Header banner
Revain logoHome Page

Security

All results
safebreach logo
Revainrating 4.5 out of 5

2 Review

SafeBreach is a platform that automates adversary breach methods across the entire kill chain, without impacting users or infrastructure.

pentera logo
Revainrating 4.5 out of 5

2 Review

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security…

Read more about this company
parrot security os logo
Revainrating 4.5 out of 5

2 Review

Parrot Security (ParrotSec) is a Security GNU/Linux distribution designed for the Cyber-Security (InfoSec) field. It includes a full portable laboratory for security and digital forensics experts.

graylog logo
Revainrating 4.5 out of 5

2 Review

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. Tens-of-thousands of IT professionals rely on Graylog’s scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and…

Read more about this company
avira cloud sandbox logo
Revainrating 4.5 out of 5

2 Review

The Avira Cloud Sandbox API enables security vendors and service providers to submit files and receive detailed threat intelligence reports containing a complete threat assessment.

deceptiongrid logo
Revainrating 4.5 out of 5

2 Review

DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.

armis logo
Revainrating 4.5 out of 5

2 Review

Armis is an IoT software that instantly protects businesses with its agentless IoT security.

astek logo
Revainrating 4.5 out of 5

2 Review

Astek is an IoT software that works closely with clients. It solves the internet of things (IoT) security issue.

bastille logo
Revainrating 4.5 out of 5

2 Review

As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets.

metadefender client logo
Revainrating 4.5 out of 5

2 Review

Out-of-date applications often contain critical vulnerabilities that make your devices more susceptible to cyberattack. It is a potential risk that your personal information can be compromised or result in data breaches for your organization. OPSWAT Client is here to help mitigate such risks using our market leading technologies and is FREE for all…

Read more about this company
esentire managed detection and response (mdr) logo
Revainrating 4.5 out of 5

2 Review

eSentire, the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates and responds in real-time to known and unknown threats before they become business…

Read more about this company
eventsentry logo
Revainrating 4.5 out of 5

2 Review

Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally.

snare central logo
Revainrating 4.5 out of 5

2 Review

When it comes to solving log collection and management challenges, Snare helps you save time, save money and reduce your risk. Snare Central ingests logs from Snare Agents and syslog feeds and you select which logs go where. You can collect and send to any number of SIEM systems, even multiple SIEMs from different vendors, your MSSP and/or your SOC, all…

Read more about this company
penten logo
Revainrating 4.5 out of 5

2 Review

Penten is a Canberra, Australia based cyber security company focused on innovation in secure mobility, cyber deception and cyber engineering services.

the illusive platform logo
Revainrating 4.5 out of 5

2 Review

It a simple, adaptive approach that empowers your defenders to stop cyberthreats that could otherwise dwell in your environment for months or years.

echosec systems logo
Revainrating 4.5 out of 5

2 Review

For security and intelligence teams, the internet is a critical yet overwhelming source of data for security and threat intelligence. Echosec Systems gives users a single point of access to a diverse range of social media networks, deep web, and dark websites, so they can respond faster and more effectively to real-world events. Our web-based Platform…

Read more about this company
whois api webservice logo
Revainrating 4.5 out of 5

2 Review

Provides the registration details, also known as the Whois Record, of a domain name or an IP address.

akeyless vault logo
Revainrating 4.5 out of 5

2 Review

Akeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. It provides coverage for all use cases, across hybrid, multi-cloud and legacy environments. Akeyless Vault enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security…

Read more about this company
interguard employee monitoring software logo
Revainrating 4.5 out of 5

2 Review

Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance, idle/active time, productivity metrics. Includes screenshots, reports, alerts and more! ~ Headquartered in Westport, Connecticut ~ Deployed on more than…

Read more about this company
cerebral logo
Revainrating 4.5 out of 5

2 Review

Veriato Cerebral is an integrated insider threat security platform, powered by advanced machine learning and AI. Cerebral integrates User Activity Monitoring (UAM) and User Behavior Analytics (UBA) into a powerful solution that allows you to quickly identify and react to signs of breach or fraud. Cerebral provides visibility into emails, chats, web…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.