+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • ThreatLocker
    684 Ratings
    Visit Website
  • Adaptive Security
    88 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • cside
    25 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Guardz
    118 Ratings
    Visit Website

About

Train your team to defend against the latest cyber attacks with our complete cybersecurity platform. Run hyper-realistic, scarily personalized attack simulations in just a few clicks. Phishing attacks are responsible for more than 80% of reported security incidents an about 90% of data breaches. Replicate techniques used by today's attackers to help your people spot and stop AI-generated threats, With tests and training materials tailored to each team member we help you increase cyber security efficiency.

About

Locurity provides patent pending 360 degree security platform using 'zero trust' security model that continuously defends this new enterprise ‘identity perimeter’. Identity is the new enterprise perimeter, protect it now. Defend against 81% of all cyber attacks. Security breaches often start with compromised identity (Verizon DBIR). Detect cyber attacks proactively. Protect before attacks turn to breaches. Secure your enterprise assets. Prevents numerous identity/credential borne attacks such as - phishing, whaling, hacking, guessing, brute forcing, scraping, social engineering, keylogging, ATO, credential stuffing etc. Decentralized architecture - no honeypot of identity crown jewels. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS (Office365, GSuite, Salesforce, BOX, Slack...), Healthcare/Finance apps and many more. Biometric (TouchID/FaceID), Pin/Pattern and elliptic curve cryptography based multi factor authentication.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams searching for an advanced Cybersecurity solution

Audience

Businesses that need a 360 degree identity security platform to continuously defend their enterprise identity perimeter

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Jericho Security
www.jerichosecurity.com

Company Information

Locurity
www.locurity.com

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Alternatives

SAGE

SAGE

HolistiCyber
Auth0

Auth0

Okta

Categories

Categories

Integrations

Active Directory
Box
Docusign
Google Workspace
Jira
Microsoft 365
SAP Concur
Salesforce
Slack

Integrations

Active Directory
Box
Docusign
Google Workspace
Jira
Microsoft 365
SAP Concur
Salesforce
Slack
Claim Jericho Security and update features and information
Claim Jericho Security and update features and information
Claim Locurity and update features and information
Claim Locurity and update features and information