---
description: Page 12 - See the list of the best Cybersecurity Software for businesses in Australia. Our free interactive tool makes software selection fast and easy allowing to filter by price, feature or user rating.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 12 - Cybersecurity Software - Comparison & Reviews - Capterra Australia 2026
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.capterra.com.au/directory/31037/cybersecurity/software) > [Page 12](https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12)

# Cybersecurity Software

Canonical: https://www.capterra.com.au/directory/31037/cybersecurity/software

Page: 12 / 26\
Prev: [Previous page](https://www.capterra.com.au/directory/31037/cybersecurity/software?page=11)\
Next: [Next page](https://www.capterra.com.au/directory/31037/cybersecurity/software?page=13)

> Cybersecurity software, also spelled Cyber Security, aims to prevent unauthorised access to data that is stored electronically. Cyber Security tools protect businesses from data theft, malicious data, and system usage by third parties.&#10;&#10;Find the best cyber security software for your organisation in Australia.

-----

## Products

1. [condignum](https://www.capterra.com.au/software/216021/condignum) — 5.0/5 (3 reviews) — cloud-based SaaS solution to design, manage and optimise security requirements for your use cases and IT Security Challenges.
2. [Bugcrowd](https://www.capterra.com.au/software/218813/bugcrowd) — 5.0/5 (3 reviews) — Bugcrowd is a crowdsourced cybersecurity platform that helps organizations proactively identify and remediate security vulnerabilities.
3. [UNGUESS](https://www.capterra.com.au/software/219803/unguess) — 5.0/5 (3 reviews) — UNGUESS is the Crowdtesting leader for Software Quality, User Experience and Cybersecurity
4. [Seqrite Centralized Security Management](https://www.capterra.com.au/software/1015109/seqrite-hawkkeye) — 3.7/5 (3 reviews) — Enterprise-grade centralized security management platform for businesses.
5. [Naq Cyber](https://www.capterra.com.au/software/1018298/naq-cyber) — 5.0/5 (3 reviews) — Naq automates compliance with healthcare's most essential frameworks, including DTAC, DCB0 129, ISO 13485, ISO 27001, and more.
6. [CODA Footprint](https://www.capterra.com.au/software/1021315/coda-footprint) — 5.0/5 (3 reviews) — Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
7. [1Fort](https://www.capterra.com.au/software/1025148/1fort) — 5.0/5 (3 reviews) — 1Fort streamlines the process of placing cyber insurance for middle-market businesses, saving brokers and insureds time and money.
8. [PC Matic PRO](https://www.capterra.com.au/software/1032024/pc-matic-pro) — 5.0/5 (3 reviews) — Malware prevention software for entities, helping them strengthen existing security layers with this cybersecurity maturity model.
9. [Sophos Phish Threat](https://www.capterra.com.au/software/1031780/sophos-phish-threat) — 4.0/5 (3 reviews) — Phish threat assessment tool used by IT administrators worldwide to test employees’ readiness for phishing campaigns.
10. [SEKOIA.IO](https://www.capterra.com.au/software/1034997/sekoiaio) — 4.7/5 (3 reviews) — SEKOIA.IO is a comprehensive SecOps platform, designed to deliver comprehensive Detection and Response before impact.
11. [ISS](https://www.capterra.com.au/software/1036001/iss) — 4.3/5 (3 reviews) — Compliance management solution that helps conduct audits, track regulatory data, and more.
12. [TEHTRIS XDR Platform](https://www.capterra.com.au/software/1052644/tehtris-xdr) — 4.3/5 (3 reviews) — Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction.
13. [Fraudlogix](https://www.capterra.com.au/software/1063770/fraudlogix) — 5.0/5 (3 reviews) — Safeguarding digital operations from threats such as bots, IVT, click fraud, fake form submissions, and unauthorized payments.
14. [ManageEngine Key Manager Plus](https://www.capterra.com.au/software/159539/manageengine-key-manager-plus) — 4.5/5 (2 reviews) — Web-based SSH key and SSL/TLS certificate management solution for enterprises
15. [Voxility ANTI DDOS](https://www.capterra.com.au/software/170654/voxility-ddos-protection) — 4.5/5 (2 reviews) — 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
16. [The CyberStrong Platform](https://www.capterra.com.au/software/174090/the-cyberstrong-platform) — 5.0/5 (2 reviews) — Integrated risk platform empowering CISOs to automate regulatory compliance assessments \&amp; report on their IT security and risk posture.
17. [CYBEATS](https://www.capterra.com.au/software/174536/cybeats) — 5.0/5 (2 reviews) — Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
18. [BigID](https://www.capterra.com.au/software/174754/bigid) — 5.0/5 (2 reviews) — BigID is a modern data intelligence platform with a foundation of data discovery, and apps for privacy, security, and governance.
19. [Cisco Secure Cloud Analytics](https://www.capterra.com.au/software/178532/stealthwatch-cloud) — 4.5/5 (2 reviews) — Protect your cloud assets and private network. Improve security and incident response across the distributed network.
20. [Pentera](https://www.capterra.com.au/software/178964/pcysys) — 5.0/5 (2 reviews) — Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times.
21. [MDefend](https://www.capterra.com.au/software/179195/mdefend) — 4.5/5 (2 reviews) — Delivers zero-touch visibility \&amp; cyber threat prevention for medical devices \&amp; IT networks. Identify. Assess. Detect. Prevent.
22. [Application Security Platform](https://www.capterra.com.au/software/180356/stealth-security) — 5.0/5 (2 reviews) — Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
23. [Swascan](https://www.capterra.com.au/software/181930/swascan) — 5.0/5 (2 reviews) — The First Cloud \&amp; On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
24. [DoveRunner](https://www.capterra.com.au/software/182094/appsealing) — 5.0/5 (2 reviews) — AppSealing is an Enterprise Level RASP based DIY mobile app security service which protects mobile applications from advanced threats.
25. [Teleport](https://www.capterra.com.au/software/185545/teleport) — 5.0/5 (2 reviews) — The easiest, most secure way to access and protect all your infrastructure.

-----

Page: 12 / 26\
Prev: [Previous page](https://www.capterra.com.au/directory/31037/cybersecurity/software?page=11)\
Next: [Next page](https://www.capterra.com.au/directory/31037/cybersecurity/software?page=13)

## Related Categories

- [Cloud Security Software](https://www.capterra.com.au/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.com.au/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.com.au/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.com.au/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.com.au/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.com.au/directory/31037/cybersecurity/software)
- [All Categories](https://www.capterra.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Capterra Australia helps millions of people find the best business software with user reviews, ratings and price comparisons.","email":"info@capterra.com.au","url":"https://www.capterra.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCjRCDmEibpHwyX3m2b3y80w"]},{"name":"Capterra Australia","url":"https://www.capterra.com.au/","@type":"WebSite","@id":"https://www.capterra.com.au/#website","publisher":{"@id":"https://www.capterra.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 12 - See the list of the best Cybersecurity Software for businesses in Australia. Our free interactive tool makes software selection fast and easy allowing to filter by price, feature or user rating.","url":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12","about":{"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#itemlist"},"breadcrumb":{"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#webpage","mainEntity":{"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#itemlist"},"isPartOf":{"@id":"https://www.capterra.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.capterra.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.capterra.com.au/directory/31037/cybersecurity/software","@type":"ListItem"},{"name":"Page 12","position":3,"item":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12","@type":"ListItem"}],"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 12 - Cybersecurity Software - Comparison &amp; Reviews - Capterra Australia 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"condignum","position":1,"description":"Security Requirements out of the box.\nCondignum is the cloud-based SaaS solution to design, manage and optimise security requirements for your use cases and IT Security Challenges.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0a7e21f6-caf5-4fb1-b65f-ad4a20cdea9b.png","url":"https://www.capterra.com.au/software/216021/condignum","@type":"ListItem"},{"name":"Bugcrowd","position":2,"description":"Bugcrowd is a crowdsourced cybersecurity platform that offers continuous security testing to help organizations identify and remediate vulnerabilities. The Bugcrowd platform provides multiple security solutions including penetration testing, bug bounty programs, vulnerability disclosure, and attack surface management powered by a community of trusted security researchers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4364b39f-deed-4f72-9915-ae551eb3b6fc.jpeg","url":"https://www.capterra.com.au/software/218813/bugcrowd","@type":"ListItem"},{"name":"UNGUESS","position":3,"description":"Make better decisions for your digital solutions\nLaunch effective testing. Engage a real crowd of skilled humans. Get powerful insights and answers at any time needed. With UNGUESS you have much more than a crowdtesting platform: it’s everything your digital solutions deserve, in one place","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/643caf05-cf4d-4c72-b47c-ce0565645b8c.jpeg","url":"https://www.capterra.com.au/software/219803/unguess","@type":"ListItem"},{"name":"Seqrite Centralized Security Management","position":4,"description":"Enterprise-grade centralized security management platform for businesses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4de0ecc9-6f80-4762-bff4-22829eff543e.png","url":"https://www.capterra.com.au/software/1015109/seqrite-hawkkeye","@type":"ListItem"},{"name":"Naq Cyber","position":5,"description":"Naq is an automated healthcare compliance platform enabling healthcare innovators to bring their solutions to market by automating their compliance with the frameworks they need to grow. \n\nNaq's automated platform streamlines compliance with essential frameworks, including NHS DSPT, DTAC, DCB 0129, and global standards like ISO 27001, ISO 9001, and HIPAA. Designed for both emerging innovators and established healthcare entities, Naq offers a single, unified platform for managing risk, information governance,  quality, clinical safety and maintaining continuous compliance with the frameworks needed to work within the healthcare industry.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4a6ee68b-ac14-4029-8dca-5f9204084780.png","url":"https://www.capterra.com.au/software/1018298/naq-cyber","@type":"ListItem"},{"name":"CODA Footprint","position":6,"description":"CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework.\n\nCODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e6f7da51-d70e-4a67-86ed-95658f9b49ee.jpeg","url":"https://www.capterra.com.au/software/1021315/coda-footprint","@type":"ListItem"},{"name":"1Fort","position":7,"description":"1Fort streamlines the process of placing cyber insurance for middle-market businesses, saving brokers and insureds time and money.\n\nBrokers use 1Fort to quote more markets in less time by helping their clients get insurable in days, not weeks.\n\nBusinesses use 1Fort to automate up to 90% of the work to meet security requirements, enabling them to unlock better-priced policies and more comprehensive coverage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/398f06fd-c1e5-40df-a52a-d00ec856c442.jpeg","url":"https://www.capterra.com.au/software/1025148/1fort","@type":"ListItem"},{"name":"PC Matic PRO","position":8,"description":"PC Matic PRO provides individuals and organizations with automated application whitelisting tools and security layers with default denial policies. Corporations may deploy the system with existing endpoint protection to offer in-depth defense for all devices. The platform updates the whitelist database, and the protection level can only decrease after updating the definition file, allowing individuals to use the software offline.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c710d8f7-b233-4c23-b76b-c5c8610ae6ce.png","url":"https://www.capterra.com.au/software/1032024/pc-matic-pro","@type":"ListItem"},{"name":"Sophos Phish Threat","position":9,"description":"Part of the Sophos Central security software suite, Sophos Phish Threat is a tool that enables IT and network administrators to simulate phishing attacks to train corporate professionals to protect themselves against real ones. It comes with 60 training modules in 10 languages, each with customizable templates and tools to create convincing lookalikes from scratch. They can be used to create emails, identity harvesting forms, password harvesters, and other realistic-looking devices. Administrators can then import or sync employee contact lists to distribute these mock-ups across the company, monitoring their response reports to determine their vulnerability to real-world phishing campaigns in real-time.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/62627089-7520-45db-84a6-b9ce566fd59a.png","url":"https://www.capterra.com.au/software/1031780/sophos-phish-threat","@type":"ListItem"},{"name":"SEKOIA.IO","position":10,"description":"SEKOIA.IO is a comprehensive SecOps platform, designed to deliver Detection and Response before impact. \nIt enables companies and security services providers with extended log ingestion and management capabilities, outstanding advanced detection through highly curated threat intelligence and other AI-powered engines, and swift response through friendly playbooks and other automation tools.\nBuilt for data transparency & interoperability, it will become the ground layer of your composable security","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81db853a-e6ff-409a-bf93-b48401671d56.jpeg","url":"https://www.capterra.com.au/software/1034997/sekoiaio","@type":"ListItem"},{"name":"ISS","position":11,"description":"INSSIDE Security Suite is a leading platform in regulatory compliance solutions that allows companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes. In addition, ISS is a highly customizable platform and can be adapted to the specific needs of each company, which guarantees a unique and effective solution for each case.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f29459a-66d2-4eef-806d-ba859aa849e7.jpeg","url":"https://www.capterra.com.au/software/1036001/iss","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":12,"description":"Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security. Orchestrate all your cybersecurity tools simultaneously, including your existing solutions such as Zscaler and Proofpoint, with our SOAR and its Playbooks. Our platform is available in our secured cloud or on-prem.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.capterra.com.au/software/1052644/tehtris-xdr","@type":"ListItem"},{"name":"Fraudlogix","position":13,"description":"Fraudlogix specializes in digital fraud protection for industries like Affiliate Marketing, Ad Tech, Cybersecurity, E-commerce, and Banking. \n\nThe approach is centered around behavioral intelligence gathered in real-time from our network of 300 million URLs and apps.\n\nWe protect platforms and websites against bots, IVT, click fraud, fake registrations, account takeovers and fraudulent credit card purchases. \n\nWith an easy integration in mind, fraudlogix was designed to work with a single IP based API call or a deeper pixel placement, depending on our client's specific needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76f2d1e5-ce02-4656-96d6-3f15eee8b24e.png","url":"https://www.capterra.com.au/software/1063770/fraudlogix","@type":"ListItem"},{"name":"ManageEngine Key Manager Plus","position":14,"description":"ManageEngine Key Manager Plus is a web-based key management solution that helps users consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/05fb45ff-c6c9-49af-b55a-7d4e59ebf795.png","url":"https://www.capterra.com.au/software/159539/manageengine-key-manager-plus","@type":"ListItem"},{"name":"Voxility ANTI DDOS","position":15,"description":"1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f1b8655-20c0-4849-b863-1a26add2aefe.png","url":"https://www.capterra.com.au/software/170654/voxility-ddos-protection","@type":"ListItem"},{"name":"The CyberStrong Platform","position":16,"description":"CISOs rely on CyberStrong to achieve real-time cyber/IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and communication. Patented AI automates assessments and saves customers millions. CyberSaint is a Gartner Cool Vendor and is 2021 CRN Emerging Vendor, Cybersecurity Excellence Gold Winner, and Cyber Defense Magazine Global Infosec Award Winner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8ab1ac1d-5bb5-4962-8e97-dbb003391636.png","url":"https://www.capterra.com.au/software/174090/the-cyberstrong-platform","@type":"ListItem"},{"name":"CYBEATS","position":17,"description":"Cybeats SBOM Studio is a software supply chain management platform that enables organizations to gain visibility into software bills of materials (SBOMs). The SBOM management solution centralizes and standardizes SBOM data to help customers reduce risk across the software supply chain. It allows teams to inventory, enrich, and distribute SBOMs at scale, supporting vulnerability lifecycle management and regulatory compliance efforts. The platform ingests SBOMs in standard languages, such as SPDX and CycloneDX.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6af62373-754e-4e7f-aa1b-30b2ba620a70.png","url":"https://www.capterra.com.au/software/174536/cybeats","@type":"ListItem"},{"name":"BigID","position":18,"description":"BigID is a modern data intelligence platform that redefines data privacy and protection: helping organizations know their data for privacy, protection and perspective. \n\nBigID's leading discovery-in-depth technology helps enterprises solve for data privacy, security, and governance challenges.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5ff460ef-e4d3-40ee-b16e-e9405343f7bb.png","url":"https://www.capterra.com.au/software/174754/bigid","@type":"ListItem"},{"name":"Cisco Secure Cloud Analytics","position":19,"description":"Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b6572487-f99e-421e-8097-788c4a5c588f.jpeg","url":"https://www.capterra.com.au/software/178532/stealthwatch-cloud","@type":"ListItem"},{"name":"Pentera","position":20,"description":"Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations","url":"https://www.capterra.com.au/software/178964/pcysys","@type":"ListItem"},{"name":"MDefend","position":21,"description":"CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/67d87089-ebdb-46df-8b52-a5dcf4433d89.png","url":"https://www.capterra.com.au/software/179195/mdefend","@type":"ListItem"},{"name":"Application Security Platform","position":22,"description":"Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications.  The extensible software platform can be deployed on premises or in the cloud.  It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fbc946ce-6f61-4577-b5c7-78993de9aec2.png","url":"https://www.capterra.com.au/software/180356/stealth-security","@type":"ListItem"},{"name":"Swascan","position":23,"description":"Swascan is the first CyberSecurity platform in Cloud & On Premise:\n- Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks\n- Code Review: solve issues in terms of source code\n- GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR\n- Phishing Simulation Attack: avoid phishing threats\n- MSSP: ensure security governance\n- Light SOC: Threat intelligence","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ec19806f-df14-4693-9ead-1c24739761b3.png","url":"https://www.capterra.com.au/software/181930/swascan","@type":"ListItem"},{"name":"DoveRunner","position":24,"description":"AppSealing is an Enterprise Level RASP based mobile app security platform with a zero-friction, zero-coding approach. It is a SAAS based DIY solution. You can seal your Mobile App with AppSealing's Security within 10 minutes. We Protect, Detect & Respond on runtime basis. Get in-depth security and regulatory compliance in a single solution for your mobile apps.\n\nIt protects your App From -\nCode analysis and Code Modification, Reverse Engineering, APK Modding, Debugging, Emulators, Cheat Tools","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e63231f0-c13d-4231-92bf-189102d30422.jpeg","url":"https://www.capterra.com.au/software/182094/appsealing","@type":"ListItem"},{"name":"Teleport","position":25,"description":"Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. \n\nThe Teleport Infrastructure Identity Platform implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. Headquartered in Oakland, CA, Teleport operates globally, with industry-leading customers such as Nasdaq, Moody’s, Adobe, and Elastic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adfb3088-111b-407a-9358-515210336eaf.png","url":"https://www.capterra.com.au/software/185545/teleport","@type":"ListItem"}],"@id":"https://www.capterra.com.au/directory/31037/cybersecurity/software?page=12#itemlist","numberOfItems":25}
</script>
