Related Products
|
||||||
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises looking for a vulnerability testing solution to remediate threats and protect their business processes
|
Audience
Organizations that want to identify and fix risks in their Internet exposed infrastructure
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$11/asset/month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCronus Cyber Technologies
Founded: 2016
Israel
cronus-cyber.com
|
Company InformationCyCognito
Founded: 2017
United States
www.cycognito.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security Features
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
||||||
Integrations
Brinqa
Cisco Vulnerability Management
IBM Security QRadar SIEM
Metasploit
Microsoft 365
Microsoft Entra ID
Microsoft Excel
OWASP ZAP
OpenVAS
PagerDuty
|
Integrations
Brinqa
Cisco Vulnerability Management
IBM Security QRadar SIEM
Metasploit
Microsoft 365
Microsoft Entra ID
Microsoft Excel
OWASP ZAP
OpenVAS
PagerDuty
|
|||||
|
|