Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Asset Monitor keeps track of all your external facing assets and services. Our protection capabilities and your risk profile will change as your technology footprint changes. Our expert training guides and simulated scams will help you teach your staff cyber security basics so they don't fall for attacks that could expose your company. Dark Web Monitor alerts to data leaks such as credit card numbers, personal information, and credentials. To find out if there are any data breaches, we monitor more than 350 cyber criminal groups. Our dashboard makes it easy to stay on top of cyber security issues. Our Hack Monitor scans the Internet for signs that cyber criminals may be targeting your company, or that you have been hacked but don't know it. Vulnerability Monitor scans your infrastructure for vulnerabilities that hackers could exploit.

Description

Proofpoint Digital Risk Protection offers comprehensive security for your brand and customers, safeguarding them from digital threats across various platforms, including web domains, social media, and areas of the deep and dark web. This solution stands out as the only one that delivers an all-encompassing defense for every digital interaction channel. By securing your social media framework, Digital Risk Protection helps prevent issues such as account takeovers, phishing attempts via social media, and the spread of harmful content. Requesting a demo allows you to analyze your social, mobile, and domain presence, helping you identify both legitimate and unauthorized accounts associated with your brand. Moreover, our solution defends your brand against a wide array of threats, including those targeting social media, web domains, and the dark web. In addition, we protect your domain investments from potential risks posed by domain squatters, typo-based phishing campaigns, and other infringing domain activities. Utilizing advanced artificial intelligence, our digital protection system identifies fraudulent domains that could endanger your brand and its customers, ensuring a safer online experience overall. With this proactive approach, you can maintain your brand's integrity and trust in the digital landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Amplifier Security
Cognizant
CrowdStrike Falcon
Eviden MDR Service
HCL Accelerate
NTT Cloud Communications
Okta
Optiv Managed XDR
Revelstoke
SailPoint
Splunk APM
Spoom
Stamus Networks
Verizon Cloud
appNovi

Integrations

Amazon Web Services (AWS)
Amplifier Security
Cognizant
CrowdStrike Falcon
Eviden MDR Service
HCL Accelerate
NTT Cloud Communications
Okta
Optiv Managed XDR
Revelstoke
SailPoint
Splunk APM
Spoom
Stamus Networks
Verizon Cloud
appNovi

Pricing Details

$99
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

DynaRisk

Founded

2015

Country

United Kingdom

Website

www.dynarisk.com/business/breachdefence

Vendor Details

Company Name

Proofpoint

Founded

2002

Country

United States

Website

www.proofpoint.com/us/products/digital-risk-protection

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Infrastructure Monitoring

Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Alternatives

Alternatives

ACID Cyber Intelligence Reviews

ACID Cyber Intelligence

ACID Technologies
Lunar Reviews

Lunar

Webz.io
PhishLabs Reviews

PhishLabs

Fortra