Fidelis Halo

Fidelis Halo

Fidelis Security
+
+

Related Products

  • Kasm Workspaces
    120 Ratings
    Visit Website
  • Hyperproof
    201 Ratings
    Visit Website
  • Blumira
    130 Ratings
    Visit Website
  • StandardFusion
    83 Ratings
    Visit Website
  • phoenixNAP
    5 Ratings
    Visit Website
  • ManageEngine Log360
    73 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    116 Ratings
    Visit Website
  • Satori
    77 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    383 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    144 Ratings
    Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Any organization using public, private, hybrid, or multi-cloud environments.

Audience

Organizations searching for a powerful Cloud Security solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.0 / 5
ease 4.0 / 5
features 5.0 / 5
design 3.0 / 5
support 4.0 / 5
Read all reviews

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fidelis Security
Founded: 2002
United States
fidelissecurity.com/platforms/fidelis-halo/

Company Information

Skybox Security
Founded: 2002
United States
www.skyboxsecurity.com

Alternatives

DisruptOps

DisruptOps

FireMon

Alternatives

Runecast

Runecast

Runecast Solutions

Categories

Categories

Audit Features

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Container Security Features

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Audit Features

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Microsoft Azure
Amazon EC2
Apache Mesos
ApptioOne
Check Point IPS
Check Point Infinity
Chef
Docker
Google Cloud Platform
Google Compute Engine
Jenkins
Okta
OpenText ArcSight Enterprise Security Manager
Oracle Cloud Infrastructure
Puppet Enterprise
Qualys WAS
Slack
Splunk SOAR
Sumo Logic
Tenable One

Integrations

Microsoft Azure
Amazon EC2
Apache Mesos
ApptioOne
Check Point IPS
Check Point Infinity
Chef
Docker
Google Cloud Platform
Google Compute Engine
Jenkins
Okta
OpenText ArcSight Enterprise Security Manager
Oracle Cloud Infrastructure
Puppet Enterprise
Qualys WAS
Slack
Splunk SOAR
Sumo Logic
Tenable One
Claim Fidelis Halo and update features and information
Claim Fidelis Halo and update features and information
Claim Skybox Security and update features and information
Claim Skybox Security and update features and information