Balbix References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1037)
    Verified56+ References
  • 4.8 / 5.0 (1183)
    66+ References
  • 4.8 / 5.0 (3551)
    75+ References

Balbix Testimonials

  • “With Balbix, we transformed our CMDB into a vital, highly productive asset for the company,”

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References56 total
    About

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.

  • Reference Rating
    4.7 / 5.0
    Customer References66 total
    About

    Phished is on a daily mission to predict and prevent cyber incidents. With the aid of their smart and fully automated AI-driven platform, they train your employees to become a real Human Firewall for your organisation. Through a holistic combination of personalised simulations, training sessions, active reporting and threat intelligence, they guarantee permanent behavioural change. They also give you access to an organisation-wide Phished Behavioural Risk Score ® (BRS) to monitor your ever-evolving security status. This reduces the risk of cyber incidents measurably, both in the workplace & at home. Start building your Human Firewall today.

  • Reference Rating
    4.7 / 5.0
    Customer References75 total
    About

    Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked