Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IBM's solution for identity threat detection and response, along with its identity security posture management, offers comprehensive visibility into user activities across various isolated IAM tools utilized in cloud environments, SaaS, and on-premise applications. The IBM Verify Identity Protection not only encompasses ISPM and ITDR capabilities to safeguard your organization but also facilitates quick deployment without the need for agents or clients. Designed to be compatible with any cloud or network infrastructure, this solution enhances your existing cybersecurity measures by providing critical insights into identity risks. It effectively identifies and addresses identity-related vulnerabilities, including shadow assets, unauthorized local accounts, the absence of multi-factor authentication, and the usage of unapproved SaaS applications across diverse platforms. Additionally, it uncovers potentially harmful misconfigurations stemming from human errors, dangerous policy deviations, and insufficient implementation of identity management tools, ensuring a more robust security posture for your organization. By proactively managing these risks, businesses can better protect their sensitive information and maintain compliance with industry standards.

Description

In a constantly evolving hybrid landscape, the success of your organization hinges on its workforce, their digital personas, and the devices they use to safeguard and enhance its resources. Malicious actors have devised clever methods to traverse your cloud ecosystems by taking advantage of these identities. To tackle this challenge, you require a cutting-edge, agentless solution for detecting and responding to identity threats, enabling you to identify and neutralize contemporary identity vulnerabilities that are crucial in today’s threat landscape. Proofpoint Identity Threat Defense, formerly known as Illusive, provides you with extensive prevention capabilities and visibility over all your identities, allowing you to address identity vulnerabilities before they escalate into significant threats. Additionally, it empowers you to identify lateral movements within your environments and implement deceptive strategies to thwart threat actors before they can access your organization's valuable assets. Ultimately, the ability to mitigate modern identity risks and confront real-time identity threats seamlessly in one platform is an invaluable advantage for any organization aiming to enhance its security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
BlueCat Unified DDI
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
IBM QRadar SIEM
IBM Verify
Infoblox DDI
LogRhythm SIEM
Microsoft 365
Microsoft Azure
Microsoft Endpoint Manager
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks NGFW
Splunk Enterprise
Tanium

Integrations

Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
BlueCat Unified DDI
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
IBM QRadar SIEM
IBM Verify
Infoblox DDI
LogRhythm SIEM
Microsoft 365
Microsoft Azure
Microsoft Endpoint Manager
Microsoft Entra ID
Microsoft Sentinel
Palo Alto Networks NGFW
Splunk Enterprise
Tanium

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/verify-identity-protection

Vendor Details

Company Name

Proofpoint

Founded

2002

Country

United States

Website

www.proofpoint.com/us/illusive-is-now-proofpoint

Alternatives

Alternatives

Baits Reviews

Baits

MokN
Fidelis Elevate Reviews

Fidelis Elevate

Fidelis Security