opConfig

opConfig

FirstWave
+
+

Related Products

  • Orca Security
    493 Ratings
    Visit Website
  • Wiz
    1,101 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website
  • Guardz
    105 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • Criminal IP ASM
    14 Ratings
    Visit Website
  • ManageEngine Log360
    140 Ratings
    Visit Website

About

Our advanced patent-pending graph-based technology enables proactive discovery and remediation of known and unknown threats. Whether it's a misconfiguration, weak configuration, over-permissive policy, or a CVE, we empower your teams to address and eliminate all threats to your cloud stack. Prioritization of the most critical issues means your team can focus on what matters most. Our root cause analysis dramatically reduces the number of alerts and general findings, enabling teams to address those that are most crucial. Protect your cloud environment while advancing along the digital transformation. It correlates between the Kubernetes layer to the cloud layer and integrates seamlessly with your existing workflow. Get a rapid visual assessment of your cloud environment using known cloud vendor APIs, from the infrastructure level down to the single microservice level.

About

opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPAA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity platform for companies wanting to prioritize and remediate any threat to their cloud stack

Audience

Enterprises looking to automate their operations through a configuration and compliance management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Lightspin
Founded: 2020
Israel
www.lightspin.io

Company Information

FirstWave
Founded: 2010
United States
firstwave.com/products/opconfig/

Alternatives

Alert Logic

Alert Logic

Fortra

Alternatives

WeConfig

WeConfig

Westermo
CySight

CySight

IdeaData
Quadrant XDR

Quadrant XDR

Quadrant Information Security
Cisco ACI

Cisco ACI

Cisco

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Kubernetes
Microsoft Azure
opFlow

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Kubernetes
Microsoft Azure
opFlow
Claim Lightspin and update features and information
Claim Lightspin and update features and information
Claim opConfig and update features and information
Claim opConfig and update features and information