Cythereal

CATEGORY

Security

Organization Details

Review Nudge Security's complete security profile for Cythereal, including supply chain details, privacy policy, terms of service, GDPR compliance, breach history, and more.

What is

Cythereal

?

Cythereal is the leader in predicting and preventing advanced malware attacks.Cythereal automates investigations of failed attacks and uses AI to identify and track persistent campaigns by the same threat actor..Cythereal automatically identifies the most dangerous campaigns and predicts the ones most likely to succeed..Cythereal automatically generates custom IoCs and custom signatures to prevent those campaigns from succeeding..Cythereal MAGIC is a fully web-based service that does not integrate with or interfere with an enterprise’s business or operations network..Cythereal does NOT introduce any agent or network device within the enterprise. We communicate only with your existing security services using their API..Cythereal ingests data from Email Security, Web Security, Anti-malware, and  prevention products using the authorized credentials from the enterprise..Cythereal sends IoCs and signatures directly to enterprises’ prevention and detection security products, with information alerts and reports to administrator.

HEADQUARTERS

HOSTING

HOSTING LOCATION

SUBDOMAINS

  • email.mg.cythereal.com
  • docs.cythereal.com

CURRENT USERS IN YOUR ORG

Start a trial to find out

Security Program

SECURITY PAGE

SECURITY PORTAL

BUG BOUNTY

VULNERABILITY DISCLOSURE

TERMS OF SERVICE

PRIVACY POLICY

STATUS PAGE

SECURITY CERTIFICATIONS

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

supply chain

  • Read the Docs
  • Mailgun
  • Google Workspace
  • Google Tag Manager

Authentication

AUTHENTICATION / SSO

Supported Okta Features
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

OAUTH GRANTS in your org

Start a trial to find out

oauth details

Stop worrying about shadow IT security risks.

With an unrivaled, patented approach to SaaS discovery, Nudge Security inventories all cloud and SaaS assets ever created across your organization on Day One, and alerts you as new SaaS apps are adopted.