| RocketCyberKaseya | ||||||
| Related Products
 | ||||||
| About
            Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. 
 
Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously.
Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution.
3 layers, 13 solutions, 1 platform, including:
• Managed Detection & Response
• Cyber Incident Response Plan
• Cybersecurity Threat Alerts
• Phishing Simulations
• Cybersecurity Awareness Training 
• Cybersecurity Awareness Videos
• Cybersecurity Awareness Posters & Graphics
• Technology Acceptable Use Policy
• Cybersecurity Risk Assessments
• Penetration Testing
• Vulnerability Scanning
• Compromised Password Scanning
• Website Security Scanning
             | About
            RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services.
RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity.
             | |||||
| Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | |||||
| Audience
        Organizations with growing security needs
         | Audience
        Companies, security teams and anyone requiring a managed cyber security solution
         | |||||
| Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | |||||
| API
            
                Offers API
            
            
         | API
            
                Offers API
            
            
         | |||||
| Screenshots and Videos | Screenshots and Videos | |||||
| Pricing
        $0
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | |||||
| 
Reviews/ | 
Reviews/ | |||||
| Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | |||||
| Company InformationDefendify Founded: 2017 United States www.defendify.com | Company InformationKaseya Founded: 2000 United States www.rocketcyber.com | |||||
| Alternatives | Alternatives | |||||
|  |  | |||||
| Categories | Categories | |||||
| Cybersecurity Features
            
                AI / Machine Learning
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Endpoint Management
            
            
         
            
                Incident Management
            
            
         
            
                IOC Verification
            
            
         
            
                Tokenization
            
            
         
            
                Vulnerability Scanning
            
            
         
            
                Whitelisting / Blacklisting
            
            
         Data Security Features
            
                Alerts / Notifications
            
            
         
            
                Antivirus/Malware Detection
            
            
         
            
                At-Risk Analysis
            
            
         
            
                Audits
            
            
         
            
                Data Center Security
            
            
         
            
                Data Classification
            
            
         
            
                Data Discovery
            
            
         
            
                Data Loss Prevention
            
            
         
            
                Data Masking
            
            
         
            
                Data-Centric Security
            
            
         
            
                Database Security
            
            
         
            
                Encryption
            
            
         
            
                Identity / Access Management
            
            
         
            
                Logging / Reporting
            
            
         
            
                Mobile Data Security
            
            
         
            
                Monitor Abnormalities
            
            
         
            
                Policy Management
            
            
         
            
                Secure Data Transport
            
            
         
            
                Sensitive Data Compliance
            
            
         Incident Response Features
            
                Attack Behavior Analytics
            
            
         
            
                Automated Remediation
            
            
         
            
                Compliance Reporting
            
            
         
            
                Forensic Data Retention
            
            
         
            
                Incident Alerting
            
            
         
            
                Incident Database
            
            
         
            
                Incident Logs
            
            
         
            
                Incident Reporting
            
            
         
            
                Privacy Breach Reporting
            
            
         
            
                Security Orchestration
            
            
         
            
                SIEM Data Ingestion / Correlation
            
            
         
            
                SLA Tracking / Management
            
            
         
            
                Threat Intelligence
            
            
         
            
                Timeline Analysis
            
            
         
            
                Workflow Automation
            
            
         
            
                Workflow Management
            
            
         Security Awareness Training Features
            
                Analytics / Reporting
            
            
         
            
                Certification Training
            
            
         
            
                Custom Test Building
            
            
         
            
                Gamification
            
            
         
            
                Industry Benchmarking
            
            
         
            
                Non-Email Based Testing
            
            
         
            
                Online Courses
            
            
         
            
                Phishing Simulation
            
            
         
            
                Pre-Assessments
            
            
         
            
                Prebuilt Training Library
            
            
         Vulnerability Scanners Features
            
                Asset Discovery
            
            
         
            
                Black Box Scanning
            
            
         
            
                Compliance Monitoring
            
            
         
            
                Continuous Monitoring
            
            
         
            
                Defect Tracking
            
            
         
            
                Interactive Scanning
            
            
         
            
                Logging and Reporting
            
            
         
            
                Network Mapping
            
            
         
            
                Perimeter Scanning
            
            
         
            
                Risk Analysis
            
            
         
            
                Threat Intelligence
            
            
         
            
                Web Inspection
            
            
         | ||||||
| Integrations
            
                
    Datto EDR
            
            
         
            
                
    Datto RMM
            
            
         
            
                
    Datto Workplace
            
            
         
            
                
    Microsoft 365
            
            
         
            
                
    Microsoft Entra ID
            
            
         | Integrations
            
                
    Datto EDR
            
            
         
            
                
    Datto RMM
            
            
         
            
                
    Datto Workplace
            
            
         
            
                
    Microsoft 365
            
            
         
            
                
    Microsoft Entra ID
            
            
         | |||||
|  |  | 
