Compare MinerEye Data Tracker™ vs Comodo Endpoint vs Proofpoint

More Information More Information More Information

Crozscore:

57%
what is this?
32%
interest falling

Crozscore:

93%
what is this?
58%
interest falling

Crozscore:

91%
what is this?
56%
interest rising
MinerEye Data Tracker™ screenshot view 1 more Comodo Endpoint screenshot Proofpoint screenshot view 4 more

Software Description:

Our Mission: Put data into order, make it more protected, compliant, and reusable to enable secure IaaS adoption.

Technological Leap: MinerEye interpretive AI™ is a fusion of Byte level pattern recognition and unsupervised clustering of those patterns.

Our Product: MinerEye Data Tracker™

MinerEye Data Tracker™ automatically discovers and monitors precious company and customer data, whether it's located within the organization or outside of it.

MinerEye Data Tracker™ is built around a three-step automated process that uses identification, classification, and tracking of sensitive information assets across data sources to identify sensitive data by its essence.

Software Description:

Comodo Advanced Endpoint Security software brings 7 layers of defense - antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) - together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Features:

  • Data Visualization
  • Analytics
  • External Integrations
  • Notifications
  • Multi-User
  • Dashboard
  • Data Export
  • Data Import
  • Data Mining

Features:

  • Anti-Virus

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Summary:

    No key features associated with this application.

Summary:

    No key features associated with this application.

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Yes.

  • Who are the main user groups of this service?
  • The main users of VisionGrid include:

    Audit & Compliance Managers, Risk Managers, CISOs, Heads of Litigation and others.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes it does.

  • What are some applications this service is commonly used in tandem with?
  • VisionGrid can be used in tandem with the following applications:

    Microsoft Azure, Microsoft Information Protection, Identity and Access Management, IRM, DLP, SIEM, Cloud platforms, and cloud service providers.

  • What platforms does this service support?
  • Clowd, SMB.

  • Does this service offer an API?
  • Yes, to the following:

    Microsoft Azure, Microsoft Information Protection, Identity and Access Management, IRM, DLP, SIEM, Cloud platforms, cloud service providers.

FAQs:

    No FAQs associated with this application.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
Followers:

Other:

Who uses MinerEye Data Tracker™
  • Enterprises
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Comodo Endpoint
  • Personal
  • Startups
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
Spanish, French, English, Japanese, German
Regional Restrictions:
No restrictions.
Back to top