Haystax

Haystax

Haystax Technology
+
+

Related Products

  • Guardz
    87 Ratings
    Visit Website
  • Netwrix Auditor
    297 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • PowerDMARC
    198 Ratings
    Visit Website
  • Hoxhunt
    4,730 Ratings
    Visit Website
  • NINJIO
    391 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine EventLog Analyzer
    179 Ratings
    Visit Website

About

In use by thousands of security professionals across industries and governments, Celerium solutions are changing the way we manage cyber threats. As a community, we need to sift through the quagmire of data to find relevant intelligence. We need to use that intelligence proactively to defend our networks and organizations and make our communities safer. And we need to help each other prioritize the volume of activity to understand the hierarchy of threat actors. With Celerium’s Cyber Defense Network, private and public organizations are proactive about cyber defense, faster to respond to threats and smarter about their response. In order to defend against threats, we must first know what's important. Together we can identify important threats, automate our reaction to those threats and proactively keep our networks and industries safer. Celerium provides a variety of solutions that empower our customers to take a proactive, aggressive stance on cyber security.

About

Our platform analytically monitors threats and prioritizes risk — enabling leaders and operators to act with confidence when it matters most. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses. The result is our on-premises or cloud-based Haystax Analytics Platform for early threat detection, situational awareness and information sharing. Read on to learn more!

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security professionals looking for a solution to protect their infrastructure against data breaches and cyber threats

Audience

IT security teams searching for a powerful platform to monitor threats and prioritizes risk

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Celerium
Founded: 2019
United States
www.celerium.com/solutions

Company Information

Haystax Technology
Founded: 2012
United States
haystax.com/platform/

Alternatives

Alternatives

TopoONE

TopoONE

Crisis24
COBRA

COBRA

Dynamis

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Sophos Firewall
pfSense

Integrations

Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Sophos Firewall
pfSense
Claim Celerium and update features and information
Claim Celerium and update features and information
Claim Haystax and update features and information
Claim Haystax and update features and information