System Security
1 Review
CloudSEK is an Artificial Intelligence-driven Unified Risk Management Enterprise. CloudSEKโs flagship SAAS based product XVigil with the combined strength of the powerful AI and Machine Learning helps organizations monitor and manage their security posture in real-time.CloudSEK uses automated technology instead of the traditional DRM, which analyses theโฆ
Read more about this company1 Review
Harness the power of artificial intelligence with CYR3CON's unique, hacker-centric approach to predicting and preventing cyber attacks
1 Review
ThreatModeler integrates with cloud service providers and automatically builds threat modeling programs using cloud configuration data
1 Review
Wapack Labs is a cyber intelligence operation designed to monitor and report on threats to IT, key personnel and investments in dozens of venues, and make that data available in both human and machine readable formats.
1 Review
Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowers companies to safeguard their business-critical assets. With just a few clicks, Cymulate challenges your security controls by initiating thousands of attack simulations, showing you exactlyโฆ
Read more about this company1 Review
Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identify gaps, and instantly apply selected mitigation advice for the purpose of security validation, hardening and mitigation. The platform is powered by anโฆ
Read more about this company1 Review
LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response โ notโฆ
Read more about this company1 Review
securiCAD is a foreseeti product, developed to perform virtual attack simulations on models of IT architectures. Based on decades of research at the Royal Institute of Technology in Stockholm (KTH), securiCAD enables companies to transform their risk assessments from isolated technical problems to a holistic approach for measuring the risk exposure ofโฆ
Read more about this company1 Review
1 Review
By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.
1 Review
The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.
1 Review
A comprehensive endpoint solution that prevents attacks through trickery and deception.
1 Review
Smokescreen is a pioneer in deception-based threat detection and response. It is the solution of choice for offensive security teams, with a customer Net Promoter Score above 70. Smokescreen's deception platform protects many of the worldโs most targeted organisations including leading financial institutions, energy companies, manufacturing giants, andโฆ
Read more about this company1 Review
Recorded Future delivers the worldโs most technically advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence for security operations and response, threat analysis, third-party risk, vulnerability management, brand protection, and geopolitical risk, Recorded Futureโฆ
Read more about this company1 Review
Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.
1 Review
Beezz is the first security solution built specifically to protect against the new and growing vulnerabilities of the IOT universe. Utilizing proprietary technology and advanced algorithms, the Beezz solution does what no one has succeeded in doing so far, simplify and unify the complex and inefficient IOT security process.
1 Review
VirusTotal is a service that analyzes suspicious files and facilitates real-time detection of viruses, worms, trojans and malware content.
1 Review
Hybrid Analysis provides free malware analysis service for the community that detects and analyzes unknown threats
1 Review
We specialise in all types of data recovery, including file restoration, hard drive rescue and forensic computer investigations.