Header banner
Revain logoHome Page

Security

All results
zero networks access orchestrator logo
Revainrating 5 out of 5

1 Review

Least privilege networking solution that prevents attacks from spreading and causing damage by automatically restricting network access to only what is normally needed, everything else goes through 2-step verification.

activshield logo
Revainrating 5 out of 5

1 Review

Control your website traffic with pat. pending click and block tech.

blackpanda logo
Revainrating 5 out of 5

1 Review

mitiga logo
Revainrating 5 out of 5

1 Review

Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.

chronicle security logo
Revainrating 5 out of 5

1 Review

autopsy logo
Revainrating 5 out of 5

1 Review

Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.

vdoo logo
Revainrating 5 out of 5

1 Review

Vdoo is a global leader in the complex and increasing critical product security spage. With Vdoo, organizations can identify, prioritize, and mitigate a vast range of security issues. As the only automated platform that provides end-to-end product security, Vdoo helps development and security teams reduce time and effort while ensuring optimal product…

Read more about this company
evigilpro logo
Revainrating 5 out of 5

1 Review

eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by reconfiguring other enterprise security controls. eVigilPro comes with Advanced correlation engine to help analyze large amount of event data for a deeper…

Read more about this company
cybersponse logo
Revainrating 5 out of 5

1 Review

CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.

mocana logo
Revainrating 5 out of 5

1 Review

Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security…

Read more about this company
critical start logo
Revainrating 5 out of 5

1 Review

Critical Start is a cybersecurity company committed to using a strategy-based approach to improve the security capabilities of our clients.

monikal logo
Revainrating 5 out of 5

1 Review

Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can it provide logging and monitoring of everything that happens both inside and outside the office, but it can also be used for threat detection and response…

Read more about this company
xplico logo
Revainrating 5 out of 5

1 Review

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isnβ€št a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT)…

Read more about this company
iot security logo
Revainrating 5 out of 5

1 Review

To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforce…

Read more about this company
decyfir logo
Revainrating 5 out of 5

1 Review

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date, resilient and ready against upcoming cyber-attacks.

cloudsek logo
Revainrating 5 out of 5

1 Review

CloudSEK is an Artificial Intelligence-driven Unified Risk Management Enterprise. CloudSEK’s flagship SAAS based product XVigil with the combined strength of the powerful AI and Machine Learning helps organizations monitor and manage their security posture in real-time.CloudSEK uses automated technology instead of the traditional DRM, which analyses the…

Read more about this company
cyr3con pr1ority logo
Revainrating 5 out of 5

1 Review

Harness the power of artificial intelligence with CYR3CON's unique, hacker-centric approach to predicting and preventing cyber attacks

threatmodeler logo
Revainrating 5 out of 5

1 Review

ThreatModeler integrates with cloud service providers and automatically builds threat modeling programs using cloud configuration data

wapack labs cyber intelligence services logo
Revainrating 5 out of 5

1 Review

Wapack Labs is a cyber intelligence operation designed to monitor and report on threats to IT, key personnel and investments in dozens of venues, and make that data available in both human and machine readable formats.

cigloo logo
Revainrating 5 out of 5

1 Review

Cigloo Browser Isolation controls and isolates corporate user browsing in instances of a data breach, helping to prevent Malware crises.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.