Header banner
Revain logoHome Page
Office software assists companies and individuals to better protect their assets. There are Cloud Security, System Security, Application Security, Confidentiality Security, as well as other types of security software. Some tools offer high degrees of customization, while others focus on keeping things simple. Reviews in this category provide information and ratings about all the popular tools.
All results
proxy-store.com logo
Revainrating 4.5 out of 5

90 Review

Individual proxies rental service

vicarius logo
Revainrating 5 out of 5

4 Review

Efficiently reduce organizational security risk With hundreds of new software and OS vulnerabilities detected each month, reducing organizational security risk can become overwhelming. TOPIA's vulnerability management toolbox provides a smart prioritization and fast remediation with or without a security patch. All-in-one vulnerability managementโ€ฆ

Read more about this company
northstar navigator logo
Revainrating 5 out of 5

4 Review

flowcrypt logo
Revainrating 5 out of 5

4 Review

FlowCrypt is a Chrome extension for Gmail encryption.

citicus one logo
Revainrating 5 out of 5

4 Review

Citicus ONE enables organizations to measure and manage the risk posed by the IT systems, suppliers, sites and other key assets and processes on which they depend, using a methodology that reflects over 25 years of research into the factors that drive risk up or down and those which make risk programmes successful.

jupiterone logo
Revainrating 5 out of 5

4 Review

Modern security and cloud governance is a data and visibility problem that needs an engineering solution. JupiterOne is a knowledge base for all your cyber assets and relationships, a platform for security engineering and automation, a virtual assistant to the security operations team, and a lightweight system to achieve compliance and complete cyberโ€ฆ

Read more about this company
snapatch logo
Revainrating 5 out of 5

4 Review

SnaPatch is an add-on that utilises Microsofts System Centre Configuration Manager (SCCM) to patch users' virtual server fleets.

wybuild logo
Revainrating 5 out of 5

4 Review

wyBuild is a tool tool for managing versions of applications and make update patches, the software also includes a built-in translating editor.

cybsafe logo
Revainrating 5 out of 5

4 Review

CybSafe measures and tracks security behaviour to improve security controls and awareness activities. Human error is a factor in more than 90% of security incidents. Most of them are avoidable. But they still happen because organisations focus on awareness training and phishing simulations. CybSafe helps you go further. By measuring 70+ securityโ€ฆ

Read more about this company
hook security logo
Revainrating 5 out of 5

4 Review

With Hook Security, you can run a fully automated security awareness training program that creates a positive and healthy security culture for companies, mitigating risk while entertaining employees. Run automated phishing testing, enroll your users in effective security awareness training courses, and generate reports that actually tell you how you'reโ€ฆ

Read more about this company
vigitrust logo
Revainrating 4.5 out of 5

4 Review

VigiTrust is a GRC (Governance, Risk, and Compliance) SaaS service provider enabling organisations to achieve, maintain and continuously monitor compliance with industry standards & laws such as PCI DSS, Vendor Risk Management, Third Party Assurance, EU GDPR, HIPAA, ISO 27001 etc.

security gateway logo
Revainrating 4.5 out of 5

4 Review

Security Gateway protects all email platforms including Microsoft Exchange, Office 365, and others. Let our team of email security experts take the headache out of managing your company's email security needs. Security Gateway uses the latest email threat detection technology and policy enforcement tools to keep good emails flowing to and from your usersโ€ฆ

Read more about this company
startmail logo
Revainrating 4.5 out of 5

4 Review

StartMail offers a secure way to send emails, while maintaining a high standard of privacy. The intended purpose is to provide their users with maximum control and visibility, without having to trade in their private information.

phishingtackle.com logo
Revainrating 4.5 out of 5

4 Review

British automated phishing & training platform

panther logo
Revainrating 4.5 out of 5

4 Review

Panther is a security analytics platform built for the cloud and designed to alleviate the problems of traditional SIEMs. Security teams love Panther because of its detections-as-code, extreme scalability, and low operational overhead. Trusted by Silicon Valley leaders like GitLab, Figma, Earnin, and many more. Loved by cloud-first security teams:โ€ฆ

Read more about this company
zscaler cloud platform logo
Revainrating 4.5 out of 5

4 Review

Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.

cetbix information security management system logo
Revainrating 4.5 out of 5

4 Review

CETBIX Risk Assessment and Management platform which is also a part of the Cetbix Information Security Management System model is seen as a better choice for organizations looking for ISMS that relates to data security. In the cybersecurity zone, the CETBIX standards for best practice have been developed that provide guidance to organizations wishing toโ€ฆ

Read more about this company
cfisa security awareness training logo
Revainrating 4.5 out of 5

4 Review

CFISA provides in-person and online security awareness training, made simple, for employees. Employee Cyber Security Training not only demonstrates that your business takes the confidentiality of its clients seriously, but they can be the difference between keeping your business up and running, or seeing it crippled by a cyber-attack or a lapse inโ€ฆ

Read more about this company
falco operator logo
Revainrating 4 out of 5

4 Review

Define what activity is considered normal for your containerized applications & be notified when an application deviates.

enzoic account takeover protection logo
Revainrating 4 out of 5

4 Review

Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare usersโ€™ credentials to large databases of leaked credentials in order to find a match and alert the user to their exposedโ€ฆ

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.