Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 32 Ratings

What is DeCYFIR?

We explore the intricacies of the hacking realm, uncovering and analyzing information to derive valuable insights from the disorderly data available. Our extensive cyber intelligence goes beyond simple tactical measures, incorporating both management and strategic insights that apply to the entire organization. By aligning data with your particular industry, geographic area, and technological context, we offer prioritized remediation suggestions for immediate action. Attaining top-notch cyber intelligence necessitates sophisticated technology to decode signals from a variety of sources. The Threat Visibility and Intelligence module converts unrefined findings into practical insights, functioning as essential cybersecurity tools that enhance the defensive capabilities of any organization. This module serves as a comprehensive platform that collects, scrutinizes, and correlates data against key attributes, presenting it in a way that enables both security experts and corporate leaders to make quick, informed decisions. Moreover, our methodology guarantees that organizations stay alert and ready to tackle the constantly changing landscape of cyber threats, fostering a resilient cybersecurity posture.

What is A10 Defend Threat Control?

A10 Defend Threat Control is a cloud-based service integrated into the A10 software suite. It features an up-to-the-minute DDoS attack map along with a comprehensive inventory of DDoS threats. Unlike many existing tools that prioritize ease of use but often generate false positives or negatives, A10 Defend Threat Control offers in-depth insights into both attackers and their targets. This includes analytics on various vectors, emerging trends, and other critical data points. By delivering actionable intelligence, it empowers organizations to enhance their security measures and effectively block harmful IP addresses that could initiate DDoS attacks. Ultimately, this tool stands out in its ability to combine thorough analysis with practical defense strategies for businesses facing evolving cyber threats.

Media

Media

Integrations Supported

A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Logsign
Palo Alto Networks NGFW

Integrations Supported

A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Logsign
Palo Alto Networks NGFW

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

CYFIRMA

Date Founded

2017

Company Location

Singapore

Company Website

www.cyfirma.com/threat-visibility-and-intelligence/

Company Facts

Organization Name

A10 Networks

Date Founded

2004

Company Location

United States

Company Website

www.a10networks.com/

Categories and Features

Categories and Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Popular Alternatives

Popular Alternatives

NetScaler Reviews & Ratings

NetScaler

Cloud Software Group
ThreatSync Reviews & Ratings

ThreatSync

WatchGuard