Average Ratings 2 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Link indicators from your network to almost all active IP addresses and domains across the Internet. Discover how this information can enhance risk evaluations, assist in identifying attackers, support online fraud probes, and trace cyber activities back to their infrastructure. Acquire crucial insights that empower you to accurately assess the threat levels faced by your organization. DomainTools Iris offers a unique threat intelligence and investigative platform, merging high-quality domain and DNS intelligence with a user-friendly web interface, ensuring ease of use for professionals. This powerful tool is essential for organizations aiming to bolster their cybersecurity measures effectively.

Description

Resecurity Risk serves as a comprehensive threat monitoring solution aimed at safeguarding brands, their subsidiaries, assets, and key personnel. Within just 24 hours of setup, users can upload their distinct digital identifiers to receive near real-time updates from over 1 Petabyte of actionable intelligence that is currently relevant to their security needs. Security information and event management (SIEM) tools are instrumental in swiftly identifying and emphasizing critical events, provided that all active threat vectors from verified sources are accessible within the platform and are scored accurately for risk. Resecurity Risk functions as an all-encompassing threat management product that typically would necessitate multiple vendors to achieve the same level of protection. By integrating existing security solutions, organizations can better realize the risk score associated with their enterprise footprint. This platform is driven by your data and powered by Context™, offering a holistic approach to monitoring piracy and counterfeiting across various industry sectors. By utilizing actionable intelligence, you can effectively prevent the unauthorized distribution and misuse of your products, ensuring greater security for your brand. With the continuous evolution of threats, staying informed is crucial for maintaining resilience in today's digital landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Marketplace
Anomali
Cortex XDR
D3 Smart SOAR
Desktop.com
EclecticIQ
Filigran
IBM QRadar SIEM
IronNet Collective Defense Platform
Polarity
Recorded Future
Revelstoke
SIRP
Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
Swimlane
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)
ThreatQ

Integrations

AWS Marketplace
Anomali
Cortex XDR
D3 Smart SOAR
Desktop.com
EclecticIQ
Filigran
IBM QRadar SIEM
IronNet Collective Defense Platform
Polarity
Recorded Future
Revelstoke
SIRP
Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
Swimlane
ThreatBlockr
ThreatConnect Risk Quantifier (RQ)
ThreatQ

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

DomainTools

Founded

2002

Country

United States

Website

www.domaintools.com

Vendor Details

Company Name

Resecurity

Founded

2016

Country

United States

Website

www.resecurity.com

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Fraud Detection

Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval

Alternatives

Alternatives