Security
1 Review
StackHawk makes it simple for developers to find, triage, and fix application security bugs. Scan your application for AppSec bugs in the code your team wrote, triage and fix with provided documentation, and automate in your pipeline to prevent future bugs from hitting prod.
1 Review
Dependency-Track is an intelligent Supply Chain Component Analysis platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill of Materials (SBOM). This approach provides capabilitiesโฆ
Read more about this company1 Review
Hoss helps teams make better API-driven products. Our simple drop-in solution makes it easy to track and manage third-party APIs. Get visibility into API performance, be alerted of errors before your customers notice, reduce the amount of time spent debugging integrations, and much more.
1 Review
Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insider threat surprises without disrupting legitimate work. We do this by detecting how data is being used and shared across computers, cloud and email. Weโฆ
Read more about this company1 Review
Satori created the first DataSecOps solution which streamlines data access while solving the most difficult security and privacy challenges. The Secure Data Access Service is a universal visibility and control plane across all data stores, allowing you to oversee your data and its usage in real-time while automating access controls. The service maps allโฆ
Read more about this company1 Review
WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.
1 Review
AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.
1 Review
Cyber adAPT is a platform that secures mobile-enabled enterprises protecting real-world reputations, it combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network and instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are foundโฆ
Read more about this company1 Review
NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications service provider can offer its customers protection from cybersecurity threats, including malware, viruses, phishing and ransomware. An easy-to-use interfaceโฆ
Read more about this company1 Review
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. WhiteSource doesnโt only alert on issues, it also provides actionable, validated remediation paths toโฆ
Read more about this company1 Review
Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce runtime security policies.
1 Review
Use the Pentest-Tools.com platform to quickly detect and report vulnerabilities in websites and network infrastructures! โ 25+ tightly integrated penetration testing and ethical hacking tools for easier, faster, and more effective engagements โ Built for pentesters, sysadmins, web devs, MSPs, business owners, and other professionals seeking to automateโฆ
Read more about this company1 Review
Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the worldโs top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAPโฆ
Read more about this company1 Review
Code Dxโs automated application vulnerability correlation shaves weeks off that process so you can get right to fixing your code. Its vulnerability management lets you quickly prioritize vulnerabilities (to fix the most important ones first), track progress of their remediation, and observe how your code's security changes over time.
1 Review
Your code is your business. Manage the npm packages you depend on with Bytesafe. Your teamโs single source of truth for secure code.
1 Review
Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requires no changes to the apps, and encrypts data at-rest, in use, in memory and in the search index. Thatโs complete data protection.
1 Review
TeleSign Number Masking is a free service*, using cloud communications APIs, that enable the ability for two parties to communicate with each other for a short period of time over Voice and SMS without exposing their actual phone numbers. This enables the two parties to accomplish the task at hand without unnecessarily exposing any private information.
1 Review
Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.