Balbix References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (970)
    15+ References
  • 4.7 / 5.0 (3176)
    Verified154+ References
  • 4.7 / 5.0 (4056)
    Premium298+ References

Balbix Case Studies

  • Large US Telco Deploys Real-Time Asset Inventory, Saves Millions

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References15 total
    About

    Intruder is a proactive security monitoring platform for internet-facing systems. Intruder was founded in 2015 to help solve the information overload crisis in vulnerability management. Having worked both as an ethical hacker for tier one companies, and for blue teams defending critical national infrastructure, Founder Chris Wallis noticed that while vulnerability management tools were great at finding issues, they were less useful when it came to prioritising them, tracking them, and timely alerting when problems arose. Quite simply the most important issues were often getting lost in the noise.

  • Reference Rating
    4.7 / 5.0
    Customer References154 total
    About

    OPSWAT is a San Francisco-based cyber security software company that provides solutions to secure and manage IT infrastructure. Founded in 2002, They've supplied companies with solutions and technologies that protect them from threats for over a decade.

  • Reference Rating
    4.7 / 5.0
    Customer References298 total
    About

    Rapid7 is engineering better security with simple, innovative solutions for IT security's most critical challenges. Rapid7 security data and analytics solutions collect, contextualize, correlate, and analyze the security data you need to dramatically reduce threat exposure and detect compromise in real-time. Unlike traditional vulnerability assessment or incident management, Rapid7's comprehensive data collection, attacker intelligence, and user-behavior analytics give you immediate insight into the security state of your assets and users from the endpoint to the cloud. They offer unmatched capabilities to spot intruders leveraging today's #1 attack vector, compromised credentials.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked