System Security
1 Review
SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated platform, it drives security visibility, so decisions can be better prioritised and response time is dramatically reduced. With SIRP, the entire cybersecurity…
Read more about this company1 Review
Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help companies end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, and Managed Cloud Monitoring, each built on our cloud-native…
Read more about this company1 Review
1 Review
Joe Security specializes in the development of malware analysis systems for malware detection and forensics. Based on the idea of deep malware analysis & multi-technology platform, Joe Security has developed unique technologies to analyze malware in a depth previously not possible. Joe Security provides malware analysis systems as a cloud service or as…
Read more about this company1 Review
Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.
1 Review
LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR)…
Read more about this company1 Review
1 Review
Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.
1 Review
1 Review
Autopsy is an easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones. It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
1 Review
Vdoo is a global leader in the complex and increasing critical product security spage. With Vdoo, organizations can identify, prioritize, and mitigate a vast range of security issues. As the only automated platform that provides end-to-end product security, Vdoo helps development and security teams reduce time and effort while ensuring optimal product…
Read more about this company1 Review
eVigilPro offers direct analysis of security events generated by computer hardware, network, and applications. It detects anomalies and policy violations through real-time monitoring and stops them by reconfiguring other enterprise security controls. eVigilPro comes with Advanced correlation engine to help analyze large amount of event data for a deeper…
Read more about this company1 Review
CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.
1 Review
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security…
Read more about this company1 Review
Critical Start is a cybersecurity company committed to using a strategy-based approach to improve the security capabilities of our clients.
1 Review
Monikal, the SIEM solution for SMEs, delivers visibility of and insight into ever-changing and fragmented networks, in a way that has never been possible for most organisations before. Not only can it provide logging and monitoring of everything that happens both inside and outside the office, but it can also be used for threat detection and response…
Read more about this company1 Review
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn‚t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT)…
Read more about this company1 Review
To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabilities regardless of where it is deployed, a.k.a IoT personality. This approach discerns each device's behaviors and detects any unusual activities to enforce…
Read more about this company1 Review
CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date, resilient and ready against upcoming cyber-attacks.