Header banner
Revain logoHome Page

Security

All results
purifile logo
Revainrating 4 out of 5

1 Review

safe-t secure file access logo
Revainrating 4 out of 5

1 Review

With Safe-T’s Secure File Access (SFA), you can prevent data leakage and block threats like ransomware by transforming your standard network drive to a Zero Trust, access-controlled drive.

axiomatics dynamic authorization suite logo
Revainrating 4 out of 5

1 Review

Axiomatics Policy Server is a software for enterprise-wide externalized dynamic authorization, delivered with Attribute Based Access Control (ABAC).

hopzero logo
Revainrating 4 out of 5

1 Review

HOPZERO's revolutionary approach precludes risk by limiting the movement of packets.

envkey logo
Revainrating 4 out of 5

1 Review

EnvKey is a software that prevent insecure sharing and config sprawl. Works as an end-to-end encrypted configuration and secrets management.

privakey cloud logo
Revainrating 4 out of 5

1 Review

Privakey Cloud uses the OpenID Connect framework and behaves much like a social login, making it easy to enable for websites, online services, and apps.

we45 logo
Revainrating 4 out of 5

1 Review

AppSec Testing(AST) - Whatever your motivation, a proactive security push or a compliance compulsion, our AST service can help keep your application secure against external threats. Security Automation - Secure your agile Software Development Life Cycle(SDLC) without compromising on quality or time. AppSec Training - Our numerous/variegated training…

Read more about this company
xpolog logo
Revainrating 4 out of 5

1 Review

A premium Log Management and Analysis solution to uncover hidden values in IT Big Data and increase systems quality and availability with quick ROI. XpoLog making any log data easily accessible for search, visualization and monitoring. XpoLog saves critical time in the investigation of problems, analysis of IT security incidents, optimization of…

Read more about this company
crawl monster logo
Revainrating 4 out of 5

1 Review

CrawlMonster is a comprehensive analytics tool, providing technical issues about your websites.

secudit logo
Revainrating 4 out of 5

1 Review

Secudit combines user behavior monitoring, penetration testing, and cyber-threat intelligence to provide an enterprise with an ongoing assessment of enterprise IT cyber-security vulnerability.

zerodayscan logo
Revainrating 4 out of 5

1 Review

ZeroDayScan is a free service for every webmaster. It scans Internet for hacked websites.

codepatrol logo
Revainrating 4 out of 5

1 Review

CodePatrol performs powerful SAST scans on your project source code and identifies security flaws early. Powered by Claranet and Checkmarx

splint logo
Revainrating 4 out of 5

1 Review

Splint is a tool for statically checking C programs for security vulnerabilities and coding mistakes. With minimal effort, Splint can be used as a better lint. If additional effort is invested adding annotations to programs, Splint can perform stronger checking than can be done by any standard lint.

coach logo
Revainrating 4 out of 5

1 Review

Roboyo Coach is a unique RPA code reviewer that will help and guide you in all your RPA implementations. We have automated RPA Code Quality Assurance making it easier than ever to ensure that no automation fails in production. Take your RPA automation to new heights with Coach, a unique service of its kind! We have simplified the code checking process…

Read more about this company
doppins logo
Revainrating 4 out of 5

1 Review

Doppins automatically upgrades dependencies through friendly GitHub pull requests.

deepcode logo
Revainrating 4 out of 5

1 Review

DeepCode is the most advanced Static Analysis Tool for code. It utilizes semantic analysis over Open Source code to identify hundreds of thousands of rules that each developer can benefit from. The Machine Learning combined with the Semantic Internal representation delivers the highest Precision in the space and a rapidly growing number of suggestions…

Read more about this company
softagram logo
Revainrating 4 out of 5

1 Review

Smarter way to manage software development

codescene logo
Revainrating 4 out of 5

1 Review

arachn logo
Revainrating 4 out of 5

1 Review

Arachni includes an integrated, real browser environment in order to provide sufficient coverage to modern web applications which make use of technologies such as HTML5, JavaScript, DOM manipulation, AJAX, etc.

the columbus collaboratory vulnerability management solution logo
Revainrating 4 out of 5

1 Review

The Columbus Collaboratory Vulnerability Management Solution provides a 360-degree, single-console view via a managed service that helps organizations make informed business decisions and mitigate threats. Rather than staff an expensive threat-intelligence team, the Columbus Collaboratory Vulnerability Management Solution affordably delivers the…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.