RocketCyberKaseya 
                        
                        
                     | 
        
        ||||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.
             
            
        
         | 
        
        
                
            
            
            About
            RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services.
RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance
         
        
    
         | 
        
        
                
            
        
        Audience
        Companies, security teams and anyone requiring a managed cyber security solution
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        $30 per node per month
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationDefense.com 
    
    United States 
    www.defense.com 
         | 
        
        
                
            
        
        Company InformationKaseya 
    
    Founded: 2000 
    
    United States 
    www.rocketcyber.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    SIEM Features
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                File Integrity Monitoring
            
            
         
        
    
        
        
            
                Forensic Analysis
            
            
         
        
    
        
        
            
                Log Management
            
            
         
        
    
        
        
            
                Network Monitoring
            
            
         
        
    
        
        
            
                Real Time Monitoring
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
                     | 
        
        ||||||
                
            
        
    
        Integrations
            
                
    Microsoft 365
            
            
         
        
    
        
        
            
                
    Datto EDR
            
            
         
        
    
        
        
            
                
    Datto RMM
            
            
         
        
    
        
        
            
                
    Datto Workplace
            
            
         
        
    
        
        
            
                
    Microsoft Entra ID
            
            
         
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    Microsoft 365
            
            
         
        
    
        
        
            
                
    Datto EDR
            
            
         
        
    
        
        
            
                
    Datto RMM
            
            
         
        
    
        
        
            
                
    Datto Workplace
            
            
         
        
    
        
        
            
                
    Microsoft Entra ID
            
            
         
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |