DynaRisk Breach DefenceDynaRisk
|
||||||
Related Products
|
||||||
About
As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence.
Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business.
Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems.
Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit.
Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.
|
About
A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Protect your business assets and train your staff, all in one easy tool. Cyber security made simple.
|
Audience
Organizations looking for advanced automated authentication solutions to provide secure single sign-on and mature identity management
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$99
Free Version
Free Trial
|
Pricing
$3 per user per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationDynaRisk
Founded: 2015
United Kingdom
www.dynarisk.com/business/breachdefence
|
Company InformationLogMeOnce
Founded: 2011
United States
www.logmeonce.com/government-ficam-identity-and-access-management/
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Infrastructure Monitoring Features
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
Security Awareness Training Features
Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library
|
||||||
Integrations
Active Directory
Amazon Web Services (AWS)
Dropbox
Google Cloud Platform
Google Drive
Microsoft OneDrive
Salesforce
|
Integrations
Active Directory
Amazon Web Services (AWS)
Dropbox
Google Cloud Platform
Google Drive
Microsoft OneDrive
Salesforce
|
|||||
|
|