Compare Violet vs Code42 vs CrowdStrike

More Information More Information More Information

Crozscore:

53%
what is this?
28%
interest falling

Crozscore:

88%
what is this?
88%
46%
interest falling

Crozscore:

84%
what is this?
80%
47%
no significant changes
Violet screenshot view 5 more Code42 screenshot view 5 more CrowdStrike screenshot

Software Description:

Most companies are unable to verify that their security controls are properly protecting them, enabling hackers to easily steal sensitive information without detection. Many major companies spend millions on cybersecurity yearly, yet are usually not protected -- even if they are complying with regulations.

Threatcare's Violet platform enables companies to continuously validate that their security in place is working, while also giving teams the ability to test if potential software buys actually do what they claim to (and are being properly setup).

Violet isn't just a virtual Purple Team (that combines cybersecurity Red Team and Blue Team actions), Violet also has machine learning and NLP (Neuro-Linguistic Programming) abilities which allows it to be more proficient over time.

Software Description:

Code42 delivers its endpoint data security and recovery product to more than 47,000 organizations around the world. It protects companies' data with guaranteed high-level security regardless of their size or industry.

Using this cloud-based technology, businesses are able to protect end-user data in a single repository and from a single platform. Code 42 provides high-end security standards and significantly reduces the chance of unexpected data disasters resulting in high financial loss.

Thanks to the platform's straightforward interface and simple deployment, it is very easy for users to protect their endpoints and schedule regular backups. The whole package is easy to install, inexpensive, remarkably reliable, and takes care of the whole backup infrastructure.

Software Description:

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks — both malware and malware-free.

Please contact us or visit our website today to learn more.

Features:

  • Data Visualization
  • Data Mining
  • Big Data
  • Sentiment Analysis
  • Analytics
  • A/B Testing
  • SAP Integration
  • Data Export
  • Multi-User
  • External Integrations
  • API
  • Batch Permissions & Access
  • File Transfer
  • Data Import
  • Cloud Deployment
  • Local Deployment
  • Optimized Search Processing
  • File Sharing
  • Dashboard
  • Notifications
  • Password & Access Management
  • 2-Factor Authentication
  • Anti-Virus
  • Firewall

Features:

  • Dashboard
  • Notifications
  • Data Export
  • 2-Factor Authentication
  • File Sharing
  • File Transfer
  • External Integrations
  • API

Features:

Summary:

  • Threatcare simplifies product evaluations and security controls monitoring by carrying out on-demand simulations.”

  • Our customers use Threatcare dashboard notifications to continuously monitor their cybersecurity posture.

  • Our on-demand simulations are easy to perform, safe, and give you instant feedback on your cybersecurity posture.

  • Our customers use the Threatcare platform to safely train incident responders and network forensic practitioners in their environment.

  • Violet isn’t just a virtual Purple Team, Violet also has machine learning and NLP (Neuro-Linguistic Programming) abilities — which has early adopters referring to Violet as the “Alexa for Security.”

  • Violet: The World’s First Virtual Cybersecurity Professional.

  • Violet doesn’t just enable benign intrusion simulations (and security stack testing), Violet also partakes in external attack surface assessments and discovers rogue internet facing assets.

  • Violet’s capabilities include data exfiltration, malware beaconing, DNS tunneling, antivirus assessment, lateral scans, egress scans, executable transfers, perimeter scans, DNS enumeration (DNS brute forcing), network reconnaissance, OSINT (open source intelligence), regression testing, tabletop exercises, gap analysis and all-encompassing defense in depth.

  • Red Team Pentesters only use 1-2 attack vectors and exfiltration vectors. Violet is all encompassing, all the time.

  • Violet helps organizations with their gap analysis — enabling them to no longer just guess that they’re protected.

Summary:

  • File Versioning

  • Automatic Upgrades

  • AES Encryption

  • Bandwidth Governing

  • Reports and Alerts

  • Mobile Compatibility

  • Key Escrowing

  • File Restoration Based on Time and Size

  • Universal Networking

  • Dynamic IP Locator

Summary:

    No key features associated with this application.

Standard

$4.00
1 user(s) / month
Included in plan:
  • 50GB Cloud Storage
  • Automatic & Continuous Endpoint Backup
  • Administration + Reporting
  • End-to-End Security
  • Point-in-Time Recovery
  • Supports Windows, Mac & Linux
  • Monitor Backup Completion
  • Data Protection In-Transit & Rest
  • Device Replacement Wizard
  • Unified Admin Console
  • Okta Integration (Identity Management)

Premium

$8.00
1 user(s) / month
Included in plan:
  • Unlimited Cloud Storage
  • USMT Integration (Profile Settings)
  • Rest API
  • Splunk Integration (Reporting)

FAQs:

    What are some applications this service is commonly used in tandem with?
  • Palo Alto networks, Splunk

  • What is this service generally used for?
  • Threatcare's Violet platform simplifies product evaluations and security controls monitoring. Organizations use Violet to augment multiple cybersecurity jobs while also helping to train current security staff and carry out on-demand simulations.

  • Does this service offer guides, tutorials and or customer support?
  • A user guide is available at our website: https://www.threatcare.com/violet-user-guide. We take pride in the continuous support we provide to all of our clients.*

  • What platforms does this service support?
  • Browser-based. Works directly through browsers (can be used on any device with a browser) including Android, iOS, Windows Phone, Mac, Windows, Linux.

  • Who are the main user groups of this service?
  • Any organization who needs to verify that their security actually works.

FAQs:

    Does this service integrate with any other apps?
  • Integrations: Splunk Cloud, Z-Discovery.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with Splunk Enterprise.

  • Does this service offer an API?
  • Yes, it offers REST API.

  • Does this service offer guides, tutorials and or customer support?
  • Support: FAQs, Community, Knowledge Base, Online Support, Phone Support, Video Tutorials, Webinars.

  • What platforms does this service support?
  • The platform can be both cloud-based and installed. Operating systems: Windows, Mac OS X, and Linux.

  • Who are the main user groups of this service?
  • Main users of Code42 are middle-sized and large organizations across indrustries.

  • What is this service generally used for?
  • This service is generally used for digital data backup and recovery.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

FAQs:

    No FAQs associated with this application.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
93
Followers:
3.19k

Publisher:

Founded:
-
Based in:
Minneapolis
Employees:
501-1000
Likes:
5.33k
Followers:

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
501-1000
Likes:
Followers:

Other:

Who uses Violet
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
  • Blackberry
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Code42
  • Startups
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Languages:
English, German
Regional Restrictions:
No restrictions.

Other:

Who uses CrowdStrike
  • Agencies
  • Enterprises
Languages:
English
Regional Restrictions:
No restrictions.
Back to top