+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website

About

C-Prot Threat Intelligence Portal is a powerful web service for providing access to information about cyber threats. C-Prot Threat Intelligence Portal offers the possibility to check different types of suspicious threat indicators such as files, file signatures, IP addresses, or web addresses. In this way, institutions are informed about potential threats and can take necessary precautions. Detect advanced threats using our advanced detection technologies, including dynamic, static, and behavioral analysis, and our global cloud reputation system with the C-Prot Threat Intelligence Portal. Access detailed information on specific malware indicators, as well as the tools, tactics, and attack types used by cyber attackers. Check for different indicators of suspicious threats such as IP address and web address. Understand threat trends and anticipate specific attacks with complete knowledge of your threat environment.

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations looking for a solution to manage and prevent potential threats

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

$30 per node per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

C-Prot
Turkey
www.c-prot.com/en/corporate-products/c-prot-threat-intelligence

Company Information

Defense.com
United States
www.defense.com

Alternatives

Alternatives

ThreatCloud

ThreatCloud

Check Point Software Technologies
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Microsoft 365

Integrations

Microsoft 365
Claim C-Prot Threat Intelligence Portal and update features and information
Claim C-Prot Threat Intelligence Portal and update features and information
Claim Defense.com and update features and information
Claim Defense.com and update features and information