Header banner
Revain logoHome Page

Security

All results
stackhawk logo
Revainrating 5 out of 5

1 Review

StackHawk makes it simple for developers to find, triage, and fix application security bugs. Scan your application for AppSec bugs in the code your team wrote, triage and fix with provided documentation, and automate in your pipeline to prevent future bugs from hitting prod.

dependency-track logo
Revainrating 5 out of 5

1 Review

Dependency-Track is an intelligent Supply Chain Component Analysis platform that allows organizations to identify and reduce risk from the use of third-party and open source components. Dependency-Track takes a unique and highly beneficial approach by leveraging the capabilities of Software Bill of Materials (SBOM). This approach provides capabilities…

Read more about this company
hoss logo
Revainrating 5 out of 5

1 Review

Hoss helps teams make better API-driven products. Our simple drop-in solution makes it easy to track and manage third-party APIs. Get visibility into API performance, be alerted of errors before your customers notice, reduce the amount of time spent debugging integrations, and much more.

incydr logo
Revainrating 5 out of 5

1 Review

Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insider threat surprises without disrupting legitimate work. We do this by detecting how data is being used and shared across computers, cloud and email. We…

Read more about this company
satori cyber logo
Revainrating 5 out of 5

1 Review

Satori created the first DataSecOps solution which streamlines data access while solving the most difficult security and privacy challenges. The Secure Data Access Service is a universal visibility and control plane across all data stores, allowing you to oversee your data and its usage in real-time while automating access controls. The service maps all…

Read more about this company
winmagic logo
Revainrating 5 out of 5

1 Review

WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.

appsuit logo
Revainrating 5 out of 5

1 Review

AppSuit is a mobile app security solution which is develped by attacker's view. Protect various type of mobile apps in safe such as finace, game, public, IoT, fintech, O2O etc., from hacking threat.

cyber adapt logo
Revainrating 5 out of 5

1 Review

Cyber adAPT is a platform that secures mobile-enabled enterprises protecting real-world reputations, it combine powerful Secure Device Management, guaranteeing secure access to cloud and network services, with real-time Attack Detection inside the network and instantly illuminates otherwise hidden, malicious behavior ensuring more real attacks are found…

Read more about this company
networksecure logo
Revainrating 5 out of 5

1 Review

NetworkSecure is a network-based cybersecurity solution, offering zero-touch, clientless operation, requiring no application installation by the end customer. With NetworkSecure, a communications service provider can offer its customers protection from cybersecurity threats, including malware, viruses, phishing and ransomware. An easy-to-use interface…

Read more about this company
whitesource software logo
Revainrating 5 out of 5

1 Review

WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. WhiteSource doesn’t only alert on issues, it also provides actionable, validated remediation paths to…

Read more about this company
coreos clair logo
Revainrating 5 out of 5

1 Review

Open-source container vulnerability analysis service.

portshift containers security operator logo
Revainrating 5 out of 5

1 Review

Portshift is a Kubernetes security leader, our innovative digital identity-based solution creates a unique, signed identity for each workload at the CI/CD pipeline stage, that is then used to enforce runtime security policies.

pentest-tools.com logo
Revainrating 5 out of 5

1 Review

Use the Pentest-Tools.com platform to quickly detect and report vulnerabilities in websites and network infrastructures! βœ” 25+ tightly integrated penetration testing and ethical hacking tools for easier, faster, and more effective engagements βœ” Built for pentesters, sysadmins, web devs, MSPs, business owners, and other professionals seeking to automate…

Read more about this company
checkmarx logo
Revainrating 5 out of 5

1 Review

Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the world’s top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP…

Read more about this company
code dx logo
Revainrating 5 out of 5

1 Review

Code Dx’s automated application vulnerability correlation shaves weeks off that process so you can get right to fixing your code. Its vulnerability management lets you quickly prioritize vulnerabilities (to fix the most important ones first), track progress of their remediation, and observe how your code's security changes over time.

bytesafe logo
Revainrating 5 out of 5

1 Review

Your code is your business. Manage the npm packages you depend on with Bytesafe. Your team’s single source of truth for secure code.

baffle logo
Revainrating 5 out of 5

1 Review

Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requires no changes to the apps, and encrypts data at-rest, in use, in memory and in the search index. That’s complete data protection.

telesign number masking logo
Revainrating 5 out of 5

1 Review

TeleSign Number Masking is a free service*, using cloud communications APIs, that enable the ability for two parties to communicate with each other for a short period of time over Voice and SMS without exposing their actual phone numbers. This enables the two parties to accomplish the task at hand without unnecessarily exposing any private information.

aircheck wi-fi tester for android logo
Revainrating 5 out of 5

1 Review

Smart Wi-Fi Troubleshooting and Deployment App

koolspan logo
Revainrating 5 out of 5

1 Review

Encrypt phone calls, messaging, and conference calls on Android, iPhone and BlackBerry with easy to use applications.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.