Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Guardz Reviews & Ratings
    117 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • NeuBird Reviews & Ratings
    2 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,446 Ratings
    Company Website
  • Grafana Cloud Reviews & Ratings
    731 Ratings
    Company Website

What is Pondurance?

Pondurance offers cybersecurity services that emphasize the importance of risk management and utilize human expertise, especially through their Managed Detection and Response (MDR) offerings, which include continuous risk assessments and digital forensic investigations. Their customized approach guarantees that organizations receive tailored solutions that address their unique cybersecurity challenges, effectively navigating complex compliance and security issues while promoting a proactive stance on security. Additionally, this strategic focus allows them to adapt to the evolving threat landscape and better safeguard their clients' vital assets.

What is OpenText Security Suite?

The OpenTextâ„¢ Security Suite, powered by OpenTextâ„¢ EnCaseâ„¢, provides extensive visibility across a range of devices, including laptops, desktops, and servers, facilitating the proactive identification of sensitive data, threat detection, remediation efforts, and thorough, forensically-sound data analysis and collection. With its agents deployed on over 40 million endpoints, the suite caters to prominent clients, including 78 organizations from the Fortune 100, and is supported by a network of more than 6,600 EnCEâ„¢ certified professionals, positioning it as a standard in the realm of incident response and digital investigations. EnCase solutions fulfill diverse needs for enterprises, governmental agencies, and law enforcement, addressing crucial areas such as risk management, compliance, file analytics, endpoint detection and response (EDR), and digital forensics, all while leveraging the most reliable cybersecurity software in the market. By resolving issues that often go unnoticed or unaddressed at the endpoint level, the Security Suite not only bolsters the security framework of organizations but also restores client trust through its exceptional reliability and expansive reach. This suite ultimately enables organizations to confidently and effectively navigate the intricate challenges of cybersecurity, ensuring they remain ahead in a rapidly evolving landscape. Moreover, its commitment to continuous innovation helps organizations stay prepared for emerging threats, making it an invaluable asset in the fight against cybercrime.

What is Compass IT GRC?

Just as a compass guides explorers on their journeys, Compass IT Compliance navigates your organization through the complex terrain of cybersecurity and regulatory obligations. Leveraging our expert insights, we support you in maintaining a clear path that protects your innovations and accelerates your journey towards success. As cybercriminals evolve and employ increasingly advanced tactics, relying solely on traditional security measures like firewalls and antivirus software is no longer sufficient for complete protection. By partnering with our dedicated team, you can identify critical solutions that significantly mitigate risks while ensuring compliance with the regulations specific to your industry. Our mission is to empower your organization, transforming compliance from a mere obligation into a strategic advantage that propels your business forward. Ultimately, we believe that proactive compliance efforts can enhance your reputation and foster greater trust among your clients.

Media

Media

Media

Integrations Supported

EnCase Forensic

Integrations Supported

EnCase Forensic

Integrations Supported

EnCase Forensic

API Availability

Has API

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Pondurance

Date Founded

2008

Company Location

United States

Company Website

www.pondurance.com

Company Facts

Organization Name

OpenText

Date Founded

1991

Company Location

Canada

Company Website

www.opentext.com/products-and-solutions/products/security

Company Facts

Organization Name

Compass IT Compliance

Date Founded

2010

Company Location

United States

Company Website

www.compassitc.com

Categories and Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Investigation Management

Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

Magnet AXIOM Cyber Reviews & Ratings

Magnet AXIOM Cyber

Magnet Forensics

Popular Alternatives