Compare Products

Showing all 194 products

Quadrant XDR

Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. With intelligent action and rapid response, XDR's proprietary technology is operated by sea...Read more about Quadrant XDR

5.0 (4 reviews)

Shinobi Defense System

Shinobi Defense System is an endpoint protection and vulnerability management solution that helps businesses streamline processes related to data encryption, internet browser restriction management, approval process handling, and ...Read more about Shinobi Defense System

No reviews yet

Chariot

The Chariot Platform enables organizations to identify, assess and reduce vulnerabilities in their networks as well as rapidly respond to real-time attacks. The platform’s unique approach to attacking cyber threats provides custom...Read more about Chariot

No reviews yet

Invicti

Invicti, formerly Netsparker, is a cloud-based and on-premise solution designed to help businesses manage the entire application security lifecycle through automated vulnerability assessments. Key features include maintenance sche...Read more about Invicti

Kiuwan

Kiuwan is a static application security testing (SAST) solution designed to help businesses identify and remediate vulnerabilities within source code across the software development life cycle (SDLC). The platform supports several...Read more about Kiuwan

Automox

Automox is the modern, cloud-native endpoint-hardening platform that empowers organizations to remediate vulnerabilities faster than they can be weaponized. This cross-platform solution simplifies and automates critical patching, ...Read more about Automox

vRx

<-- Patch Everything You Need --> Automatically or manually install all prioritized updates for which a patch is available across your OS and Apps. Focus on the vulnerabilities that have a real probability of being exploited inste...Read more about vRx

WIZ

Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company...Read more about WIZ

No reviews yet

Astra Pentest

Astra Pentest offers a vulnerability assessment tool that packs the intelligence acquired over years of security testing. The vulnerability scanner conducts 8000+ tests ensuring a thorough evaluation of a user's security strength....Read more about Astra Pentest

4.8 (8 reviews)

OX Security

Designed for businesses in banking, information technology, financial services and other industries, OX Security is a cloud security platform that provides advanced threat detection and response capabilities. The solution provides...Read more about OX Security

5.0 (1 reviews)

NorthStar

NorthStar is a comprehensive, fully-integrated, and advanced data-driven platform that allows organizations to automate their security risk operations with prioritized remediation, risk reduction, and comprehensive data visibility...Read more about NorthStar

No reviews yet

Pentera

The Pentera automated penetration testing platform uses an algorithm to scan and ethically attack networks, providing real-time penetration tests at scale. Pentera safely performs the actions that a malicious adversary would — rec...Read more about Pentera

5.0 (2 reviews)

Heimdal Patch & Asset Management

Heimdal Patch & Asset Management is an automated patch management solution with incorporated asset tracking features. With its help, your company can achieve pre-emptive vulnerability management, while at the same time allowing yo...Read more about Heimdal Patch & Asset Management

Nanitor

The Nanitor vulnerability management solution is designed to simplify the process of real-time detection and proactive response to cybersecurity issues. It focuses on strengthening the security fundamentals of an organization's gl...Read more about Nanitor

No reviews yet

Netwrix StealthINTERCEPT

Netwrix StealthINTERCEPT helps businesses promptly uncover and prevent attempts to compromise AD security such as unauthorized LSASS injection, NTDS.dit database extraction, and modification of AdminSDHolder container rights. Depl...Read more about Netwrix StealthINTERCEPT

No reviews yet

NinjaOne

NinjaOne is a leading unified IT management software company that simplifies how IT teams work. MSPs and IT departments can automate, manage, and remediate all their device management tasks within one fast, modern, intuitive platf...Read more about NinjaOne

Rencore Governance

Rencore helps to automate Microsoft 365 Governance for mid-market and large enterprises among all industries worldwide. Rencore Governance maximizes flexibility and efficiency in governance for Microsoft 365, Microsoft Teams, Shar...Read more about Rencore Governance

Xygeni

Xygeni - End to end Software Supply Chain Security. Xygeni shields your Software Supply Chain from unseen threats, providing comprehensive visibility and control throughout the entire SDLC. The platform enables systematic risk as...Read more about Xygeni

5.0 (3 reviews)

FlexNet Code Insight

FlexNet Code Insight helps organizations understand their license compliance and security vulnerability exposure across the software supply chain. It provides users with a Software Bill of Materials from across the software supply...Read more about FlexNet Code Insight

No reviews yet

Centraleyezer

Centraleyezer is a vulnerability management software that helps businesses track, view and manage vulnerabilities across IT systems via a unified portal. The platform offers monitoring, reporting, automated follow-ups, escalations...Read more about Centraleyezer

ESET PROTECT MDR

Organizations now need increased visibility into their computers and networks to ensure that emerging threats, careless behavior by employees or unwanted applications do not put their profits or reputations at risk. The answer is ...Read more about ESET PROTECT MDR

Holm Security VMP

The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one inte...Read more about Holm Security VMP

4.4 (5 reviews)

Runecast

Runecast is a provider of one solution designed to help IT Security and Operations teams like yours effectively manage and mitigate risks. Our platform offers a range of valuable features to enhance your operational efficiency and...Read more about Runecast

Learn More

SysKit Insights

SysKit Insights is a performance monitoring and reporting tool designed to help enterprises manage troubleshooting, search event logs, and track servers' behavior across on-premise, hybrid, and cloud-based SharePoint applications....Read more about SysKit Insights

No reviews yet

ThunderScan

ThunderScan is a static application security testing and white-box testing tool designed to help businesses perform extensive security analysis of application source codes. The application requires minimal user input and can also ...Read more about ThunderScan

No reviews yet

Cyber Chief

Cyber Chief offers businesses the power to identify and resolve potential vulnerabilities across web applications and cloud infrastructure. Using the one-click vulnerability scanning feature, the software helps users scan and se...Read more about Cyber Chief

CloudPassage Halo

CloudPassage Halo is a security solution that helps brands and businesses in finance, e-commerce, healthcare, gaming, B2B SaaS, biotech and digital media sectors safeguard cloud infrastructures. The CloudPassage Halo allows users ...Read more about CloudPassage Halo

No reviews yet

Syxsense

Syxsense is a leading Unified Security and Endpoint Management (USEM) solution that delivers real-time monitoring and intelligent automation for vulnerability management, patch management, and security remediation in a single con...Read more about Syxsense

Learn More

SiteGround

SiteGround is a vulnerability management solution designed to help businesses monitor issues across servers using artificial intelligence (AI) technology. With the built-in staging tool, developers can create testing environments ...Read more about SiteGround

Learn More

IncMan SOAR

IncMan SOAR is a cloud-based and on-premise solution, designed to helps MSSPs and organizations across finance, energy, healthcare or retail industries manage, measure, and orchestrate various security tasks such as threat hunting...Read more about IncMan SOAR

Cyberwatch Vulnerability Manager

Cyberwatch Vulnerability Manager helps enterprises monitor and manage vulnerabilities across servers, networks, devices and more. The platform includes a centralized dashboard, which enables organizations to gain visibility into a...Read more about Cyberwatch Vulnerability Manager

No reviews yet

Crashtest Security

Crashtest Security is a SaaS-based solution for vulnerability scanning. This security program runs automated scans and detects cyber threats for web applications. The software is designed for developers and companies to conduct do...Read more about Crashtest Security

4.7 (3 reviews)

Vulkyrie

Vulkyrie offers unlimited network and website security scans for small to mid-sized enterprises. A Free Plan is available for vulnerability discovery. This easy-to-use cloud-based solution helps enterprises quickly find and fix vu...Read more about Vulkyrie

No reviews yet

Nessus

Nessus is a cloud-based solution designed to help businesses identify potential vulnerabilities across the system and prioritize critical issues to facilitate threat remediation processes. Professionals can maintain an audit trail...Read more about Nessus

Learn More

Orca Security

Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an a...Read more about Orca Security

Learn More

Intruder

Intruder is a cloud-based software designed to help businesses automatically perform security scans to identify and remediate potential threats. Professionals can proactively monitor the system, receive automated alerts about new ...Read more about Intruder

5.0 (2 reviews)

HackerOne

HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. Hac...Read more about HackerOne

4.7 (9 reviews)

CybrHawk SIEM XDR

CybrHawk XDR provides enterprise-wide protection by analyzing data from any source to detect and prevent sophisticated attacks and providing complete visibility. Simplify security operations to reduce average response time (MTTR) ...Read more about CybrHawk SIEM XDR

5.0 (1 reviews)

RedShield

RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government agencies proactively discover and remediate application and API vulnerabilities using artificial intelligence (AI)...Read more about RedShield

No reviews yet

Snyk

Snyk is an application security and testing platform designed to help businesses find, prioritize and remediate vulnerabilities across open source libraries, codes and containers. The platform enables developers to scan and test...Read more about Snyk

CxSAST

Checkmarx Static Application Security Testing (CxSAST) is a static analysis platform that enables businesses to identify security vulnerabilities across source codes. It allows software development teams to automate workflows, def...Read more about CxSAST

3.9 (7 reviews)

Cytellix

www.cytellix.com Cytellix is a cloud-based solution that manages, plans, and executes the ongoing IT Security activities of service providers, enterprises, and small and medium businesses. It is transforming the security industry...Read more about Cytellix

No reviews yet

Sysdig

Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig ...Read more about Sysdig

4.4 (7 reviews)

Systweak Antivirus

Designed for businesses of all sizes, Systweak Antivirus is an on-premise solution that helps streamline vulnerability management via malware, firewall and web protection. Key features include threat management, system clean-ups, ...Read more about Systweak Antivirus

No reviews yet

Lightspin

Lightspin offers an application programming interface (API) for integrations. It also provides behavioral analytics, data visualization, incident management, vulnerability scanning protection, antivirus, security auditing, and vis...Read more about Lightspin

4.7 (3 reviews)

Autobahn Fit

Autobahn Fit is an innovative solution to measure and improve hacking resistance. Autobahn saves you time and increases your defenses. Most importantly, it provides issues prioritised from a hacker's perspective and best-in-class...Read more about Autobahn Fit

5.0 (1 reviews)

Vulcan Cyber

Vulcan Cyber is a vulnerability management software designed to help businesses analyze and mitigate cyber risks. The platform enables administrators to identify patches and prioritize vulnerabilities based on threat intelligence ...Read more about Vulcan Cyber

5.0 (1 reviews)

AppTrana

AppTrana is a website and application security tool, designed to help businesses manage and maintain cloud security using scanning, Pen Testing, risk detection, always-on security, WAF, traffic monitoring, and more. It provides a ...Read more about AppTrana

Learn More

USM Anywhere

USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response. The security platform enables users to collect and ...Read more about USM Anywhere

Hackuity

Hackuity is not a simple vulnerability detection tool. It intervenes between detection and remediation to allow CISOs to optimize the remediation of the various vulnerabilities identified. It is thus possible to centralize all t...Read more about Hackuity

No reviews yet

STORM

STORM is a cybersecurity software designed to help security operation centers identify, prioritize and resolve incidents. The platform enables administrators to collect and analyze cybersecurity incident-related data and automatic...Read more about STORM

No reviews yet

Qualys Cloud Platform

Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attac...Read more about Qualys Cloud Platform

Learn More

Reflectiz

Take control of your website security with Reflectiz. Our proprietary website security sandbox creates a complete digital application inventory in minutes — the first of its kind. This inventory displays all the external applicati...Read more about Reflectiz

No reviews yet

WebTitan

WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also provides web and DNS filtering control and is suitable for large and midsize businesses across all industries. ...Read more about WebTitan

Learn More

Squad1

Squad1 is a risk-based vulnerability management (RBVM) solution. It is designed to help organizations prioritize and accelerate vulnerability mitigation through risk scoring and intelligence. Squad1 serves security, IT operations,...Read more about Squad1

No reviews yet

ShiftLeft CORE

ShiftLeft CORE is the only suite of Application Security tools and services capable of analyzing the complete flow of data through a modern application in minutes so dev teams can release secure code at scale. ShiftLeft can match ...Read more about ShiftLeft CORE

No reviews yet

Control Compliance Suite

Overall, Control Compliance Suite is an IT security solution that helps businesses automate compliance assessments, identify security gaps and vulnerabilities, and prioritize remediation. It allows organizations to improve their s...Read more about Control Compliance Suite

No reviews yet

CloudJacketXi

CloudJacketXi manages, detects, and responds to ongoing cybersecurity threats. It can be deployed on-premise, virtually, in the cloud or a hybrid combination. It can protect SMBs to mid-market enterprises against data breaches by ...Read more about CloudJacketXi

5.0 (1 reviews)

Security Manager by FireMon

FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Wi...Read more about Security Manager by FireMon

4.3 (4 reviews)

Greenbone

Greenbone is a vulnerability management software as a hosted vulnerability scanner that detects security issues, generate security reports and offeres remediation advice. The software is available as not only a cloud-based solutio...Read more about Greenbone

4.1 (8 reviews)

Nexus Lifecycle

Nexus Lifecycle by Sonatype helps developers streamline open-source governance operations and scan and fix issues in the software development process via a unified portal. The platform enables security professionals to establish c...Read more about Nexus Lifecycle

4.0 (4 reviews)

Strobes RBVM

Enable a robust offensive security program with the help of Strobes. With the combination of ASM, PTaaS and VM we help you achieve great progress toward building a robust CTEM program. Our best-in-class security experts along with...Read more about Strobes RBVM

5.0 (2 reviews)

v6Protect

v6Protect is cloud-based cyber security software that offers an innovative, non-intrusive solution, allowing to easily monitor the security of web applications. Features include mapping of the attacks exposed on the Internet, vuln...Read more about v6Protect

No reviews yet

Seeker

Seeker, our interactive application security testing (IAST) solution, gives you unparalleled visibility into your web application security position and identifies vulnerability trends against compliance standards. Seeker performs ...Read more about Seeker

No reviews yet

HTTPCS Security

The next generation vulnerability scanner, proven by over 9200 customers worldwide. Thanks to its technology, HTTPCS Security is the most powerful vulnerability scanner on the market, allowing you to analyze and audit your most co...Read more about HTTPCS Security

No reviews yet

Alert Logic MDR

Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for various environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform and hybrid environment. ...Read more about Alert Logic MDR

The Anomali Platform

The Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence repository, to automatically correlate all installed security telemetry against active threat intelligence to stop breac...Read more about The Anomali Platform

No reviews yet

Reveelium

Reveelium is a cloud-based and on-premise solution cybersecurity and safety solution that helps businesses in aviation, hospitality, IT, computer software, retail, broadcast media, and other sectors identify thefts, manage threats...Read more about Reveelium

4.5 (6 reviews)

esChecker

esChecker, your MAST automation companion Reduce the time wasted to qualify your Mobile Application Protections thanks to MAST automation (SAST static tests and DAST dynamic tests). The slow, manual days of pentesting mobile appli...Read more about esChecker

5.0 (1 reviews)

System Mechanic Ultimate Defense

System Mechanic Ultimate Defense is a suite of 18 PC optimization tools that cleans up and optimizes Windows to run faster and better. Use System Mechanic to fix registry errors, remove junk files, fix long startup times, and impr...Read more about System Mechanic Ultimate Defense

Learn More

Code Dx

Code Dx by Synopsys is an application security orchestration and correlation tool that enables DevSecOps teams to efficiently leverage their security testing tools. Integrating with over 70 of the most popular SCA, SAST, DAST, and...Read more about Code Dx

No reviews yet

Tinfoil API Scanner

In today's tech landscape, many applications and services are connected through application programming interfaces (APIs), which enhance communication, but also complicate security. Tinfoil by Synopsys is a dynamic testing solutio...Read more about Tinfoil API Scanner

No reviews yet

Sn1per

Introducing Sn1per Professional — the most powerful automated security tool built with professional security practitioners and IT professionals in mind. With Sn1per Professional, you can discover and prioritize the risks in your e...Read more about Sn1per

No reviews yet

IDA Pro

IDA Pro is a binary code analysis tool. It's capable of creating maps of software's execution to show the binary instructions that are actually executed by the processor in a symbolic representation called assembly language. This ...Read more about IDA Pro

5.0 (1 reviews)

Blacklock

Blacklock is an award-winning service that offers consultant-grade testing with an On-Demand experience. The service allows you to perform penetration testing when you need it. We love to make security things simple, practical and...Read more about Blacklock

No reviews yet

StorageGuard

StorageGuard scans, detects and remediates all security risks in your enterprise backup systems. How does it work? StorageGuard scans all enterprise backup systems to automatically detect, prioritize and remediate vulnerabilitie...Read more about StorageGuard

No reviews yet

JFrog Xray

Helps users gain confidence in their software releases with a universal DevSecOps software composition analysis solution that scans all of their open source software artifacts and their dependencies for vulnerabilities and license...Read more about JFrog Xray

4.3 (6 reviews)

Probely

Probely is a cloud-based web vulnerability scanning solution for security teams and developers. It is suitable for companies that build digital services. The solution scans web applications and manages the lifecycle of detected vu...Read more about Probely

Red Sentry

Red Sentry is the industry leader in fast and affordable penetration testing. Our unique value comes in combining our fast pentests with our automated platform, keeping customers protected 24/7/365....Read more about Red Sentry

5.0 (2 reviews)

CLAW

CLAW is a cybersecurity platform that helps businesses identify real-time threats and assess network's gaps. Organizations can build composite datasets that quickly identify false positives. Using CLAW, businesses can enhance sn...Read more about CLAW

No reviews yet

DataDome

DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobi...Read more about DataDome

CanIPhish

CanIPhish is a phishing simulation and security awareness training platform that helps organizations train employees to detect and report phishing threats. The software caters to information security and IT teams in companies of a...Read more about CanIPhish

Hackrate

Hackrate Bug Bounty platform helps organizations to identify software vulnerabilities in a cost-efficient way. A bug bounty is about utilizing the power of crowdsourced security to secure businesses. During a bug bounty program, ...Read more about Hackrate

Defense.com

Defense.com is a cybersecurity platform that helps enterprises ensure compliance with security policies and manage detection/protection of data and applications from online threats. The solution enables businesses to create user p...Read more about Defense.com

No reviews yet

CODA Footprint

CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimizes both discovery and evaluation of active software vulnerabilities. The CODA Footprint platform offers a compreh...Read more about CODA Footprint

5.0 (3 reviews)

GetSecured

GetSecured is a comprehensive security scanning solution, which helps businesses find breached data, exposed servers, web app/AWS cloud vulnerabilities, and compliance issues. This platform can be easily understood by a non-tech...Read more about GetSecured

No reviews yet

Ermetic

Holistic security for AWS, Azure and GCP Tenable's holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery ...Read more about Ermetic

5.0 (2 reviews)

Trava

Trava is a cybersecurity solution, which enables investors, managed service providers and businesses to identify threats, secure financial assets and assess risks. Trava's automated assessments let organizations can scan technic...Read more about Trava

5.0 (1 reviews)

baramundi Management Suite

baramundi Management Suite is an IT management solution that helps businesses of all sizes streamline processes related to IT asset installation, distribution, protection and backup. The license management module allows employees ...Read more about baramundi Management Suite

4.7 (6 reviews)

Airplane Autopilot

Airplane Autopilot is an artificial intelligence coding assistant tool that helps software developers build internal tools and streamline engineering workflows. It helps automate repetitive coding tasks and monitor development cyc...Read more about Airplane Autopilot

No reviews yet

DeepSurface

DeepSurface is a predictive vulnerability management platform designed to strengthen cybersecurity for companies across various industries. It uses computational algorithms and artificial intelligence to accurately identify softwa...Read more about DeepSurface

4.5 (2 reviews)

Versio.io

Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT servi...Read more about Versio.io

4.5 (2 reviews)

Arcules

Arcules is a cloud surveillance solution that can manage all live and recorded videos across 4,000+ devices and 100,000+ channels. Arcules delivers a simple and unified access control, video surveillance, and analytics platform ...Read more about Arcules

No reviews yet

Beagle Security

Discover website security issues at the right time and address them in the right way using Beagle Security. With the ability to automate vulnerability assessment and accelerate remediation, you can secure your web applications fr...Read more about Beagle Security

Learn More

vPenTest

vPentest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge,...Read more about vPenTest

No reviews yet

ESOF VMDR

ESOF (Enterprise Security in One Framework) VMDR is the product launched by TAC Security in 2018. The product quickly assesses the risk and addresses prime concerns. ESOF VMDR is a risk-based vulnerability management platform for...Read more about ESOF VMDR

No reviews yet

Phoenix Security

AppSec Phoenix is a software, container and cloud security platform. Users can access vulnerabilities from different scanners in one single risk-based platform. ...Read more about Phoenix Security

Learn More

Conviso

Conviso is a Static Application Security Testing tool that helps businesses secure application development pipelines via vulnerability scanning, automated testing, and more. This platform is designed for businesses in finance, eCo...Read more about Conviso

4.0 (1 reviews)

tbSIEM

tbSIEM is a log management solution that helps businesses manage multiple data sources and network performances. The platform enables managers to monitor, analyze and investigate the data collected by various security tools, inclu...Read more about tbSIEM

No reviews yet

tbVA

Designed for businesses in IT, retail, travel and leisure, telecommunications, healthcare, finance, and other industries, tbVA is a cloud-based vulnerability management software that helps organizations handle security issues, ana...Read more about tbVA

No reviews yet

Malwarebytes for Business

Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response. The platform provides enterprise-class threat detection, isolation, and ...Read more about Malwarebytes for Business

Learn More

Enzoic for Active Directory Lite

Enzoic’s quick and free password auditor provides the most recent credential-related information and reporting to ensure IT administrators have the most accurate and comprehensive picture in a simple clean dashboard. ...Read more about Enzoic for Active Directory Lite

4.7 (3 reviews)

CloudWize

CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture design to runtime. We are the only cloud security cloud center of excellence. CloudWize provides 360° protection to pr...Read more about CloudWize

4.5 (4 reviews)

CAST Highlight

CAST Highlight is a SaaS software intelligence product for performing smarter application portfolio governance. It automatically understands source code of hundreds of applications in hours for Cloud Readiness, Software Compositio...Read more about CAST Highlight

5.0 (3 reviews)

Compliance Foresight

Compliance Foresight is a scalable GRC framework suitable for modern new age organisations. The solution is workflow enabled with ready to use modules and business logics implemented. Solution can manage the Audits, third parties ...Read more about Compliance Foresight

No reviews yet

Ostorlab

Ostorlab is a platform that discovers and scans mobile applications, web applications, and external attack surfaces to identify vulnerabilities and security & privacy weaknesses. - Manage attack surfaces and discover assets. - R...Read more about Ostorlab

No reviews yet

GuardRails

GuardRails is a security platform that empowers developers to build secure applications by giving them continuous protection. GuardRails provides a seamless experience for you and your team by securing all the critical component...Read more about GuardRails

5.0 (5 reviews)

CYRISMA

CYRISMA provides a complete risk assessment and mitigation ecosystem to organizations via a unified platform. The cloud-delivered solution is easy to deploy and use, with capabilities for internal and external vulnerability scanni...Read more about CYRISMA

4.8 (5 reviews)

Open Systems

Open Systems is a threat detection and response management solution that helps businesses in healthcare, insurance, manufacturing, NGOs, financial and other industries manage secure access, cyber risk and more. The platform enable...Read more about Open Systems

No reviews yet

Intigriti

Intigriti is a rapidly growing cybersecurity company based in Belgium. Our industry-leading bug bounty platform enables companies to tap into our global community of 50,000 ethical hackers, who use their unique expertise to f...Read more about Intigriti

4.5 (4 reviews)

SecOps Solution

SecOps Solution is a full-stack vulnerability and patch management platform. It is one single console to identify security vulnerabilities, prioritise them and patch them within seconds....Read more about SecOps Solution

5.0 (1 reviews)

ESOF App Sec

A unified vulnerability management solution, ESOF AppSec detects and protects websites and apps against risk-based vulnerabilities. By purchasing an ESOF AppSec license, the platform enables daily, weekly, monthly, and annual scan...Read more about ESOF App Sec

No reviews yet

Informer

Automated asset discovery unearths your external assets. Active scanning and hundreds of data sources are used to find online assets in seconds with just your domain as the seed. This continuous attack surface discovery process se...Read more about Informer

No reviews yet

Teleport

Teleport is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications. Teleport provides access control for all your cloud resources in one place. It simplifies the management of SSH keys...Read more about Teleport

5.0 (1 reviews)

ManageEngine Vulnerability Manager Plus

Vulnerability Manager Plus is an on-premise cyber security solution that empowers IT administrators and security teams with an integrated console to perform vulnerability assessment, security configuration management, patch manage...Read more about ManageEngine Vulnerability Manager Plus

Learn More

Vulnerability Intelligence

SaaS Vulnerability Scanner is a cloud-based cybersecurity solution that features vulnerability detection, reporting tools and misconfigured service tracking for internet-facing infrastructures. SaaS Vulnerability Scanner uses...Read more about Vulnerability Intelligence

5.0 (1 reviews)

Acunetix

Acunetix (by Invicti) is a cloud-based digital security solution that assist security analysts with data protection, manual testing and compliance reporting. It is primarily designed to scan websites and identify vulnerabilities t...Read more about Acunetix

Learn More

Sonrai Public Cloud Security Platform

Sonrai Public Cloud Security Platform delivers an enterprise identity and data governance platform to protect your cloud from insider threats, external threats, cybercrime, and information loss. Sonrai gives IT teams the visibili...Read more about Sonrai Public Cloud Security Platform

5.0 (1 reviews)

KACE

KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your net...Read more about KACE

Learn More

6clicks

6clicks is an easy way to implement your risk & compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate t...Read more about 6clicks

RayVentory

Get the data you need for your critical business initiatives: The Unified Data Platform fully covers the diversity, scale, and complexity of enterprise data assets through intelligent automation and technology in a centralized pl...Read more about RayVentory

CyberArk Privileged Access Manager

Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information ...Read more about CyberArk Privileged Access Manager

Risk Hawk

Risk Hawk is designed for CROs and heads of risk, compliance, audit, and operations who are aiming to make their organization resilient and firmly establish risks, controls, and related processes. It can give you and your senior...Read more about Risk Hawk

Learn More

CyLock Anti-Hacker

CyLock Anti-Hacker is a software designed to protect systems from hacker attacks by identifying weaknesses across the network and websites and providing information to address vulnerabilities. The dashboard allows managers to moni...Read more about CyLock Anti-Hacker

Learn More

RoboShadow

RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vulnerability Assessment Capabilities. RoboShadow allows any organisation, anywhere on the planet, to get an Interna...Read more about RoboShadow

No reviews yet

Threatspy

Threatspy is a Developer-first AI-powered AppSec Management platform (DAST) that enables developers and Security Teams to proactively identify and mitigate known and unknown vulnerabilities in their applications & API through auto...Read more about Threatspy

4.7 (3 reviews)

Detectify

Detectify is a vulnerability management software designed to help security teams and developers automate asset monitoring processes to secure web applications. Businesses can scan crawled URLs to identify security threats and mana...Read more about Detectify

5.0 (2 reviews)

Bytesafe

Bytesafe is a cloud-native security platform reduces risk and protects revenue - without slowing down developers. In today’s insecure world, security attacks are increasingly targeting the software supply chain and simply scannin...Read more about Bytesafe

4.6 (7 reviews)

CloudFabrix

CloudFabrix Composable Analytics is an analytics platform that provides data observability, AI-powered insights, and cloud cost management. The platform is designed for data, analytics, and cloud leaders in enterprise companies. T...Read more about CloudFabrix

4.5 (2 reviews)

PingSafe

PingSafe is an industry-leading all-in-one cloud security platform with a comprehensive knowledge of the attackers’ modus operandi. PingSafe is a comprehensive CNAPP that scans your entire cloud infrastructure through an attacke...Read more about PingSafe

5.0 (5 reviews)

Elastio Cyber Recovery

Elastio Cyber Recovery ensures the recovery of data and applications. Despite cybersecurity being given top priority, attackers continue to break through defenses, wreaking havoc on organizations, large and small. The data protect...Read more about Elastio Cyber Recovery

5.0 (1 reviews)

Fortify

Fortify is an application security platform designed to help organizations address the evolving threats of today and tomorrow. By combining established next-gen technologies with best practices, Fortify allows organizations to inc...Read more about Fortify

5.0 (2 reviews)

DPL Fault Tree

Fault trees are unique in their ability to gracefully handle graphic representations of large-scale, complex problems or systems. A fault tree provides a means to better understand the risks involved in a given system and how they...Read more about DPL Fault Tree

No reviews yet

ShadowKat

ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as we...Read more about ShadowKat

5.0 (1 reviews)

VulnSign

VulnSign is an automated dynamic application security testing tool that detects vulnerabilities in web applications, microservices, and APIs. VulnSign is designed for organizations that want to improve their application security p...Read more about VulnSign

No reviews yet

cyberscan.io

cyberscan.io combines the functions of vulnerability scanner, penetration tool and OSINT scanner in one product. The scanner identifies all IP addresses and sub-domains associated with a domain and scans them for open ports. The r...Read more about cyberscan.io

5.0 (1 reviews)

DarkSight

Darksight is a comprehensive vulnerability assessment and patch management solution that aids organizations in identifying and eliminating critical vulnerabilities in a seamless and automated manner. By focusing on addressing thir...Read more about DarkSight

No reviews yet

AWS Config

AWS Config is a compliance and policy management solution that helps businesses streamline processes related to change management, continuous compliance, troubleshooting, and security analysis. With AWS Config, users can continuou...Read more about AWS Config

Learn More

Amazon CloudWatch

Amazon CloudWatch is an automated testing software designed to help DevOps engineers, IT managers, developers and site reliability engineers (SREs) monitor application performances. The platform enables administrators to set up al...Read more about Amazon CloudWatch

Machine Learning on AWS

AWS provides the most comprehensive set of artificial intelligence (AI) and machine learning (ML) services. With a fully managed cloud infrastructure, you can build, train, and deploy integrated machine learning models for any us...Read more about Machine Learning on AWS

5.0 (3 reviews)

FlexNet Code Aware

FlexNet Code Aware is a source code management software that provides code scanning capabilities to businesses, whether they are looking for vulnerabilities, dependencies, or policies. The scanning technology can automatically det...Read more about FlexNet Code Aware

No reviews yet

AWS Shield

AWS Shield is a vulnerability management solution that helps businesses streamline processes related to inline attack mitigation, network flow monitoring, event response, and more from within a unified platform. It allows staff me...Read more about AWS Shield

4.3 (3 reviews)

SanerNow

SecPod SanerNow is an endpoint security solution that enables businesses to streamline processes related to threat detection, compliance management, and more. Its vulnerability management platform lets users automate operations, c...Read more about SanerNow

Learn More

WhiteSource

WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or comp...Read more about WhiteSource

4.3 (7 reviews)

Rubrik

Rubrik is a data management solution that helps businesses streamline data backup, archiving, offsite replication and compliance management operations via a unified portal. It enables organizations to detect anomalies and protect ...Read more about Rubrik

Learn More

Penzzer

DAST/blackbox test platform for automotive, IOT, and medical devices with integrated pen testing and fuzzing. Penzzer, the only tool that combines pen testing with dynamic analysis, assists in identifying software vulnerabilities...Read more about Penzzer

No reviews yet

Netsurion

Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you ...Read more about Netsurion

Learn More

Amazon Inspector

Amazon Inspector is a web application to help you find, prioritize and remediate potential security vulnerabilities in Amazon EC2 and ECR workloads. It detects common security vulnerabilities, missing patches, and confidential dat...Read more about Amazon Inspector

No reviews yet

IBM Security Guardium

IBM Security Guardium provides comprehensive compliance and data security solutions for modern data environments. It supports data that is hosted on-premise, on-cloud, or in containers. Guardium can be used to manage compliance re...Read more about IBM Security Guardium

No reviews yet

Zscaler

Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious...Read more about Zscaler

Learn More

SolarWinds Patch Manager

SolarWinds is an on-premise security and patch management solution that offers Microsoft Windows Server Update Services (WSUS) management, System Center Configuration Manager (SCCM) management, compliance management and reporting ...Read more about SolarWinds Patch Manager

GlitchSecure

Designed for businesses in technology, telecommunications, healthcare and other industries, GlitchSecure is a cloud-based solution that helps manage cybersecurity operations through vulnerability assessment, penetration testing, c...Read more about GlitchSecure

ReversingLabs Titanium Platform

ReversingLabs Titanium Platform is an advanced malware analysis solution that leverages machine learning technology to provide threat analysis and identification. With support for a vast array of file formats and types, the platfo...Read more about ReversingLabs Titanium Platform

No reviews yet

Netwrix Change Tracker

Netwrix Change Tracker enables organizations of all sizes to enhance their security posture by hardening configurations, monitoring changes and delivering superior forensic capabilities that minimize the time and effort needed to ...Read more about Netwrix Change Tracker

No reviews yet

Data Center Automation

Micro Focus Data Center Automation is a risk management solution that can help businesses automate their IT infrastructure management and reduce risk, human error, and working hours. With its powerful features and flexibility, Dat...Read more about Data Center Automation

No reviews yet

Uptycs

The Uptycs CNAPP + XDR Platform is a comprehensive security solution designed for modern attack surfaces. Uptycs enables organizations to reduce risk and respond to threats with a single, unified platform that covers the entire mo...Read more about Uptycs

4.7 (6 reviews)

DriveStrike

DriveStrike is a data breach protection software designed to help businesses locate, track, lock and wipe all computers, laptops, tablets and phones across multiple locations to protect against stolen or lost devices, insider thre...Read more about DriveStrike

FYEO DI

FYEO Domain Intelligence is a cyber security platform that leverages one of the largest databases of leaked credentials, cracked passwords, and phone numbers to notify your organization of 3rd party data breaches impacting your em...Read more about FYEO DI

No reviews yet

ISS

INSSIDE Security Suite is a leading platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes....Read more about ISS

4.3 (3 reviews)

PDQ Deploy & Inventory

PDQ Deploy is specifically designed to automate system patches and application updates. Choose from our Package Library of over 200 applications to make updates within minutes. Select the software you want to deploy, specify which...Read more about PDQ Deploy & Inventory

Learn More

Enginsight

Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the plat...Read more about Enginsight

5.0 (6 reviews)

Pathlock

Pathlock is a governance, risk, an compliance (GRC) solution that helps businesses streamline processes related to access analysis, automated role designing, provisioning management, change log tracking, data masking, emergency ac...Read more about Pathlock

No reviews yet

Cohesity

Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, and get value from data—across the data center, edge, and cloud. Cohesity helps organizations defend against cyber...Read more about Cohesity

No reviews yet

Appgate SDP

Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce risk and ensure network security within a digital environment. Serving more than 1,000 organizations across 40 count...Read more about Appgate SDP

5.0 (5 reviews)

Sigrid

Sigrid is a data-driven intelligence platform that helps users analyze and manage applications' source code. By using advanced analysis techniques, it provides users with objective insights into the software's technical and busine...Read more about Sigrid

teamplay Fleet

Designed for healthcare organizations, teamplay Fleet is a cloud-based solution that helps track and manage equipment maintenance via vulnerability assessment, service tickets, activity tracking and more. The platform helps health...Read more about teamplay Fleet

No reviews yet

EcoTrust

EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced ...Read more about EcoTrust

TruOps

TruOps' powerful GRC platform transforms traditionally siloed risk functions into a comprehensive Risk Operations Center. Designed to integrate and automate critical GRC functions, TruOps simplifies the security, risk, and complia...Read more about TruOps

No reviews yet

Rivial Data Security

Rivial Data Security enables organizations to accurately measure their risk, automate compliance, and mature their cybersecurity program. Our six-module platform, which includes Governance, Risk, Compliance, Vulnerabilities, Vend...Read more about Rivial Data Security

5.0 (4 reviews)

Brandefense

Brandefense is a cloud-based digital risk protection suite designed to assist organizations in tracking and managing cyber threats via a unified portal. This platform provides protection for systems by identifying threats, deliver...Read more about Brandefense

No reviews yet

Jazz Platform

Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses with threat detection and response automation. Key features include data protection, image capture, forensic anal...Read more about Jazz Platform

5.0 (6 reviews)

Apiiro

Apiiro invented a code risk platform to remediate critical risks from cloud to code and secure all cloud-native application components in a single platform. Once connected to a source control manager, Apiiro will identify all appl...Read more about Apiiro

4.3 (3 reviews)

Dark Web ID

Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about ...Read more about Dark Web ID

Learn More

VulScan

VulScan is a cloud-based vulnerability management software designed to help businesses scan and handle the entire IT security pipeline, from complex issue detection and remediation to service ticket creation and network location m...Read more about VulScan

4.0 (9 reviews)

Fyde

Fyde allows organizations, especially those with a distributed workforce, to mitigate the risk of breach with a secure enterprise resource platform accessible employees, contractors, and other users. It is compatible with any app ...Read more about Fyde

5.0 (1 reviews)

Deepinfo Attack Surface Platform

Deepinfo Attack Surface Platform is a cloud-based solution that helps businesses discover and monitor digital assets, detect issues and vulnerabilities, and remediate them. To optimize cybersecurity efforts, administrators can p...Read more about Deepinfo Attack Surface Platform

No reviews yet

Axonius

Axonius is an information technology asset management (ITAM) solution designed to assist small to large enterprises with monitoring inventory of software and hardware assets. It enables users to automatically validate security enf...Read more about Axonius

5.0 (5 reviews)

Falcon

CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. ...Read more about Falcon

Learn More

Cyber Hawk

Cyber Hawk open-source software is based on SUSE Linux Enterprise and contains a reliable and secure codebase that implements a collection of tools needed for analysis and threat intelligence. Cyber Hawk offers a unique solution...Read more about Cyber Hawk

4.0 (1 reviews)

FractalScan Surface

Every asset your business has connected to the internet is a potential entry point for attackers. As more systems move to the cloud, even a small business's online estate can quickly become unmanageable. FractalScan Surface is a...Read more about FractalScan Surface

runZero

runZero provides asset inventory and network visibility for security and IT teams. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints a...Read more about runZero

Learn More

Aikido Security

Aikido is a security management system that aids businesses in streamlining their security operations across codes and the cloud. It offers various features, including custom rules, tailored notifications, on-demand security repor...Read more about Aikido Security

4.6 (5 reviews)

MeghOps

MeghOps emerges as a reliable partner for businesses seeking a holistic and hassle-free cybersecurity solution. By integrating cloud security compliance, a robust firewall, and a suite of security services, MeghOps empowers organi...Read more about MeghOps

5.0 (1 reviews)

FileAnalysis

Designed for small to large businesses, FileAnalysis by ManageEngine is a cloud-based vulnerability management solution for storage and security insights. The platform provides various features such as junk data purging, duplicate...Read more about FileAnalysis

No reviews yet

Predictive

Predictive is a cloud-based application designed to fortify organizations against cyber threats, empowering them with informed insights for decisive action. Key features of Predictive' s robust offering include: 1. Security Audi...Read more about Predictive

5.0 (1 reviews)

Fidelis Elevate

Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and use...Read more about Fidelis Elevate

5.0 (1 reviews)

Jit

Jit enables full application and cloud security coverage in minutes with codified security plans. Using these plans, you can tailor a developer security toolchain to your use case and implement it across your repos in Jit’s clicka...Read more about Jit

5.0 (1 reviews)

Action1

Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party ...Read more about Action1

Learn More

Morphisec Guard

Morphisec is an endpoint security platform designed to help small to large businesses manage and protect devices by camouflaging applications and web browsers from malware and data intrusions. It uses moving target defense (MTD) t...Read more about Morphisec Guard

5.0 (1 reviews)

Secomea

Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage the...Read more about Secomea

No reviews yet

Reporter

Reporter is a cybersecurity software that helps businesses enhance efficiency in security assessments and reporting. Teams can document findings using templates or references from previous research. The platform enables managers t...Read more about Reporter

No reviews yet

BIMA

BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart integration ensures a proactive shield against cyber threats, boosting organizational resilience. With streamline...Read more about BIMA

5.0 (2 reviews)

Elastic Stack

Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, s...Read more about Elastic Stack

Learn More

Carbon Black Cloud Workload

The Carbon Black Cloud Workload helps protect the most common serverless workloads such as AWS Lambda, Azure Functions, and GCP Functions. The solution monitors vulnerabilities in cloud-native applications and automatically applie...Read more about Carbon Black Cloud Workload

5.0 (1 reviews)