Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Knowledge Base
  • Phone Support
  • Chat
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4 /5
(9)

Ease of Use

4.1/ 5

Features

3.3/ 5

Customer Service

4.2/ 5

Value for Money

4.2/ 5

Overall rating

5 /5
(4)

Ease of Use

5/ 5

Features

5/ 5

Customer Service

5/ 5

Value for Money

5/ 5

Total features 28

  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Automated Containment
  • Compliance Management
  • Endpoint Management
  • Issue Tracking
  • Monitoring
  • Network Scanning
  • Network Security Software
  • Policy Management
  • Real-Time Analytics
  • Real-Time Data
  • Reporting/Analytics
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Search/Filter
  • Security Auditing
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web-Application Security

Total features 23

  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Automated Containment
  • Compliance Management
  • Endpoint Management
  • Issue Tracking
  • Monitoring
  • Network Scanning
  • Network Security Software
  • Policy Management
  • Real-Time Analytics
  • Real-Time Data
  • Reporting/Analytics
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Search/Filter
  • Security Auditing
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web-Application Security
  • Autotask PSA
  • Compliance Manager GRC
  • Kaseya BMS
  • Network Detective Pro
  • RocketCyber
Not provided by vendor