Related Products
|
||||||
About
Perform continuous scans all year round, valid for both vulnerability management and penetration testing to stay on top of your network’s security 24/7. See live map and get real-time alerts on current threats to your business processes. Cybot can be deployed globally and showcase global Attack Path Scenarios so you can see how a hacker can hop from a workstation in the UK to a router in Germany to a database in the US. This capability is unique both for penetration testing as well as for vulnerability management. The various CyBot Pros will be managed by a single enterprise dashboard. CyBot brings context to each asset it scans, checking how it could affect a business process. In this way, you can funnel all your vulnerabilities and first focus on those that are exploitable and that are a part of an attack path to a critical asset or business process. This greatly reduces the resources needed for patching and ensures business continuity.
|
About
TrustMeter collects information from your network via active throttled scanning and pulls identity information from Active Directory, cloud computing services (AWS, Azure, GCP) and other identity providers. Using this information, TrustMeter discovers the managed and unmanaged assets in your network, classifying them as clients, servers or cloud hosts. A TrustMeter report gives details overall exposure level while providing detailed insights into network topology. Scan a network from the data center to identify problematic network paths. Scan the network from an internal host to give you complete visibility into assets accessible from a single machine inside the network.
|
About
Active scanning, passive discovery, and API integrations unite in one powerful platform to deliver complete visibility into managed and unmanaged assets across IT, OT, IoT, cloud, mobile, and remote environments. Some CAASM solutions rely solely on integrations to inventory your network, but those other tools are notoriously incomplete because they rely on existing sources. runZero combines our own active scanning and passive discovery with integrations so you see absolutely everything. Our unique, safe scanning technology creatively gathers data points just like an attacker would, extracting asset details to deliver mind-blowing, in-depth fingerprinting and insights into OSs, services, hardware, and more. runZero surfaces all sorts of things you had no idea were on your network, like unmanaged and unpatched assets, misconfigured and abandoned cloud resources, rogue OT devices, and unknown subnets.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Enterprises looking for a vulnerability testing solution to remediate threats and protect their business processes
|
Audience
IT teams looking for an Attack Surface Management platform
|
Audience
Organizations and enterprises interested in a solution to find and fix security exposures
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5,000 for 500 assets
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCronus Cyber Technologies
Founded: 2016
Israel
cronus-cyber.com
|
Company InformationZero Networks
Founded: 2019
Israel
zeronetworks.com/trustmeter/
|
Company InformationrunZero
United States
www.runzero.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Integrations
Active Directory
Amazon Web Services (AWS)
Censys
CrowdStrike Falcon
Google Cloud Platform
Google Workspace
Microsoft Azure
Microsoft Defender XDR
Microsoft Intune
Nessus
|
Integrations
Active Directory
Amazon Web Services (AWS)
Censys
CrowdStrike Falcon
Google Cloud Platform
Google Workspace
Microsoft Azure
Microsoft Defender XDR
Microsoft Intune
Nessus
|
Integrations
Active Directory
Amazon Web Services (AWS)
Censys
CrowdStrike Falcon
Google Cloud Platform
Google Workspace
Microsoft Azure
Microsoft Defender XDR
Microsoft Intune
Nessus
|
||||
|
|
|
|