Darwin Attack

Darwin Attack

Evolve Security
+
+

Related Products

  • Reflectiz
    29 Ratings
    Visit Website
  • Wiz
    1,446 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Astra Pentest
    246 Ratings
    Visit Website
  • Orca Security
    531 Ratings
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website

About

Evolve Security’s Darwin Attack® platform is designed to help maximize the utilization and collaboration of security information, to enable your organization to perform proactive security actions, improving your security and compliance, while reducing risk. Attackers continue to get better at identifying vulnerabilities, then developing exploits and weaponizing them in tools and exploit kits. If you want a chance at keeping up with these attackers you also need to become better at identifying and fixing vulnerabilities, and doing so before attackers are taking advantage of them in your environment. Evolve Security’s Darwin Attack® platform is a combination data repository, collaboration platform, communication platform, management platform, and reporting platform. This combination of client-focused services improves your capability to manage security threats and reduce risks to your environment.

About

Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to identify and remediate risks and vulnerabilities to improve control

Audience

Organizations looking for an advanced Vulnerability Management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Evolve Security
United States
www.evolvesecurity.com/platform

Company Information

Intruder
Founded: 2015
United Kingdom
intruder.io

Alternatives

Alternatives

Astra Pentest

Astra Pentest

Astra Security
Acunetix

Acunetix

Invicti Security
Tenable One

Tenable One

Tenable
Silent Armor

Silent Armor

Silent Breach

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Jira
Slack
6clicks
Amazon EC2
Amazon Web Services (AWS)
BI Book
CardinalOps
CodeConductor
Jira Work Management
Microsoft Azure
Microsoft Teams
Quickwork
Seemplicity
ServiceNow
Tenable One
Zapier
Zendesk

Integrations

Jira
Slack
6clicks
Amazon EC2
Amazon Web Services (AWS)
BI Book
CardinalOps
CodeConductor
Jira Work Management
Microsoft Azure
Microsoft Teams
Quickwork
Seemplicity
ServiceNow
Tenable One
Zapier
Zendesk
Claim Darwin Attack and update features and information
Claim Darwin Attack and update features and information
Claim Intruder and update features and information
Claim Intruder and update features and information