Proofpoint Identity Threat DefenseProofpoint
|
||||||
Related Products
|
||||||
About
In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain.
Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.
|
About
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
Keep your cloud, IoT, collaboration tools, endpoints, and infrastructure safe. Automate your responses to adapt to the changing security landscape. Integrate with any vendor—and improve efficiency by surfacing only the alerts that matter to you. Minimize the risk of costly breaches by detecting and preventing advanced, targeted, and other evasive attacks in real time. Discover how you can take advantage of actionable insights, comprehensive protection, and extensible architecture.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies searching for an identity threat defense system
|
Audience
Organizations and enterprises in search of a threat protection solution for their virtual network security needs
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationProofpoint
Founded: 2002
United States
www.proofpoint.com/us/illusive-is-now-proofpoint
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/platform/network-detection-and-response/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Integrations
Microsoft 365
Microsoft Azure
Amazon Web Services (AWS)
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
CyberArk Privileged Access Manager
Google Cloud Platform
Google Digital Risk Protection
IBM QRadar SIEM
|
Integrations
Microsoft 365
Microsoft Azure
Amazon Web Services (AWS)
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
CyberArk Privileged Access Manager
Google Cloud Platform
Google Digital Risk Protection
IBM QRadar SIEM
|
|||||
|
|
|