+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    76 Ratings
    Visit Website
  • Guardz
    99 Ratings
    Visit Website
  • Resolver
    273 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • ThreatLocker
    492 Ratings
    Visit Website
  • Wiz
    1,062 Ratings
    Visit Website
  • Cloudflare
    1,882 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • NinjaOne
    3,904 Ratings
    Visit Website

About

Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.

About

Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for proactive cyber defense with targeted and actionable threat intelligence: Retail, eCommerce, Finance, Media, Gaming, Entertainment, and other digital enterprises

Audience

IT teams and IT security professionals

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cyberint
Founded: 2011
Israel
cyberint.com

Company Information

Sysdig
Founded: 2013
United States
sysdig.com/products/secure/

Alternatives

Alternatives

Lacework

Lacework

Fortinet
Aqua

Aqua

Aqua Security
Tenable One

Tenable One

Tenable

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Integrations

Anitian FedRAMP Comprehensive
Axonius
Azure Marketplace
Chainguard
Cortex XSOAR
Falco
IBM Cloud Pak for Watson AIOps
IBM QRadar SIEM
Kubernetes
Microsoft Entra ID
Multi-Domain Security Management
Open Container Initiative (OCI)
Opsera
Ozone
Prometheus
Samplead
Squadcast
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App
Zenduty

Integrations

Anitian FedRAMP Comprehensive
Axonius
Azure Marketplace
Chainguard
Cortex XSOAR
Falco
IBM Cloud Pak for Watson AIOps
IBM QRadar SIEM
Kubernetes
Microsoft Entra ID
Multi-Domain Security Management
Open Container Initiative (OCI)
Opsera
Ozone
Prometheus
Samplead
Squadcast
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App
Zenduty
Claim Cyberint Argos Platform and update features and information
Claim Cyberint Argos Platform and update features and information
Claim Sysdig Secure and update features and information
Claim Sysdig Secure and update features and information