+
+

Related Products

  • ThreatLocker
    496 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • SOCRadar Extended Threat Intelligence
    82 Ratings
    Visit Website
  • ManageEngine Log360
    134 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    189 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • Wiz
    1,088 Ratings
    Visit Website

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

About

Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Audience

Companies and individuals seeking a solution to reduce attack surface, detect threats and automate deep investigation

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$30 per node per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Defense.com
United States
www.defense.com

Company Information

Optiv
Founded: 2015
United States
www.optiv.com/services/managed-services/managed-extended-detection-response

Alternatives

Alternatives

AirCISO

AirCISO

Airiam
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Microsoft 365
Armis Centrix
Aruba Cloud
BeyondTrust Endpoint Privilege Management
Check Point Infinity
Cisco Duo
Exabeam
ExtraHop RevealX
Forcepoint Behavioral Analytics
Global Risk Exchange
Keysight Application Threat Intelligence
Netskope
Okta
Ping Identity
Tenable One
Tines
VMware Cloud

Integrations

Microsoft 365
Armis Centrix
Aruba Cloud
BeyondTrust Endpoint Privilege Management
Check Point Infinity
Cisco Duo
Exabeam
ExtraHop RevealX
Forcepoint Behavioral Analytics
Global Risk Exchange
Keysight Application Threat Intelligence
Netskope
Okta
Ping Identity
Tenable One
Tines
VMware Cloud
Claim Defense.com and update features and information
Claim Defense.com and update features and information
Claim Optiv Managed XDR and update features and information
Claim Optiv Managed XDR and update features and information