Header banner
Revain logoHome Page

Security

All results
imask logo
Revainrating 4 out of 5

1 Review

iMask secures your sensitive data at the Application Layer and the Database layer by offering flexible approaches that cater to all use cases and all types of users – small, medium, and large enterprises.

testbench logo
Revainrating 4 out of 5

1 Review

Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. TestBench Modules Data Extraction Stop copying the entire live database and hone in…

Read more about this company
certo iphone logo
Revainrating 4 out of 5

1 Review

Certo iPhone is the only bug and spyware detection tool available for iOS devices. Our clients use Certo iPhone to ensure their employee's devices are secure.

capsule8 logo
Revainrating 4 out of 5

1 Review

Capsule8 is the industry's only real-time, zero-day attack detection platform capable of scaling to massive production deployments.

tufin orca logo
Revainrating 4 out of 5

1 Review

Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize and control security policies across hybrid cloud

acunetix by invicti logo
Revainrating 4 out of 5

1 Review

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time…

Read more about this company
detectify deep scan logo
Revainrating 4 out of 5

1 Review

Detectify is the first company of its kind to automate the cutting-edge knowledge of the best ethical hackers in the world to secure public web applications. Users check web applications against 2000+ known vulnerabilities beyond the OWASP Top 10. In a fast-paced tech environment, the potential attack surface increases with each release and new app…

Read more about this company
sourceclear logo
Revainrating 4 out of 5

1 Review

Combining static analysis and data-science with modern developer tools and practices, SourceClear is the leading Software Composition Analysis platform for DevOps workflows.

authsafe - safegarding users from attack logo
Revainrating 4 out of 5

1 Review

AuthSafe is Account Takeover Prevention Solution End-user trained risk-based authentication stops cybercriminal accessing compromised user and automate account recovery process. The organization may realize that a bad actor is accessing the accounts for performing fraudulent activities such as purchases, increased chargebacks, or customer data stealing…

Read more about this company
authentic8 silo logo
Revainrating 4 out of 5

1 Review

Authentic8 enables anyone, anywhere, on any device to experience the web without risk. The Silo Web Isolation Platform by Authentic8 separates the things you care about like apps, data and devices, from the things you cannot trust like public websites, external users and unmanaged devices. Silo executes all web code in a secure, isolated environment…

Read more about this company
bitninja logo
Revainrating 4 out of 5

1 Review

BitNinja is an easy-to-use server security tool, which can be installed on your server within a couple of minutes and requires virtually no maintenance. It is a mixture of an on-premise and cloudbased solution. It is an agent which sits on your infrastructure and sends the attack information to the central server which is in the cloud. We have a new…

Read more about this company
geetest captcha logo
Revainrating 4 out of 5

1 Review

GeeTest protects your websites, mobile apps and APIs from bad bot attacks with zero user friction. Its self-learning defense model based on Graph Convolutional Networks and massive volumes of biometric data collected in the past 7 years allows GeeTest to identify and mitigate bad bots across all GeeTest-protected sites. By analyzing over 200 parameters…

Read more about this company
perimeterx bot defender logo
Revainrating 4 out of 5

1 Review

PerimeterX was named a Leader in The Forrester New WaveTM: Bot Management. PerimeterX Bot Defender is a behavior-based bot management solution that protects your websites, mobile applications, and APIs from automated attacks, safeguarding your online revenue, reducing the risk of data breaches, and improving operational efficiency. Protect your website…

Read more about this company
mtcaptcha captcha logo
Revainrating 4 out of 5

1 Review

MTCaptcha provides smart bot detection and protection against automated attacks via AI driven adaptive captchas and proof-of-work, while fully compliant with Privacy (GDPR) and Accessibility (WCAG AAA) standards, delivered via a fully configurable globally distributed SaaS service. Its smart, its beautiful and its fully enterprise ready.

forceshield logo
Revainrating 4 out of 5

1 Review

ForceShield real time proactive defense is a comprehensive security solution for both web and mobile applications, which can secure enterprise business and end users against account takeover and online fraud from automation attacks and data breaches.

privafy logo
Revainrating 4 out of 5

1 Review

Privafy’s security-as-a-service application secures data wherever it travels. The company’s cloud-native technology integrates all the functionality of traditional point solutions, such as encryption, firewall, DDoS protection, IDS/IPS and DLP technology, to provide comprehensive data protection as it moves between locations, clouds, mobile devices, and…

Read more about this company
leaksid logo
Revainrating 4 out of 5

1 Review

Deter leak of your sensitive information Data leakage identification platform for conducting significant contracts and sharing confidential documents. Every time the user sees information on the screen or prints it out, the system's algorithm displays a unique copy with invisible marks. Visually, the differences between the original and a copy are…

Read more about this company
trustifi email security logo
Revainrating 4 out of 5

1 Review

Trustifi is a cyber security firm featuring solutions delivered on software as a service platform. Trustifi leads the market with the easiest to use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained in…

Read more about this company
infowatch traffic monitor logo
Revainrating 4 out of 5

1 Review

InfoWatch Traffic Monitor is a centralized solution for preventing confidential data leaks and thus eliminating financial losses.

devicelock dlp logo
Revainrating 4 out of 5

1 Review

DeviceLock provides DLP solutions protecting organizations from data leak threats.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.