FortMesa vs Blackpoint MDR
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$20.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.6/ 5Features
4.5/ 5Customer Service
4.9/ 5Value for Money
4.5/ 5Features
Total features 48
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Approval Process Control
- Assessment Management
- Audit Management
- Audit Trail
- Authentication
- Behavioral Analytics
- Collaboration Tools
- Compliance Management
- Continuous Monitoring
- Data Import/Export
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- HIPAA Compliant
- IT Risk Management
- Incident Management
- Incident Reporting
- Issue Management
- Monitoring
- Network Monitoring
- Network Provisioning
- Password Management
- Patch Management
- Policy Management
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Single Sign On
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- User Management
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Workflow Management
Total features 28
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Approval Process Control
- Assessment Management
- Audit Management
- Audit Trail
- Authentication
- Behavioral Analytics
- Collaboration Tools
- Compliance Management
- Continuous Monitoring
- Data Import/Export
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- HIPAA Compliant
- IT Risk Management
- Incident Management
- Incident Reporting
- Issue Management
- Monitoring
- Network Monitoring
- Network Provisioning
- Password Management
- Patch Management
- Policy Management
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Single Sign On
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- User Management
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Workflow Management
Integrations
Not provided by vendor
- Bitdefender Antivirus Plus
- Cisco Meraki
- Malwarebytes for Business
- Microsoft Defender for Business
- Microsoft Defender for Endpoint
- SentinelOne
- WatchGuard Endpoint Security
- Webroot Business Endpoint Protection