Security
1 Review
iMask secures your sensitive data at the Application Layer and the Database layer by offering flexible approaches that cater to all use cases and all types of users – small, medium, and large enterprises.
1 Review
Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. TestBench Modules Data Extraction Stop copying the entire live database and hone in…
Read more about this company1 Review
Certo iPhone is the only bug and spyware detection tool available for iOS devices. Our clients use Certo iPhone to ensure their employee's devices are secure.
1 Review
Capsule8 is the industry's only real-time, zero-day attack detection platform capable of scaling to massive production deployments.
1 Review
Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize and control security policies across hybrid cloud
1 Review
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time…
Read more about this company1 Review
Detectify is the first company of its kind to automate the cutting-edge knowledge of the best ethical hackers in the world to secure public web applications. Users check web applications against 2000+ known vulnerabilities beyond the OWASP Top 10. In a fast-paced tech environment, the potential attack surface increases with each release and new app…
Read more about this company1 Review
Combining static analysis and data-science with modern developer tools and practices, SourceClear is the leading Software Composition Analysis platform for DevOps workflows.
1 Review
AuthSafe is Account Takeover Prevention Solution End-user trained risk-based authentication stops cybercriminal accessing compromised user and automate account recovery process. The organization may realize that a bad actor is accessing the accounts for performing fraudulent activities such as purchases, increased chargebacks, or customer data stealing…
Read more about this company1 Review
Authentic8 enables anyone, anywhere, on any device to experience the web without risk. The Silo Web Isolation Platform by Authentic8 separates the things you care about like apps, data and devices, from the things you cannot trust like public websites, external users and unmanaged devices. Silo executes all web code in a secure, isolated environment…
Read more about this company1 Review
BitNinja is an easy-to-use server security tool, which can be installed on your server within a couple of minutes and requires virtually no maintenance. It is a mixture of an on-premise and cloudbased solution. It is an agent which sits on your infrastructure and sends the attack information to the central server which is in the cloud. We have a new…
Read more about this company1 Review
GeeTest protects your websites, mobile apps and APIs from bad bot attacks with zero user friction. Its self-learning defense model based on Graph Convolutional Networks and massive volumes of biometric data collected in the past 7 years allows GeeTest to identify and mitigate bad bots across all GeeTest-protected sites. By analyzing over 200 parameters…
Read more about this company1 Review
PerimeterX was named a Leader in The Forrester New WaveTM: Bot Management. PerimeterX Bot Defender is a behavior-based bot management solution that protects your websites, mobile applications, and APIs from automated attacks, safeguarding your online revenue, reducing the risk of data breaches, and improving operational efficiency. Protect your website…
Read more about this company1 Review
MTCaptcha provides smart bot detection and protection against automated attacks via AI driven adaptive captchas and proof-of-work, while fully compliant with Privacy (GDPR) and Accessibility (WCAG AAA) standards, delivered via a fully configurable globally distributed SaaS service. Its smart, its beautiful and its fully enterprise ready.
1 Review
ForceShield real time proactive defense is a comprehensive security solution for both web and mobile applications, which can secure enterprise business and end users against account takeover and online fraud from automation attacks and data breaches.
1 Review
Privafy’s security-as-a-service application secures data wherever it travels. The company’s cloud-native technology integrates all the functionality of traditional point solutions, such as encryption, firewall, DDoS protection, IDS/IPS and DLP technology, to provide comprehensive data protection as it moves between locations, clouds, mobile devices, and…
Read more about this company1 Review
Deter leak of your sensitive information Data leakage identification platform for conducting significant contracts and sharing confidential documents. Every time the user sees information on the screen or prints it out, the system's algorithm displays a unique copy with invisible marks. Visually, the differences between the original and a copy are…
Read more about this company1 Review
Trustifi is a cyber security firm featuring solutions delivered on software as a service platform. Trustifi leads the market with the easiest to use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained in…
Read more about this company1 Review
InfoWatch Traffic Monitor is a centralized solution for preventing confidential data leaks and thus eliminating financial losses.
1 Review
DeviceLock provides DLP solutions protecting organizations from data leak threats.