+
+

Related Products

  • Keeper Security
    1,740 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,457 Ratings
    Visit Website
  • ThreatLocker
    496 Ratings
    Visit Website
  • Wiz
    1,088 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Orca Security
    492 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    119 Ratings
    Visit Website
  • TruGrid
    73 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website

About

SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.

About

Active scanning, passive discovery, and API integrations unite in one powerful platform to deliver complete visibility into managed and unmanaged assets across IT, OT, IoT, cloud, mobile, and remote environments. Some CAASM solutions rely solely on integrations to inventory your network, but those other tools are notoriously incomplete because they rely on existing sources. runZero combines our own active scanning and passive discovery with integrations so you see absolutely everything. Our unique, safe scanning technology creatively gathers data points just like an attacker would, extracting asset details to deliver mind-blowing, in-depth fingerprinting and insights into OSs, services, hardware, and more. runZero surfaces all sorts of things you had no idea were on your network, like unmanaged and unpatched assets, misconfigured and abandoned cloud resources, rogue OT devices, and unknown subnets.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations looking for a tool to keep track of their assets and optimize their vulnerability management operations

Audience

Organizations and enterprises interested in a solution to find and fix security exposures

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$5,000 for 500 assets
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SecHard
Turkey
sechard.com

Company Information

runZero
United States
www.runzero.com

Alternatives

Red Sift ASM

Red Sift ASM

Red Sift

Alternatives

TrustMeter

TrustMeter

Zero Networks

Categories

Categories

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
VMware Cloud
Apache HTTP Server
Aruba Cloud
Avaya Cloud Office
Censys
Check Point Application Control
CrowdStrike Falcon
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Intune
MongoDB
Nessus
Palo Alto Networks Threat Prevention
Red Hat Cloud Suite
Sophos Cloud Native Security
Splunk Cloud Platform
Syslog-ng

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
VMware Cloud
Apache HTTP Server
Aruba Cloud
Avaya Cloud Office
Censys
Check Point Application Control
CrowdStrike Falcon
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Intune
MongoDB
Nessus
Palo Alto Networks Threat Prevention
Red Hat Cloud Suite
Sophos Cloud Native Security
Splunk Cloud Platform
Syslog-ng
Claim SecHard and update features and information
Claim SecHard and update features and information
Claim runZero and update features and information
Claim runZero and update features and information