Compare inDefend vs Duo Security vs Code42

More Information More Information More Information

Crozscore:

63%
what is this?
34%
interest falling

Crozscore:

84%
what is this?
53%
no significant changes

Crozscore:

90%
what is this?
90%
46%
no significant changes
inDefend screenshot view 5 more  Duo Security screenshot view 5 more Code42 screenshot view 5 more

Software Description:

Our flagship solution, inDefend is a complete insider threat management suite capable of providing a real-time feed of the data that’s been sent out on a daily basis. It provides a controlled environment for information outflow on various channels and portable devices. inDefend’s Cyber Intelligence reports bestow proactive warnings about probable data loss through notifications, alerts, SMS, and emails to identify and block sensitive data from leakage.

inDefend is built to achieve full transparency over all the computers of the organization by maintaining relevant data and network control. The application is designed to prevent access to unauthorized removable media devices, websites and applications.

Mobile access to vital resources is required to make Enterprise mobility work and leverage business opportunities. Mobile Workforce Management (MWM) is required to protect the corporate assets used on these mobile devices. The devices required to manage may be out of physical reach, but they don’t have to be out of touch. With MWM, it is possible to manage everything users need to be productive and gain secure access through mobile devices. MWM can control the insider data leakage scenarios and log such events on the basis of company-specific policies.

Software Description:

Duo Security complete security solution verifies the identity of users and health of their devices prior to connecting to any of their applications. The platform provides multiple modes of two-factor authentication, configurable permissions and controls, endpoint visibility and remediation, as well as Single Sign-On options.

This web-based solution addresses security issues by user's identity verification based on multiple measures such as SMS passcodes, phone callbacks, or hardware tokens. It provides the necessary protection of users, data, and applications from hacker attacks and data loss. There is also email access protection ensured by sending push notifications to users' device when logging in from a different one.

Users of this app are able to build an inventory of their devices and recognize all vulnerabilities brought by an outdated OS, browsers, or plugins, along with data about login attempts. Safety checks of user's devices are performed each time he accesses a cloud application and his identity is confirmed as soon as the application is accessed.

Software Description:

Code42 delivers its endpoint data security and recovery product to more than 47,000 organizations around the world. It protects companies' data with guaranteed high-level security regardless of their size or industry.

Using this cloud-based technology, businesses are able to protect end-user data in a single repository and from a single platform. Code 42 provides high-end security standards and significantly reduces the chance of unexpected data disasters resulting in high financial loss.

Thanks to the platform's straightforward interface and simple deployment, it is very easy for users to protect their endpoints and schedule regular backups. The whole package is easy to install, inexpensive, remarkably reliable, and takes care of the whole backup infrastructure.

Features:

  • Organization Management
  • Malware Protection
  • Bug Tracking
  • Google Apps Integration
  • 2-Factor Authentication
  • Email Integration
  • Multi-User
  • Data Export
  • Dashboard
  • Notifications
  • Password & Access Management
  • Anti-Virus
  • External Integrations
  • Firewall
  • API
  • Batch Permissions & Access
  • Data Import
  • File Transfer
  • File Sharing

Features:

  • Dashboard
  • Multi-User
  • External Integrations
  • Data Import
  • API
  • Notifications
  • Password & Access Management
  • 2-Factor Authentication

Features:

  • Dashboard
  • Notifications
  • Data Export
  • 2-Factor Authentication
  • File Sharing
  • File Transfer
  • External Integrations
  • API

Summary:

  • Prevent access to unauthorized removable media devices, websites and applications.

  • Achieve full transparency over all the organization computers.

  • Be secured against insider threats and cybersecurity risks.

Summary:

  • Two-Factor Authentication

  • One-Tap Mobile Authentication

  • SMS Passcodes

  • Phone Callback

  • Temporary Bypass Codes

  • Hardware Tokens

  • Device Visibility

  • User Device Inventory

  • Outdated OS, Browser & Plugin Identification

  • Self-Remediation Notifications

Summary:

  • File Versioning

  • Automatic Upgrades

  • AES Encryption

  • Bandwidth Governing

  • Reports and Alerts

  • Mobile Compatibility

  • Key Escrowing

  • File Restoration Based on Time and Size

  • Universal Networking

  • Dynamic IP Locator

Duo Free

Free
Included in plan:
  • Protect logins with two-factor authentication
  • Protect on-premises apps

Duo MFA

$3.00
1 user(s) / month
Included in plan:
  • Easily enroll and manage users
  • Automate the management of your Duo solution (i.e. admin APIs)
  • Get an overview of device security hygiene
  • Protect federated cloud apps
  • Native support for protecting all cloud apps
  • Provide a secure single sign-on (SSO) experience for all users
  • Telephony credits — all accounts receive 100 credits

Duo Access

$6.00
1 user(s) / month
Included in plan:
  • Enforce role-based access policies
  • Identify users vulnerable to phishing attacks
  • Monitor and identify risky devices
  • Control what endpoints can access apps based on device hygiene
  • Automatically encourage users to update their own devices

Duo Beyond

$9.00
1 user(s) / month
Included in plan:
  • Identify corporate vs. personal devices
  • Control what devices can access apps based on device trust
  • Seamlessly launch all of your on-premises and cloud apps
  • Control which internal apps are accessible by remote users

Standard

$4.00
1 user(s) / month
Included in plan:
  • 50GB Cloud Storage
  • Automatic & Continuous Endpoint Backup
  • Administration + Reporting
  • End-to-End Security
  • Point-in-Time Recovery
  • Supports Windows, Mac & Linux
  • Monitor Backup Completion
  • Data Protection In-Transit & Rest
  • Device Replacement Wizard
  • Unified Admin Console
  • Okta Integration (Identity Management)

Premium

$8.00
1 user(s) / month
Included in plan:
  • Unlimited Cloud Storage
  • USMT Integration (Profile Settings)
  • Rest API
  • Splunk Integration (Reporting)

FAQs:

    What is this service generally used for?
  • For proactively tackling insider threats, monitoring employees digital activities like
    browsing (search engine, application usage, email activities) and device activities can
    provide insights about intention

FAQs:

    Who are the main user groups of this service?
  • Users of Duo Security are businesses of all sizes (SMB, MM, Enterprise) on a global scale. With customers in healthcare, legal, finance, tech, government, and education, Duo provides security to all market segments.

  • Does this service offer an API?
  • Yes, it offers API.

  • What is this service generally used for?
  • This service is generally used for two-factor authentication.

  • What platforms does this service support?
  • This is a web-based platform with Android and iOS native apps offered.

  • Does this service integrate with any other apps?
  • Integrations: PingFederate. Caradigm’s EPCS Solution for Healthcare, Aruba Networks Clearpass, Protecting Keeper Security Solutions, OneLogin.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • Does this service offer guides, tutorials and or customer support?
  • Support: Email Support, Chat, Telephone Support, Knowledge Base, Videos.

FAQs:

    Does this service integrate with any other apps?
  • Integrations: Splunk Cloud, Z-Discovery.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with Splunk Enterprise.

  • Does this service offer an API?
  • Yes, it offers REST API.

  • Does this service offer guides, tutorials and or customer support?
  • Support: FAQs, Community, Knowledge Base, Online Support, Phone Support, Video Tutorials, Webinars.

  • What platforms does this service support?
  • The platform can be both cloud-based and installed. Operating systems: Windows, Mac OS X, and Linux.

  • Who are the main user groups of this service?
  • Main users of Code42 are middle-sized and large organizations across indrustries.

  • What is this service generally used for?
  • This service is generally used for digital data backup and recovery.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Minneapolis
Employees:
501-1000
Likes:
Followers:

Other:

Who uses inDefend
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Duo Security
  • Personal
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
French, English, German
Regional Restrictions:
No restrictions.

Other:

Who uses Code42
  • Startups
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Languages:
English, German
Regional Restrictions:
No restrictions.
Back to top