Security
1 Review
The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud-centric. Wandera provides a unified cloud security solution to protect the modern workplace. We enableβ¦
Read more about this company1 Review
Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust security framework and automatically prevent attacks. Pradeo's next generation technology provides a reliable detection of threats, protecting against dataβ¦
Read more about this company1 Review
1 Review
AppScanOnline is the leading provider of mobile app security software for today's developers. AppScanOnline's automated static vulnerability testing service quickly provides security teams with a detailed report compliant with both OWASP Top 10 and Industrial Development App standards, allowing developers to bring their application to market sooner.
1 Review
Detect security flaws in your website or web application and avoid being hacked. HTTPCS Security puts Machine Learning at the service of your cyber security to protect your site against hacking and data leaks.
1 Review
Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems before the hackers do. It saves you time by proactively scanning for new threats as well as offering a unique threat interpretation system that makes vulnerability management easy.
1 Review
Trusted by security and development teams at top enterprises, MergeBase provides security and development teams with visibility to the real risk in their applications from vulnerable open source components at every stage of the software development lifecycle with CodeGreen, BuildGreen, and RunGreen. MergeBase accelerates triage by minimizing falseβ¦
Read more about this company1 Review
Lenses.io delivers a developer workspace for building & operating real-time applications on any Apache Kafka. By enabling teams to monitor, investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their weekends back.
1 Review
Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.
1 Review
Rectify leverages privacy-enabled artificial intelligenceTM to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties.
1 Review
Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd. The Prey service is theβ¦
Read more about this company1 Review
zANTITM is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
1 Review
Fyde replaces outdated and costly VPN, SWG and NAC point products with a quick to deploy, easy to manage, unified offering. Fyde helps companies mitigate security and compliance risk, increase user productivity and experience by enabling secure access to corporate applications like Jira, Confluence, Bitbucket, Gitlab, Kibana, MS RDP, SSH and cloudβ¦
Read more about this company1 Review
Promon SHIELD makes it possible to launch effective and secure apps on untrusted devices, without risking data leakage and damage to end-user trust.
1 Review
A range of mobile softphone application solutions from standalone apps to branded cloud softphones configured and managed from your own secure web portal. All softphone products come with Push Notifications for great battery life, Encryption and HD Voice and Video calling.
1 Review
Protect any API. In any environment. Against any threats. Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native applications securely, monitor them for modern threats, and get alerted when threats arise. Whether you protect some of the legacy apps or brand new cloud-native APIs, Wallarm multi-cloud platform provides key componentsβ¦
Read more about this company1 Review
For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.
1 Review
Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when selecting from public repositories. Remediate known issues within the IDE. With integration to the most popular IDEs, developers can select the bestβ¦
Read more about this company1 Review
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicatedβ¦
Read more about this company