Audience

Organizations that need a cybersecurity and compliance solution

About VikingCloud Asgard

Our cloud-native Asgard Platform™ blends algorithms and technologies to deliver hyper-effective cybersecurity and compliance. Predictive platform providing continuous cybersecurity and compliance. We stop threats before they stop your business. Next generation signature and behavior-based threat detection. Model behavior and auto-discover patterns of interest. Continuous monitoring of your network to uncover suspicious activity. Understand the threat landscape, plus make compliance and risk assessments easier. Blend data for a holistic security/compliance view. Get truly real-time data and information flows to see what’s going on. A world-class data store capable of tracking hundreds of metrics. Intuitive dashboards and drill-throughs to find just the information you need.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

VikingCloud
Founded: 2019
United States
www.vikingcloud.com/asgard-platform/

Videos and Screen Captures

VikingCloud Asgard Screenshot 1
Other Useful Business Software
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Try Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Online

VikingCloud Asgard Frequently Asked Questions

Q: What kinds of users and organization types does VikingCloud Asgard work with?
Q: What languages does VikingCloud Asgard support in their product?
Q: What kind of support options does VikingCloud Asgard offer?
Q: What type of training does VikingCloud Asgard provide?

VikingCloud Asgard Product Features

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

PCI Compliance

PCI Assessment
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
Policy Management