+
+

Related Products

  • ThreatLocker
    502 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

About

alphaMountain’s domain and IP threat intelligence powers many of the world’s leading cybersecurity solutions. High-fidelity threat feeds are updated hourly with fresh URL classification, threat ratings and actionable intelligence on over 2 billion hosts including domains and IP addresses. KEY BENEFITS: Get high-fidelity URL classification and threat ratings for any URL from 1.00 to 10.0. Receive fresh categorization and threat ratings updated every hour, syndicated via API or threat feed. See threat factors and other intelligence contributing to threat verdicts. USE CASES: Use threat feeds in your network security products such as secure web gateway, secure email gateway or next-generation firewall. Call the alphaMountain API from your SIEM to investigate threats or from your SOAR to automate responses such as blocking and policy updates. Detect if a URL is suspicious, contains malware, is a phishing site and which of 89 content categories the site belongs to.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Audience

Security Architects, Threat Analysts, Network Security Engineers, Threat Researchers and cybersecurity product leaders.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

No images available

Pricing

$30 per node per month
Free Version
Free Trial

Pricing

$300/month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Defense.com
United States
www.defense.com

Company Information

alphaMountain AI
Founded: 2022
United States
www.alphamountain.ai

Alternatives

Alternatives

CleanINTERNET

CleanINTERNET

Centripetal
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Cisco SecureX
Cyware
Datastreamer
FortiSOAR
Maltego
Microsoft 365
Mindflow
Splunk Enterprise Security
Sumo Logic
ThreatQ
Tines

Integrations

Cisco SecureX
Cyware
Datastreamer
FortiSOAR
Maltego
Microsoft 365
Mindflow
Splunk Enterprise Security
Sumo Logic
ThreatQ
Tines
Claim Defense.com and update features and information
Claim Defense.com and update features and information
Claim alphaMountain Threat Intelligence APIs and Feeds and update features and information
Claim alphaMountain Threat Intelligence APIs and Feeds and update features and information