Compare TokenOne Authentication vs CarbonBlack vs Proofpoint

More Information More Information More Information

Crozscore:

53%
what is this?
19%
interest falling

Crozscore:

82%
what is this?
42%
interest rising

Crozscore:

91%
what is this?
56%
interest falling
TokenOne Authentication screenshot view 1 more CarbonBlack screenshot view 5 more Proofpoint screenshot view 4 more

Software Description:

How Is TokenOne Different From Other Authentication Systems? The key differentiator to other authentication services is that TokenOne proves user presence. We provide genuine strong Two-Factor Authentication as both factors are strong. There are three accepted factors in Authentication:

  1. Something you know – the knowledge factor
  2. Something you have – the possession factor
  3. Something you are – the inherence factor

With TokenOne you never reveal your secret PIN – so the knowledge factor remains strong. Unlike other solutions that rely on the user entering a ‘secret’ (usually a password) to prove they know it, TokenOne changes the knowledge factor paradigm by enabling proof of the knowledge factor without ever revealing it. This makes the TokenOne PIN a ‘zero-knowledge password proof’ and sets a new standard for Authentication.

The second factor, the possession factor, is your smart device. This has been profiled and must also be present to prove you are an authorized user.

With TokenOne Authentication both factors are strong. TokenOne allows organizations to prove who is accessing your site or service. This is vital not only for the security of sensitive information but also for compliance.

Software Description:

One of the most used products of this service provider is CB Defense which is one of the strongest security solutions for data centers and critical systems.

Carbon Black’s security solution is based on the central whitelist database, which consists of a registry of trusted software and their classifications/ratings. CB Defense provides its users with transparent anti-virus solution, a low impact on their systems, and provides lots of useful reporting data. The antivirus, along with EDR is presented in one cloud-delivered platform that stops all kinds of malware and ransomware.

CB Defense catches all unfiltered data from the endpoint and analyzes events in context to reveal arising threats that other platforms could miss. Unlike traditional antivirus, there are no lags behind emerging attacks and thanks to the automation of operational tasks, manual efforts are reduced to the minimum.

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Features:

  • Password & Access Management
  • 2-Factor Authentication

Features:

  • Dashboard
  • Notifications
  • Data Export
  • External Integrations
  • API
  • Firewall
  • Anti-Virus

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Summary:

  • Best of breed user authentication

  • TokenOne “Keeps Secrets Secret!”

  • The strongest form of software-based Two Factor Authentication security

  • With TokenOne a user’s secret PIN is never entered, transmitted or even stored anywhere

  • The TokenOne PIN is a "zero knowledge password proof"

Summary:

  • Prevents attacks automatically, online and offline

  • Stops malware, ransomware, and non-malware attacks

  • Blocks emerging, never-before-seen attacks that other solutions miss

  • Records and stores the complete data record of every endpoint, even if it is offline

  • Visualizes every stage of the attack with easy-to-follow attack chain

  • Uncovers root cause in minutes to quickly address gaps in your defenses

  • Continuous and centralized recording provides complete visibility into the attack

  • Quickly visualize the attack chain to see exactly what attackers are trying to do

  • Creates a secure shell to any endpoint on or off the network to address critical issues

  • Deploys in 15 minutes or less, with less than 1% CPU and disk space per endpoint

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

3-year license

$420.00
3-year license
Included in plan:
  • Single endpoint installation
  • Built entirely on open APIs and features easy integration with other tools

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

FAQs:

    What are some applications this service is commonly used in tandem with?
  • Some Applications TokenOne Authentication is commonly used with are RADIUS, SAML, Window Server, ADFS, and Office 365.

  • What is this service generally used for?
  • TokenOne Authentication is used for secure authentication to different types of software and platforms in a way that never reveals the users' credentials and proves user presence.

  • Does this service offer guides, tutorials and or customer support?
  • Yes.

  • What platforms does this service support?
  • TokenOne Authentication supports Android, Windows mobile and IOS.

  • Does this service integrate with any other apps?
  • TokenOne can be integrated into any apps using our pre-configured connectors or through our APIs.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • The main user groups are companies/enterprises and their employees and clients.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Webinars, Training, Community Support, Phone Support, Email Support.

  • Does this service integrate with any other apps?
  • Integrations: Cyphort, Corvil, ServiceNow.

  • What is this service generally used for?
  • This service is used for anti-malware protection.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • Does this service offer an API?
  • Yes, it offers RESTful API.

  • Who are the main user groups of this service?
  • Main users of CarbonBlack are enterprise-level organizations.

  • What platforms does this service support?
  • This service supports WIndows, MacOS, Red Hat Linux, and CentOS.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Southborough
Employees:
51-200
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
Followers:

Other:

Who uses TokenOne Authentication
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Mobile Platforms:
  • iOS
  • Android
  • Blackberry
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses CarbonBlack
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
Japanese, Spanish, French, German, English
Regional Restrictions:
No restrictions.
Back to top