34 results
Why Capterra is free
Software that provides a unified view of service delivery, availability, performance and security of IT applications. Learn more about ServicePilot
ServicePilot monitoring software enables faster resolution of IT incidents. This intelligent observability platform collects and analyzes metrics, traces and logs to improve application performance and prevent IT failures. It also unifies monitoring and breaks down silos to ensure continuity of services and IT infrastructure. Learn more about ServicePilot

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Focusing on the corporate network, employee & device protection, it is easy to forget the importance of website security. Not secured properly, an exposed website can lead to hacks and reputational damage due to leaked customer data and compromised online company presence. Companies can use NordLayer prevention measures by establishing a dedicated IP to hide the company website from hostile actors to avoid the impact of a taken offline website, malicious code injection, or fraud. Learn more about NordLayer

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues. Learn more about GetSecured
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues. This tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more. Learn more about GetSecured

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Easy to use, fast and reliable web hosting services for everyone who wants to start their online journey.
Start your online journey with fast and secure web hosting that enables you to take the Internet by storm. At Hostinger, you can choose from various web hosting-related services that include Domain Registration, Cloud Hosting, Email Hosting, SSL Certificate, and LiteSpeed Servers. Learn more about Hostinger

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Datadog is a service that helps increase uptime and maximize the performance of services through centralized monitoring and alerting.
Datadog is a SaaS-based monitoring, security, and analytics platform for cloud-scale infrastructure, applications, logs, and more. The platform assists organizations in improving agility, increasing efficiency and providing end-to-end visibility across dynamic or high-scale infrastructures. By collecting metrics and events from 400+ out of the box services and technologies, Datadog enables Dev, Sec, and Ops teams to ensure application uptime and accelerate go-to-market efforts. Learn more about Datadog

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Kount's Identity Trust Global Network delivers fraud prevention and personalized customer experiences for over 9,000 leading brands.
Powered by its Identity Trust Global Network , Kount, An Equifax Company, links billions of trust and fraud signals to protect every interaction from account creation and login to payments and disputes. Businesses use Kount to increase approval rates, reduce chargebacks, stop bot attacks, prevent account takeover, and manage disputes all within a single platform. With Kount, businesses get both hands-free automation and flexible controls for more accurate decisions. Learn more about Kount

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market. Learn more about Perch Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Learn more about Acunetix

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location. Learn more about Zscaler

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise. Learn more about AppTrana

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Learn more about SiteLock

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho Learn more about Netsparker

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Premium managed WordPress hosting, powered by Google Cloud. Lightning-fast load times, 24/7 expert support, and highly scalable.
At Kinsta, we take managed WordPress hosting and performance to the next level. Powered by Google Cloud Platform and their lightning-fast "premium tier" network, WordPress users can choose from 25+ data centers around the globe. We host all types of sites, from small blogs up to Fortune 500 customers. Learn more about Kinsta

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
DataDome provides state-of-the-art protection against online fraud and bot attacks for mobile apps, websites and APIs.
DataDome protects mobile apps, websites and APIs from online fraud and bot attacks, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. Our AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time. Learn more about DataDome

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
Your users and visitors depend on you to keep their information safe. If you want to be sure of your website security, Security for Everyone is the tool for you. With S4E, you will have: 1- Manual Vulnerability Scanning 2- Automated Vulnerability Scanning 3- Vulnerability Scanning API Additionally, you can check your website security regularly with our web application penetration testing service performed by our highly trained cybersecurity experts who have 35+ years of experience collectively. Learn more about Security for Everyone

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, acquired ShieldSquare in March 2019.
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages Intent-based Deep Behavior Analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, card fraud, content Learn more about Radware Bot Manager

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.
Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company. A bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities. Learn more about Hackrate Bug Bounty Platform

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Learn more about Netskope Active Platform

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Cloud-based solution that helps businesses secure websites and track their performance.
Cloud-based solution that helps businesses secure websites and track their performance.

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Learn more about Red Sentry

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Learn more about Detectify

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors
NO-COMPROMISE FEATURES FOR ROBUST SECURITY: With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks. Protect unlimited domains and applications using a single instance at no additional cost. Active threat intelligence for real-time protection. Denial of Service (DoS) protection helps safeguard the application from random repetitive attacks. Bot, Crawlers Protection Learn more about Modshield SB

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Extends OSSEC with a management console, advanced file integrity management, compliance auditing and reporting, and expert support.
Atomic OSSEC provides a comprehensive FIM at a fraction of the cost of traditional solutions. It meets all your file integrity monitoring requirements, works in any cloud, server or hybrid environment and integrates easily where you need it. Based on OSSECs solid open source foundation, it expands the capabilites to what businesses need. With advanced SIEM log filtering that reduces the noise for security op centers & a light footprint that doesnt break the bank on SOC costs. Learn more about Atomicorp OSSEC

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Kasada detects the presence of malicious automation from the very first request and stops bots before it can do its damage.
Kasada has pioneered an approach to mitigating bots. Instead of letting requests in to look for suspicious behavior that can fly beneath the radar, Kasada is able to identify and stop malicious automation before it’s ever allowed to enter the user's infrastructure. Kasada achieves this by detecting the immutable evidence that presents itself whenever the tools associated with automation interact with online businesses. Learn more about Kasada

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more.
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more.

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments.
NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments.

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API
F5's Advanced WAF proactively detects and mitigates threats, secures sensitive data, and defends against application (DoS).
F5's Advanced WAF proactively detects and mitigates threats, secures sensitive data, and defends against application (DoS).

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management Software
  • Endpoint Protection Software
  • API