6 Integrations with Fidelis Network

View a list of Fidelis Network integrations and software that integrates with Fidelis Network below. Compare the best Fidelis Network integrations as well as features, ratings, user reviews, and pricing of software that integrates with Fidelis Network. Here are the current Fidelis Network integrations in 2024:

  • 1
    Fidelis LRM

    Fidelis LRM

    Fidelis Education

    A central and scalable repository for learning and engagement. A Student Success Platform Software for coordinating all of your student success support services. LRM will rise as a new category to make online and blended learning, competency-based learning, and the unbundling of the university far more fruitful and productive for learners, educational institutions, and employers. Learning relationship management is an emerging category that has the potential to solve critical problems–attrition, skills gap, and powering lifelong learning. LRM is not only an interesting product or integration option to watch, but also a movement any institution serious about academic innovation should join. We are taking steps to further improve success, particularly among new students in high-enrollment gateway courses. In 2014, we completed a successful pilot of the new ClearPath Learning Relationship Management (LRM) System, a social media tool that fosters engagement and collaboration.
    Starting Price: $50 per month
  • 2
    ThreatConnect Risk Quantifier (RQ)
    ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls.
  • 3
    Securonix NDR

    Securonix NDR

    Securonix

    Advanced threat monitoring combining network traffic, security logs, and entity context. Identify advanced threats that standalone network traffic analysis (NTA) or security information and event management (SIEM) solutions are not able to detect. Reduce false positives by over 90% by prioritizing threats using Securonix threat chains that span across network and security events. Improve efficiency and lower the operational overhead related to training and enablement when you only need to use a single console and database for all events. Advanced cyberattacks are usually slow and low and involve multiple steps. Detecting such threats requires monitoring and correlating indicators of compromise (IOC) across event sources. Securonix Spotter enables blazing-fast threat hunting using natural language search.
  • 4
    Intellicta

    Intellicta

    TechDemocracy

    Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems.
  • 5
    Mandiant Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Mandiant delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  Mandiant’s digital risk protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.  Identify unknown or unmanaged vulnerable internet-facing assets before threat actors do.
  • 6
    Fidelis Endpoint

    Fidelis Endpoint

    Fidelis Cybersecurity

    See all endpoint activity across Windows, Mac, and Linux systems and gain unmatched insight through the collection of all executable files and scripts that are analyzed against the latest threat intelligence. Detect threats in real time or hunt retrospectively through recorded events. You can also monitor a full software inventory and identify vulnerabilities with links to MITRE CVEs or Microsoft KB Reports.
  • Previous
  • You're on page 1
  • Next