Compare Probe.ly vs Proofpoint vs cWatch

More Information More Information More Information

Crozscore:

55%
what is this?
25%
interest falling

Crozscore:

91%
what is this?
56%
no significant changes

Crozscore:

93%
what is this?
58%
interest falling
Probe.ly screenshot view 1 more Proofpoint screenshot view 4 more cWatch screenshot

Software Description:

Probe.ly automates web vulnerability scanning and is targeted at companies that build online services. Our customers can cost-effectively request scans of web applications and efficiently manage the lifecycle of the vulnerabilities found in a sleek and intuitive web interface. By providing step-by-step solutions to fix the vulnerabilities, our customers can avoid hiring expensive security consultants.

At the core of Probe.ly, we developed an engine that is able to significantly reduce the number of false positives found, by applying heuristics and Machine Learning, and increased vulnerability detection by applying an advanced fingerprinting module that recognizes popular web applications and frameworks.

Probe.ly, in its bare bones, automates the task of scanning your web application to find vulnerabilities and lets you efficiently manage the lifecycle of the vulnerabilities found in a sleek and intuitive interface.

As opposed to Web Application Penetration testing, our product, by being automated, can offer a very competitive price and address a new market of small companies and startups that do not have the budget for penetration testing services. For more mature companies that already perform annual pen-testing, Probe.ly complements it by providing continuous scans and a continuous level of assurance.

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Software Description:

Comodo cWatch Web is a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) that leverages data from over 85 million endpoints to detect and mitigate threats before they occur.

The service also includes malware detection scanning, preventive methods, and removal services to enable organizations to take a proactive approach to protecting their business and brand reputation from attacks and infections. And, vulnerability scanning to provide businesses, Online merchants and other service providers who handle credit cards online with a simple and automated way to stay compliant with the Payment Card Industry Data Security Standard (PCI DSS).

Features:

  • Data Visualization
  • Multi-User
  • Bug Tracking
  • Dashboard
  • Scheduling
  • Notifications
  • Third-Party Plugins/Add-Ons
  • External Integrations
  • API

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Features:

Summary:

  • Automated vulnerability scanning of web applications.

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

Summary:

  • Malware Detection

  • Malware Removal

  • Threat management

  • Security Expertise

  • 24/7 Website Surveillance

  • Threat Investigations

  • Incident Response

On Demand

$60.00
1 server(s) / month
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access

On Demand Annually

$48.00
1 server(s) / year
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access

Pool

$600.00
10 server(s) / year
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access
  • Option to Pay by Invoice
  • Add/Remove Targets as Needed Within the Pool Limit

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

PREMIUM

$24.90
1 user(s) / month
Included in plan:
  • Instant Malware Removal

PRO

$9.90
1 user(s) / month
Included in plan:
  • Instant Malware Removal

ENTERPRISE

$149.90
1 user(s) / month
Included in plan:
  • Bandwidth and Domains - 1000 GB/mo

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • We offer customer support and some tutorials.

  • What is this service generally used for?
  • Find vulnerabilities in web applications in an automated and unattended fashion. Manage the vulnerabilities (mark as fixed, mark as accept risk, see how to fix).

  • Does this service offer an API?
  • Yes, for every single operation and piece of information available in the site.

  • What are some applications this service is commonly used in tandem with?
  • Jenkins, Travis, Jira, Slack.

  • What platforms does this service support?
  • Web applications.

  • Does this service integrate with any other apps?
  • Jira and Slack have direct integrations. Virtually any application since we have an API for everything.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes, a paying customer can create multiple users for their team.

  • Who are the main user groups of this service?
  • Companies that build or manage online services. Developers that build and maintain web applications but also security teams that need to test web applications.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

FAQs:

    No FAQs associated with this application.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
3.55k
Followers:
23.7k

Publisher:

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Other:

Who uses Probe.ly
  • Personal
  • Startups
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
French, English, Spanish, Japanese, German
Regional Restrictions:
No restrictions.

Other:

Who uses cWatch
  • Enterprises
Languages:
English
Regional Restrictions:
No restrictions.
Back to top