Skip to main content
TrustRadius
Leakwatch

Leakwatch

Overview

What is Leakwatch?

Leakwatch, developed by Login Sécurité, is a cybersecurity solution aimed at helping organizations preserve digital trust. According to the vendor, Leakwatch caters to companies of all sizes, including small businesses and large enterprises. It is utilized by professionals such as Chief Information...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Network Security Software

Be the first one in your network to review Leakwatch, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

What is Perimeter 81?

Perimeter 81 is a Zero Trust Network as a Service from the company of the same name in Tel Aviv, designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Return to navigation

Product Details

What is Leakwatch?

Leakwatch, developed by Login Sécurité, is a cybersecurity solution aimed at helping organizations preserve digital trust. According to the vendor, Leakwatch caters to companies of all sizes, including small businesses and large enterprises. It is utilized by professionals such as Chief Information Security Officers (CISOs), IT Security Managers, IT Directors, Security Analysts, Risk Managers, and Compliance Officers across various industries, including financial institutions, healthcare organizations, government agencies, and retail companies.

Key Features

Conseil & Gouvernance: According to the vendor, Leakwatch offers cybersecurity expertise to assist businesses in identifying, preventing, detecting, and responding to risks effectively. The goal is to minimize potential reputation damage and financial losses.

RSSI à temps partagé: Leakwatch provides part-time Chief Information Security Officer (CISO) services to help define and implement an organization's security strategy, as stated by the vendor.

Implémentation SMSI / PSSI: The vendor claims that Leakwatch helps companies establish Information Security Management Systems (SMSI) or Information System Security Plans (PSSI) to ensure compliance with security standards and regulations.

Analyse de risques : ISO 27001, EBIOS: Leakwatch evaluates information security risks according to ISO 27001 and EBIOS standards, as stated by the vendor. It then recommends appropriate prevention and protection measures.

Gestion des données personnelles (GDPR): According to the vendor, Leakwatch assists businesses in complying with the General Data Protection Regulation (GDPR) by implementing measures to protect personal data effectively.

Mise en œuvre de SOC: Leakwatch helps organizations design, integrate, deploy, and operate Security Operations Centers (SOCs) to ensure business continuity through detection, reaction, and decision support, according to the vendor.

Audit & Security Testing: Leakwatch evaluates the security of critical infrastructure and applications through organizational security audits, security testing, code audits, and real-time web security testing, as claimed by the vendor.

Formation & Sensibilisation: According to the vendor, Leakwatch provides training and awareness programs to educate employees about computer security risks and empower them to adopt best practices for protection.

Intégration de Solutions: Leakwatch focuses on implementing network, application, and access security solutions tailored to the specific needs of organizations, aiming to enhance security and trust, according to the vendor.

Sécurité Opérationnelle: Leakwatch helps organizations establish systems for detection, reaction, and decision support, including continuous monitoring of equipment, incident response planning, compliance and vulnerability management, and external data leak monitoring, as stated by the vendor.

Leakwatch Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation