+
+

Related Products

  • ZeroPath
    2 Ratings
    Visit Website
  • Wiz
    1,088 Ratings
    Visit Website
  • Orca Security
    492 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Astra Pentest
    219 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • Cloudflare
    1,903 Ratings
    Visit Website
  • Aikido Security
    123 Ratings
    Visit Website
  • Safetica
    394 Ratings
    Visit Website

About

Protecting your organization and data is hard work - let us make it easier The CyberSmart app is easily deployed and allows you to get insights into the current security status of all your devices.It takes less than 60 seconds to scan for vulnerabilities and to identify non-conformities in line with Cyber Essentials including: - The operating system is up to date - Antivirus and firewall are installed - The device is securely configured We use technology to automate the search for weaknesses in your system, so you don’t have to do it.Smart software eliminates burdensome checklists. Available for Windows, Mac, Apple App Store and Android. Your cloud-based dashboard is used to manage compliance throughout your organization. You can add new team members, check the compliance status of individual devices and fix issues within the dashboard.

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organisations that want to ensure compliance and security

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$49 per user per month
Free Version
Free Trial

Pricing

$30 per node per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberSmart
Founded: 2017
United Kingdom
cybersmart.co.uk

Company Information

Defense.com
United States
www.defense.com

Alternatives

Alternatives

Runecast

Runecast

Runecast Solutions
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Microsoft 365
Starling Bank

Integrations

Microsoft 365
Starling Bank
Claim CyberSmart and update features and information
Claim CyberSmart and update features and information
Claim Defense.com and update features and information
Claim Defense.com and update features and information