Header banner
Revain logoHome Page

Security

All results
cyver.io logo
Revainrating 5 out of 5

1 Review

Cyver is a pentest management platform to digitize, automate, and optimize manual work for pentest firms, while delivering Pentest-as-a-Service to your clients. Cyver offers pentest report automation, branded client portals, pentest management, team management, and more.

gamashield logo
Revainrating 5 out of 5

1 Review

GamaShield a cutting-edge virtual hacker technology to identify and eradicate dangerous malware threats and website application vulnerabilities, a pre-breach tool designed to detect and prevent cyber attacks. GamaSec provides a portfolio of services including web vulnerability scanning, daily malware detection, blacklist monitoring and application…

Read more about this company
attackflow logo
Revainrating 5 out of 5

1 Review

AttackFlow is a solution helps find security and quality weaknesses in software by analyzing the code.

source insight logo
Revainrating 5 out of 5

1 Review

Source Insight parses your source code and maintains its own database of symbolic information dynamically while you work, and presents useful contextual information to you automatically.

youmonitor logo
Revainrating 5 out of 5

1 Review

YourKit offersinnovative and intelligent tools for profiling Java & .NET applications.

prepros logo
Revainrating 5 out of 5

1 Review

Prepros can compile almost all preprocessing languages like Sass, Less, Stylus, Cssnext, Jade/Pug, Markdown, Slim, Coffeescript etc.

offensity logo
Revainrating 5 out of 5

1 Review

Offensity is an automated vulnerability scanner helping IT admins identify vulnerabilities by scanning infrastructure from the Internet. The service focuses on ease of use and minimizing human effort. You will be set up in minutes: IT admins enter and verify the main domain (e.g. example.com). Additional subdomains will be suggested automatically…

Read more about this company
vaddy logo
Revainrating 5 out of 5

1 Review

Continuous web security testing service that connects with continuous integration tools.

leakwatch logo
Revainrating 5 out of 5

1 Review

Leakwatch develops a technology detecting your sensitive data leaks in real-time on the Internet to alert you as soon as possible and empower you to take actions quickly.

alliance key manager logo
Revainrating 5 out of 5

1 Review

Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system…

Read more about this company
fortanix logo
Revainrating 5 out of 5

1 Review

Fortanix Self-Defending Key Management Service is the world's first cloud solution secured with Intel SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data.

ssh universal key manager logo
Revainrating 5 out of 5

1 Review

SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.

coralogix logo
Revainrating 5 out of 5

1 Review

Coralogix is a Log Analytics and Cloud Security platform that empowers thousands of leading companies with ML-powered insights to improve stability and accelerate their version delivery without paying for the noise that their systems generate. Reengineered Elasticsearch engine allows you to pay according to data priority instead of solely on volume by…

Read more about this company
blesk logo
Revainrating 5 out of 5

1 Review

Blesk is a log management software that performs all aspects of network monitoring from a single machine. Blesk layers are added bringing enhanced features and a uniform graphical interface.

logfusion logo
Revainrating 5 out of 5

1 Review

Real-Time Log Monitoring Made Easy

pentoma® logo
Revainrating 5 out of 5

1 Review

Pentoma® is an automated penetration testing solution for web and APIs. Pentoma® initially conducts a web scanning analysis, and then simulates exploits to verify security weaknesses that can be critical in the wild. As Pentoma® is fully automated, the penetration testing process is much faster and less costly than the traditional pen testing. Pentoma®…

Read more about this company
spectral logo
Revainrating 5 out of 5

1 Review

Discover, classify, and protect your codebases, logs, and other assets. Monitor and detect API keys, tokens, credentials, high-risk security misconfiguration and more.

thunderscan logo
Revainrating 5 out of 5

1 Review

DefenseCode ThunderScan® is a SAST (Static Application Security Testing, WhiteBox Testing) solution for performing deep and extensive security analysis of application source code. ThunderScan® is easy to use, requires almost no user input and can be deployed during or after development with easy integration into your DevOps environment and CI/CD pipeline…

Read more about this company
jprofiler logo
Revainrating 5 out of 5

1 Review

JProfiler is a Java profiler tool that helps users to resolve performance bottlenecks, pin down memory leaks and understand threading issues

ndepend logo
Revainrating 5 out of 5

1 Review

Measure quality with metrics, see design with diagrams and enforce decisions with code rules, right into Visual Studio.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.