Header banner
Revain logoHome Page

System Security

All results
red canary logo
Revainrating 4.5 out of 5

2 Review

Red Canary is a security ally enabling every organization to make its greatest impact without fear of cyber attack. The company provides outcome-focused solutions for security operations teams, who rely on Red Canary to detect threats on their endpoint, network, and cloud environments. With Red Canary, security teams can make a measurable improvement to…

Read more about this company
hacknowledge logo
Revainrating 4.5 out of 5

2 Review

Hacknowledge is a Swiss security monitoring solution that will help you shorten the time between breach and detection.

business log logo
Revainrating 4.5 out of 5

2 Review

Log Management suite for IT security and corporate compliance . More than 5000 organizations (small, medium and large companies) have already chosen Business LOG as Log Management Suite for IT security and corporate compliance.

correlog solution suite logo
Revainrating 4.5 out of 5

2 Review

CorreLog is a ISV for cross-platform IT security log management and event log correlation.

truxton logo
Revainrating 4.5 out of 5

2 Review

broadkey logo
Revainrating 4.5 out of 5

2 Review

BROADKEY is a secure key management software solution for IoT security, based on SRAM PUF technology. This patented technology is able to extract identifiers from the uniqueness that is inherent to every piece of silicon. BROADKEY dynamically reconstructs on-chip secret keys without ever storing those keys. SRAM PUF-based keys are bound to a device in…

Read more about this company
logsign next-gen siem logo
Revainrating 4.5 out of 5

2 Review

Logsign delivers automation-driven cyber security solutions and are committed to providing the smartest, easiest-to-use and most affordable cybersecurity detection and response solutions and value-added services. Logsign Next-Gen SIEM is an enterprise-grade SIEM, inline with our premise, it's easy-to-deploy, easy-to-use and affordable unlike the other…

Read more about this company
simbus logo
Revainrating 4.5 out of 5

2 Review

SIMBUS is a complete privacy and security management software that is designed to help any size facility get and maintain compliance.

socradar threatfusion logo
Revainrating 4.5 out of 5

2 Review

SOCRadar ThreatFusion provides a big-data powered threat investigation module to help Threat Intelligence Teams searching for deeper context, real-time threat research and analysis. The suite is fed by massive data sources across surface, deep and dark web from Paste Sites to Underground Dark Web forums. The product also includes API-ready intelligence…

Read more about this company
surfwatch threat analyst logo
Revainrating 4.5 out of 5

2 Review

SurfWatch Threat Analyst is an easy-to-use SaaS product that delivers strategic and operational threat intelligence to help organizations identify adversarial opportunities for attack and proactively mitigate cyber risks.

bitdam logo
Revainrating 4 out of 5

2 Review

BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels. Protecting email (Office 365, G-Suite, MS Exchange), cloud storage (OneDrive, G-Drive, Dropbox, Box etc.) and IM (Slack, Teams, Skype and more) BitDam empowers organizations to collaborate safely.

elasticito logo
Revainrating 4 out of 5

2 Review

Help companies to identify and manage cyber threats that affect their business.

cuckoo sandbox logo
Revainrating 4 out of 5

2 Review

Cuckoo Sandbox is the leading open source automated malware analysis system.You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment.

morphisec logo
Revainrating 4 out of 5

2 Review

Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.

immunity debugger logo
Revainrating 4 out of 5

2 Review

Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.

new zealand forensics logo
Revainrating 4 out of 5

2 Review

belkasoft evidence center logo
Revainrating 4 out of 5

2 Review

Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

zobi logo
Revainrating 4 out of 5

2 Review

Zobi is a software for smart homes which uses AI to go beyond anti-virus and firewall protects, helping protect you and your family from cybercriminals and scammers.

proficio logo
Revainrating 4 out of 5

2 Review

MANAGED DETECTION AND RESPONSE SERVICES INCREASE VISIBILITY AND PROTECTION. REDUCE RISK. Proficio’s Managed, Detection and Response (MDR) solution surpasses the capabilities of traditional Managed Security Services Providers (MSSPs). Our MDR service is powered by next-generation cybersecurity technology and our security experts partner with you to…

Read more about this company
lognostic logo
Revainrating 4 out of 5

2 Review

Companion provides Sales Force Automation and e-Detailing solutions for pharmaceutical companies. It solution empowers the systems not only in Technology but also produce insights to the businesses. Companion encompasses functional modules include the complete life-cycle of field force.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.