+
+

Related Products

  • Guardz
    87 Ratings
    Visit Website
  • Netwrix Auditor
    297 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • PowerDMARC
    198 Ratings
    Visit Website
  • Hoxhunt
    4,730 Ratings
    Visit Website
  • NINJIO
    391 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine EventLog Analyzer
    179 Ratings
    Visit Website

About

In use by thousands of security professionals across industries and governments, Celerium solutions are changing the way we manage cyber threats. As a community, we need to sift through the quagmire of data to find relevant intelligence. We need to use that intelligence proactively to defend our networks and organizations and make our communities safer. And we need to help each other prioritize the volume of activity to understand the hierarchy of threat actors. With Celerium’s Cyber Defense Network, private and public organizations are proactive about cyber defense, faster to respond to threats and smarter about their response. In order to defend against threats, we must first know what's important. Together we can identify important threats, automate our reaction to those threats and proactively keep our networks and industries safer. Celerium provides a variety of solutions that empower our customers to take a proactive, aggressive stance on cyber security.

About

Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security professionals looking for a solution to protect their infrastructure against data breaches and cyber threats

Audience

Enterprises looking for proactive cyber defense with targeted and actionable threat intelligence: Retail, eCommerce, Finance, Media, Gaming, Entertainment, and other digital enterprises

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Celerium
Founded: 2019
United States
www.celerium.com/solutions

Company Information

Cyberint
Founded: 2011
Israel
cyberint.com

Alternatives

Alternatives

Qualys VMDR

Qualys VMDR

Qualys
Tenable One

Tenable One

Tenable

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Integrations

Axonius
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cortex XSOAR
IBM QRadar SIEM
Jira
Microsoft Entra ID
Multi-Domain Security Management
Okta
Samplead
Siemplify
Sophos Firewall
Splunk IT Service Intelligence
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App
pfSense

Integrations

Axonius
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cortex XSOAR
IBM QRadar SIEM
Jira
Microsoft Entra ID
Multi-Domain Security Management
Okta
Samplead
Siemplify
Sophos Firewall
Splunk IT Service Intelligence
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App
pfSense
Claim Celerium and update features and information
Claim Celerium and update features and information
Claim Cyberint Argos Platform and update features and information
Claim Cyberint Argos Platform and update features and information