Adept Secure

Adept Secure

Adept Technologies
Dhound

Dhound

IDS Global
+
+

Related Products

  • ThreatLocker
    478 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,088 Ratings
    Visit Website
  • Guardz
    87 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • Action1
    593 Ratings
    Visit Website
  • NinjaOne
    3,071 Ratings
    Visit Website
  • Kandji
    1,297 Ratings
    Visit Website
  • Syncro
    450 Ratings
    Visit Website
  • Cisco Duo
    1,360 Ratings
    Visit Website

About

The rush to be first to market in application development, and the leveraging of open-source technology has created a hacker’s paradise. The Unites States of America and its allies are the target of an unprecedented amount of cyber terror attacks. Hacking, cracking, kill chains, zero-day attacks, ransomware, denial of service and other cyberattacks have reached levels of sophistication surpassing the capabilities of most organizations to defend against. On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in Ukraine. In addition, there have also been reports of malware found in Ukrainian companies in a variety of critical infrastructure sectors. Public reports indicate that the Black Energy (BE) malware has been discovered on numerous power companies’ computer networks.

About

Your business is linked to critical infrastructure or sensitive data, and you understand the cost of a vulnerability that an attacker can find. You work under security regulations stated by the law to take certain security measures (i.e. SOC2, HIPAA, PCI DSS, etc.) and are required to conduct pentests by a third-party company. Your clients claim partnership only with reliable and secure solutions, and you keep your promises, guaranteeing your system security with the results of penetration testing. Pen test is an imitation of a real hacking attack but performed by security knights who fight for your web security with noble intentions. We conduct Penetration testing (also known as pen test or ethical hacking) so you can breathe out and be confident your system in safe hands. Unlike vulnerability assessment, ethical hacking at Dhound not just seeks vulnerabilities. It would be too easy for us. To stay ahead of adversaries, we apply hackers’ mindset and techniques but no worry!

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises searching for a cybersecurity solution to protect their systems against all the latest cyber-based threats

Audience

Companies and individuals seeking a tool to find cracks in their web and mobile application security

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$30 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Adept Technologies
www.adepttech.com/adeptsecure.html

Company Information

IDS Global
Founded: 2014
United Kingdom
dhound.io

Alternatives

BUFFERZONE

BUFFERZONE

Bufferzone Security

Alternatives

Dhound

Dhound

IDS Global
RAV Endpoint Protection

RAV Endpoint Protection

Reason Cybersecurity

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Website Monitoring Features

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

Integrations

NVIDIA AI Foundations
WordPress

Integrations

NVIDIA AI Foundations
WordPress
Claim Adept Secure and update features and information
Claim Adept Secure and update features and information
Claim Dhound and update features and information
Claim Dhound and update features and information