System Security
1 Отзыв
SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated platform, it drives security visibility, so decisions can be better prioritised and response time is dramatically reduced. With SIRP, the entire cybersecurity…
Узнайте больше об этой компании1 Отзыв
Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help companies end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, and Managed Cloud Monitoring, each built on our cloud-native…
Узнайте больше об этой компании1 Отзыв
1 Отзыв
Joe Security specializes in the development of malware analysis systems for malware detection and forensics. Based on the idea of deep malware analysis & multi-technology platform, Joe Security has developed unique technologies to analyze malware in a depth previously not possible. Joe Security provides malware analysis systems as a cloud service or as…
Узнайте больше об этой компании1 Отзыв
Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.
1 Отзыв
LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR)…
Узнайте больше об этой компании1 Отзыв
1 Отзыв
Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.
1 Отзыв
1 Отзыв
Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
1 Отзыв
Vdoo is a global leader in the complex and increasing critical product security spage. With Vdoo, organizations can identify, prioritize, and mitigate a vast range of security issues. As the only automated platform that provides end-to-end product security, Vdoo helps development and security teams reduce time and effort while ensuring optimal product…
Узнайте больше об этой компании1 Отзыв
eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by reconfiguring other enterprise security controls. eVigilPro comes with Advanced correlation engine to help analyze large amount of event data for a deeper…
Узнайте больше об этой компании1 Отзыв
CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.
1 Отзыв
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security…
Узнайте больше об этой компании1 Отзыв
Critical Start is a cybersecurity company committed to using a strategy-based approach to improve the security capabilities of our clients.
1 Отзыв
Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can it provide logging and monitoring of everything that happens both inside and outside the office, but it can also be used for threat detection and response…
Узнайте больше об этой компании1 Отзыв
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn‚t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT)…
Узнайте больше об этой компании1 Отзыв
To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforce…
Узнайте больше об этой компании1 Отзыв
CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date, resilient and ready against upcoming cyber-attacks.