Header banner
Revain logoHome Page

Security

All results
cymptom logo
Revainrating 4.5 out of 5

2 Review

Cymptom's Network Security Posture Management platform is the only solution that provides continuous full visibility of the entire hybrid network threat landscape in real-time. Cymptom maps all misconfigurations, segmentation flaws, weaknesses and vulnerabilities, as well as open ransomware vectors in the hybrid network continuously in real-time. Unlikeโ€ฆ

Read more about this company
firecompass logo
Revainrating 4.5 out of 5

2 Review

FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nation-state grade reconnaissance techniques. The platform automatically discovers an organizationโ€™s digital attack surface and launches multi-stage safeโ€ฆ

Read more about this company
threatsign - website anti malware logo
Revainrating 4.5 out of 5

2 Review

Website Anti-malware product that will ensure business continuity by protecting your website from online threats and malware. With ThreatSign we guarantee the fastest incident response and access to the top-notch security professionals in case your site gets on blacklist or compromised. There is nothing to install and no maintenance is required. Fullyโ€ฆ

Read more about this company
bitdam logo
Revainrating 4 out of 5

2 Review

BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels. Protecting email (Office 365, G-Suite, MS Exchange), cloud storage (OneDrive, G-Drive, Dropbox, Box etc.) and IM (Slack, Teams, Skype and more) BitDam empowers organizations to collaborate safely.

panda adaptive defense 360 logo
Revainrating 4 out of 5

2 Review

Panda Adaptive Defense 360 is an innovative cybersecurity solution for endpoints and servers, delivered from the Cloud. Its agent is lightweight and minimal impact on endpoints performance, which is managed via a single Cloud console. AD360 combines the widest range of endpoint protection (EPP) technologies with EDR capabilities, automating theโ€ฆ

Read more about this company
elasticito logo
Revainrating 4 out of 5

2 Review

Help companies to identify and manage cyber threats that affect their business.

cuckoo sandbox logo
Revainrating 4 out of 5

2 Review

Cuckoo Sandbox is the leading open source automated malware analysis system.You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment.

morphisec logo
Revainrating 4 out of 5

2 Review

Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.

immunity debugger logo
Revainrating 4 out of 5

2 Review

Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.

indefend logo
Revainrating 4 out of 5

2 Review

inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This solution is built to achieve complete transparency over all the digital assets residing within the organization, thus, ensuring maximum security and solidโ€ฆ

Read more about this company
ecs2 logo
Revainrating 4 out of 5

2 Review

Secucloud's ECS2 solution protects data traffic against external threats in mobile communication networks and prevents botnet traffic (even from its own network). In doing so, it enables providers to play an important role in the protection of their customers against malware and unwanted harmful content.

redirect.pizza logo
Revainrating 4 out of 5

2 Review

Making it easy to redirect URLs with full HTTPS support. You can even get email forwarding, analytics and API compatibility. Just type in your domain and weโ€™ll deliver everything you need.

inumbo logo
Revainrating 4 out of 5

2 Review

inumbo is a cloud-based anti-spam service that works with any e-mail infrastructure.

infoexpress cybergatekeeper logo
Revainrating 4 out of 5

2 Review

CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.

ciss forza logo
Revainrating 4 out of 5

2 Review

CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.

i-guard logo
Revainrating 4 out of 5

2 Review

Endpoint Detection & Response solution based on artificial intelligence

keyfocus web server logo
Revainrating 4 out of 5

2 Review

KF Web Server is a free HTTP Server that can host a number of web sites.

threatlocker logo
Revainrating 4 out of 5

2 Review

The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should notโ€ฆ

Read more about this company
network management logo
Revainrating 4 out of 5

2 Review

NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.

binary defense endpoint detection and response (edr) logo
Revainrating 4 out of 5

2 Review

Endpoint Detection and Response

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.