Audience

Companies of all sizes with security and IT teams focused on cloud and application security through cyber hygiene and vulnerability remediation.

About Vulcan Cyber

At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.

Pricing

Starting Price:
$999 / month
Pricing Details:
Start with the industry's only free vulnerability prioritization engine for risk-based vulnerability management, then move to full vulnerability remediation orchestration for enterprise cyber hygiene and cloud and application security.
Free Version:
Free Version available.
Free Trial:
Free Trial available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Vulcan Cyber
Founded: 2018
Israel
vulcan.io

Videos and Screen Captures

Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
Webinars
Support
Phone Support
Online

Vulcan Cyber Frequently Asked Questions

Q: What kinds of users and organization types does Vulcan Cyber work with?
Q: What languages does Vulcan Cyber support in their product?
Q: What kind of support options does Vulcan Cyber offer?
Q: What other applications or services does Vulcan Cyber integrate with?
Q: What type of training does Vulcan Cyber provide?
Q: Does Vulcan Cyber offer a free trial?
Q: How much does Vulcan Cyber cost?
Q: What pricing for support is available for Vulcan Cyber?
Q: What pricing for training is available for Vulcan Cyber?

Vulcan Cyber Product Features

Application Security

Analytics / Reporting
Third-Party Tools Integration
Vulnerability Detection
Vulnerability Remediation
Open Source Component Monitoring
Source Code Analysis
Training Resources

Cloud Security

Application Security
Threat Intelligence
Vulnerability Management
Antivirus
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Two-Factor Authentication

Cybersecurity

AI / Machine Learning
Vulnerability Scanning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Whitelisting / Blacklisting

IT Management

Event Logs
Patch Management
Capacity Monitoring
Compliance Management
Hardware Inventory
IT Budgeting
License Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Event Tracking
Vulnerability Scanning
Web Threat Management
Anti Spam
Anti Virus
Email Attachment Protection
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Web Traffic Reporting

PCI Compliance

Compliance Reporting
PCI Assessment
Patch Management
Access Control
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Policy Management

Risk Management

Dashboard
IT Risk Management
Risk Assessment
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Exceptions Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management

Vulnerability Management

Asset Tagging
Patch Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Asset Discovery
Network Scanning
Policy Management

Vulcan Cyber Additional Categories