Related Products
|
||||||
About
GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations.
GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation.
GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture.
Our Professional Services find issues, our Managed Services fix them, helping you thrive.
|
About
Cyber threat hunting is the process of proactively searching across networks and endpoints to identify threats that evade security controls. Using a combination of manual and machine assisted techniques, threat hunters search for indicators of compromise (IOCs) across an organisation’s IT environments. By hunting for evidence that a breach has occurred, threat hunting enables security teams to identify unknown threats and respond quickly and effectively to them before they cause damage and disruption. ThreatDetect™, Redscan’s outcome-focused Managed Detection and Response (MDR) service integrates the latest detection technologies and intelligence plus a team of cyber offensive security professionals to provide the hunting capability needed to proactively detect threats. Our experienced team of Red and Blue Team security professionals have a deep knowledge of offensive security and apply this knowledge to help better identify unknown threats.
|
About
USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information.
- Centralized USB Device Management.
- Secures Groups of Computer or Specific Computers.
- Whitelists Specific Devices by Hardware ID and Blocks the rest.
-Automatically apply Group 1 protection settings to unassigned clients. NEW!
- Receives Alerts & Logs Device Connections in the Network Automatically.
-Export Status and Alerts Reports to csv format (Comma-separated value)NEW!
-Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Organizations looking to stay above the crowd, stop reacting and be in control. Companies looking to enter the continuous improvement process and optimize their investments. Through GoSecure Titan®'s Managed Security Services (which includes our Managed Extended Detection & Response (MXDR) Service) and our Professional Security Services, we are your ally to prevent breaches.
|
Audience
Organizations in need of a cyber threat protection solution
|
Audience
IT security teams
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$20 per client/one-time
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationGoSecure
Founded: 2002
United States
www.gosecure.ai/
|
Company InformationRedscan
Founded: 2002
United Kingdom
www.redscan.com/services/managed-detection-and-response/cyber-threat-hunting/
|
Company InformationAdvanced Systems International
Founded: 2004
Peru
www.usb-lock-rp.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
Categories |
||||
Endpoint Detection and Response (EDR) Features
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
|
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
|
|||||
Integrations
Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
|
Integrations
Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
|
Integrations
Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
|
||||
|
|
|
|