+
+

Related Products

  • ZeroPath
    2 Ratings
    Visit Website
  • Wiz
    1,088 Ratings
    Visit Website
  • Orca Security
    492 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Astra Pentest
    219 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • Cloudflare
    1,903 Ratings
    Visit Website
  • Aikido Security
    123 Ratings
    Visit Website
  • Safetica
    394 Ratings
    Visit Website

About

Protecting your organization and data is hard work - let us make it easier The CyberSmart app is easily deployed and allows you to get insights into the current security status of all your devices.It takes less than 60 seconds to scan for vulnerabilities and to identify non-conformities in line with Cyber Essentials including: - The operating system is up to date - Antivirus and firewall are installed - The device is securely configured We use technology to automate the search for weaknesses in your system, so you don’t have to do it.Smart software eliminates burdensome checklists. Available for Windows, Mac, Apple App Store and Android. Your cloud-based dashboard is used to manage compliance throughout your organization. You can add new team members, check the compliance status of individual devices and fix issues within the dashboard.

About

Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organisations that want to ensure compliance and security

Audience

Enterprises seeking a software solution to find vulnerabilities and threats in all hardware and firmware components inside their devices

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$49 per user per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberSmart
Founded: 2017
United Kingdom
cybersmart.co.uk

Company Information

Eclypsium
Founded: 2017
United States
eclypsium.com

Alternatives

Alternatives

Runecast

Runecast

Runecast Solutions
Blackberry Spark

Blackberry Spark

BlackBerry

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Integrations

AMI Data Center Manager
Axonius
Cisco Secure Cloud Analytics
Cisco Vulnerability Management
Cloudflare
Jamf Protect
Microsoft Intune
Microsoft System Center
NorthStar Navigator
Okta
Ping Identity
Splunk Cloud Platform
Starling Bank
Tanium
VMware Cloud
VMware ESXi
Workspace ONE

Integrations

AMI Data Center Manager
Axonius
Cisco Secure Cloud Analytics
Cisco Vulnerability Management
Cloudflare
Jamf Protect
Microsoft Intune
Microsoft System Center
NorthStar Navigator
Okta
Ping Identity
Splunk Cloud Platform
Starling Bank
Tanium
VMware Cloud
VMware ESXi
Workspace ONE
Claim CyberSmart and update features and information
Claim CyberSmart and update features and information
Claim Eclypsium and update features and information
Claim Eclypsium and update features and information