Related Products
|
||||||
About
Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
|
About
3 out of 4 companies are subject to computer attacks or hacking. However, 90% are equipped with essential security equipment that does not detect these malicious attacks. APTs, malicious behaviors, viruses, crypto lockers, override existing security defenses and no current tool can detect these attacks. Yet these attacks leave footprints of their passage. Finding these malicious traces on a large amount of data and exploiting these signals is impossible with current tools. Reveelium correlates and aggregates all types of logs from an information system and detects attacks or malicious activity in progress. An essential tool in the fight against cyber-malware Reveelium SIEM can be used alone or complemented by Ikare, Reveelium UEBA or ITrust’s Acsia EDR, to provide a true next-generation security center (SOC). Have the practices of its teams monitored by a third party and obtain an objective opinion on its level of safety.
|
About
Syteca — control privileged access and detect identity threats in one place.
Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start.
The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process).
Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments.
Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Security teams and IT professionals seeking proactive, AI-driven cybersecurity solutions to improve threat detection, response times, and overall resilience
|
Audience
Companies seeking a security information event management solution to mitigate risks
|
Audience
Large Enterprises, SMB
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationDarktrace
Founded: 2013
United Kingdom
www.darktrace.com
|
Company InformationITrust.fr
Founded: 2007
France
www.itrust.fr/en/reveelium-siem/
|
Company InformationSyteca
Founded: 2013
United States
www.syteca.com/en
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|
||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
Employee Monitoring Features
Activity Monitoring
Browsing History
Email Monitoring
Keystroke Recording
Productivity Analysis
Remote Control
Screen Activity Recording
Time & Attendance
Time Tracking
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
|
|||||
Integrations
Abstract Security
Amazon Web Services (AWS)
Axonius
Azure Marketplace
Box
Checkpoint Anti-Spam and Email Security
Chronicle SOAR
CnSight
Cydarm
Docker
|
Integrations
Abstract Security
Amazon Web Services (AWS)
Axonius
Azure Marketplace
Box
Checkpoint Anti-Spam and Email Security
Chronicle SOAR
CnSight
Cydarm
Docker
|
Integrations
Abstract Security
Amazon Web Services (AWS)
Axonius
Azure Marketplace
Box
Checkpoint Anti-Spam and Email Security
Chronicle SOAR
CnSight
Cydarm
Docker
|
||||
|
|
|
|