+
+

Related Products

  • ThreatLocker
    502 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

About

No expertise is needed to run a full security program with Zip. Minimize hassle with single-click workflows for everything from account recovery to deploying CrowdStrike. We provide everything you need to execute instantly. Never worry about missing a compliance standard. Monitor your system’s devices, identities, and 3rd party tools at a bird’s eye view and get each metric to where it needs to be. We integrate the best-in-class security tooling like CrowdStrike, Jamf, and Intune to build the enterprise security stack that scales with you, and it’s all behind a single pane of glass. Set consistent security policies across Windows and macOS devices without juggling platform-specific configuration. Zip is your single partner to procure, deploy, configure, and manage your enterprise security program. We’ll manage all of the software you need to buy to meet the standards of your customers, insurers, and compliance regimes.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Audience

Enterprises looking for a solution to secure their company and manage compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$30 per node per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Defense.com
United States
www.defense.com

Company Information

Zip Security
www.zipsec.com

Alternatives

Alternatives

Iru

Iru

Iru (formerly Kandji)
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Microsoft 365
Active Directory
CrowdStrike Container Security
Google Workspace
Jamf Connect
Microsoft Intune
Okta
Slack

Integrations

Microsoft 365
Active Directory
CrowdStrike Container Security
Google Workspace
Jamf Connect
Microsoft Intune
Okta
Slack
Claim Defense.com and update features and information
Claim Defense.com and update features and information
Claim Zip Security and update features and information
Claim Zip Security and update features and information