DeCYFIR

DeCYFIR

CYFIRMA
+
+

Related Products

  • ManageEngine Log360
    141 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    190 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • PowerDMARC
    244 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • ThriveSparrow
    17 Ratings
    Visit Website

About

We go to the hackers’ trenches, discover, analyze, correlate, and find the deepest insights from noisy data. Receive comprehensive cyber intelligence that covers beyond tactical approach; our insights include management and strategic intelligence that is applicable across the organization. We correlate data against your industry, geography and technology to give you remediation recommendations, prioritized for swift actions. Quality cyber intelligence requires deep technology to decode signals from a multitude of sources. By converting discovery to useful insights, the Threat Visibility and Intelligence module is the essential cybersecurity ammunition to keep any organization’s security posture robust. The threat visibility and Intelligence module is a powerful platform where data is collected, analyzed, correlated against key attributes and presented in a format where both security practitioners and business leaders can take decisive actions.

About

To protect against advanced threats, organizations need to integrate their security and apply the right expertise and processes. Trellix Helix Connect is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Gain comprehensive visibility and control across your entire enterprise by collecting, correlating and analyzing critical data for meaningful threat awareness. Easily integrate security functions without extensive and costly cycles. Make informed and efficient decisions with contextual threat intelligence. Detect advanced threats with machine learning, AI and integrated real-time cyber intelligence. Gain critical context into who is targeting your organization and why. With a smart and adaptive platform, you can predict and prevent emerging threats, identify root causes and respond in real time.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a threat intelligence system

Audience

IT teams and anyone seeking a cloud based solution to manage their security

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CYFIRMA
Founded: 2017
Singapore
www.cyfirma.com/threat-visibility-and-intelligence/

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/helix/

Alternatives

Alternatives

ThreatSync

ThreatSync

WatchGuard

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

ActiveScale
Cyware
DatAnswers
Google Digital Risk Protection
Logsign
Netreo
NorthStar Navigator
ThreatConnect Risk Quantifier (RQ)
Varonis Data Security Platform

Integrations

ActiveScale
Cyware
DatAnswers
Google Digital Risk Protection
Logsign
Netreo
NorthStar Navigator
ThreatConnect Risk Quantifier (RQ)
Varonis Data Security Platform
Claim DeCYFIR and update features and information
Claim DeCYFIR and update features and information
Claim Trellix Helix Connect and update features and information
Claim Trellix Helix Connect and update features and information