Real-time security intelligence shared among endpoint, gateway and network security solutions.
-
43
Fidelis Network
Fidelis Security
Advanced threats require deep inspection, extraction and analysis of all content moving across the wire in real time. Fidelis network detection & response bi-directionally scans all protocols and ports to collect rich metadata that can be used for machine-learning and other powerful machine-learning analyses. You can have full visibility and network coverage with direct, internal, web, and email sensors. To help security teams stay ahead of the curve, identified attacker TTPs are mapped against MITRE ATT&CK™. Threats can hide, but they can't run. To map your cyber terrain, automatically profile and classify IT assets. This includes legacy systems, enterprise IoT, and shadow IT. Integrating with Fidelis' endpoint response and detection solution, you can create a software asset inventory that is correlated with known vulnerabilities, including CVE and KB Links, as well security hygiene for patches, and endpoint status. -
44
Qualys WAS
Qualys
A robust cloud solution that continuously discovers web apps and detects vulnerabilities and misconfigurations. It's fully cloud-based and easy to deploy and maintain. It can scale to millions of assets. WAS catalogs all web applications in your network, even unknown ones. It scales from a few apps to thousands. Qualys WAS allows you to tag your apps with your own labels. These labels can be used to control reporting and limit access. WAS' dynamic deep scan covers all apps within your perimeter, your internal environment, under active development, and APIs that support mobile devices. It can also be used to detect vulnerabilities such as SQLi and XSS in public cloud instances. Supported are complex, progressive, and authenticated scans. WAS supports programmatic scanning of SOAP API services and REST API services. This allows WAS to test IoT services as well as APIs used in mobile apps and modern mobile architectures. -
45
Censys
Censys
Censys Attack Surface Management is a continuous discovery tool that uncovers unknown assets, from Internet services to cloud storage buckets. It also comprehensively checks all public-facing assets for security or compliance issues regardless of their location. Cloud services allow companies to be agile and innovative, but they also expose them to security risks from hundreds of cloud accounts and projects that span dozens more providers. Non-IT employees frequently create unmanaged cloud accounts, resulting in blind spots for security teams. Censys ASM provides comprehensive security coverage for all your Internet assets, regardless of where they are located or what account they are. Censys continuously uncovers unknown assets, ranging from Internet service to storage buckets. It provides you with an inventory and security problem analysis of all public-facing assets. -
46
Check Point Infinity
Check Point
In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud. -
47
Check Point IPS
Check Point IPS
Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are. -
48
Qualys TruRisk Platform
Qualys
$500.00/month Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors. -
49
Archer
RSA Security
Based on decades of experience and hundreds upon hundreds of deployments in all areas of risk management. No matter if your organization has an advanced Risk Management function, it can consolidate visibility or start with one area. A platform that is specifically designed for risk analysis and management will help you increase efficiency and coordination among stakeholders. Archer facilitates a common understanding of risks, making it easier for everyone to work together to manage them. The use of the same metrics, policies, and taxonomies to manage all risk data improves visibility, collaboration, and efficiency. Archer is a comprehensive solution for integrated risk management. Get a demo to see it in action. Explore the UI to see how the features, dashboards and capabilities can best address your unique compliance and risk challenges, regardless of whether you use our SaaS or on-premises offering. -
50
Trellix Helix Connect
Trellix
To protect themselves against advanced threats, organisations need to integrate security and apply the correct expertise and processes. Trellix Helix Connect, a cloud-hosted platform for security operations, allows organizations to control any incident from alert through to fix. By collecting, correlating, and analyzing vital data to create meaningful threat awareness across your entire organization, you can gain comprehensive visibility and control. Integrate security functions easily without expensive and lengthy cycles. Contextual threat intelligence helps you make informed and efficient decisions. Machine learning, AI, and real-time cyber intelligence can detect advanced threats. Get critical context on who is targeting your company and why. With a smart, adaptive platform, you are able to predict and prevent emerging threats. You can also identify root causes, and respond in real-time.