Security
1 Review
Least privilege networking solution that prevents attacks from spreading and causing damage by automatically restricting network access to only what is normally needed, everything else goes through 2-step verification.
1 Review
1 Review
Mitiga bolsters organizationsβ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.
1 Review
1 Review
Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
1 Review
Vdoo is a global leader in the complex and increasing critical product security spage. With Vdoo, organizations can identify, prioritize, and mitigate a vast range of security issues. As the only automated platform that provides end-to-end product security, Vdoo helps development and security teams reduce time and effort while ensuring optimal productβ¦
Read more about this company1 Review
eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by reconfiguring other enterprise security controls. eVigilPro comes with Advanced correlation engine to help analyze large amount of event data for a deeperβ¦
Read more about this company1 Review
CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.
1 Review
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and securityβ¦
Read more about this company1 Review
Critical Start is a cybersecurity company committed to using a strategy-based approach to improve the security capabilities of our clients.
1 Review
Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can it provide logging and monitoring of everything that happens both inside and outside the office, but it can also be used for threat detection and responseβ¦
Read more about this company1 Review
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isnβt a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT)β¦
Read more about this company1 Review
To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforceβ¦
Read more about this company1 Review
CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organizationβs cybersecurity posture up-to-date, resilient and ready against upcoming cyber-attacks.
1 Review
CloudSEK is an Artificial Intelligence-driven Unified Risk Management Enterprise. CloudSEKβs flagship SAAS based product XVigil with the combined strength of the powerful AI and Machine Learning helps organizations monitor and manage their security posture in real-time.CloudSEK uses automated technology instead of the traditional DRM, which analyses theβ¦
Read more about this company1 Review
Harness the power of artificial intelligence with CYR3CON's unique, hacker-centric approach to predicting and preventing cyber attacks
1 Review
ThreatModeler integrates with cloud service providers and automatically builds threat modeling programs using cloud configuration data
1 Review
Wapack Labs is a cyber intelligence operation designed to monitor and report on threats to IT, key personnel and investments in dozens of venues, and make that data available in both human and machine readable formats.
1 Review
Cigloo Browser Isolation controls and isolates corporate user browsing in instances of a data breach, helping to prevent Malware crises.