Header banner
Revain logoHome Page

Security

All results
sequretek edpr logo
Revainrating 4 out of 5

2 Review

Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industry to achieve efficiency and sophistication in product design that combines a multitude of technologies.

mtg ag logo
Revainrating 4 out of 5

2 Review

Our portfolio of IT security products covers the complete key lifecycle from production to operation of IoT devices.

aegify rsc suite logo
Revainrating 4 out of 5

2 Review

Aegify RSC Suite provides support to healthcare, retail and financial organizations with Risk, Security and Compliance Management

responsible cyber pte. ltd. logo
Revainrating 4 out of 5

2 Review

We are founded in 2016, and we provide cybersecurity as a service (Governance & Policies, Access Control Management, Secure Coding, Patch & Vulnerability Management, Monitoring & SIEM, Backups & Incident Response, Third Party Management, Data Loss Protection, Threat Intelligence) and we are building an amazing cyber platform called IMMUNE; a 360°…

Read more about this company
razberi logo
Revainrating 4 out of 5

2 Review

Razberi provides open platform video surveillance server appliances combined with cybersecurity and health monitoring software.

aspia logo
Revainrating 4 out of 5

2 Review

ASPIA is an Automated and Simplified Application Security Management Platform that significantly reduces manual efforts and greatly simplifies the assessment process.Smart remediation decisions based on comprehensive risk visibility helps senior management improve overall risk management efforts.Automated Report generation and Reminders along with…

Read more about this company
attacktree logo
Revainrating 4 out of 5

2 Review

AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

irisk platform logo
Revainrating 4 out of 5

2 Review

riskrecon logo
Revainrating 4 out of 5

2 Review

Gain objective insight into your third-party security performance and IT landscape

new zealand forensics logo
Revainrating 4 out of 5

2 Review

belkasoft evidence center logo
Revainrating 4 out of 5

2 Review

Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

zobi logo
Revainrating 4 out of 5

2 Review

Zobi is a software for smart homes which uses AI to go beyond anti-virus and firewall protects, helping protect you and your family from cybercriminals and scammers.

proficio logo
Revainrating 4 out of 5

2 Review

MANAGED DETECTION AND RESPONSE SERVICES INCREASE VISIBILITY AND PROTECTION. REDUCE RISK. Proficio’s Managed, Detection and Response (MDR) solution surpasses the capabilities of traditional Managed Security Services Providers (MSSPs). Our MDR service is powered by next-generation cybersecurity technology and our security experts partner with you to…

Read more about this company
lognostic logo
Revainrating 4 out of 5

2 Review

Companion provides Sales Force Automation and e-Detailing solutions for pharmaceutical companies. It solution empowers the systems not only in Technology but also produce insights to the businesses. Companion encompasses functional modules include the complete life-cycle of field force.

silent break security logo
Revainrating 4 out of 5

2 Review

Silent Break Security sets the bar for quality, customer service, and professionalism. From compliance to sophisticated adversary simulations to collaborative assessments to custom red team toolkits and training, the approach is customized to best help your organization progress in security maturity. Silent Break Security's expertise, reputation, and…

Read more about this company
wispero logo
Revainrating 4 out of 5

2 Review

Seamlessly guarding your IoT assets and detecting vulnerabilities. Detailed device and event profiles are visualized to provide a real-time map of security vulnerability of IoT network. Once data is collected and categorized, it is then sent to the cloud security and analytic engine for deep analysis to create attack models to enhance security. Like a…

Read more about this company
actzero managed detection and response logo
Revainrating 4 out of 5

2 Review

ActZero challenges cybersecurity coverage for SMB and mid-market companies. Our Intelligent MDR provides 24/7 monitoring, protection and response support that goes well beyond other third-party software solutions. Our teams of data scientists leverage cutting edge technologies like AI and ML to scale resources, identify vulnerabilities and eliminate…

Read more about this company
pareto cyber logo
Revainrating 4 out of 5

2 Review

Pareto Cyber was founded to change the way companies protect against cyber threats. We apply the Pareto principle, aka the 80/20 rule, to focus our efforts on the cyber tools and processes that will make the most impact protecting our clients against cyber threats. Our team focus on providing organizations to develop proactive strategies, implementing…

Read more about this company
seclytics logo
Revainrating 4 out of 5

2 Review

Seclytics delivers the industry's only science based platform, that hunts adversaries in the wild, during their setup stages, and delivers accurate, verifiable and actionable Attack Predictions our customers use to prevent their attacks outright, and integrate our highest value pivots that connect the dots other technologies miss. This saves them time…

Read more about this company
aisoc logo
Revainrating 5 out of 5

1 Review

The premier cyber security company that protects you before, during and after a breach

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.