Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

The Cyber adAPT NTD (Network Threat Detection) platform delivers prompt, automated, and contextual insights that assess both the risk and urgency of potential threats. By combining extensive visibility with rapid detection capabilities, businesses can swiftly recognize threats and take immediate action to effectively mitigate attacks before any harm occurs. This top-of-the-line solution leverages patented technology to detect infiltration, scanning, and exploitation within network traffic, uncovering threats that other systems may overlook. Moreover, it employs innovative and advanced intellectual property to continuously identify, assess, and analyze the latest threats, ensuring our systems are always up-to-date in the field. Not only is it straightforward to deploy and maintain, but the Cyber adAPT NTD also automates some of the most labor-intensive processes in cybersecurity. Additionally, Cyber adAPT provides optional consulting services for clients seeking expert guidance from its cybersecurity professionals, enhancing the overall security posture of enterprises even further. This commitment to support underscores their dedication to empowering organizations in the battle against evolving cyber threats.

Description

Reveal the most elusive threats that typically go unnoticed by leveraging global intelligence from one of the largest cyber intelligence networks, along with insights tailored to local customers. By consolidating intelligence from various control points, you can pinpoint and prioritize systems that are still compromised and urgently need remediation. With just a single click, you can contain and address all instances of a threat. This solution offers comprehensive visibility into threats across IT environments in one centralized location, eliminating the need for manual searches. You can instantly search for Indicators-of-Compromise and visualize all related attack events, including files used, email addresses, and malicious IPs involved. Remediating any attack artifact across Symantec-protected endpoints, networks, and emails can be accomplished with one click. Additionally, swiftly isolating any compromised system from the enterprise network enhances overall security and response capabilities. This streamlined approach not only improves efficiency but also significantly reduces the risk of further breaches.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AppSmart Identity
Aranda Security Compliance
BluVector Advanced Threat Detection
CA Auditor for z/OS
Expel
Getvisibility
GoSecure
Link
NorthStar Navigator
OctoXLabs
Panaseer
Recorded Future
Securonix SOAR
Swimlane
Symantec Endpoint Protection Mobile

Integrations

AppSmart Identity
Aranda Security Compliance
BluVector Advanced Threat Detection
CA Auditor for z/OS
Expel
Getvisibility
GoSecure
Link
NorthStar Navigator
OctoXLabs
Panaseer
Recorded Future
Securonix SOAR
Swimlane
Symantec Endpoint Protection Mobile

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cyber adAPT

Founded

2015

Country

United States

Website

www.cyberadapt.com

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.broadcom.com/solutions/integrated-cyber-defense/advanced-threat-protection

Product Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Quantum Armor Reviews

Quantum Armor

Silent Breach

Alternatives

ShadowKat Reviews

ShadowKat

3wSecurity
SmartFlow Reviews

SmartFlow

Solana Networks