By BlackFog
How would you rate your experience with BlackFog?
Asset Management
Based on 11 BlackFog reviews.
Lets users group and organize their endpoints to gather threat intelligence on specific technologies.
Security Workflow Automation
11 reviewers of BlackFog have provided feedback on this feature.
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.
Deployment
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment.
Proactive Alerts
This feature was mentioned in 11 BlackFog reviews.
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.
Malware Detection
As reported in 11 BlackFog reviews.
Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge.
Data Management
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Reporting
Produces reports detailing trends and vulnerabilities related to bot management and performance.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Data Visibility
Similifies data identification to increase visibility and management capabilities
Encryption
Protects data with within and as it leaves your secure or local network.
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Silent Deploy
As reported in 15 BlackFog reviews.
Silently deploys on endpoints without alerting users.
Detect Data Movement
This feature was mentioned in 14 BlackFog reviews.
Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.
Trigger Alerts
Based on 15 BlackFog reviews.
Sends alerts to administrators when users take insider threat actions .
Searchable Evidence
14 reviewers of BlackFog have provided feedback on this feature.
Maintains active and historical evidence in a searchable format.
Risk Scoring
This feature was mentioned in 15 BlackFog reviews.
Provides risk scoring for suspicious activity.
Proactive report alerts
Proactively sends reports or alerts to customers.
Application control
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
Proactively hunts threats.
Rapid response time
Provides rapid reponse time to cyber threats.
Customizeable reports
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automated remediation
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
AI Text Summarization
Condenses long documents or text into a brief summary.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Offers managed detection and response services.