CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$10.00/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

5 /5
(1)

Ease of Use

5/ 5

Features

5/ 5

Customer Service

5/ 5

Value for Money

5/ 5

Overall rating

4.8 /5
(34)

Ease of Use

4.6/ 5

Features

4.5/ 5

Customer Service

4.9/ 5

Value for Money

4.5/ 5

Total features 82

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Archiving & Retention
  • Asset Discovery
  • Audit Management
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Dashboard
  • Dashboard Creation
  • Data Security
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewalls
  • HIPAA Compliant
  • IP Address Monitoring
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Network Security Software
  • PCI Compliance
  • Patch Management
  • Performance Monitoring
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Status Tracking
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Virus Definition Update
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Whitelisting/Blacklisting

Total features 28

  • AI/Machine Learning
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Archiving & Retention
  • Asset Discovery
  • Audit Management
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Dashboard
  • Dashboard Creation
  • Data Security
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewalls
  • HIPAA Compliant
  • IP Address Monitoring
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Network Security Software
  • PCI Compliance
  • Patch Management
  • Performance Monitoring
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Status Tracking
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Virus Definition Update
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Whitelisting/Blacklisting
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • Google Cloud
  • Malwarebytes for Business
  • Microsoft Azure
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • SentinelOne
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection
  • Bitdefender Antivirus Plus
  • Cisco Meraki
  • Google Cloud
  • Malwarebytes for Business
  • Microsoft Azure
  • Microsoft Defender for Business
  • Microsoft Defender for Endpoint
  • SentinelOne
  • WatchGuard Endpoint Security
  • Webroot Business Endpoint Protection