+
+

Related Products

  • ManageEngine ADAudit Plus
    480 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    189 Ratings
    Visit Website
  • AdRem NetCrunch
    148 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • Safetica
    394 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,188 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • NINJIO
    411 Ratings
    Visit Website

About

Go beyond static File Integrity Monitoring (FIM). Automate integrity in motion and at rest—in real-time. With eXtended Integrity Monitoring (XIM) from Chainkit. Chainkit detects threats faster and in real-time, which in turn reduces the amount of time that undetected attacks linger in your data. Chainkit dramatically increases the visibility of attacks within your data. It detects anti-forensic tampering techniques that attackers use to evade detection. Chainkit seeks out malware hidden within your data and provides full transparency on tampered logs. Chainkit preserves the integrity of artifacts required by forensic investigators. Chainkit enhances attestation for ISO, NIST and related log or audit trail compliance requirements. Chainkit can help you reach and maintain compliance for all security compliance regulations. We provide customers with a more comprehensive audit-readiness posture.

About

Uncover the stealthiest threats that would otherwise evade detection by using global intelligence from one of the world’s largest cyber intelligence networks combined with local customer context. Aggregate intelligence across multiple control points to identify and prioritize those systems that remain compromised and require immediate remediation. Contain and remediate all the instances of a threat with a single click of a button. Provides in-depth threat visibility across IT environments in one place, without requiring any manual searching. Instant search for Indicators-of-Compromise and visualize all related events of an attack, e.g. all files used in an attack, email addresses and malicious IP addresses involved. Click once to remediate any attack artifact everywhere – across Symantec-protected endpoint, network and email. Quickly isolate any compromised system from the enterprise network.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity solution for organizations wanting to detect invisible data integrity attacks in real-time

Audience

IT security teams that want to uncover, prioritize, investigate and remediate complex attacks across endpoint, network and email from one console

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$50 per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Chainkit
Founded: 2017
United States
chainkit.com

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/solutions/integrated-cyber-defense/advanced-threat-protection

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Alternatives

Tripwire

Tripwire

Fortra

Categories

Categories

Integrations

AppSmart Identity
Aranda Security Compliance
BluVector Advanced Threat Detection
CA Auditor for z/OS
Expel
Getvisibility
GoSecure
Link
NorthStar Navigator
OctoXLabs
Panaseer
Recorded Future
Securonix SOAR
Swimlane
Symantec Endpoint Protection Mobile

Integrations

AppSmart Identity
Aranda Security Compliance
BluVector Advanced Threat Detection
CA Auditor for z/OS
Expel
Getvisibility
GoSecure
Link
NorthStar Navigator
OctoXLabs
Panaseer
Recorded Future
Securonix SOAR
Swimlane
Symantec Endpoint Protection Mobile
Claim Chainkit and update features and information
Claim Chainkit and update features and information
Claim Symantec Advanced Threat Protection and update features and information
Claim Symantec Advanced Threat Protection and update features and information