Related Products
|
||||||
About
Simplify the security assessment process with hosted vulnerability scanners. From attack surface discovery to vulnerability identification, actionable network intelligence for IT & security operations. Proactively hunt for security weakness. Pivot from attack surface discovery to vulnerability identification. Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Hunt vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Discover the attack surface with tools and open source intelligence. Protect your network with improved visibility. Over 1 million scans performed last year. Our vulnerability scanners have been launching packets since 2007. Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure.
|
About
Map out your entire cloud identity attack surface and harden it against identity-based attacks. Push is a vulnerability scanner for your cloud identities. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and the vulnerabilities putting your business at risk.
- Get real-time visibility of all your cloud identities, apps and integrations.
- Onboard unmanaged apps to SSO. Detect and harden non-SSO identities.
- Find and secure vulnerable identities. Prevent your employees creating insecure identities.
- Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk.
- Improve employee security awareness by equipping them to self-remediate security issues.
Try it for free today.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT security teams wanting a vulnerability scanner solution to simplify their security assessment processes and operations
|
Audience
Security teams in cloud-first businesses
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$10 per month
Free Version
Free Trial
|
Pricing
$5 per employee per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationHacker Target
Founded: 2009
Australia
hackertarget.com
|
Company InformationPush Security
Founded: 2019
United Kingdom
pushsecurity.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
SaaS Management Features
License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management
|
||||||
Integrations
Drupal
Google Workspace
Joomla!
Microsoft 365
Microsoft Azure
Microsoft SharePoint
Microsoft Teams
Nmap
OpenVAS
Slack
|
Integrations
Drupal
Google Workspace
Joomla!
Microsoft 365
Microsoft Azure
Microsoft SharePoint
Microsoft Teams
Nmap
OpenVAS
Slack
|
|||||
|
|
|