Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    386 Ratings
    Company Website
  • Statseeker Reviews & Ratings
    35 Ratings
    Company Website
  • Boozang Reviews & Ratings
    15 Ratings
    Company Website
  • Intelex Reviews & Ratings
    129 Ratings
    Company Website
  • SBS Quality Management Software Reviews & Ratings
    7 Ratings
    Company Website
  • StarTree Reviews & Ratings
    26 Ratings
    Company Website
  • SafetyCulture Reviews & Ratings
    387 Ratings
    Company Website
  • ConnectWise SIEM Reviews & Ratings
    192 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    112 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    179 Ratings
    Company Website

What is Smokescreen?

Smokescreen focuses on advanced deception technology and active defense solutions, providing a network shield composed of decoys intended to trap cyber intruders. By participating in a demonstration of our flagship product, IllusionBLACK, you will learn about the tactics employed by adversaries while observing how strategically distributed decoys within your network facilitate accurate threat detection at every level. The system is designed for ease of use and is adaptable to various environments, including perimeter defenses, cloud infrastructures, internal networks, endpoints, and Active Directory setups. You can quickly launch your first deception campaign with ready-to-use decoys, enabling you to focus on identifying threats without the hassle of a lengthy setup process. Every interaction with an IllusionBLACK decoy acts as a trustworthy indicator of a possible security breach, ensuring that the alerts you receive are meaningful. Additionally, our platform streamlines automated forensic investigations and root-cause analyses, allowing you to deliver results swiftly with a more efficient team. With seamless integrations supported for SIEMs, firewalls, endpoint detection and response systems, proxies, threat intelligence feeds, SOAR, and many other tools, you can effectively bolster your cybersecurity framework. This holistic approach not only simplifies your defense mechanisms but also equips your organization to adeptly tackle new and evolving threats as they arise. Ultimately, Smokescreen’s solutions empower your security team to stay one step ahead of potential cyber risks.

What is Proofpoint Identity Threat Defense?

In an ever-changing hybrid environment, the prosperity of your organization relies heavily on its personnel, their digital identities, and the tools they utilize to protect and improve its assets. Cybercriminals have developed sophisticated techniques to infiltrate your cloud environments by exploiting these identities. To combat this issue effectively, you need a state-of-the-art, agentless solution designed to detect and respond to identity-related threats, allowing you to pinpoint and eliminate current identity weaknesses that are vital in the modern threat landscape. Proofpoint Identity Threat Defense, previously known as Illusive, offers comprehensive prevention capabilities and insights into all your identities, enabling you to tackle identity vulnerabilities before they develop into serious risks. Furthermore, it equips you to detect lateral movements within your systems and deploy misleading tactics to hinder threat actors from accessing your organization's critical resources. By integrating the ability to address contemporary identity risks and manage real-time identity threats within a single platform, organizations can significantly bolster their security posture and ensure greater peace of mind. This holistic approach not only enhances protection but also fosters a proactive security culture essential for navigating today’s complex cybersecurity challenges.

Media

Media

Integrations Supported

CrowdStrike Falcon
Palo Alto Networks Next-Generation Firewalls
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
BlueCat Unified DDI
Carbon Black EDR
Cisco ACI
Cisco Umbrella
CyberArk Privileged Access Manager
Google Cloud Platform
HALO Inventory Management
IBM QRadar SIEM
Microsoft 365
Microsoft Azure
Microsoft Entra ID
Microsoft Sentinel
Splunk Cloud Platform
Splunk Enterprise
Tanium

Integrations Supported

CrowdStrike Falcon
Palo Alto Networks Next-Generation Firewalls
BeyondTrust Endpoint Privilege Management
BlueCat Gateway
BlueCat Unified DDI
Carbon Black EDR
Cisco ACI
Cisco Umbrella
CyberArk Privileged Access Manager
Google Cloud Platform
HALO Inventory Management
IBM QRadar SIEM
Microsoft 365
Microsoft Azure
Microsoft Entra ID
Microsoft Sentinel
Splunk Cloud Platform
Splunk Enterprise
Tanium

API Availability

Has API

API Availability

Has API

Pricing Information

$7,750 per year
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Smokescreen

Date Founded

2015

Company Location

United States

Company Website

www.smokescreen.io

Company Facts

Organization Name

Proofpoint

Date Founded

2002

Company Location

United States

Company Website

www.proofpoint.com/us/illusive-is-now-proofpoint

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

Defused Reviews & Ratings

Defused

Aves Netsec
Baits Reviews & Ratings

Baits

MokN
Trapster Reviews & Ratings

Trapster

Ballpoint
Fidelis Elevate Reviews & Ratings

Fidelis Elevate

Fidelis Security