Header banner
Revain logoHome Page

Security

All results
contentkeeper logo
Revainrating 5 out of 5

1 Review

Multiple threats call for multiple layers of defense. ContentKeeper layers complementary technologies that detect, identify, analyze and prevent attacks on todayโ€™s distributed, cloud-enabled organization. Easy to scale, manage and use, the platform protects from advanced malware, ensures compliance and controls policies across mobile devices, remoteโ€ฆ

Read more about this company
contentprotect logo
Revainrating 5 out of 5

1 Review

ContentProtect provides: Content filtering, Internet usage policies apply to devices on and off the network, Web based administration and reporting, Productivity tools with custom rules and time controls, Email alerts for policy violations or filter change requests, Customized policy settings and rules.

virusdie logo
Revainrating 5 out of 5

1 Review

Collect all your customers' websites distributed across different Shared, VPS, and Dedicated servers in one place and get started providing comprehensive website security to all your clients under your own brand, at your price. It's a quick and easy way to grow your business.

fgx-web logo
Revainrating 5 out of 5

1 Review

FGX-Web monitors and protects websites against the latest threats affecting online businesses - constantly updated by our forensic research from investigations of criminal activity, from simple hacks to sophisticated cyber attacks by malicious hackers.

webcops logo
Revainrating 5 out of 5

1 Review

WebCops is a DRM security system for safe distribution on Windows and MacOS (OS X).

website security scanner logo
Revainrating 5 out of 5

1 Review

Welcome to Website Security SCANNER and MONITOR by H-X Technologies! These professional automated services are designed for protection of your websites. This Guide will help you to use our services in the best possible way, even if you are not a cyber security specialist. First, if you have not read the Frequently Asked Questions page, we suggest you toโ€ฆ

Read more about this company
wp security logo
Revainrating 5 out of 5

1 Review

Launch security scans for your WordPress websites and have results in a minute. Schedule daily, weekly, twice a week, twice a month or monthly scans. Detailed security reports which includes guidelines to improve security. Email alerts once we find new vulnerabilities.

securekloud technologies logo
Verified
Revainrating 5 out of 5

1 Review

SecureKloud is a cloud native company with a combination of platforms and services, designed to solve problems around Blockchain, Cloud, Enterprise Security, Data Collaboration, Decision Engineering, and Managed Services.

cymulate logo
Revainrating 4 out of 5

1 Review

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowers companies to safeguard their business-critical assets. With just a few clicks, Cymulate challenges your security controls by initiating thousands of attack simulations, showing you exactlyโ€ฆ

Read more about this company
picus security logo
Revainrating 4 out of 5

1 Review

Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identify gaps, and instantly apply selected mitigation advice for the purpose of security validation, hardening and mitigation. The platform is powered by anโ€ฆ

Read more about this company
lmntrix logo
Revainrating 4 out of 5

1 Review

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response โ€“ notโ€ฆ

Read more about this company
securicad logo
Revainrating 4 out of 5

1 Review

securiCAD is a foreseeti product, developed to perform virtual attack simulations on models of IT architectures. Based on decades of research at the Royal Institute of Technology in Stockholm (KTH), securiCAD enables companies to transform their risk assessments from isolated technical problems to a holistic approach for measuring the risk exposure ofโ€ฆ

Read more about this company
attackiq platform logo
Revainrating 4 out of 5

1 Review

infection monkey logo
Revainrating 4 out of 5

1 Review

By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.

botsink logo
Revainrating 4 out of 5

1 Review

The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.

minerva anti-evasion platform logo
Revainrating 4 out of 5

1 Review

A comprehensive endpoint solution that prevents attacks through trickery and deception.

smokescreen logo
Revainrating 4 out of 5

1 Review

Smokescreen is a pioneer in deception-based threat detection and response. It is the solution of choice for offensive security teams, with a customer Net Promoter Score above 70. Smokescreen's deception platform protects many of the worldโ€™s most targeted organisations including leading financial institutions, energy companies, manufacturing giants, andโ€ฆ

Read more about this company
recorded future security intelligence platform logo
Revainrating 4 out of 5

1 Review

Recorded Future delivers the worldโ€™s most technically advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence for security operations and response, threat analysis, third-party risk, vulnerability management, brand protection, and geopolitical risk, Recorded Futureโ€ฆ

Read more about this company
threatconnect logo
Revainrating 4 out of 5

1 Review

ThreatConnect is a in-platform analytics and automation solution.

mbed os logo
Revainrating 4 out of 5

1 Review

Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.