Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is SitePlex?

SitePlex is a comprehensive digital platform designed to streamline the management of construction sites and projects. By enabling real-time management of staff, equipment, suppliers, materials, and waste, SitePlex ensures that project teams are always informed and responsive. The platform is tailored to meet the needs of construction professionals, providing an easy-to-use solution for both field workers and back-office staff. Whether using a mobile device on-site or a PC in the office, SitePlex makes it simple for all team members to stay connected and efficient. With its intuitive interface, construction teams can quickly adapt to SitePlex without requiring advanced technical skills. The platform also offers powerful dashboards and reporting tools that provide valuable insights and help with decision-making. From project set-up to completion, SitePlex ensures that every stage is managed effectively, keeping teams compliant and accountable. Designed to work in both online and offline environments, SitePlex boosts operational efficiency, work quality, and safety, no matter where teams are located. By digitalizing project documentation, SitePlex offers a cost-effective and user-friendly solution for improving construction site management.

What is PlexTrac?

At PlexTrac, we strive to improve the performance of all security teams, no matter their size or focus. Whether you belong to a small enterprise, operate as a service provider, work independently, or are part of a larger security unit, you will discover a wealth of useful tools at your disposal. The PlexTrac Core features our most popular modules, including Reports, Writeups, Asset Management, and Custom Templating, making it particularly beneficial for smaller teams and solo practitioners. Moreover, PlexTrac provides a variety of add-on modules that significantly enhance its functionality, transforming it into the premier choice for extensive security organizations. These additional features, such as Assessments, Analytics, Runbooks, and more, empower security teams to maximize their productivity. With PlexTrac, cybersecurity teams gain unparalleled capabilities for documenting vulnerabilities and managing risk effectively. Our sophisticated parsing engine also supports the seamless integration of data from various well-known vulnerability scanners like Nessus, Burp Suite, and Nexpose, thereby streamlining workflows. By leveraging PlexTrac, security teams can not only meet but exceed their goals with unprecedented efficiency, ensuring they stay ahead in the ever-evolving landscape of cybersecurity. Ultimately, our platform is tailored to help security professionals enhance their operational success and navigate the complexities of their roles with ease.

What is Kroll Cyber Risk?

We hold the title of the leading incident response service globally, dedicated to safeguarding against cyber threats through a synthesis of comprehensive response capabilities and real-time threat insights derived from over 3000 incidents annually, complemented by our extensive expertise. Reach out to us right away through our round-the-clock cyber incident hotlines for immediate assistance. Kroll's Cyber Risk experts are equipped to address the challenges posed by current and future threats. Our protective solutions, detection, and response strategies are bolstered by frontline intelligence gathered from more than 3000 incident reports each year. Taking preemptive action to secure your organization is crucial, as the landscape of potential attacks is continually evolving and becoming more complex. Enter Kroll's Threat Lifecycle Management, which offers holistic solutions for managing cyber risk that help identify vulnerabilities, assess the strength of your defenses, enhance controls, optimize detection methods, and effectively respond to any emerging threats. The need for robust cybersecurity measures has never been more critical in today’s digital environment.

What is Dradis?

You have the capability to import results from over 20 widely-used security and penetration testing tools and display them in various formats, such as Word, Excel, and HTML. Different methodologies can be applied at various phases of a project, enabling you to monitor all tasks effectively and maintain consistent outcomes across your organization. Centralizing security project data, tool outputs, scopes, results, screenshots, and notes simplifies collaboration among team members. To ensure everyone is aligned, you can easily track changes, provide feedback, and distribute updated findings. There's no need to familiarize yourself with unfamiliar technologies; you can simply amalgamate outputs from preferred security tools like Nessus, Burp, Nmap, and others to produce tailored reports. Our user-friendly yet robust templates facilitate the creation of reports in just minutes instead of taking days. Dradis Gateway empowers you to transcend the limitations of conventional static security reports. Furthermore, it allows for the sharing of security assessment results in real time, enhancing communication and decision-making within your team. This real-time capability fosters a more dynamic response to security challenges as they arise.

Media

Media

Media

Media

Integrations Supported

Burp Suite
AWS Amplify
Amazon Web Services (AWS)
Azure DevOps
Brakeman
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for Identity
Microsoft Defender for IoT
Nmap
Palo Alto Networks Threat Prevention
Qualys CSAM
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud
Veracode

Integrations Supported

Burp Suite
AWS Amplify
Amazon Web Services (AWS)
Azure DevOps
Brakeman
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for Identity
Microsoft Defender for IoT
Nmap
Palo Alto Networks Threat Prevention
Qualys CSAM
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud
Veracode

Integrations Supported

Burp Suite
AWS Amplify
Amazon Web Services (AWS)
Azure DevOps
Brakeman
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for Identity
Microsoft Defender for IoT
Nmap
Palo Alto Networks Threat Prevention
Qualys CSAM
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud
Veracode

Integrations Supported

Burp Suite
AWS Amplify
Amazon Web Services (AWS)
Azure DevOps
Brakeman
Cortex XDR
CrowdStrike Falcon
Google Cloud Armor
Microsoft Defender External ASM
Microsoft Defender for Cloud
Microsoft Defender for Identity
Microsoft Defender for IoT
Nmap
Palo Alto Networks Threat Prevention
Qualys CSAM
SentinelOne Singularity
Splunk Cloud Platform
VMware Cloud
Veracode

API Availability

Has API

API Availability

Has API

API Availability

Has API

API Availability

Has API

Pricing Information

£30/month/user
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$79 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

SitePlex Ltd.

Date Founded

2021

Company Location

United Kingdom

Company Website

www.siteplex.co.uk

Company Facts

Organization Name

PlexTrac

Date Founded

2016

Company Location

United States

Company Website

plextrac.com

Company Facts

Organization Name

Kroll

Date Founded

1972

Company Location

United States

Company Website

www.kroll.com/en/services/cyber-risk/

Company Facts

Organization Name

Dradis Framework

Date Founded

2010

Company Location

United Kingdom

Company Website

dradis.com

Categories and Features

Construction Management

Accounting Integration
Budget Tracking/Job Costing
CRM
Change Orders
Commercial
Contract Management
Contractors
Equipment Tracking
Estimating
Incident Reporting
Mobile Access
Offline Access
RFI & Submittals
Residential
Subcontractor Management
Timesheets

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Breach and Attack Simulation (BAS)

Have your system safeguards undergone evaluation? Are you certain they are equipped to effectively handle contemporary attack trends? Kroll's exclusive FAST Attack Simulations merge exceptional incident forensics expertise with top-tier security frameworks to deliver tailored breach simulations specifically designed for your environment.

Cyber Risk Management

Address all aspects of the current and future threat environment with insights from Kroll’s Cyber Risk specialists. Bolstered by real-time threat intelligence drawn from over 3,000 incident response cases annually, Kroll’s solutions for protection, detection, and response significantly enhance your cybersecurity readiness.

Cybersecurity

Combining comprehensive response skills with real-time threat insights from more than 3,000 incidents managed annually and extensive knowledge in cybersecurity, we safeguard against, identify, and react to cyber threats.

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Digital Forensics

With a record of managing over 3,000 security incidents annually, Kroll's digital forensics specialists possess extensive expertise in data comprehension, analysis, and preservation throughout investigations. When a security breach occurs, these skilled investigators can adeptly conduct inquiries and safeguard crucial data to gather evidence and maintain operational continuity.

Incident Management

Kroll's top-tier security experts manage swift responses to more than 3,000 incidents annually. They possess the resources and knowledge necessary to handle every stage of the incident lifecycle, from legal obligations to breach notifications. Find reassurance during emergencies with their support.

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Kroll stands as the premier global provider of incident response services, boasting unmatched proficiency and cutting-edge threat intelligence to safeguard, identify, and react to cyber threats. Regardless of the nature of data breaches or cyber offenses, Kroll possesses the necessary expertise and resources—both personnel and technology—to promptly assess, pinpoint, and protect crucial data while thoroughly investigating the digital footprint, no matter where it leads.

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Managed Detection and Response (MDR)

Prevent cyber threats with Kroll Responder's managed detection and response services, powered by experienced incident response professionals and cutting-edge threat intelligence. Kroll Responder MDR offers continuous security surveillance, proactive identification of potential attacks, and comprehensive strategies to neutralize and eliminate threats throughout your digital environment.

Penetration Testing

Ensure the strength of your cybersecurity measures by testing them against actual threats. Kroll offers top-tier penetration testing services that combine cutting-edge threat intelligence, extensive annual cybersecurity evaluations, and a dedicated team of certified professionals. This forms the basis of our advanced and adaptable methodology.

Security Risk Assessment

Our Cybersecurity Risk Assessments involve an in-depth examination of the information security framework, encompassing everything from policies and procedures to technical safeguards involving personnel, processes, and technology. We carry out a comprehensive set of interviews with key internal stakeholders from both technical and business sectors to pinpoint opportunities for enhancement, aiming to advance the maturity of the organization's information security strategy, with the NIST Cybersecurity framework serving as a foundational reference.

Threat Intelligence

Kroll's cyber threat intelligence offerings leverage real-time incident response insights and a team of top-tier analysts to adeptly identify and address potential threats. Our experts integrate Kroll’s technical intelligence with in-depth analytical research and investigative skills to enhance your situational awareness, delivering specialized triage, investigation, and remediation services.

Categories and Features

Collaboration

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Popular Alternatives

PlexVPN Reviews & Ratings

PlexVPN

Plex

Popular Alternatives

Dradis Reviews & Ratings

Dradis

Dradis Framework

Popular Alternatives

Popular Alternatives

ShadowPlex Reviews & Ratings

ShadowPlex

Acalvio Technologies
Reporter Reviews & Ratings

Reporter

Security Reporter
Reporter Reviews & Ratings

Reporter

Security Reporter