Listing Thumbnail

    Hackuity Enterprise

     Info
    Sold by: HACKUITY 
    Hackuity is your Vulnerability Operation center (VOC) enabler. Hackuity gives you a complete view of your cyber exposure depth and tools to interpret it, so you can detect, predict and protect yourself from cyber vulnerabilities.
    5

    Overview

    Hackuity reinvents Risk Based Vulnerability Management (RBVM) to protect organizations worldwide: Aggregate 80+ market leading tools into a single pane of glass. Prioritize vulnerabilities with our risk based scoring algorithm. Automate remediation specific to your attack surface.

    Integrate your ecosystem to help security teams focus on what is actually vulnerable and not on managing Excel spreadsheets. Hackuity platform breaks security silos and provides a unified view of your cyber exposure specific to your attack surface so you can remediate the real threats, faster. In short, Hackuity is your VOC enabler. Hackuity gives you a complete view of your cyber exposure depth and tools to interpret it, so you can detect, predict and protect yourself from cyber vulnerabilities.

    Highlights

    • The VOC (Vulnerability Operations Center) is a system that manages IT vulnerabilities within an organization. This operational center ensures the prevention, detection, analysis, prioritization, and remediation of security flaws affecting information systems. A VOC allows teams to reduce their attack surface, master risks, and reinforce data protection.
    • Aggregate and standardize all of your threat assessment practices, whether automated or hand-crafted, and enrich them with business context and your risk analysis so that security practitioners can finally create risk-based remediation plans and align their priorities with your organization's business challenges.
    • Deeply map your cyber asset inventory and effectively adapt your security posture. Reconcile all inventory information in a single repository regardless of the nature or location of the asset. Finally, make the right decisions to protect your IT infrastruture.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Hackuity Enterprise

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Cost/12 months
    Hackuity Enterprise
    $19.00

    Vendor refund policy

    Service credits represent additional days during which Hackuity makes its Platform available at no additional cost to the Client and under the same terms and conditions as in the Contract. These credits are added to the end of the current Initial Duration. Service credits are not transferable and cannot be exchanged for a cash refund or offset against amounts owed to Hackuity.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Hackuity Customer Support Center (CSC) handles: Assistance requests from Authorized Users in using the Platform / Redirections to the applicable Documentation / Investigation into the causes of Anomalies / An approach to resolving Anomalies, which may involve the installation or provision of a workaround or a temporary or permanent update to the Platform / Continuous updates about the new Features and improvements made to the Hackuity platform / Proactive alerts regarding technical issues such as Platform unavailability / Product enhancement requests (Feature Requests) from Authorized Users and the Clients.

    If you need to contact the Hackuity support:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Vulnerability and Patch Management
    Top
    50
    In Security Observability

    Overview

     Info
    AI generated from product descriptions
    Multi-Source Tool Integration
    Aggregates 80+ market leading security tools into a unified platform for centralized vulnerability management.
    Risk-Based Vulnerability Prioritization
    Prioritizes vulnerabilities using a risk-based scoring algorithm that contextualizes threats based on organizational risk factors.
    Cyber Asset Inventory Management
    Maps and reconciles cyber asset inventory across multiple sources and locations into a single repository for unified visibility.
    Automated Remediation Orchestration
    Automates remediation workflows tailored to specific attack surface characteristics and organizational context.
    Vulnerability Operations Center Capabilities
    Provides prevention, detection, analysis, prioritization, and remediation of security flaws affecting information systems through a centralized operational framework.
    Centralized Vulnerability Management
    Aggregates all security testing tool data from multiple sources into a single unified view for enhanced visibility across the application security landscape.
    Automated Workflow Orchestration
    Automates vulnerability management workflows across five stages: integrate, scan and import, triage, remediate, and monitor to reduce manual effort and accelerate remediation cycles.
    Multi-Tool Integration
    Integrates with security, DevOps, notification, and issue-tracking tools to correlate findings and eliminate duplicate vulnerabilities across different scanning platforms.
    Vulnerability Triage and Prioritization
    Provides vulnerability management capabilities with focused triage and remediation insights to enable faster prioritization and resolution of security findings.
    Developer-Level Vulnerability Visibility
    Delivers granular vulnerability data at the developer level to support security awareness and foster a culture of continuous security improvement within development teams.
    Vulnerability Resolution Automation
    Automates critical vulnerability resolution processes with intelligent automation capabilities
    Cross-Domain Workflow Management
    Manages and automates remediation workflows across multiple organizational domains and fixing teams
    SLA Tracking and Compliance Reporting
    Tracks and reports on Service Level Agreement compliance with end-to-end process integration and monitoring
    No-Code Process Automation
    Provides no-code process automation for rapid deployment and scaling without custom development
    Security Tool Integration
    Connects and integrates with security tools and work management systems for unified remediation operations

    Contract

     Info
    Standard contract

    Customer reviews

    Ratings and reviews

     Info
    5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    100%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    1 external reviews
    External reviews are from G2 .
    Philippe T.

    A vulnerability management cockpit

    Reviewed on Nov 19, 2021
    Review provided by G2
    What do you like best about the product?
    The ability to consolidate all vulnerabilities regardless of the detection method, and to orchestrate its management.
    The responsiveness of the Hackuity team
    What do you dislike about the product?
    We are awaiting the French version to strengthen the membership of the SSI community collaborating on the portal.
    What problems is the product solving and how is that benefiting you?
    Consolidated and centralized management of vulnerabilities
    View all reviews