+
+

Related Products

  • Uniqkey
    181 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • Auth0
    991 Ratings
    Visit Website
  • Astra Pentest
    222 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website
  • Graylog
    385 Ratings
    Visit Website
  • ManageEngine Log360
    140 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website

About

Identify your weak points, secure your environment and monitor your defences. If you want to secure your organization and guarantee compliance with industry regulations, you need Intragen’s four-step approach. Assess your weak points, fortify your environment, test your security, and monitor your system. Founded in 2006, Intragen has delivered hundreds of Identity and Access Management services and has secured some of the biggest brands in the world. Maintain your organization’s integrity by having faith in ours. Security and usability are key to productive systems. Your corporate security and productivity rely on experience and expertise to plan, design and deliver solutions. You shouldn’t waste your own valuable time when Intragen provides security assessments to determine what your current security looks like and where you want to be. Our expert team of consultants have years of experience executing identity and security projects.

About

It takes one click to give an adversary everything they need to access your global environment. Our proven technology and expert teams will evaluate your detective controls to prepare you for real-world threats throughout the cyber kill chain. Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% detection does not exist. So, how can we improve our security controls to better detect attacks across the kill chain? With breach and cyber attack simulation. We deliver a centralized detective control platform that gives organizations the ability to create and execute customized procedures utilizing purpose-built technology and professional human pentesters. Simulate real-world attack behaviors, not just IOC’s, and put your detective controls to the test in a way no other organization can.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations interested in a solution to identify their weak points and secure their environment

Audience

Organizations in need of a breach and attack simulation solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intragen
United Kingdom
www.intragen.com

Company Information

NetSPI
Founded: 2001
United States
www.netspi.com/security-testing/breach-and-attack-simulation/

Alternatives

Alternatives

The OptimalCloud

The OptimalCloud

Optimal IdM
Quantum Armor

Quantum Armor

Silent Breach

Categories

Categories

Integrations

Ping Identity
Ubisecure

Integrations

Ping Identity
Ubisecure
Claim Intragen and update features and information
Claim Intragen and update features and information
Claim NetSPI Breach and Attack Simulation and update features and information
Claim NetSPI Breach and Attack Simulation and update features and information