Infiltrator

Infiltrator

Infiltration Systems
+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    82 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    189 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,188 Ratings
    Visit Website
  • Adaptive Security
    82 Ratings
    Visit Website
  • DataDome
    221 Ratings
    Visit Website
  • ThreatLocker
    496 Ratings
    Visit Website
  • ManageEngine Log360
    134 Ratings
    Visit Website
  • SpamTitan
    814 Ratings
    Visit Website

About

The Cyber adAPT NTD (Network Threat Detection) platform provides immediate, automated and contextual information that categorizes the risk and urgency of the threat. With comprehensive visibility combined with speed-to-detection, enterprises are able to identify threats and respond immediately to effectively and efficiently remediate attacks before damage occurs. The Cyber adAPT NTD best in class approach utilizes patented software to identify the infiltration, scanning, and exploitation of network traffic finding threats that other solutions miss. ​Using unique and cutting-edge intellectual property to find, analyze, and identify the latest attacks updating our systems in the field continuously. Easy to deploy, use and maintain. The Cyber adAPT NTD automates the most tedious and time-consuming processes. Cyber adAPT offers access to its cybersecurity professionals through optional consulting services.

About

Infiltrator is a free easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also comes with over 15 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more!

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for an in-network threat detection solution to identify threats and respond immediately

Audience

Enterprises searching for a solution to scan, audit, and secure their network

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cyber adAPT
Founded: 2015
United States
www.cyberadapt.com

Company Information

Infiltration Systems
www.infiltration-systems.com

Alternatives

Alternatives

SmartFlow

SmartFlow

Solana Networks
Check Point Quantum Network Security

Check Point Quantum Network Security

Check Point Software Technologies
MODRET

MODRET

Scientific Software Group

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

No info available.

Integrations

No info available.
Claim Cyber adAPT and update features and information
Claim Cyber adAPT and update features and information
Claim Infiltrator and update features and information
Claim Infiltrator and update features and information