+
+

Related Products

  • Guardz
    106 Ratings
    Visit Website
  • Iru
    1,487 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    191 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    487 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website

About

In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain. Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.

About

Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points. Keep your cloud, IoT, collaboration tools, endpoints, and infrastructure safe. Automate your responses to adapt to the changing security landscape. Integrate with any vendor—and improve efficiency by surfacing only the alerts that matter to you. Minimize the risk of costly breaches by detecting and preventing advanced, targeted, and other evasive attacks in real time. Discover how you can take advantage of actionable insights, comprehensive protection, and extensible architecture.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for an identity threat defense system

Audience

Organizations and enterprises in search of a threat protection solution for their virtual network security needs

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Proofpoint
Founded: 2002
United States
www.proofpoint.com/us/illusive-is-now-proofpoint

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/platform/network-detection-and-response/

Alternatives

Baits

Baits

MokN

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security
ExtraHop RevealX

ExtraHop RevealX

ExtraHop Networks

Categories

Categories

Integrations

Microsoft 365
Microsoft Azure
Amazon Web Services (AWS)
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
CyberArk Privileged Access Manager
Google Cloud Platform
Google Digital Risk Protection
IBM QRadar SIEM
Infoblox DDI
LogRhythm SIEM
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks Next-Generation Firewalls
Splunk Enterprise
Tanium
Trellix Network Security

Integrations

Microsoft 365
Microsoft Azure
Amazon Web Services (AWS)
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
CyberArk Privileged Access Manager
Google Cloud Platform
Google Digital Risk Protection
IBM QRadar SIEM
Infoblox DDI
LogRhythm SIEM
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks Next-Generation Firewalls
Splunk Enterprise
Tanium
Trellix Network Security
Claim Proofpoint Identity Threat Defense and update features and information
Claim Proofpoint Identity Threat Defense and update features and information
Claim Trellix Network Detection and Response (NDR) and update features and information
Claim Trellix Network Detection and Response (NDR) and update features and information