Security
2 Отзыва
SafeBreach is a platform that automates adversary breach methods across the entire kill chain, without impacting users or infrastructure.
2 Отзыва
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security…
Узнайте больше об этой компании2 Отзыва
Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.
2 Отзыва
Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. Tens-of-thousands of IT professionals rely on Graylog’s scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and…
Узнайте больше об этой компании2 Отзыва
The Avira Cloud Sandbox API enables security vendors and service providers to submit files and receive detailed threat intelligence reports containing a complete threat assessment.
2 Отзыва
DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.
2 Отзыва
Armis is an IoT software that instantly protects businesses with its agentless IoT security.
2 Отзыва
Astek is an IoT software that works closely with clients. It solves the internet of things (IoT) security issue.
2 Отзыва
As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets.
2 Отзыва
Out-of-date applications often contain critical vulnerabilities that make your devices more susceptible to cyberattack. It is a potential risk that your personal information can be compromised or result in data breaches for your organization. OPSWAT Client is here to help mitigate such risks using our market leading technologies and is FREE for all…
Узнайте больше об этой компании2 Отзыва
eSentire, the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates and responds in real-time to known and unknown threats before they become business…
Узнайте больше об этой компании2 Отзыва
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally.
2 Отзыва
When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you select which logs go where. You can collect and send to any number of SIEM systems, even multiple SIEMs from different vendors, your MSSP and/or your SOC, all…
Узнайте больше об этой компании2 Отзыва
Penten is a Canberra, Australia based cyber security company focused on innovation in secure mobility, cyber deception and cyber engineering services.
2 Отзыва
It a simple, adaptive approach that empowers your defenders to stop cyberthreats that could otherwise dwell in your environment for months or years.
2 Отзыва
For security and intelligence teams, the internet is a critical yet overwhelming source of data for security and threat intelligence. Echosec Systems gives users a single point of access to a diverse range of social media networks, deep web, and dark websites, so they can respond faster and more effectively to real-world events. Our web-based Platform…
Узнайте больше об этой компании2 Отзыва
Provides the registration details, also known as the Whois Record, of a domain name or an IP address.
2 Отзыва
Akeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. It provides coverage for all use cases, across hybrid, multi-cloud and legacy environments. Akeyless Vault enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security…
Узнайте больше об этой компании2 Отзыва
Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance, idle/active time, productivity metrics. Includes screenshots, reports, alerts and more! ~ Headquartered in Westport, Connecticut ~ Deployed on more than…
Узнайте больше об этой компании2 Отзыва
Veriato Cerebral is an integrated insider threat security platform, powered by advanced machine learning and AI. Cerebral integrates User Activity Monitoring (UAM) and User Behavior Analytics (UBA) into a powerful solution that allows you to quickly identify and react to signs of breach or fraud. Cerebral provides visibility into emails, chats, web…
Узнайте больше об этой компании