Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Loss Prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Risk-scoring
As reported in 14 Bastion Technologies reviews.
Calculates risk based on user behavior, baselines, and improvements.
Customization
Based on 14 Bastion Technologies reviews.
Customizable solution so administers can adjust content to industry, position, etc.
White-Labeling
Based on 14 Bastion Technologies reviews.
Allows users to implement their own branding throughout the platform.
Reporting
As reported in 14 Bastion Technologies reviews.
Provides analytics tools that reveal important business metrics and track progress.
AI-generated Content
Uses generative AI to create training scenarios, deepfake simulations, or tailored modules.
Maintenance (4)
Auditing
Access pre-built and custom reports to monitor user activity and storage.
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Archiving
Archives conversations, files, and other communications for future reference
Security (6)
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
Encryption
Encrypts the content of emails and their attachments.
Quarantine
Isolates potentially malicious content and files before they can gain network access
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Functionality (4)
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Analysis (3)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Assessment (3)
Continuous Assessment
14 reviewers of Bastion Technologies have provided feedback on this feature.
The abillity to automate assessment or have assesments scheduled and delivered continuously.
Phishing Assessment
As reported in 14 Bastion Technologies reviews.
Sends users phishing emails, voicemails, messages through SMS, Slack, Teams, etc. to test user's threat-identification abilities.
Baselining
As reported in 14 Bastion Technologies reviews.
Assess current state of user security training, prior to training, which can be used to track performance and improvement.
Training (3)
Content Library
Based on 14 Bastion Technologies reviews.
Provides users with a pre-built library of useable security-related informational content.
Interactive Training
As reported in 14 Bastion Technologies reviews.
Engages users through content in the form of interactive applications, games, and modules.
Gamification
As reported in 14 Bastion Technologies reviews.
Contains gamification tools, including but not limited to badges, leaderboards, and point scoring.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.