Security
1 Отзыв
Least privilege networking solution that prevents attacks from spreading and causing damage by automatically restricting network access to only what is normally needed, everything else goes through 2-step verification.
1 Отзыв
1 Отзыв
Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.
1 Отзыв
1 Отзыв
Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
1 Отзыв
Vdoo is a global leader in the complex and increasing critical product security spage. With Vdoo, organizations can identify, prioritize, and mitigate a vast range of security issues. As the only automated platform that provides end-to-end product security, Vdoo helps development and security teams reduce time and effort while ensuring optimal product…
Узнайте больше об этой компании1 Отзыв
eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by reconfiguring other enterprise security controls. eVigilPro comes with Advanced correlation engine to help analyze large amount of event data for a deeper…
Узнайте больше об этой компании1 Отзыв
CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.
1 Отзыв
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security…
Узнайте больше об этой компании1 Отзыв
Critical Start is a cybersecurity company committed to using a strategy-based approach to improve the security capabilities of our clients.
1 Отзыв
Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can it provide logging and monitoring of everything that happens both inside and outside the office, but it can also be used for threat detection and response…
Узнайте больше об этой компании1 Отзыв
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn‚t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT)…
Узнайте больше об этой компании1 Отзыв
To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforce…
Узнайте больше об этой компании1 Отзыв
CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date, resilient and ready against upcoming cyber-attacks.
1 Отзыв
CloudSEK is an Artificial Intelligence-driven Unified Risk Management Enterprise. CloudSEK’s flagship SAAS based product XVigil with the combined strength of the powerful AI and Machine Learning helps organizations monitor and manage their security posture in real-time.CloudSEK uses automated technology instead of the traditional DRM, which analyses the…
Узнайте больше об этой компании1 Отзыв
Harness the power of artificial intelligence with CYR3CON's unique, hacker-centric approach to predicting and preventing cyber attacks
1 Отзыв
ThreatModeler integrates with cloud service providers and automatically builds threat modeling programs using cloud configuration data
1 Отзыв
Wapack Labs is a cyber intelligence operation designed to monitor and report on threats to IT, key personnel and investments in dozens of venues, and make that data available in both human and machine readable formats.
1 Отзыв
Cigloo Browser Isolation controls and isolates corporate user browsing in instances of a data breach, helping to prevent Malware crises.