Compare Probe.ly vs Heimdal CORP vs CarbonBlack

More Information More Information More Information

Crozscore:

58%
what is this?
25%
interest falling

Crozscore:

83%
what is this?
48%
no significant changes

Crozscore:

82%
what is this?
42%
no significant changes
Probe.ly screenshot view 1 more Heimdal CORP screenshot CarbonBlack screenshot view 5 more

Software Description:

Probe.ly automates web vulnerability scanning and is targeted at companies that build online services. Our customers can cost-effectively request scans of web applications and efficiently manage the lifecycle of the vulnerabilities found in a sleek and intuitive web interface. By providing step-by-step solutions to fix the vulnerabilities, our customers can avoid hiring expensive security consultants.

At the core of Probe.ly, we developed an engine that is able to significantly reduce the number of false positives found, by applying heuristics and Machine Learning, and increased vulnerability detection by applying an advanced fingerprinting module that recognizes popular web applications and frameworks.

Probe.ly, in its bare bones, automates the task of scanning your web application to find vulnerabilities and lets you efficiently manage the lifecycle of the vulnerabilities found in a sleek and intuitive interface.

As opposed to Web Application Penetration testing, our product, by being automated, can offer a very competitive price and address a new market of small companies and startups that do not have the budget for penetration testing services. For more mature companies that already perform annual pen-testing, Probe.ly complements it by providing continuous scans and a continuous level of assurance.

Software Description:

  • Effortless Patching and Installation
    Automate your patch management to save time and resources. Heimdal CORP installs software and keeps it up to date, according to your specific needs and settings. Block 85% of web attack angles… with zero setup and no user interruptions. In-depth reporting on vulnerabilities and updates included. Works anywhere in the world.

  • Bird's Eye Threat Management
    Spot and mitigate infection risks, supervise how quickly your vulnerabilities are being removed and find malware through communication patterns - all in one Unified Threat Dashboard (UTD). Doing compliance and working with the EU DPA is also possible in the UTD.

  • Security Enhancement
    Heimdal supplements your endpoints’ security by filling the gaps left uncovered by inadequate antivirus reaction. Build up your defenses against unknown, polymorphic malware with dormant capabilities. Heimdal helps you reduce your response time to malware compromise with automated email alerts. Engineered to help you spot and mitigate infection risks before they turn into network-wide infections.

  • Deploy fast, at any scale and stay nimble
    As a lightweight client, you can easily deploy Heimdal on all your endpoints, via MSI, no matter the size of your organization. Doesn’t impact your endpoints’ performance and Internet speed. Heimdal doesn’t rely on large signatures or definitions and keeps your endpoints nimble and effective. Works anywhere in the world, not just in the Active Directory.

  • Integrate seamlessly, manage easily
    No matter what other security solutions you may be using, we guarantee that Heimdal will work smoothly with them, without causing conflicts. Your Heimdal dashboard makes it simple and time-effective for you to set up and manage your organization’s protection. Spot vulnerable endpoints and take action to keep malware infections at bay. Ensure continued compliance with legal requirements. Always know the state of security in your organizations.

  • Secure Access, Everywhere
    The Heimdal CORP platform uses a login process based on 3-factor authentication and is powered by a cloud-based, always on infrastructure. This platform is geo-replicated and load balanced, with SSD drives for ultra-quick response times and zero service delay.

  • Fiercely protect your endpoints against ransomware
    Proactive protection is what you need to stop ransomware from encrypting your endpoints. Heimdal closes vulnerabilities and sanitizes your Internet traffic to stop ransomware from infecting your endpoints. Based on extensive knowledge of cyber criminal infrastructure, Heimdal detects and blocks malware distribution websites, exploit kits, ransomware payloads, encryption keys and C&C communication. Effective 24/7, anywhere in the world.

  • Prevent data leakage and enhance your uptime
    Heimdal CORP prevents data breaches by blocking communication between malware and its C&C servers. By analyzing all HTTP, HTTPS and DNS traffic, Heimdal stops malware from harvesting confidential data from your endpoints. Effective against phishing, whaling, botnets, financial malware and other malicious software with data exfiltration capabilities. Ensures legal compliance with data protection standards. Reduces downtime and provides a safeguard for business continuity.

Heimdal CORP works in 3 ways, powered by its powerful engines:

  1. Supplement for Antivirus, which is reactive
    Antivirus looks for files and actions, whereas Heimdal looks at Internet traffic. Therefore, what Heimdal covers and antivirus products cover varies greatly. Heimdal prevents cyber criminals from taking data from your workstations and moving it out of your network.

  2. Traffic scanning to block malicious traffic
    Dangerous Internet traffic can be used to infect your workstations and network. This makes scanning and blocking malicious web traffic a core security component. Heimdal protects your workstations against cyber attacks and infected servers, domains and websites, while also ensuring a safeguard against data leakage.

  3. Patches 99.5% of security-critical software
    Heimdal patches Java 7 / 8, Acrobat Reader, Acrobat Flash, Quicktime, VLC Player, Silverlight and many other applications, covering 99% of security-critical software apps. Heimdal works automatically and silently, without interrupting the user.

Heimdal’s patch & install engine – key benefits

  • Automatic deployment/redeployment of patches
  • Silent software installation
  • Silent patching without user interruption
  • Works anywhere in the world, not just in the AD
  • Covers both feature and security patches
  • Patch release to install time of less the 4 hours on avg.
  • Integrates with the Active Directory without any setup
  • Configurable – install and patch specific software
  • Version management included
  • Easy deployment via MSI

Heimdal CORP provides proactive protection against:

  • Ransomware
  • Data leakage
  • Financial fraud and financial malware
  • Vulnerabilities caused by outdated software
  • Zero Day Malware
  • Data Leakage & Data Theft
  • Phishing, Pharming, Whaling
  • Exploit Kits
  • Malware Distribution Vectors (C&Cs, websites, etc.)
  • Malvertising
  • Fileless Malware
  • Malicious Traffic Redirects
  • Adware & Spyware
  • Botnets
  • Browser hijacking
  • DNS hijacking
  • Drive-by Attacks
  • Macro Viruses
  • Document Malware
  • URL Injection
  • Targeted Threats
  • SQL Injection
  • Remote Access Trojans
  • Rogueware
  • Polymorphic Malware
  • Keyloggers
  • IP Spoofing
  • Form-grabbing Malware
  • Email Malware Distribution
  • Dormant malware
  • Potentially unwanted programs (PUPs)

You can install Heimdal on computers running the following operating systems:

  • Windows 10 (32 and 64 bit)
  • Windows 8.1 (32 and 64 bit)
  • Windows 8 (32 and 64 bit)
  • Windows 7 (32 and 64 bit)
  • CITRIX
  • XENAPP 7.6 or above
  • XENSERVER 6.5
  • VMWARE
  • HYPER-V
  • WINDOWS SERVER 2008-2012

Heimdal has the following system requirements:

  • Microsoft .NET Framework 4.6.1*
  • 100 MB disk space
  • 250 MB RAM
  • 3% of CPU usage
  • Local administrator or domain administrator (if in domain) rights during installations
  • User rights during execution
  • Internet access

*if .NET Framework 4.6.1 Full Profile is not already installed, Heimdal will automatically download and install it. This does not apply to the MSI based installation.

Software Description:

One of the most used products of this service provider is CB Defense which is one of the strongest security solutions for data centers and critical systems.

Carbon Black’s security solution is based on the central whitelist database, which consists of a registry of trusted software and their classifications/ratings. CB Defense provides its users with transparent anti-virus solution, a low impact on their systems, and provides lots of useful reporting data. The antivirus, along with EDR is presented in one cloud-delivered platform that stops all kinds of malware and ransomware.

CB Defense catches all unfiltered data from the endpoint and analyzes events in context to reveal arising threats that other platforms could miss. Unlike traditional antivirus, there are no lags behind emerging attacks and thanks to the automation of operational tasks, manual efforts are reduced to the minimum.

Features:

  • Data Visualization
  • Multi-User
  • Bug Tracking
  • Dashboard
  • Scheduling
  • Notifications
  • Third-Party Plugins/Add-Ons
  • External Integrations
  • API

Features:

  • 2-Factor Authentication
  • Data Export
  • Multi-User
  • Notifications
  • Dashboard
  • API

Features:

  • Dashboard
  • Notifications
  • Data Export
  • External Integrations
  • API
  • Firewall
  • Anti-Virus

Summary:

  • Automated vulnerability scanning of web applications.

Summary:

    No key features associated with this application.

Summary:

  • Prevents attacks automatically, online and offline

  • Stops malware, ransomware, and non-malware attacks

  • Blocks emerging, never-before-seen attacks that other solutions miss

  • Records and stores the complete data record of every endpoint, even if it is offline

  • Visualizes every stage of the attack with easy-to-follow attack chain

  • Uncovers root cause in minutes to quickly address gaps in your defenses

  • Continuous and centralized recording provides complete visibility into the attack

  • Quickly visualize the attack chain to see exactly what attackers are trying to do

  • Creates a secure shell to any endpoint on or off the network to address critical issues

  • Deploys in 15 minutes or less, with less than 1% CPU and disk space per endpoint

On Demand

$60.00
1 server(s) / month
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access

On Demand Annually

$48.00
1 server(s) / year
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access

Pool

$600.00
10 server(s) / year
Included in plan:
  • Full API Access
  • Unlimited Scans
  • Full Feature Access
  • Option to Pay by Invoice
  • Add/Remove Targets as Needed Within the Pool Limit

3-year license

$420.00
3-year license
Included in plan:
  • Single endpoint installation
  • Built entirely on open APIs and features easy integration with other tools

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • We offer customer support and some tutorials.

  • What is this service generally used for?
  • Find vulnerabilities in web applications in an automated and unattended fashion. Manage the vulnerabilities (mark as fixed, mark as accept risk, see how to fix).

  • Does this service offer an API?
  • Yes, for every single operation and piece of information available in the site.

  • What are some applications this service is commonly used in tandem with?
  • Jenkins, Travis, Jira, Slack.

  • What platforms does this service support?
  • Web applications.

  • Does this service integrate with any other apps?
  • Jira and Slack have direct integrations. Virtually any application since we have an API for everything.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes, a paying customer can create multiple users for their team.

  • Who are the main user groups of this service?
  • Companies that build or manage online services. Developers that build and maintain web applications but also security teams that need to test web applications.

FAQs:

    No FAQs associated with this application.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Webinars, Training, Community Support, Phone Support, Email Support.

  • Does this service integrate with any other apps?
  • Integrations: Cyphort, Corvil, ServiceNow.

  • What is this service generally used for?
  • This service is used for anti-malware protection.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • Does this service offer an API?
  • Yes, it offers RESTful API.

  • Who are the main user groups of this service?
  • Main users of CarbonBlack are enterprise-level organizations.

  • What platforms does this service support?
  • This service supports WIndows, MacOS, Red Hat Linux, and CentOS.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Copenhagen
Employees:
11-50
Likes:
2.23k
Followers:
4.66k

Publisher:

Founded:
-
Based in:
Southborough
Employees:
51-200
Likes:
Followers:

Other:

Who uses Probe.ly
  • Personal
  • Startups
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Heimdal CORP
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
Danish, English, German
Regional Restrictions:
No restrictions.

Other:

Who uses CarbonBlack
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.
Back to top