Proofpoint Identity Threat DefenseProofpoint
|
||||||
Related Products
|
||||||
About
In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain.
Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.
|
About
Map out your entire cloud identity attack surface and harden it against identity-based attacks. Push is a vulnerability scanner for your cloud identities. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and the vulnerabilities putting your business at risk.
- Get real-time visibility of all your cloud identities, apps and integrations.
- Onboard unmanaged apps to SSO. Detect and harden non-SSO identities.
- Find and secure vulnerable identities. Prevent your employees creating insecure identities.
- Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk.
- Improve employee security awareness by equipping them to self-remediate security issues.
Try it for free today.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies searching for an identity threat defense system
|
Audience
Security teams in cloud-first businesses
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5 per employee per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationProofpoint
Founded: 2002
United States
www.proofpoint.com/us/illusive-is-now-proofpoint
|
Company InformationPush Security
Founded: 2019
United Kingdom
pushsecurity.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
SaaS Management Features
License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management
|
||||||
Integrations
Microsoft 365
Microsoft Azure
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
Google Workspace
|
Integrations
Microsoft 365
Microsoft Azure
Axonius
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Google Cloud Platform
Google Workspace
|
|||||
|
|
|