Header banner
Revain logoHome Page

Security

All results
nopsec unified vrm logo
Revainrating 5 out of 5

3 Review

NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that matter. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence…

Read more about this company
vulcan cyber logo
Revainrating 5 out of 5

3 Review

Vulcan Cyber has developed the industry’s first vulnerability remediation orchestration platform, built to help businesses reduce cyber risk through measurable cloud and application security. The Vulcan platform orchestrates and tracks the remediation lifecycle from scan to fix by prioritizing vulnerabilities, curating and delivering the best remedies…

Read more about this company
hackedu secure coding training logo
Revainrating 5 out of 5

3 Review

HackEDU’s number one goal is to reduce vulnerabilities in code and we do that through best-in-class secure coding training. HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and…

Read more about this company
cywaria cyber range logo
Revainrating 5 out of 5

3 Review

Cyber Security Simulation Platform. Cloud-based and fully customizable Cyber Range. Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment of Security Professionals. Cympire's cloud native platform empowers clients to improve their response to real-life cyber attacks in a true to life environment…

Read more about this company
right-hand cybersecurity logo
Revainrating 5 out of 5

3 Review

Right-Hand helps you to make your employees defensible against cyber-threats.

cycognito logo
Revainrating 5 out of 5

3 Review

CyCognito’s global bot network operates at nation-state scale, using sophisticated reconnaissance techniques to continuously scan, map and fingerprint billions of digital assets all over the world.

hackuity.io logo
Revainrating 5 out of 5

3 Review

Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enriches them so security practitioners can, at last, create risk-driven remediation plans and align their…

Read more about this company
strobes logo
Revainrating 5 out of 5

3 Review

Risk-based Vulnerability Management Platform. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization.

safecode logo
Revainrating 5 out of 5

3 Review

Security engineering training by SAFECode is an online community resource offering free software security training courses delivered via on-demand webcasts.

mindsett awareness toolbox logo
Revainrating 5 out of 5

3 Review

Complete security awareness platform incorporating over 200 elearning awareness lessons, phishing capabilities and advanced statistics. Security awareness training content in presented following e-learning and pedagogy good practices. All training components can be customized in the security awareness platfom.

the cybermaniacs logo
Revainrating 5 out of 5

3 Review

Cybermaniacs creates cyber-secure humans, one laugh at a time. Our unique platform and approach helps everyone at your company build the cyber habits needed to stay cyber safe. These days, a computer can be more dangerous in the hands of people than heavy machinery. With cybercrime and remote working challenges, your workforce must now learn to stay…

Read more about this company
scipp international logo
Revainrating 5 out of 5

3 Review

Scipp International offers a choice of technical and non-technical security awareness programs for every employee, including web application developers who use, build, administer, or have access to your web applications.

counter fraud training logo
Revainrating 5 out of 5

3 Review

Peter Darby Associates is a specialist counter fraud training and consultancy company. Peter and his team of associates have over forty years experience working in the counter fraud investigation community, including the design, development and delivery of professional counter fraud training. Our courses are aimed at counter fraud professions…

Read more about this company
junglemap logo
Revainrating 5 out of 5

3 Review

Junglemap is a new type of user awareness training tool. It uses a technique called 'NanoLearning', that offers short, simple lessons over a period of time, so users aren't flooded with too much information.

runecast analyzer logo
Revainrating 5 out of 5

3 Review

Runecast adds value, security & stability to AWS, Azure, Kubernetes & VMware Runecast Analyzer is a predictive and actionable support intelligence solution for AWS, Azure, Kubernetes and VMware admins. It mitigates lost time and other costs incurred from troubleshooting often-complex issues only in a limited and reactive capacity by proactively scanning…

Read more about this company
ermetic logo
Revainrating 5 out of 5

3 Review

The Ermetic cloud security platform governs identities and access in AWS, Azure and Google Cloud. With Ermetic, enterprises can harden their cloud applications and address what Gartner has called the biggest cause of security failures in IaaS/PaaS environments: misconfiguration of identities, access and privileges. Through continuous analysis of…

Read more about this company
global management console logo
Revainrating 5 out of 5

3 Review

The global management console provides single point-of-control of multi-PoliWall TIG architecture--whether TIG is on premise, on a virtual machine, or in the cloud.

octiga logo
Revainrating 5 out of 5

3 Review

Because they don’t know how, they don’t think it will happen to them or they just can’t afford the consultants.

saasment saas security logo
Revainrating 5 out of 5

3 Review

Fully automated security marketplace to help digital businesses protect against cyber threats and data loss. Companies are now highly dependent on their digital environment for critical business functions like file sharing, collaboration, code management, and customer relationship. An emerging challenge for these companies is how to stay secure while…

Read more about this company
cpdone logo
Revainrating 5 out of 5

3 Review

As a cloud based compliance management software, CPDone was designed to work across a global workforce, allowing businesses to monitor various aspects of different compliance initiatives. The platform provides board to front line visibility on policy & professional development initiatives. A comprehensive and constantly updated view of weaknesses and…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.