Header banner
Revain logoHome Page

Security

All results
uptycs logo
Revainrating 5 out of 5

2 Review

Uptycs offers the first scalable osquery-powered security analytics platform.

bufferzone logo
Revainrating 5 out of 5

2 Review

Bufferzone is a patented containment solution designed to defend endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

spamjadoo logo
Revainrating 5 out of 5

2 Review

The Worlds First Lockable Email that Stops Spam before ever its sent

blusapphire logo
Revainrating 5 out of 5

2 Review

BluSapphire is one platform that replaces your entire advanced cyber defense stack. It gets rid of silos by converging network, system, and end point based multi-vector analysis. Built on an Open Data Platform, it readily integrates with existing security tools to deliver comprehensive advanced cyber defense.

igel logo
Revainrating 5 out of 5

2 Review

IGEL’s endpoint management software is designed to allow users to convert any x86 device and control every PC from one easy-to-manage platform.

fusion udm premium logo
Revainrating 5 out of 5

2 Review

VXL Software is a world leader in digital signage, unified endpoint management, PC repurposing & thin-client migration.

crowdsec logo
Revainrating 5 out of 5

2 Review

CrowdSec is an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global IP reputation database to protect the user network.

metapacket logo
Revainrating 5 out of 5

2 Review

Metapacket is a proxy platform that detects & prevents malwares from exfiltration, rendering malware useless.

egosecure endpoint logo
Revainrating 5 out of 5

2 Review

EgoSecure Endpoint provides comprehensive protection against all threats to your data. The solution is based on the C.A.F.E. management principle that is used by more than 1,500 customers. The innovative principle combines the functions of control, audit, filter and encryption intelligently combined in a holistic safety concept that offers complete…

Read more about this company
fortifydata cyber risk scoring logo
Revainrating 5 out of 5

2 Review

FortifyData offers a clear and accurate analysis of cyber risks through a risk scoring platform. Using statistical analysis and continuous monitoring of a company’s network and application layer, dark web search discoveries, IP reputation, and breach history records, companies can now understand their current cyber risk posture using our easy to…

Read more about this company
bowtiexp logo
Revainrating 5 out of 5

2 Review

BowTieXP is a next generation risk assessment tool that uses the Bowtie Method to assess risks. BowTieXP is unique in its ability to visualise complex risks in a way that is understandable.

hypercomply logo
Revainrating 5 out of 5

2 Review

HyperComply helps vendors respond to security questionnaires in a fraction of the time.

the respond analyst logo
Revainrating 5 out of 5

2 Review

The Respond Analyst is security decision automation software that performs just like an expert cyber security analyst but at machine speed -- making escalations decisions by analyzing streaming security data. The Respond Analyst processes millions of alerts, in real-time, and escalates detailed, vetted security situations for security teams to respond…

Read more about this company
vendict logo
Revainrating 5 out of 5

2 Review

Vendict provides you a solution to validate a Vendor at business speed, build a documented compliance on Privacy and Vendor Management and track your Vendor risk. First scan automatically all your website domains and review your third-party Vendors. Get a full Vendor inventory, including fourth parties. Each Vendor has a 360-degree profile to assess its…

Read more about this company
sam for compliance logo
Revainrating 5 out of 5

2 Review

EXPERTS IN STANDARDS COMPLIANCE AND CYBERSECURITY

cyrebro logo
Revainrating 5 out of 5

2 Review

CYREBRO was founded in 2012 as CyberHat to help companies take cyber protection to new and unprecedented heights. Today, we have evolved into CYREBRO and are on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization. Our team of…

Read more about this company
pfp iot security logo
Revainrating 5 out of 5

2 Review

P2Scan software containins PFP's patented PowerIQ analytics algorithms, which provide a complete identification and analysis solution.

securithings logo
Revainrating 5 out of 5

2 Review

SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and suitable for small as well as the largest IoT solutions in the world

breachrx logo
Revainrating 5 out of 5

2 Review

Transform your incident and data breach response processes with dynamic incident response plans that are always up to date, automated workflows designed specifically to accelerate privacy team processes, and the best central system of record that reinforces legal privilege for all your response actions.

centri protected sessions logo
Revainrating 5 out of 5

2 Review

CENTRI provides advanced security for the Internet of Things.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.