Compare inDefend vs cWatch vs Proofpoint

More Information More Information More Information

Crozscore:

65%
what is this?
34%
interest falling

Crozscore:

92%
what is this?
58%
no significant changes

Crozscore:

88%
what is this?
50%
55%
interest rising
inDefend screenshot view 5 more cWatch screenshot Proofpoint screenshot view 4 more

Software Description:

Our flagship solution, inDefend is a complete insider threat management suite capable of providing a real-time feed of the data that’s been sent out on a daily basis. It provides a controlled environment for information outflow on various channels and portable devices. inDefend’s Cyber Intelligence reports bestow proactive warnings about probable data loss through notifications, alerts, SMS, and emails to identify and block sensitive data from leakage.

inDefend is built to achieve full transparency over all the computers of the organization by maintaining relevant data and network control. The application is designed to prevent access to unauthorized removable media devices, websites and applications.

Mobile access to vital resources is required to make Enterprise mobility work and leverage business opportunities. Mobile Workforce Management (MWM) is required to protect the corporate assets used on these mobile devices. The devices required to manage may be out of physical reach, but they don’t have to be out of touch. With MWM, it is possible to manage everything users need to be productive and gain secure access through mobile devices. MWM can control the insider data leakage scenarios and log such events on the basis of company-specific policies.

Software Description:

Comodo cWatch Web is a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) that leverages data from over 85 million endpoints to detect and mitigate threats before they occur.

The service also includes malware detection scanning, preventive methods, and removal services to enable organizations to take a proactive approach to protecting their business and brand reputation from attacks and infections. And, vulnerability scanning to provide businesses, Online merchants and other service providers who handle credit cards online with a simple and automated way to stay compliant with the Payment Card Industry Data Security Standard (PCI DSS).

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Features:

  • Organization Management
  • Malware Protection
  • Bug Tracking
  • Google Apps Integration
  • 2-Factor Authentication
  • Email Integration
  • Multi-User
  • Data Export
  • Dashboard
  • Notifications
  • Password & Access Management
  • Anti-Virus
  • External Integrations
  • Firewall
  • API
  • Batch Permissions & Access
  • Data Import
  • File Transfer
  • File Sharing

Features:

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Summary:

  • Prevent access to unauthorized removable media devices, websites and applications.

  • Achieve full transparency over all the organization computers.

  • Be secured against insider threats and cybersecurity risks.

Summary:

  • Malware Detection

  • Malware Removal

  • Threat management

  • Security Expertise

  • 24/7 Website Surveillance

  • Threat Investigations

  • Incident Response

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

PREMIUM

$24.90
1 user(s) / month
Included in plan:
  • Instant Malware Removal

PRO

$9.90
1 user(s) / month
Included in plan:
  • Instant Malware Removal

ENTERPRISE

$149.90
1 user(s) / month
Included in plan:
  • Bandwidth and Domains - 1000 GB/mo

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

FAQs:

    What is this service generally used for?
  • For proactively tackling insider threats, monitoring employees digital activities like
    browsing (search engine, application usage, email activities) and device activities can
    provide insights about intention

FAQs:

    No FAQs associated with this application.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
Followers:

Other:

Who uses inDefend
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses cWatch
  • Enterprises
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
German, Japanese, French, English, Spanish
Regional Restrictions:
No restrictions.
Back to top