Header banner
Revain logoHome Page

Security

All results
youattest.com logo
Revainrating 4.5 out of 5

2 Review

Cloud-Based Audits for your Okta Applications

proxy-seller.com logo
Revainrating 4.5 out of 5

2 Review

Proxy-Seller.com is a provider of individual, private, dedicated proxy servers. IPv4, IPv6, and Mobile proxies as well. More than 36 countries to choose a proxy from, more than thousands of cities.

bitdefender gravityzone logo
Revainrating 4.5 out of 5

2 Review

Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.

malwarebytes for business logo
Revainrating 4.5 out of 5

2 Review

Malwarebytes is the cybersecurity company that millions worldwide trust. Malwarebytes proactively protects organizations and their employees against advanced malicious threats, including ransomware, that traditional antivirus tools and other endpoint protection products miss. Driven from the cloud through a single pane of glass, Malwarebytes solutions…

Read more about this company
bluvector pulse logo
Revainrating 4.5 out of 5

2 Review

BluVector Pulse delivers a fully turnkey sense and respond platform, automating the health and heartbeat monitoring and device management of the market-leading BluVector Cortex offering.

cebox logo
Revainrating 4.5 out of 5

2 Review

ceBox is a connected PC solution that lets users pilot all desktops centrally without any third-party solution needed. Offered as a monthly subscription service, the ceBox offer includes the Intel NUC, centralized management of NUC kits as well as proactive support.

getform logo
Revainrating 4.5 out of 5

2 Review

Form endpoints to manage the backend of your online webforms.

hysolate logo
Revainrating 4.5 out of 5

2 Review

Hysolate is revolutionizing enterprise endpoints, resolving the conflict between security and productivity. We bring air gap security to the enterprise and at the same time free knowledge workers from past usage restrictions.

seculution application whitelisting logo
Revainrating 4.5 out of 5

2 Review

The secure and reliable protection against any malware is Application Whitelisting. It defines what can be executed. Anything else cannot be started.

arcadia snow logo
Revainrating 4.5 out of 5

2 Review

SNOW is an endpoint detection/response solution in the form of a lightweight cross platform sensor. Operating on a host based managed system, it proactively searches through networks 24/7 to provide the ultimate protection against todays most sophisticated cyber security threats.

threatbook tdp logo
Revainrating 4.5 out of 5

2 Review

ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

haikiki iq logo
Revainrating 4.5 out of 5

2 Review

Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ ́s anomaly detection analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection and guided investigation. Its self-learning AI is similar to the human…

Read more about this company
reve endpoint security logo
Revainrating 4.5 out of 5

2 Review

REVE Antivirus Endpoint Security solutions incorporate a Device Control technology that allows the administrator to block or allow permissions for using external devices such as Hard Disk, Pen drive, USB Dongle, Printers, External CD/DVD. By blocking unauthorized media, Device control prevents the spreading of a virus via removable devices.

wahupa scm logo
Revainrating 4.5 out of 5

2 Review

Wahupa SCM is based on a proven successful concept with a slew of new innovations. We've taken our vast experience building best-of-class Supply Chain Management (SCM) products and started all over to build a product that will optimize your supply chain, and still be affordable.

txhunter logo
Revainrating 4.5 out of 5

2 Review

TXHunter provides an easy to use and convenient tool for conducting threat incident investigations remotely. If any endpoint system or server is suspected of having been attacked, TXHunter can simply take a snapshot of the suspicious system and automatically conduct an incident investigation. If the investigation process identifies suspicious files or…

Read more about this company
wazuh - the open source security platform logo
Revainrating 4.5 out of 5

2 Review

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

smartshield logo
Revainrating 4.5 out of 5

2 Review

Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.

heimdal threat prevention logo
Revainrating 4.5 out of 5

2 Review

Heimdal Security is a Denmark-based, self-financed, cybersecurity vendor, specialized in DNS filtering, silent patching, antivirus/antimalware software, and Privileged Access Management (PAM) solutions. In an ever-evolving threatscape, traditional, file-based, Antivirus solutions are no longer sufficient to withstand the next generation of online…

Read more about this company
pc matic pro endpoint suite logo
Revainrating 4.5 out of 5

2 Review

corax logo
Revainrating 4.5 out of 5

2 Review

Corax is a cyber risk analytics and underwriting platform that helps those involved in cyber risk transfer with client facing and carrier/reinsurer facing activity.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.