Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Aikido Security Reviews & Ratings
    231 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    254 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,452 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • ZeroPath Reviews & Ratings
    2 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    415 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • Fraud.net Reviews & Ratings
    56 Ratings
    Company Website

What is Ethiack?

We prioritize your security by merging AI-enabled automated penetration testing with expert ethical hacking, which allows us to deliver both thorough and focused security assessments. The potential threats to your organization are not limited to your own code; external services, APIs, and tools can also introduce vulnerabilities that must be addressed. Our service provides a complete analysis of your digital presence, helping you to pinpoint and remedy its vulnerabilities effectively. Unlike traditional scanners, which can produce a high number of false positives, and infrequent penetration tests that may lack reliability, our automated pentesting approach stands out significantly. This method boasts a false positive rate of less than 0.5%, while more than 20% of its findings are deemed critical issues that need immediate attention. Our team consists of highly skilled ethical hackers, each chosen through a meticulous selection process, who have a proven track record of identifying the most critical vulnerabilities present in your systems. We take pride in our accolades and have successfully uncovered security weaknesses for renowned companies like Shopify, Verizon, and Steam. To begin, simply add the TXT record to your DNS, and enjoy our 30-day free trial, which allows you to witness the effectiveness of our top-notch security solutions. By combining automated and manual testing approaches, we ensure that your organization is always ahead of possible security threats, giving you peace of mind in an ever-evolving digital landscape. This dual strategy not only enhances the reliability of our assessments but also strengthens your overall security posture.

What is Dhound?

When your business deals with critical infrastructure or sensitive data, you are acutely aware of the serious consequences that a security breach could entail if exploited by malicious entities. To comply with essential legal security requirements like SOC2, HIPAA, and PCI DSS, it is mandatory for you to engage third-party firms to conduct penetration tests. Your customers are keen on partnering exclusively with reliable and secure solutions, and you meet this expectation by safeguarding your systems through thorough penetration testing. A penetration test mimics a genuine hacking attempt, but it is conducted by experienced professionals who are committed to protecting your web security for the right reasons. At Dhound, we specialize in penetration testing—also known as pen tests or ethical hacking—allowing you to enjoy peace of mind knowing your systems are well-defended. Unlike a basic vulnerability assessment, our approach to ethical hacking at Dhound transcends merely pinpointing flaws; we adopt the tactics and mindset of actual hackers, enabling us to stay ahead of those intent on causing harm. This forward-thinking strategy guarantees that your security protocols are in a constant state of evolution and enhancement, ensuring comprehensive protection. Through our diligent efforts, we help you build not only a secure environment but also foster trust with your clientele by demonstrating your commitment to security excellence.

Media

Media

Integrations Supported

Secfix
Shopify
Verizon Cloud
WordPress

Integrations Supported

Secfix
Shopify
Verizon Cloud
WordPress

API Availability

Has API

API Availability

Has API

Pricing Information

€1,790 per year
Free Trial Offered?
Free Version

Pricing Information

$30 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Ethiack

Company Location

Portugal

Company Website

ethiack.com

Company Facts

Organization Name

IDS Global

Date Founded

2014

Company Location

United Kingdom

Company Website

dhound.io

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Website Monitoring

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

Popular Alternatives

Popular Alternatives