Header banner
Revain logoHome Page

Network Security

All results
flowtraq logo
Revainrating 5 out of 5

1 Review

FlowTraq is a security visibility tool that enables (network) security operators to hunt for threats, discover data leaks, spot hacker-controlled systems, and investigate security breaches.

sweepatic logo
Revainrating 5 out of 5

1 Review

Sweepatic is a cybersecurity start-up operating on a global scale making our customers cyber resilient.

hotspot shield logo
Revainrating 5 out of 5

1 Review

Hotspot Shield lets you browse the web securely, anonymously & change your browsing location to unblock content.

vyprvpn logo
Revainrating 5 out of 5

1 Review

VyprVPN offers sleek, cutting-edge apps for Windows, Mac, Android, iOS, TV and Router so you can secure your devices in seconds

cactusvpn logo
Revainrating 5 out of 5

1 Review

CactusVPN is a virtual private network enabling users to encrypt their internet connections.

discriminat firewall logo
Revainrating 5 out of 5

1 Review

The discrimiNAT upgrades native GCP Firewall Rules and AWS Security Groups to support hostnames/FQDNs, for a scalable egress filtering solution. It works by monitoring and blocking traffic without decryption, with our Deep Packet Inspection engine, inline as a high-availability NAT Instance on the egress of your VPC network. Gets your cloud application…

Read more about this company
remote desktop firewall logo
Revainrating 5 out of 5

1 Review

RDPFirewall try to protect your server or computer while using remote desktop service. RDPFirewall futures : 1 - Detect and block brute force attacks 2 - Black Countries 3 - OTP for your remote desktop 4 - Detect Suspected Users 5 - Change remote desktop port 6 - Black times

snok logo
Revainrating 5 out of 5

1 Review

Industrial cybersecurity. Secure-NOK provides innovative solutions to solve Industrial Cybersecurity needs.

venusense intrusion prevention and management system (ips) logo
Revainrating 5 out of 5

1 Review

Venusense intrusion prevention system (IPS) can recognize and block attacks and viruses, such as the Web attack, worm, spy software, Trojan, overflow attack, database attack, advanced threat attack, and brute-force, which make up the deficiencies of deep prevention at the network layer.

netcyte logo
Revainrating 5 out of 5

1 Review

NetCyte is a next-generation network access control solution that provides dynamic and adaptive access control with unparalleled threat discovery.

portnox clear logo
Revainrating 5 out of 5

1 Review

Is a leading risk management, access control and network visibility solution delivered seamlessly as a cloud service

mixmode logo
Revainrating 5 out of 5

1 Review

MixMode is a cybersecurity anomaly detection platform that combines the functionality of SIEM, NDR, NTA and UEBA in a single purpose built platform for the modern SOC. MixMode is focused on solving three primary issues for the Security Operations Center: providing next-generation threat and anomaly detection, surfacing zero-day attacks and improving…

Read more about this company
software defined labs (sdl) logo
Revainrating 5 out of 5

1 Review

Virtual appliance that simplifies management, automation, and orchestration of network and lab resources.

highbar ss8 logo
Revainrating 5 out of 5

1 Review

Easily and cost-effectively comply with regulatory requirements with active, passive and hybrid collection options and global handover support for any type of network.

languardian logo
Revainrating 5 out of 5

1 Review

NetFort LANGuardian is an inspection software that monitors network and user activity.

perimeter 81 logo
Revainrating 5 out of 5

1 Review

Cloud and mobility are creating a mega shift in traditional network security, and hardware-based solutions are not capable of accommodating this migration. Unlike legacy solutions, Perimeter 81’s Zero Trust Secure Network as a Service utilizes a Software-Defined Perimeter architecture, offering greater network visibility, seamless onboarding, and full…

Read more about this company
assetnote logo
Revainrating 5 out of 5

1 Review

Assetnote automatically maps your external assets and monitors them for changes and security issues to help prevent serious breaches.

deep watch identify logo
Revainrating 5 out of 5

1 Review

deepwatch Identify solutions serve as the foundation of mature SecOps programs by discovering the assets, threats, and vulnerabilities relevant to your organization. Leverage deepwatch Identify solutions to establish confidence in your areas of responsibility while continuously updating you on the changes impacting your organization.

waverley labs sdp logo
Revainrating 5 out of 5

1 Review

Waverley Labs then worked closely with CSA and DHS to develop the industry’s first Open Source reference implementation for version 1 specification for DDoS.

zywall usg/40/40w/60/60w logo
Revainrating 5 out of 5

1 Review

ZyWALL USG/40/40W/60/60W offers unbeatable protection from malware and unauthorized applications for smaller-sized enterprises.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.