Audience

IT security teams

About Fletch

Fletch is known as The Cybersecurity Answer Engine because it gives you instant answers to your most pressing questions with zero data plumbing. For each app, Fletch’s AI engine does all the heavy lifting to bring together disparate data from your SaaS and security products so you can live in decision-making mode.

No data plumbing, no complicated search languages, no dashboards to maintain—get answers in terms anyone can understand with Fletch.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Fletch
Founded: 2019
United States
fletch.ai/

Videos and Screen Captures

Fletch Screenshot 1
Other Useful Business Software
Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries. Icon
Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.

For Residential, Commercial and Public Works Contractors

Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
Learn More

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Phone Support
Online

Fletch Frequently Asked Questions

Q: What kinds of users and organization types does Fletch work with?
Q: What languages does Fletch support in their product?
Q: What kind of support options does Fletch offer?
Q: What type of training does Fletch provide?

Fletch Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Intrusion Detection System
Two-Factor Authentication
Anti Virus
Event Tracking
IP Protection
Web Traffic Reporting
Internet Usage Monitoring
Web Threat Management
Anti Spam
Email Attachment Protection
Vulnerability Scanning
Spyware Removal