Compare inDefend vs Comodo Endpoint vs Proofpoint

More Information More Information More Information

Crozscore:

65%
what is this?
34%
interest falling

Crozscore:

93%
what is this?
58%
interest falling

Crozscore:

84%
what is this?
70%
55%
interest falling
inDefend screenshot view 5 more Comodo Endpoint screenshot Proofpoint screenshot view 4 more

Software Description:

Our flagship solution, inDefend is a complete insider threat management suite capable of providing a real-time feed of the data that’s been sent out on a daily basis. It provides a controlled environment for information outflow on various channels and portable devices. inDefend’s Cyber Intelligence reports bestow proactive warnings about probable data loss through notifications, alerts, SMS, and emails to identify and block sensitive data from leakage.

inDefend is built to achieve full transparency over all the computers of the organization by maintaining relevant data and network control. The application is designed to prevent access to unauthorized removable media devices, websites and applications.

Mobile access to vital resources is required to make Enterprise mobility work and leverage business opportunities. Mobile Workforce Management (MWM) is required to protect the corporate assets used on these mobile devices. The devices required to manage may be out of physical reach, but they don’t have to be out of touch. With MWM, it is possible to manage everything users need to be productive and gain secure access through mobile devices. MWM can control the insider data leakage scenarios and log such events on the basis of company-specific policies.

Software Description:

Comodo Advanced Endpoint Security software brings 7 layers of defense - antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) - together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Features:

  • Organization Management
  • Malware Protection
  • Bug Tracking
  • Google Apps Integration
  • 2-Factor Authentication
  • Email Integration
  • Multi-User
  • Data Export
  • Dashboard
  • Notifications
  • Password & Access Management
  • Anti-Virus
  • External Integrations
  • Firewall
  • API
  • Batch Permissions & Access
  • Data Import
  • File Transfer
  • File Sharing

Features:

  • Anti-Virus

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Summary:

  • Prevent access to unauthorized removable media devices, websites and applications.

  • Achieve full transparency over all the organization computers.

  • Be secured against insider threats and cybersecurity risks.

Summary:

    No key features associated with this application.

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

FAQs:

    What is this service generally used for?
  • For proactively tackling insider threats, monitoring employees digital activities like
    browsing (search engine, application usage, email activities) and device activities can
    provide insights about intention

FAQs:

    No FAQs associated with this application.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
Followers:

Other:

Who uses inDefend
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Comodo Endpoint
  • Personal
  • Startups
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
Japanese, Spanish, French, German, English
Regional Restrictions:
No restrictions.
Back to top