Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    386 Ratings
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    42 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    455 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    112 Ratings
    Company Website
  • Safetica Reviews & Ratings
    374 Ratings
    Company Website
  • ManageEngine OpManager Reviews & Ratings
    1,483 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    480 Ratings
    Company Website
  • Auvik Reviews & Ratings
    669 Ratings
    Company Website
  • Site24x7 Reviews & Ratings
    815 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    3,441 Ratings
    Company Website

What is Fidelis Network?

To successfully identify advanced threats, it is crucial to perform detailed inspections, extractions, and real-time analyses of all content moving through the network. Fidelis' network detection and response technology meticulously examines all ports and protocols in both directions, collecting extensive metadata that forms the basis for powerful machine-learning analytics. By employing sensors to monitor internal communications, email, web, and cloud interactions, organizations can achieve complete visibility and coverage across their networks. The tactics, techniques, and procedures (TTPs) used by detected attackers are mapped to the MITRE ATT&CK™ framework, empowering security teams to proactively combat potential threats. Although threats may try to avoid detection, they are ultimately unable to escape scrutiny. Organizations can also automatically profile and classify IT assets and services, which includes enterprise IoT devices, legacy systems, and shadow IT, thus constructing a comprehensive overview of their cybersecurity landscape. Additionally, when combined with Fidelis' endpoint detection and response capabilities, users gain an inventory of software assets linked to known vulnerabilities such as CVE and KB references, along with an evaluation of security hygiene pertaining to patches and endpoint statuses. This thorough and strategic approach provides organizations with the necessary tools to uphold a strong cybersecurity posture, ensuring ongoing protection against evolving threats. Ultimately, fostering a culture of continuous improvement in cybersecurity practices can further enhance resilience against future attacks.

What is Box Shield?

Shield enables you to sort content based on your specific needs, implementing both manual and automatic approaches. We are excited to present our powerful, integrated feature that identifies personally identifiable information (PII) and customized terminology within documents, categorizing them automatically according to your predefined policies — a significant enhancement for large-scale data protection. By placing controls near your content, you can successfully mitigate data leaks in real-time while providing a smooth experience for end users. You can establish access policies in mere minutes, ensuring that your data remains secure while allowing individuals to perform their critical functions. With the power of machine learning, Shield offers you timely and accurate alerts concerning insider threats, account compromises, and malware occurrences. You can quickly evaluate notifications within Shield or transfer them to your existing tools for further analysis. Shield seamlessly integrates with the leading security solutions you already employ, and alerts, enriched with unique insights, can be connected to your SIEM and CASB, providing a thorough view of your security environment. This seamless integration guarantees that your organization stays alert, proactive, and ready to tackle any security issues that may develop, enabling a fortified defense against potential threats. Furthermore, as security challenges continue to evolve, the adaptability of Shield ensures that your organization is well-equipped to handle future risks effectively.

Media

Media

Integrations Supported

Box
Box Shuttle
Fidelis Endpoint
Fidelis LRM
Google Digital Risk Protection
IBM Cloud
Intellicta
LogRhythm SIEM
Microsoft Azure
Netskope
Splunk Cloud Platform
Sumo Logic
ThreatConnect Risk Quantifier (RQ)

Integrations Supported

Box
Box Shuttle
Fidelis Endpoint
Fidelis LRM
Google Digital Risk Protection
IBM Cloud
Intellicta
LogRhythm SIEM
Microsoft Azure
Netskope
Splunk Cloud Platform
Sumo Logic
ThreatConnect Risk Quantifier (RQ)

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$130 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Fidelis Security

Date Founded

2002

Company Location

United States

Company Website

fidelissecurity.com/products/network/

Company Facts

Organization Name

Box

Date Founded

2005

Company Location

United States

Company Website

www.box.com/shield

Categories and Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Categories and Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Popular Alternatives

IronDefense Reviews & Ratings

IronDefense

IronNet Cybersecurity

Popular Alternatives

Sangfor Athena NDR Reviews & Ratings

Sangfor Athena NDR

Sangfor Technologies
GREYCORTEX Mendel Reviews & Ratings

GREYCORTEX Mendel

GREYCORTEX
Check Point Data Loss Prevention (DLP) Reviews & Ratings

Check Point Data Loss Prevention (DLP)

Check Point Software Technologies