Header banner
Revain logoHome Page

Security

All results
finalcode for box logo
Revainrating 5 out of 5

3 Review

Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.

alcide logo
Revainrating 5 out of 5

3 Review

SECURE KUBERNETES & SERVICE MESH. ANYWHERE. Bridge Security & DevOps with code-to-production security for Kubernetes deployments

outscan logo
Revainrating 5 out of 5

3 Review

OUTSCANTM is an automated vulnerability management solution that scans and secures external networks, allowing companies to protect sensitive data. It analyzes perimeters, detects vulnerabilities, notifies organizations and gives remediation solutions to prevent cybercriminals from penetrating their networks. OUTSCANTM can fit any size organizations. It…

Read more about this company
caveonix cloud logo
Revainrating 5 out of 5

3 Review

cavirin logo
Revainrating 5 out of 5

3 Review

Cavirin provides security management across physical, public, and hybrid clouds, supporting AWS, Microsoft Azure, Google Cloud Platform, VMware, KVM, and Docker.

cloudaware logo
Revainrating 5 out of 5

3 Review

CloudAware cross-references data from multiple systems and can pinpoint specific servers that are not monitored, backed up or have reported security vulnerabilities.

aspen mesh logo
Revainrating 5 out of 5

3 Review

Aspen Mesh simplifies service mesh. Our tested, hardened and supported distribution of Istio makes it easy for enterprises to get the power of Istio without the headaches.

powerdmarc logo
Revainrating 5 out of 5

3 Review

Protect your email from Business Email Compromise and Spoofing Powered by AI and Threat Intelligence. Using DMARC/MTA-STS/TLS-RPT/DKIM/SPF.

godmarc logo
Revainrating 5 out of 5

3 Review

DMARC in GoDMARC stands for Domain-based Message Authentication, Reporting & Conformance, which is one of the best security software that prevents email phishing by blocking unauthorized emails before they can reach your company, its employees, consumers, partners and so on. GoDMARC Dashboard helps you identify and whitelist promotional or transactional…

Read more about this company
venafi tls protect logo
Revainrating 5 out of 5

3 Review

Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.

securetrust certificate lifecycle management logo
Revainrating 5 out of 5

3 Review

SecureTrust Managed PKI Portal automates the tedious to ensure your organization's up-time, compliance and efficient use of internal staff.

folder lock logo
Revainrating 5 out of 5

3 Review

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

comodo certificate manager logo
Revainrating 5 out of 5

3 Review

vsec:cms c-series logo
Revainrating 5 out of 5

3 Review

ondmarc by red sift logo
Revainrating 5 out of 5

3 Review

OnDMARC helps users to implement and maintain DMARC - the email authentication protocol that blocks domain-based phishing attacks. Our partnerships with Verified Mark Certificate (VMC) Providers also supports customers to deploy BIMI. OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to…

Read more about this company
ironscales logo
Revainrating 5 out of 5

3 Review

Email security continues to be a significant challenge for companies . Attackers introduce billions of new phishing emails every single day. IRONSCALES combines human and automated intelligence to fight back against BEC, ATO, Credential Theft Protection, Fake Login Pages and more, while also significantly reducing the excessive amount of time and effort…

Read more about this company
data security platform logo
Revainrating 5 out of 5

3 Review

Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.

supertokens logo
Revainrating 5 out of 5

3 Review

SuperTokens manages user sessions in the most secure way possible by minimising the chances of session attacks (such as XSS, Session fixation, compromised JWT signing key, CSRF etc) and enabling robust ways of detecting session theft (we use rotating refresh tokens - as recommended by IETF in RFC 6819). We’ve made it highly customisable and incredibly…

Read more about this company
hoxhunt logo
Revainrating 5 out of 5

3 Review

Hoxhunt is a People-First Cybersecurity Platform that protects organizations and their employees from the risk of cyber attacks. Hoxhunt empowers employees with the skills and confidence to recognize and respond to attacks wherever they arise and provides security teams with real-time visibility into threats so they can react fast and limit their spread…

Read more about this company
siteowl logo
Revainrating 5 out of 5

3 Review

SiteOwl is the world’s first unified, digital platform for security integrators and system managers that provides an end-to-end solution to help users design, install, and manage their security systems. SiteOwl brings modern technology to the job site by equipping designers, field technicians, and integrator customers with a suite of mobile and…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.