477 results
Filter Results (477)
Pricing Options
Product type
Deployment
Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions.
https://youtu.be/EMVHOkXVWKk
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Fully automated Security Awareness Training -
Train More. Manage Less.
Ready for smart automation in your Security Awareness Training program?
Impress your execs and delight your users with INFIMA's fully automated security awareness training platform.
Your program is always active.
Stop chasing down your team to complete Training courses.
Breathe easy knowing that your Phishing emails are continuously built, randomized and sent across your whole team.
Ready for smart automation in your Security Awareness Training program?
Impress your execs and delight your users with INFIMA's fully automated security awareness training platform.
Your program is...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities.
67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach
ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity.
It is the only deep level server monitoring product on the market.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities.
67 % of SMBs experienced a cyber attack in the...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler,...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Cybersecurity solution that enables businesses to discover, audit, and monitor privileged accounts of all types.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes.
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits.
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.
We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Enterprise-Grade Security For Any Business
Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention.
Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention.
Coronet uses AI to detect and...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript.
Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java,...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
Boolebox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability.
Boolebox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Digital experience and Streaming platform that delivers excellent digital experience, drive conversion and increase engagement.
New age Digital experience & Streaming platform that delivers better digital experiences,drive conversions & increase engagement. Nitrogen accelerates performance by using predictive caching, 3rd party Java Script Manager & instantaneous rendering of catalog & product pages.
With its ultra-fast network & edge computing, the platform is used by its globally located customers to provide accelerated content delivery, quality video, advanced security & hyper personalized experiences with insights
New age Digital experience & Streaming platform that delivers better digital experiences,drive conversions & increase engagement. Nitrogen accelerates performance by using predictive caching, 3rd...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Feedzai is the market leader in fighting financial crime with AI. Our platform is purpose-built for financial institutions of all sizes
Feedzai is the market leader in fighting financial crime with AI. Global and regional banks, fintechs, processors and merchants use our fraud prevention and anti-money laundering products to safeguard trillions of dollars and manage risk while improving the customer experience. Feedzai offers both enterprise and packaged solutions to support the digital-first evolution for financial institutions of all sizes.
Feedzai is the market leader in fighting financial crime with AI. Global and regional banks, fintechs, processors and merchants use our fraud prevention and anti-money laundering products to...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Deploy private servers for your Business in a few clicks
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more!
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
DNIF provides real-time threat detection and analytics to the most critical data assets on the Internet.
DNIF offers solutions to the worlds most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management.
DNIF offers solutions to the worlds most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, DNIF has one of the...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and media. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
ThreatCop is an AI/ML-based security attack simulator and awareness tool that assesses the real-time threat posture
ThreatCop is a cyber security simulator and awareness tool that launches dummy cyber attacks on employees followed with awareness modules and gamified assessment. It simulates and imparts customized awareness based on top 6 attack vectors namely Phishing, Ransomware, Vishing, SMiShing, Cyber Scam and Removable Media. It compares the pre and post cybersecurity awareness levels of employees and provides a comprehensive report on individual user awareness as 'Employee Vulnerability Score (EVS)'
ThreatCop is a cyber security simulator and awareness tool that launches dummy cyber attacks on employees followed with awareness modules and gamified assessment. It simulates and imparts customized...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Employee cyber risk management platform which identifies, risks and analyzes and evaluates employee knowledge gaps in cybersecurity
Comprehensive management of human cyber risk:
1.- Assess Cyber Awareness and Strengthening Needs
Monthly chatbot guided sessions and situational decisions between Employees and Platform
2.- Execute personalized awareness itineraries
Specific content for the needs of each person
Tailor-made contents packages
3.-Phishing Campaign Simulation, automated and personalis for each employee
4.- Mitigate Cyber Risk
Delivers the best actions to reduce organizations risk
Comprehensive management of human cyber risk:
1.- Assess Cyber Awareness and Strengthening Needs
Monthly chatbot guided sessions and situational decisions between Employees and Platform
2.- Execute...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises
adopting cloud services, ensuring confidential and sensitive data is protected at
all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Designed to help organizations meet recordkeeping, supervision, and e-discovery challenges.
Designed to help organizations meet recordkeeping, supervision, and e-discovery challenges, the Archiving Platform from Smarsh provides a unified, search-ready repository of all archived electronic communications, including email, social media, instant messaging, mobile/text messaging and web content. Content is ingested and indexed, preserved in its original format, and available for search, review and production.
Designed to help organizations meet recordkeeping, supervision, and e-discovery challenges, the Archiving Platform from Smarsh provides a unified, search-ready repository of all archived electronic...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies.
By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius
deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Cloud Control automates cloud security and compliance monitoring and management.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
RISK IDENT is a leading software development company that offers anti-fraud solutions with expert knowledge in data analytics and ML.
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sector. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications.
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sector. We are experts in data analytics and...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
CyberSmart offers same-day government-backed certification: Cyber Essentials & IASME Governance/GDPR Readiness continuous compliance.
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet found the process too complicated or limited by financial or human resources. CyberSmart offers same-day government-backed certification: Cyber Essentials and IASME Governance/GDPR Readiness, ensuring all devices are continuously compliant through the usage of our mobile and desktop apps.
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Office Protect
(3)
Local product
Office Protect is a Microsoft 365 add-on that lets you easily implement best practice security settings for all your clients.
Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at the same time, monitors activity 24/7, and alerts you to suspicious events in a timely fashion. By using Office Protect, you're raising clients baseline security, improving your security offer, and showing your value to customers.
Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Infoblox delivers Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. With 8,000 customers and 350 of the Fortune 500, Infoblox is running the worlds most sophisticated networks.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
A program for software license compliance, hosts' configurations management, hardware upgrade planning, IT asset management, etc.
A program for software license compliance, hosts' configurations management, hardware upgrade planning, IT asset management, etc.
A program for software license compliance, hosts' configurations management, hardware upgrade planning, IT asset management, etc.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Integrated risk management platform that helps firms manage regulatory compliance, IT, security, vendors, audits and documentation.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Automated Penetration Testing, with a click of a button
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Swascan is the first CyberSecurity platform in Cloud & On Premise:
- Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks
- Code Review: solve issues in terms of source code
- GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR
- Phishing Simulation Attack: avoid phishing threats
- MSSP: ensure security governance
- Light SOC: Threat intelligence
Swascan is the first CyberSecurity platform in Cloud & On Premise:
- Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks
-...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
The iboss cloud provides fast and secure Internet access on any device, from any location, in the cloud.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting
Claroty provides the leading industrial cybersecurity platform to drive visibility, continuity and resiliency in the industrial economy
Claroty, the industrial cybersecurity company, is trusted by the worlds largest enterprises to help them reveal, protect, and manage their OT, IoT, and IIoT assets. Its comprehensive platform connects seamlessly with customers existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote accessall with a significantly reduced total cost of ownership.
Claroty, the industrial cybersecurity company, is trusted by the worlds largest enterprises to help them reveal, protect, and manage their OT, IoT, and IIoT assets. Its comprehensive platform...
Features
- AI/Machine Learning
- Behavioral Analytics
- Incident Management Software
- Vulnerability Scanning
- Endpoint Management
- Whitelisting/Blacklisting