Header banner
Revain logoHome Page

Security

All results
scythe™ logo
Revainrating 5 out of 5

1 Review

SCYTHETM enables organizations to continuously assess their risk posture and exposure. SCYTHE combines breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical…

Read more about this company
whitehax logo
Revainrating 5 out of 5

1 Review

WhiteHaX currently is the only solution that provides an in-depth, real-life simulation verification for this purpose. WhiteHaX helps the businesses identify security holes in their detection/prevention infrastructure and then help them re-verify as issues are fixed when right security solutions at right place in the infrastructure.

haxm logo
Revainrating 5 out of 5

1 Review

HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.

cybertrap logo
Revainrating 5 out of 5

1 Review

CYBERTRAP is a revolutionary new step in cyber security. Instead of blocking attackers, we lead them into a contained, monitored environment track them inside the network to gather intelligence.

packetviper logo
Revainrating 5 out of 5

1 Review

PacketViper's patented cybersecurity platform features integrated deception, defense and intelligence that helps our customers address cybersecurity challenges in a practical, high-impact manner. PacketViper sits inline at key network transition points throughout the network. Licenses are deployed in one of three models (on-premise, cloud/AWS and bring…

Read more about this company
shadowplex logo
Revainrating 5 out of 5

1 Review

Acalvio provide an Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies that allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion.

titanium platform logo
Revainrating 5 out of 5

1 Review

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

vmray analyzer logo
Revainrating 5 out of 5

1 Review

VMRay Analyzer is a breakthrough solution for dynamic analysis of advanced threats, including zero day and targeted attacks. By surmounting inherent flaws that plague other products, VMRay Analyzer has become the gold standard for malware sandboxing among leading DFIR teams worldwide. The core of VMRay Analyzer is an agentless, hypervisor-based sandbox…

Read more about this company
spycloud logo
Revainrating 5 out of 5

1 Review

SpyCloud proactively alerts companies when their users’ data has been compromised in a third-party breach, and automates the remediation of exposed passwords to keep corporate data, sensitive PII, and financial information safe. We protect over 2 billion employee and consumer accounts for the world’s largest businesses and consumer brands, including 4…

Read more about this company
presploit logo
Revainrating 5 out of 5

1 Review

Aves Deception Platform is a SaaS-based cybersecurity detection and response product aimed at midmarket and enterprise companies. It leverages a powerful deception methodology to provide detection capability. Unlike traditional detection solutions which are based on data analysis, log crunching and other heavy-load mechanisms, the Aves Deception…

Read more about this company
any.run logo
Revainrating 5 out of 5

1 Review

ANY.RUN is a service that allows cybersecurity specialists to detect, analyze, and monitor cybersecurity threats. ANY.RUN is the first interactive online malware analysis sandbox, where the user controls the flow of the analysis. Just imagine: you get access to the malware laboratory with a lot of different tools within a second and most of these…

Read more about this company
malzilla logo
Revainrating 5 out of 5

1 Review

MalZilla is a useful program for use in exploring malicious pages. It allows you to choose your own user agent and referrer, and has the ability to use proxies. It shows you the full source of webpages and all the HTTP headers. It gives you various decoders to try and deobfuscate javascript aswell.

threatanalyzer logo
Revainrating 5 out of 5

1 Review

VIPRE ThreatAnalyzer is a dynamic malware analysis sandbox that lets you safely reveal the potential impact of malware on your organization—so you can respond faster and smarter in the event of a real threat. Today’s most devastating security risks are often disguised as legitimate executable files, PDFs, or Microsoft Office documents. One wrong click…

Read more about this company
alert logic mdr logo
Revainrating 5 out of 5

1 Review

Alert Logic MDR is the industry’s first SaaS-enabled managed detection and response (MDR) provider. Alert Logic MDR is always on, protecting across an organization, delivering unrivaled security value. Since no level of investment prevents or blocks 100% of attacks, companies need to continuously identify and address breaches, threats, and IT security…

Read more about this company
sirp logo
Revainrating 5 out of 5

1 Review

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated platform, it drives security visibility, so decisions can be better prioritised and response time is dramatically reduced. With SIRP, the entire cybersecurity…

Read more about this company
arctic wolf networks logo
Revainrating 5 out of 5

1 Review

Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help companies end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, and Managed Cloud Monitoring, each built on our cloud-native…

Read more about this company
airdecoy logo
Revainrating 5 out of 5

1 Review

joe sandbox logo
Revainrating 5 out of 5

1 Review

Joe Security specializes in the development of malware analysis systems for malware detection and forensics. Based on the idea of deep malware analysis & multi-technology platform, Joe Security has developed unique technologies to analyze malware in a depth previously not possible. Joe Security provides malware analysis systems as a cloud service or as…

Read more about this company
reverss logo
Revainrating 5 out of 5

1 Review

Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.

logrhythm nextgen siem platform logo
Revainrating 5 out of 5

1 Review

LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR)…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.