Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • NinjaOne Reviews & Ratings
    2,427 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Serviceaide Reviews & Ratings
    138 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    173 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    154 Ratings
    Company Website
  • JDisc Discovery Reviews & Ratings
    26 Ratings
    Company Website
  • NMIS Reviews & Ratings
    14 Ratings
    Company Website
  • Unimus Reviews & Ratings
    17 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website

What is Saint Security Suite?

This comprehensive solution is capable of conducting active, passive, and agent-driven evaluations. It provides considerable flexibility in assessing risks tailored to the unique needs of each organization. With its impressive, adaptable, and scalable scanning functionalities, SAINT distinguishes itself from competitors in the industry. Additionally, SAINT has collaborated with AWS to enhance the scanning experience for its users, leveraging AWS's effective scanning tools. Furthermore, SAINT provides Windows scanning agents to its subscribers, ensuring a wider reach. Security teams benefit from the ability to effortlessly schedule scans, customize them extensively, and adjust their configurations using sophisticated options to optimize performance. This level of detail allows organizations to maintain a robust security posture while adapting to evolving threats.

What is Dhound?

When your business deals with critical infrastructure or sensitive data, you are acutely aware of the serious consequences that a security breach could entail if exploited by malicious entities. To comply with essential legal security requirements like SOC2, HIPAA, and PCI DSS, it is mandatory for you to engage third-party firms to conduct penetration tests. Your customers are keen on partnering exclusively with reliable and secure solutions, and you meet this expectation by safeguarding your systems through thorough penetration testing. A penetration test mimics a genuine hacking attempt, but it is conducted by experienced professionals who are committed to protecting your web security for the right reasons. At Dhound, we specialize in penetration testing—also known as pen tests or ethical hacking—allowing you to enjoy peace of mind knowing your systems are well-defended. Unlike a basic vulnerability assessment, our approach to ethical hacking at Dhound transcends merely pinpointing flaws; we adopt the tactics and mindset of actual hackers, enabling us to stay ahead of those intent on causing harm. This forward-thinking strategy guarantees that your security protocols are in a constant state of evolution and enhancement, ensuring comprehensive protection. Through our diligent efforts, we help you build not only a secure environment but also foster trust with your clientele by demonstrating your commitment to security excellence.

Media

Media

Integrations Supported

Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
Splunk Enterprise
WordPress

Integrations Supported

Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
Splunk Enterprise
WordPress

API Availability

Has API

API Availability

Has API

Pricing Information

$1500.00/year/user
Free Trial Offered?
Free Version

Pricing Information

$30 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Carson & SAINT

Date Founded

1997

Company Location

United States

Company Website

www.carson-saint.com/products/saint-security-suite/vulnerability-management/

Company Facts

Organization Name

IDS Global

Date Founded

2014

Company Location

United Kingdom

Company Website

dhound.io

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Configuration Management

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Website Monitoring

Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting

Popular Alternatives

Popular Alternatives

Acunetix Reviews & Ratings

Acunetix

Invicti Security
Invicti Reviews & Ratings

Invicti

Invicti Security