+
+

Related Products

  • ThreatLocker
    502 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

About

Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Audience

Enterprises looking for a solution to increase their security and mitigate digital risk

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$30 per node per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Defense.com
United States
www.defense.com

Company Information

Google
Founded: 1998
United States
cloud.google.com/security/solutions/digital-risk-protection

Alternatives

Alternatives

TrendAI Vision One

TrendAI Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Microsoft 365
Amazon Route 53
Amazon Web Services (AWS)
Armis Centrix
Carbon Black EDR
Check Point URL Filtering
Cloudflare Access
Cortex XSOAR
FortiGate NGFW
LevelBlue USM Anywhere
Maltego
MaxMind
McAfee Total Protection
Microsoft Defender for Endpoint
Nozomi Networks
Nucleus
OfficeScan
Palo Alto Networks Threat Prevention
Silobreaker
Sophos Cloud Native Security

Integrations

Microsoft 365
Amazon Route 53
Amazon Web Services (AWS)
Armis Centrix
Carbon Black EDR
Check Point URL Filtering
Cloudflare Access
Cortex XSOAR
FortiGate NGFW
LevelBlue USM Anywhere
Maltego
MaxMind
McAfee Total Protection
Microsoft Defender for Endpoint
Nozomi Networks
Nucleus
OfficeScan
Palo Alto Networks Threat Prevention
Silobreaker
Sophos Cloud Native Security
Claim Defense.com and update features and information
Claim Defense.com and update features and information
Claim Google Digital Risk Protection and update features and information
Claim Google Digital Risk Protection and update features and information