Skip to main content
TrustRadius
BlueVoyant Digital Risk Protection

BlueVoyant Digital Risk Protection

Overview

What is BlueVoyant Digital Risk Protection?

What Digital Risk Protection Looks Like:Threat Intelligence That Extends Beyond the PerimeterBlueVoyant continuously monitors external attack surface to review relevant threat actor activity taking place outside the perimeter.Bigger, Better Threat DataCombining public and proprietary data sources (including Passive DNS and…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Managed Security Service Providers

Be the first one in your network to review BlueVoyant Digital Risk Protection, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is BlueVoyant Digital Risk Protection?

What Digital Risk Protection Looks Like: Threat Intelligence That Extends Beyond the Perimeter BlueVoyant continuously monitors external attack surface to review relevant threat actor activity taking place outside the perimeter. Bigger, Better Threat…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Webroot Endpoint Protection?

Webroot Endpoint Protection is the OpenText company's business class multi-vector endpoint protection application, providing centralized endpoint management, deep learning intelligence, and advanced behavioral analytics. For SMBs, Webroot Smarter Cybersecurity solutions were designed from the…

Return to navigation

Product Details

What is BlueVoyant Digital Risk Protection?

What Digital Risk Protection Looks Like:

Threat Intelligence That Extends Beyond the Perimeter
BlueVoyant continuously monitors external attack surface to review relevant threat actor activity taking place outside the perimeter.

Bigger, Better Threat Data
Combining public and proprietary data sources (including Passive DNS and an open-source database ), BlueVoyant identifies emerging threats and helps organizations prioritize their cyber defenses. They leverage an array of sources from the surface, deep and dark web, as well as social media and criminal instant messaging applications.

Expert Knowledge of Adversaries and Attacker Methods
BlueVoyant’s threat intelligence experts bring experience from the NSA, FBI, GCHQ and Unit 8200, as well as private sector organizations. This experience enables their analysts to understand the attacker methodology to interpret how attackers plan and implement attacks, as well as identify attacks that are still in the planning stages.

BlueVoyant Digital Risk Protection Features

  • Supported: Digital Brand Protection
  • Supported: Account Takeover Monitoring
  • Supported: Fraud Campaigns Discovery
  • Supported: Data Leakage Detection
  • Supported: Executive Cyber Guard
  • Supported: External Attack Surface Analysis

BlueVoyant Digital Risk Protection Competitors

BlueVoyant Digital Risk Protection Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

BlueVoyant Digital Risk Protection Downloadables

Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation