Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The most advanced AI-powered Digital Risk Monitoring Platform that instantly detects third party data leaks. XVigil gathers millions from online sources to begin gathering data units. This raw data is then filtered using an AI engine to remove noise, false positives and anomalies. It is then indexed, parsed and checked against the historical data lakes. Finally, it is mapped to clients assets. Duplicates and known threats are removed. The remaining threats are rated according to severity and sent to customers as alerts. Monitors your internet-exposed infrastructure and curates a list. Then periodically monitors for misconfigurations and potential data leakages. XVigil uses the internet to detect and classify external threats, provide real-time alerts, and classify them based upon their severity. CloudSEK's "XVigil" is a SaaS-based platform that's easy to use and backed by five years of research and development.
Description
Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Auth0
Avalor
Axonius
CSV Editor Pro
Cisco Vulnerability Management
Gmail
Google
IBM QRadar SIEM
Metasploit
Integrations
Active Directory
Auth0
Avalor
Axonius
CSV Editor Pro
Cisco Vulnerability Management
Gmail
Google
IBM QRadar SIEM
Metasploit
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$11/asset/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CloudSEK
Founded
2015
Country
Singapore
Website
cloudsek.com
Vendor Details
Company Name
CyCognito
Founded
2017
Country
United States
Website
www.cycognito.com
Product Features
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning