Cavalier

Cavalier

Hudson Rock
+
+

Related Products

  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website

About

Cavalier is based on forensic technologies and operational know-how developed at the IDF’s 8200 Unit to counter nation-state adversaries and professional threat actors. It is a unique cybercrime intelligence data source composed of millions of machines compromised in global malware-spreading campaigns. Our high-fidelity data is sourced directly from threat actors and augmented monthly with hundreds of thousands of new compromised machines. Cavalier’s high-fidelity data protects employees, partners, customers, and digital assets with an unprecedented granularity of threat vectors including ransomware, business espionage, breaches & network overtakes. Allows hackers to use existing victims' sessions by importing their cookies and bypassing security measurements. URL accessed by the victim, their login credentials, and plaintext passwords, are used by hackers to hack into employee and user accounts.

About

ThreatBook CTI provides high-fidelity intelligence collected from alerts from real customer cases. Our R&D team uses it as a critical indicator to evaluate our intelligence extraction and quality control work. Meanwhile, we continuously assess the data based on any relevant alerts from timely cyber incidents. ThreatBook CTI aggregates data and information with a clear verdict, behavior conclusions, and intruder portraits. It enables the SOC team to spend less time on irrelevant or harmless activities,boosting the operation's efficiency. The core value of threat intelligence is detection and response, that is, enterprises can carry out compromise detection with high-fidelity intelligence, figuring out if a device has been attacked or if a server has been infected and respond based on the investigation to prevent threats, isolate or avoid risks in a timely manner and reduce the likelihood of serious consequences.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security teams wanting a tool to secure and protect their digital assets from threats

Audience

IT teams wanting a tool to improve cyber threat detection and response

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Hudson Rock
Israel
www.hudsonrock.com/cavalier

Company Information

ThreatBook
Founded: 2015
China
threatbook.io

Alternatives

Alternatives

CleanINTERNET

CleanINTERNET

Centripetal
Cavalier

Cavalier

Hudson Rock
Intel 471 TITAN

Intel 471 TITAN

Intel 471
CleanINTERNET

CleanINTERNET

Centripetal

Categories

Categories

Integrations

JSON

Integrations

JSON
Claim Cavalier and update features and information
Claim Cavalier and update features and information
Claim ThreatBook and update features and information
Claim ThreatBook and update features and information