RumbleCritical Research
|
||||||
Related Products
|
||||||
About
Identify all of your assets and map your networks through fast, safe, credential-less scans from a single light agent, with no server install required. Uncover policy violations, visualize IP allocations, identify compliance issues, highlight misconfigurations, and discover security exposures. Leverage recurring scans to track asset changes, identify new assets, and flag offline assets, with built-in alerting. Import, export, script, schedule, integrate, merge, and sync your asset inventory with existing systems. Rumble is fast and identifies assets without the need for credentials or special access. A single agent can assess an entire enterprise, or multiple agents can be used to limit cross-site traffic. Discover networks, large or small, in a fraction of the time required by legacy tools.
|
About
Stay ahead of cyber attacks, ransomware, data compromise, and brand damage by identifying security exposures before the bad guys do. ThreatMate helps you discover your internal and external attack surface and then gives you a game plan for reducing opportunities for hackers to attack you. ThreatMate will monitor for changes in your exposure to attackers and immediately alert you. ThreatMate scores your security from the outside and inside so you can compare your network security resiliency to your peers and competitors while developing a game plan with prioritized tasks to improve your score materially. ThreatMate’s compliance agent queries your assets and 3rd party SaaS services to collect evidence to enrich vulnerability scans, check for compliance with IT policy, SOC-2, NIST, ISO, and other compliance schema, and detect suspicious behaviors on the network. Discover all assets on your external, cloud, and internal networks.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies that want good visibility into their network environments
|
Audience
Enterprises in search of a security tool to manage IT compliance and ensure their cybersecurity requirements
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$99 per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCritical Research
Founded: 2018
United States
www.rumble.run
|
Company InformationThreatMate
United States
www.threatmate.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Network Mapping Features
Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting
|
||||||
Integrations
Phosphorus
|
||||||
|
|
|