Related Products
|
||||||
About
Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
|
About
Fight advanced threats with a covert defense. ExtraHop eliminates blindspots and detects threats that other tools miss. ExtraHop gives you the perspective you need to understand your hybrid attack surface from the inside out. Our industry-leading network detection and response platform is purpose-built to help you rise above the noise of alerts, silos, and runaway technology so you can secure your future in the cloud.
|
About
Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Vectra is Security that thinks. We have developed an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Security teams and IT professionals seeking proactive, AI-driven cybersecurity solutions to improve threat detection, response times, and overall resilience
|
Audience
IT departments
|
Audience
Security centers or IT administrators who want an AI cybersecurity platform to protect their SaaS, cloud and on-premises deployments
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationDarktrace
Founded: 2013
United Kingdom
www.darktrace.com
|
Company InformationExtraHop Networks
Founded: 2007
United States
www.extrahop.com
|
Company InformationVectra
Founded: 2010
United States
www.vectra.ai/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
Application Performance Monitoring (APM) Features
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Database Monitoring Features
Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
|
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
||||
Integrations
CYREBRO
Axonius
Carbon Black EDR
Checkpoint Anti-Spam and Email Security
CrowdStrike Falcon
Expel
FortiADC
Google Cloud Platform
Microsoft 365
Microsoft Azure
|
Integrations
CYREBRO
Axonius
Carbon Black EDR
Checkpoint Anti-Spam and Email Security
CrowdStrike Falcon
Expel
FortiADC
Google Cloud Platform
Microsoft 365
Microsoft Azure
|
Integrations
CYREBRO
Axonius
Carbon Black EDR
Checkpoint Anti-Spam and Email Security
CrowdStrike Falcon
Expel
FortiADC
Google Cloud Platform
Microsoft 365
Microsoft Azure
|
||||
|
|
|
|