Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Keepnet's extended platform for human risk management empowers organizations to build security cultures with AI-driven simulations, adaptive training and automated phishing responses. This helps eliminate employee-driven risks, insider threats and social engineering within your organization and beyond. Keepnet continuously assesses the human behavior through AI-driven simulations of phishing across email, SMS and voice, QR codes, MFA and callback phishing. This helps to reduce human-driven cybersecurity risks. Keepnet's adaptive learning paths are tailored for each individual based on their risk level, role, and cognitive behavior. This ensures that secure behaviors are embedded in order to continuously reduce cyber risk. Keepnet empowers its employees to report threats immediately. Security admins can respond 168x quicker using AI-driven analysis, automated phishing responses and automated responses. Detects employees that click on phishing links frequently, mishandle information, or ignore security policy.

Description

We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Microsoft 365
Splunk Enterprise
Active Directory
Armis Centrix
Google Cloud Armor
IBM X-Force
LogRhythm SIEM
Microsoft Azure
Microsoft Defender Antivirus
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for IoT
Microsoft Exchange
OpenText Enterprise Security Manager
Palo Alto Networks Threat Prevention
Pipedrive
SentinelOne Singularity
VMRay
VirusTotal

Integrations

Microsoft 365
Splunk Enterprise
Active Directory
Armis Centrix
Google Cloud Armor
IBM X-Force
LogRhythm SIEM
Microsoft Azure
Microsoft Defender Antivirus
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for IoT
Microsoft Exchange
OpenText Enterprise Security Manager
Palo Alto Networks Threat Prevention
Pipedrive
SentinelOne Singularity
VMRay
VirusTotal

Pricing Details

$1
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Keepnet Labs

Founded

2017

Country

United Kingdom

Website

keepnetlabs.com

Vendor Details

Company Name

Kroll

Founded

1972

Country

United States

Website

www.kroll.com/en/services/cyber-risk/

Product Features

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Product Features

Breach and Attack Simulation (BAS)

Have your system controls undergone testing? Are you aware if they are prepared to effectively tackle current attack trends? Kroll's exclusive FAST Attack Simulations leverage unmatched incident forensic expertise alongside top-tier security frameworks to create tailored breach simulations suited to your specific environment.

Cyber Risk Management

Address all aspects of the current and future threat environment with insights from Kroll’s Cyber Risk specialists. Leveraging intelligence gathered from over 3,000 incident response cases annually, Kroll’s solutions for protection, detection, and response significantly enhance your cybersecurity stance right away.

Cybersecurity

We combine comprehensive response capabilities with frontline intelligence gathered from more than 3,000 incidents managed annually, along with extensive cybersecurity knowledge, to safeguard, identify, and address cyber threats effectively.

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Digital Forensics

With a track record of managing over 3,000 security incidents annually, Kroll's team of digital forensics specialists excels in the comprehension, analysis, and safeguarding of data throughout the investigative process. When faced with a security breach, Kroll’s experts are well-equipped to conduct thorough investigations and secure critical data, aiding in the collection of evidence and the maintenance of business operations.

Incident Management

Kroll's top-tier security experts respond swiftly to more than 3,000 incidents annually, equipped with the knowledge and tools to manage every phase of an incident, from legal obligations to breach alerts. Rest assured during emergencies with our dedicated support.

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Kroll stands as the premier global provider of incident response services, boasting unparalleled knowledge and cutting-edge threat intelligence to safeguard against, identify, and react to cyber threats. Regardless of the nature of data breaches or cyber offenses, Kroll possesses the necessary experience and resources—both personnel and technological—to act swiftly. They excel at identifying, isolating, and protecting critical data while thoroughly investigating the digital footprint, no matter where it may lead.

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Managed Detection and Response (MDR)

Combat cyber threats effectively with Kroll Responder's managed detection and response service. Backed by experienced incident response specialists and cutting-edge threat intelligence, Kroll Responder MDR offers unparalleled security solutions. With 24/7 monitoring, proactive detection of targeted attacks, and comprehensive incident management, we ensure your digital landscape is safeguarded and threats are swiftly contained and eliminated.

Penetration Testing

Assess your cybersecurity measures against genuine threats. Kroll offers top-tier penetration testing services that combine cutting-edge threat intelligence, extensive experience from numerous cybersecurity evaluations conducted annually, and a skilled team of certified professionals. This forms the basis of our advanced and adaptable strategy.

Security Risk Assessment

Our Cybersecurity Risk Evaluations encompass a comprehensive examination of the organization's information security framework, covering everything from policies and procedures to technical safeguards, as well as the involvement of personnel, processes, and technologies. We carry out a range of discussions with key internal stakeholders from both technical and business sectors to pinpoint opportunities for enhancement aimed at advancing the maturity of the organization's information security strategy, utilizing the NIST Cybersecurity framework as a reference point.

Threat Intelligence

Kroll's cyber threat intelligence offerings are powered by real-time incident response insights and a skilled team of top-tier analysts dedicated to proactively identifying and addressing threats. Our experts integrate Kroll’s technical intelligence, thorough analytical research, and investigative skills to enhance your security awareness, ensuring you receive specialized triage, investigation, and remediation assistance.

Alternatives

Alternatives

MetaPhish Reviews

MetaPhish

MetaCompliance
Elasticito Reviews

Elasticito

Elasticito Limited