CySight Description

CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight empowers network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance. CySight’s Dropless Collection method enables unsurpassed visibility of network Big-Data which is retained in the smallest footprint, accelerating machine learning, artificial intelligence and automation to fully utilize all metadata no matter the amount, size, or type.

Pricing

Pricing Starts At:
$299/month
Pricing Information:
Contact for "Pay by Need"
Free Version:
Yes
Free Trial:
Yes

Integrations

API:
Yes, CySight has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
IdeaData
Year Founded:
2001
Headquarters:
Israel
Website:
Cysight.ai
Update This Listing

Media

CySight Top Talkers per minute - Pie

CySight Top Talkers per minute - Pie

Recommended Products
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms
Web-Based
Windows
Types of Training
Training Docs
Live Training (Online)
Webinars
Customer Support
Business Hours
Live Rep (24/7)
Online Support

CySight Features and Options

Network Monitoring Software

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Application Performance Monitoring (APM) Software

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Network Troubleshooting Software

Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring

Computer Security Software

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Billing and Provisioning Software

Billing & Invoicing
Carrier Access Billing
Contract Management
Customer Accounts
Customizable Billing
Flexible Rate Tables
Internet
Order Management
Post-Paid Systems
Pre-Paid Systems
Provisioning
Rating
Self Service Portal
Service Order System
VoIP

Network Mapping Software

Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Network Security Software

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Network Traffic Analysis (NTA) Software

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

CySight Lists

CySight User Reviews

Write a Review
  • Previous
  • Next