+
+

Related Products

  • Resolver
    257 Ratings
    Visit Website
  • Guardz
    56 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Wiz
    1,052 Ratings
    Visit Website
  • Cisco Duo
    1,336 Ratings
    Visit Website
  • ThreatLocker
    469 Ratings
    Visit Website
  • NinjaOne
    3,047 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • Aikido Security
    72 Ratings
    Visit Website

About

Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.

About

ZEST Security offers an AI-powered risk resolution platform that redefines cloud risk remediation for security teams. Unlike traditional security solutions that merely identify vulnerabilities, ZEST proactively resolves them by connecting the right team to the right fix, thereby reducing the time from discovery to remediation. The platform provides full remediation coverage by comparing the planned DevOps state with the actual cloud runtime state, enabling seamless identification and remediation of risks across both managed and unmanaged cloud infrastructure. Automated root cause analysis pinpoints the origin of issues down to the associated asset and originating lines of code, allowing teams to address multiple problems with minimal changes. AI-generated risk resolution paths drastically reduce mean time to remediation and eliminate manual triage by implementing dynamic remediation strategies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for proactive cyber defense with targeted and actionable threat intelligence: Retail, eCommerce, Finance, Media, Gaming, Entertainment, and other digital enterprises

Audience

Companies and organizations in search of a tool to resolve cloud vulnerabilities and misconfigurations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cyberint
Founded: 2011
Israel
cyberint.com

Company Information

ZEST Security
Founded: 2023
United States
zestsecurity.io

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Tenable One

Tenable One

Tenable

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Integrations

Amazon S3
Amazon Web Services (AWS)
Axonius
Clair
CloudSploit
Databricks Data Intelligence Platform
Docker
IBM QRadar SIEM
Jira
Kubernetes
Microsoft Entra ID
Multi-Domain Security Management
Okta
Samplead
Siemplify
Splunk IT Service Intelligence
Terraform
ThreatConnect Threat Intelligence Platform
Trivy
WatchTower Security Management App

Integrations

Amazon S3
Amazon Web Services (AWS)
Axonius
Clair
CloudSploit
Databricks Data Intelligence Platform
Docker
IBM QRadar SIEM
Jira
Kubernetes
Microsoft Entra ID
Multi-Domain Security Management
Okta
Samplead
Siemplify
Splunk IT Service Intelligence
Terraform
ThreatConnect Threat Intelligence Platform
Trivy
WatchTower Security Management App
Claim Cyberint Argos Platform and update features and information
Claim Cyberint Argos Platform and update features and information
Claim ZEST Security and update features and information
Claim ZEST Security and update features and information