MaxPatrol

MaxPatrol

Positive Technologies
+
+

Related Products

  • Carbide
    88 Ratings
    Visit Website
  • Cloudflare
    1,995 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Reflectiz
    29 Ratings
    Visit Website
  • Astra Pentest
    246 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Wiz
    1,446 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.

About

MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes looking for an advanced Vulnerability Management solution

Audience

Enterprises looking for a vulnerability and compliance management system for penetration testing, system checks, and compliance monitoring

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 4.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fortra
Founded: 1982
United States
www.digitaldefense.com

Company Information

Positive Technologies
Founded: 2002
Russia
www.ptsecurity.com/ww-en/products/maxpatrol/

Alternatives

Alternatives

Patrol Points

Patrol Points

Condo Control
SanerNow

SanerNow

SecPod Technologies
DrPatrol

DrPatrol

Dr Integrated Systems
TrendAI Vision One

TrendAI Vision One

Trend Micro

Categories

Categories

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Apache Airflow
Array APV Series
Check Point CloudGuard
Elastic
Frontline Vulnerability Manager
Gigamon
Huawei FusionStorage
IBM Cloud
IBM WebSphere Application Server
Juniper Square
Microsoft IIS
MongoDB
MySQL
NGINX
PostgreSQL
SAP ERP
Trend Micro Endpoint Encryption
VMware Cloud

Integrations

Apache Airflow
Array APV Series
Check Point CloudGuard
Elastic
Frontline Vulnerability Manager
Gigamon
Huawei FusionStorage
IBM Cloud
IBM WebSphere Application Server
Juniper Square
Microsoft IIS
MongoDB
MySQL
NGINX
PostgreSQL
SAP ERP
Trend Micro Endpoint Encryption
VMware Cloud
Claim Digital Defense and update features and information
Claim Digital Defense and update features and information
Claim MaxPatrol and update features and information
Claim MaxPatrol and update features and information