FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool functionality.
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

US$20.00/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

No reviews available

Already have FortMesa?

Write a Review!

Overall rating

4.1 /5
(7)

Ease of Use

4.6/ 5

Features

4/ 5

Customer Service

4.1/ 5

Value for Money

4.5/ 5

Total features 50

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Collaboration Tools
  • Compliance Management
  • Dashboard Creation
  • Data Import/Export
  • Data Visualization
  • Document Management
  • Document Storage
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • IT Risk Management
  • Incident Management
  • Monitoring
  • Password Management
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Process/Workflow Automation
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Workflow Management

Total features 3

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Collaboration Tools
  • Compliance Management
  • Dashboard Creation
  • Data Import/Export
  • Data Visualization
  • Document Management
  • Document Storage
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • IT Risk Management
  • Incident Management
  • Monitoring
  • Password Management
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Process/Workflow Automation
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Workflow Management