248 results
Filter Results (248)
Pricing Options
Deployment
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and compliance. Maximize performance and availability by monitoring and troubleshooting infrastructure and services. Sysdig is a SaaS platform, built on an open-source stack.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
The iboss cloud provides fast and secure Internet access on any device, from any location, in the cloud.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Quixxi is an end-to-end mobile app security solution for developers to protect and monitor any mobile app in minutes.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection.
Quixxi is also a monitoring tool with Licensing, Analytics & Diagnostics SDK. Allowing developers to identify illegal use & help recover associated lost revenue, detailed insights into customer engagement & advanced debugging files.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Zero-Configuration Web Application, API Protection, and Bot Mitigation for Kubernetes.
Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Helps monitor and analyze networks.
Advanced Dropless Collection capabilities.
A complete Network Monitoring solution.
Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.
A complete Network Monitoring solution.
Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Contextual cloud security platform that protects native, Kubernetes, and microservices from known and unknown risks.
Why Lightspin Cloud Security
Lightspin offers a contextual cloud security platform that protects cloud native, Kubernetes, and microservices from known and unknown risks by empowering security teams with the ability to continuously and effortlessly visualize, detect, and block any attack path in their cloud and Kubernetes environment.
Why Lightspin Cloud Security
Lightspin offers a contextual cloud security platform that protects cloud native, Kubernetes, and microservices from known and unknown risks by empowering security teams...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management.
Cloudaware is a SaaS multi-cloud management platform with such modules as:
CMDB, Change Management, Cost Management, Vulnerability Scanning, Monitoring, Intrusion Detection, Patch Management, Compliance Engine, Log Management and Backups & Replication.
Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products.
Cloudaware is a SaaS multi-cloud management platform with such modules as:
CMDB, Change Management, Cost Management, Vulnerability Scanning, Monitoring, Intrusion Detection, Patch Management,...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
DisruptOps is enabling security and development teams to work together and fix cloud security issues faster.
DisruptOps helps you fix cloud security issues faster and more consistently. Our Cloud Security Detection and Response Platform connects to AWS and Azure clouds and intelligently routes security alerts to the responsible team within the tools they already use. DisruptOps integrates tightly with cloud native logs and assessment tools to quickly and consistently take the appropriate actions and remediate security issues, reducing the risk of compromises due to misconfigurations.
DisruptOps helps you fix cloud security issues faster and more consistently. Our Cloud Security Detection and Response Platform connects to AWS and Azure clouds and intelligently routes security...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organizations public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Stop the most common cause of cloud data breaches with Warden, the integrated cloud security and compliance solution for AWS users.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous Vulnerability Monitoring: Prevent exploitable vulnerabilities like open AWS S3 Buckets and disabled MFA with automated detection on Storyfier. Built-in Compliance Reporting: Assess your compliance posture against the CIS Benchmark and AWS Well-Architected Framework.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks....
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs).
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Holistic Security For Your CI/CD Pipeline.
Prevent software supply chain attacks and vulnerabilities, from commit to release.
Argon provides security for software development environments' CI/CD pipelines, eliminating the risk from misconfigurations, vulnerabilities and preventing supply chain attacks.
This new bread of attacks is an issue all enterprises are dealing with and Argon's solution materially solves the problem in a meaningful way.
Argon provides end-to-end AppSec visibility and security platform for the development process and boost your overall security posture.
Argon provides security for software development environments' CI/CD pipelines, eliminating the risk from misconfigurations, vulnerabilities and preventing supply chain attacks.
This new bread of...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
FTAPI
(0)
End to end encrypted file transfer and dataroom solution with no size restrictions.
End to end encrypted file transfer and dataroom solution with no size restrictions.
End to end encrypted file transfer and dataroom solution with no size restrictions.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
AWS cloud logs analysis & management tool - get insights into your end user content consumption.
AWS cloud logs analysis & management tool - get insights into your end user content consumption.
AWS cloud logs analysis & management tool - get insights into your end user content consumption.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Kenna
(0)
Network security solution that helps businesses predict and identify vulnerabilities while calculating organizational risk scores.
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data.
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Threat Stack provides cloud security & compliance for infrastructure and applications.
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads.
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Aviatrix
(0)
Scale Out VPC Peering solution designed to manage cloud gateways.
Scale Out VPC Peering solution designed to manage cloud gateways.
Scale Out VPC Peering solution designed to manage cloud gateways.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
A suite that provides accurate, easy to integrate protection from automated cyber-attacks.
PerimeterX is a suite that provides accurate, easy to integrate protection from automated cyber-attacks. It offers cloud-based products for behavior-based bot protection and client-side breach prevention. PerimeterX is designed to safeguard the consumer digital experience on business websites and mobile apps.
PerimeterX is a suite that provides accurate, easy to integrate protection from automated cyber-attacks. It offers cloud-based products for behavior-based bot protection and client-side breach...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source.
CloudSploit scans configurations of AWS accounts, looking for security concerns.
Open source, with a fully free option.
On SANS's Secure DevOps Toolchain.
Amazon Partner.
CloudSploit scans configurations of AWS accounts, looking for security concerns.
Open source, with a fully free option.
On SANS's Secure DevOps Toolchain.
Amazon Partner.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Haltdos
(0)
HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It ensures high-availability of your website along with in-depth network monitoring and predefined ruleset custom dashboards.
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data.
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud management solution that helps businesses with data management, media migration and information security.
Cloud management solution that helps businesses with data management, media migration and information security.
Cloud management solution that helps businesses with data management, media migration and information security.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Encryption key management solution built to protect your critical data within virtualized environment.
Encryption key management solution built to protect your critical data within virtualized environment.
Encryption key management solution built to protect your critical data within virtualized environment.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions.
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility
of your attack surface, using its context to analyze, prioritize and remediate your
riskiest vulnerabilities fast.
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility
of your attack surface, using its...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills.
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication