Related Products
|
||||||
About
An enterprise security solution to proactively shield enterprise assets by creating an e-fence that uses software based security constructs to replace physical appliances with logical components that operate under the control of the application owner. Entire solution is developed to be up and running on Docker containers. Single agent download on user side to access all the assets (which are hybrid in nature).
|
About
Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between.
The world’s only AI-powered exposure management platform.
See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
|
About
The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Network Security solution for IT teams
|
Audience
IT security teams
|
Audience
Organizations interested in a powerful third-party risk management and attack surface management platform
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5,249 per year
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationPrimeSoft Solutions
India
www.primesoft.net
|
Company InformationTenable
Founded: 2002
United States
www.tenable.com/products/tenable-one
|
Company InformationUpGuard
Founded: 2012
United States
www.upguard.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
||||
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
Application Lifecycle Management Features
Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control
|
|||||
Integrations
Cisco Vulnerability Management
Continuum GRC
CyCognito
CyberArk Conjur
Cybersixgill
Cymulate
Cynerio
Darwin Attack
IBM Security Randori Recon
Optiv Managed XDR
|
Integrations
Cisco Vulnerability Management
Continuum GRC
CyCognito
CyberArk Conjur
Cybersixgill
Cymulate
Cynerio
Darwin Attack
IBM Security Randori Recon
Optiv Managed XDR
|
Integrations
Cisco Vulnerability Management
Continuum GRC
CyCognito
CyberArk Conjur
Cybersixgill
Cymulate
Cynerio
Darwin Attack
IBM Security Randori Recon
Optiv Managed XDR
|
||||
|
|
|
|