Balbix References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (2329)
    Premium74+ References
  • 4.8 / 5.0 (1261)
    66+ References
  • 4.7 / 5.0 (4509)
    Premium298+ References

Balbix Case Studies

  • The Master Group Improves Asset Visibility, Reduces Risk and Speeds Up Patching with Balbix

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References74 total
    About

    Infosec has been fighting cybercrime since 2004. Thousands of organizations and over 2.68 million learners trust the wide range of security-specific classes and enterprise security awareness and phishing training to stay a step ahead of the bad guys. Infosec IQ, Infosec Flex and Infosec Skills provide the most advanced and comprehensive education and training platforms.

  • Reference Rating
    4.7 / 5.0
    Customer References66 total
    About

    Phished is on a daily mission to predict and prevent cyber incidents. With the aid of their smart and fully automated AI-driven platform, they train your employees to become a real Human Firewall for your organisation. Through a holistic combination of personalised simulations, training sessions, active reporting and threat intelligence, they guarantee permanent behavioural change. They also give you access to an organisation-wide Phished Behavioural Risk Score ® (BRS) to monitor your ever-evolving security status. This reduces the risk of cyber incidents measurably, both in the workplace & at home. Start building your Human Firewall today.

  • Reference Rating
    4.7 / 5.0
    Customer References298 total
    About

    Rapid7 is engineering better security with simple, innovative solutions for IT security's most critical challenges. Rapid7 security data and analytics solutions collect, contextualize, correlate, and analyze the security data you need to dramatically reduce threat exposure and detect compromise in real-time. Unlike traditional vulnerability assessment or incident management, Rapid7's comprehensive data collection, attacker intelligence, and user-behavior analytics give you immediate insight into the security state of your assets and users from the endpoint to the cloud. They offer unmatched capabilities to spot intruders leveraging today's #1 attack vector, compromised credentials.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked