Header banner
Revain logoHome Page

Security

All results
overwatch logo
Revainrating 4 out of 5

1 Review

Overwatch โ€šAฬˆiฬ‚ Security for the Internet of Things and Beyond.

socvue security monitoring logo
Revainrating 4 out of 5

1 Review

SOCVue Security Monitoring is a service that includes 24/7/365 threat detection, remediation guidance, compliance, and SIEM and log management.

threatrespond logo
Revainrating 4 out of 5

1 Review

Tailored to small and medium businesses who want a SIEM in order to comply with regulations and protect the ever-present danger of a cyber-attack. This is the perfect solution for those organizations that do not have a SIEM due to the cost of setting up and deploying one in-house. Vijilan will deploy and implement its fully managed service in record timeโ€ฆ

Read more about this company
qintell crosslink logo
Revainrating 4 out of 5

1 Review

Qintell provides the tools analysts need to assess and protect against the abundance of cyber threats that exist in the world today.

canary logo
Revainrating 4 out of 5

1 Review

Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.

digitalstakeout scout logo
Revainrating 4 out of 5

1 Review

For the security analyst who wants to tap into the sea of data from the Internet in real-time to illuminate risk, uncover threats, and warn of vulnerabilities. DigitalStakeout Scout is a simple, cost-effective tool used by security teams of all sizes to mitigate common security intelligence gaps with relevant and actionable information from real-timeโ€ฆ

Read more about this company
deep secure content threat removal platform logo
Revainrating 4 out of 5

1 Review

Our Content Threat Removal Platform is the world's first cyber security solution that mitigates the risk of stegware attacks that hide from detection using steganography techniques.

eriskhub logo
Revainrating 4 out of 5

1 Review

When you license the eRiskHubยฎ portal, powered by NetDiligenceยฎ, you provide your clients with a go-to resource for all things cyber, helping them shore up their defenses and respond effectively to data breaches, network attacks and other cyber events.

cyber lorica logo
Revainrating 4 out of 5

1 Review

Abacodeโ€™s product-agnostic solution, Cyber LoricaTM, is a subscription-based managed Security Information and Event Management (SIEM) / Artificial Intelligence (AI) service. We work with industry-leading products to determine the best solutions to meet the specific security needs of your business. We identify vulnerabilities and detect high-riskโ€ฆ

Read more about this company
expel logo
Revainrating 4 out of 5

1 Review

Eliminating the black box within which managed security service providers (MSSPs) operate. You can see and use the same interface our analysts use to deliver our service. There's no internal analyst console. There's no curtain to look (or hide) behind. With Expel, if you're ever wondering what we're doing for you or want to see how we're making decisionsโ€ฆ

Read more about this company
ingalls mdr logo
Revainrating 4 out of 5

1 Review

Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between.

rook security services logo
Revainrating 4 out of 5

1 Review

Rook Security's Managed Detection and Response services leverage threat and log data enhanced with asset and threat intelligence to prioritize escalations. Workload is managed through a shared queue where our team can collaborate with you in real time. This results in expediting effective response so incidents can be brought to resolution before a breachโ€ฆ

Read more about this company
security operation center logo
Revainrating 4 out of 5

1 Review

Leo TechnoSoft's Intelligence Driven SOC is an integrated stack of security solutions and offers security incident and event management (SIEM), identity and access management (IDM), privilege identity management (PIM) and cloud access security broker (CASB), which is built on security Big Data.

maltego logo
Revainrating 4 out of 5

1 Review

Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.

massive intelligence logo
Revainrating 4 out of 5

1 Review

strixus is a deep web monitoring engine for cyber and brand threats.

reveelium logo
Revainrating 4 out of 5

1 Review

Reveelium is a threat detection software that monitors user behavior and identifies anomalies that can lead to security breaches.

threatq logo
Revainrating 4 out of 5

1 Review

ThreatQuotient is a threat intelligence platform designed to enable threat operations and management and arm your analysts with the intelligence, controls and automation required to protect your business, employees and customers.

cyberinc isla logo
Revainrating 4 out of 5

1 Review

The Isla Malware Isolation Platform is an innovative browser isolation solution that helps keep all malware off your endpoints.

puffin secure browser logo
Revainrating 4 out of 5

1 Review

Puffin Secure Browser provides the most effective way to guard against threats like malware, ransomeware, adware, and malicious links

apozy logo
Revainrating 4 out of 5

1 Review

Airlock is a Browser Endpoint Detection and Response platform that fills the gap in endpoint protection. Disrupt phishing and malware delivery kill chains and protect your brand from impersonators. Airlock uses Native Browser Isolation to to make every URL safe to visit. Deploy a lightweight browser add-on in seconds to see and respond to incidents, orโ€ฆ

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.