Header banner
Revain logoHome Page

Security

All results
wandera logo
Revainrating 5 out of 5

1 Review

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud-centric. Wandera provides a unified cloud security solution to protect the modern workplace. We enable…

Read more about this company
pradeo security logo
Revainrating 5 out of 5

1 Review

Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust security framework and automatically prevent attacks. Pradeo's next generation technology provides a reliable detection of threats, protecting against data…

Read more about this company
ukeysoft foneeraser logo
Revainrating 5 out of 5

1 Review

Mobile Data Security

kubesafe logo
Revainrating 5 out of 5

1 Review

appscanonline logo
Revainrating 5 out of 5

1 Review

AppScanOnline is the leading provider of mobile app security software for today's developers. AppScanOnline's automated static vulnerability testing service quickly provides security teams with a detailed report compliant with both OWASP Top 10 and Industrial Development App standards, allowing developers to bring their application to market sooner.

security by httpcs logo
Revainrating 5 out of 5

1 Review

Detect security flaws in your website or web application and avoid being hacked. HTTPCS Security puts Machine Learning at the service of your cyber security to protect your site against hacking and data leaks.

intruder logo
Revainrating 5 out of 5

1 Review

Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems before the hackers do. It saves you time by proactively scanning for new threats as well as offering a unique threat interpretation system that makes vulnerability management easy.

mergebase logo
Revainrating 5 out of 5

1 Review

Trusted by security and development teams at top enterprises, MergeBase provides security and development teams with visibility to the real risk in their applications from vulnerable open source components at every stage of the software development lifecycle with CodeGreen, BuildGreen, and RunGreen. MergeBase accelerates triage by minimizing false…

Read more about this company
lenses logo
Revainrating 5 out of 5

1 Review

Lenses.io delivers a developer workspace for building & operating real-time applications on any Apache Kafka. By enabling teams to monitor, investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their weekends back.

clonetab logo
Revainrating 5 out of 5

1 Review

Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.

rectify logo
Revainrating 5 out of 5

1 Review

Rectify leverages privacy-enabled artificial intelligenceTM to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties.

prey logo
Revainrating 5 out of 5

1 Review

Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd. The Prey service is the…

Read more about this company
zanti logo
Revainrating 5 out of 5

1 Review

zANTITM is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

fyde logo
Revainrating 5 out of 5

1 Review

Fyde replaces outdated and costly VPN, SWG and NAC point products with a quick to deploy, easy to manage, unified offering. Fyde helps companies mitigate security and compliance risk, increase user productivity and experience by enabling secure access to corporate applications like Jira, Confluence, Bitbucket, Gitlab, Kibana, MS RDP, SSH and cloud…

Read more about this company
promon shield logo
Revainrating 5 out of 5

1 Review

Promon SHIELD makes it possible to launch effective and secure apps on untrusted devices, without risking data leakage and damage to end-user trust.

sessioncloud logo
Revainrating 5 out of 5

1 Review

A range of mobile softphone application solutions from standalone apps to branded cloud softphones configured and managed from your own secure web portal. All softphone products come with Push Notifications for great battery life, Encryption and HD Voice and Video calling.

wallarm next gen waf and api security logo
Revainrating 5 out of 5

1 Review

Protect any API. In any environment. Against any threats. Wallarm is the platform Dev, Sec, and Ops teams choose to build cloud-native applications securely, monitor them for modern threats, and get alerted when threats arise. Whether you protect some of the legacy apps or brand new cloud-native APIs, Wallarm multi-cloud platform provides key components…

Read more about this company
cyberark conjur logo
Revainrating 5 out of 5

1 Review

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

nexus lifecycle logo
Revainrating 5 out of 5

1 Review

Continuously secure your entire software supply chain. Empower developers to select safer components. With a Chrome browser extension, developers know if an open source component is vulnerable when selecting from public repositories. Remediate known issues within the IDE. With integration to the most popular IDEs, developers can select the best…

Read more about this company
netsparker by invicti logo
Revainrating 5 out of 5

1 Review

Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.