138 results
Why Capterra is free
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. Learn more about Falcon
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent. Learn more about Falcon
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivir...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With O...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Learn more about Kiuwan
Manage your application's vulnerabilities with Static Application Security Testing (SAST) and Software Composition Analysis (SCA) by Kiuwan. It's easy to set up and use. Scan your code locally, then share results in the cloud. Tailored reports with industry standard security ratings help you make informed decisions, reduce technical debt, and mitigate risk. Kiuwan provides comprehensive language coverage, integrates with leading IDEs, and fits seamlessly into your CI/CD/DevSecOps process. Learn more about Kiuwan
Manage your application's vulnerabilities with Static Application Security Testing (SAST) and Software Composition Analysis (SCA) by Kiuwan. It's easy to set up and use. Scan your code locally, then sh...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Simplified Vulnerability Remediation Learn more about TOPIA
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more. TOPIA enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch. Learn more about TOPIA
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more. TOPIA enables companies to analyze, pri...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Highly automated vulnerability management solution drawing on years of consulting, suitable for any IT footprint from SME to Enterprise Learn more about Autobahn
Autobahn is an innovative solution to measure and improve hacking resistance. Autobahn saves you time and increases your defenses. The platform automates asset discovery, vulnerability scanning, and cyber benchmarking. Most importantly, it provides best-in-class remediation insights. Autobahn is used by companies globally from Fortune500 to SME. We provide suitable packages for every size and security maturity level. Our customers value Autobahn's ease of use and comprehensive insights. Learn more about Autobahn
Autobahn is an innovative solution to measure and improve hacking resistance. Autobahn saves you time and increases your defenses. The platform automates asset discovery, vulnerability scanning, and c...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Detectify automates the knowledge of the best ethical hackers in the world to secure web apps. Stay on top of threats with Detectify. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilities within the OWASP top 10 categories and beyond. Detectifys Deep Scan and Asset Monitoring services identifies security vulnerabilities and misconfigurations across all layers of your internet-facing assets and keeps you up to date for the latest threats. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilit...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
SecPod SanerNow is the best endpoint management and security solution. It's on-cloud, supports all OSs, affordable, and easy to use. Learn more about SanerNow
SecPod SanerNow is the best ALL-IN-ONE endpoint management and security solution which supports operations on all major OSs like Windows, MAC & Linux from a cloud-based platform. The primary features of SanerNow include patch Management, vulnerability management, security compliance management, IT asset management, endpoint management, and endpoint detection & response. Achieve ALL your cyber hygiene goals with SanerNow and make your network cyberattack-proof! Learn more about SanerNow
SecPod SanerNow is the best ALL-IN-ONE endpoint management and security solution which supports operations on all major OSs like Windows, MAC & Linux from a cloud-based platform. The primary features o...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities Learn more about Syxsense
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Learn more about Syxsense
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help secur...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Learn more about Centraleyezer
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Learn more about Centraleyezer
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability As...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee d...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, su...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform unifies security and compliance across servers, containers, and IaaS resources across any mix of public, private, hybrid, and multi-cloud environments including Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Halo’s extensive automation capabilities streamline and accelerate workflow Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform un...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
The SaaS platform for vulnerability remediation orchestration. Learn more about Vulcan Cyber
Vulcan Cyber is the industry's first vulnerability remediation platform, built to help security and IT ops teams collaborate to secure digital business. Vulcan SaaS closes gaps between detection and remediation to reduce vulnerability dwell time and business risk. Vulcan is used to orchestrate the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. Learn more about Vulcan Cyber
Vulcan Cyber is the industry's first vulnerability remediation platform, built to help security and IT ops teams collaborate to secure digital business. Vulcan SaaS closes gaps between detection and re...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
SysKit Insights is a performance monitoring and troubleshooting tool for SharePoint On-Premises and SharePoint Online. Learn more about SysKit Insights
SysKit Insights is a web and desktop app that saves admins hours of troubleshooting time by gathering all ULS, SQL, and Windows Event logs in one dashboard. Powerful filters will help you find the logs faster, while intelligent alerting will notify you of any specific event. Insights detects non-optimized CSS or HTML content, oversized images, and JavaScript files to calculate the page health score. Insights tracks 30+ SharePoint specific counters so you can detect server slowdowns. Learn more about SysKit Insights
SysKit Insights is a web and desktop app that saves admins hours of troubleshooting time by gathering all ULS, SQL, and Windows Event logs in one dashboard. Powerful filters will help you find the logs...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
SaaS based solution that assists with data visualization through live presentations, KPIs, heatmaps, waffle charts and more.
Elastic Enterprise Search is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Beats make up the "Elastic Stack" developed by Elastic. Hosted Elasticsearch (Elastic Cloud) is also provided.
Elastic Enterprise Search is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Bea...
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help securi...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Data management and backup solution that helps businesses manage data across cloud environments using automated protection policies.
Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize applications, automate protection policies, recover from Ransomware, search and analyze application data at scale on one platform. From days to seconds.
Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
A tool that deploys software patch and updates simultaneously to multiple Windows PCs.
A tool that helps system admins deploy software patches and updates, execute scripts, and remotely execute commands to multiple Windows PCs.
A tool that helps system admins deploy software patches and updates, execute scripts, and remotely execute commands to multiple Windows PCs....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Security management platform offering fully integrated security controls for threat detection and compliance management.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the O...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Automate configuration management across virtual and physical servers, workstations, and desktops.
Automate configuration management across virtual and physical servers, workstations, and desktops.
Automate configuration management across virtual and physical servers, workstations, and desktops....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting & more.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, tu...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing int...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Alert Logic's purpose-built security technology & a team of 24/7 MDR security experts empowers companies to resolve any threat.
Alert Logic Managed Detection and Response (MDR) platform is always on, protecting across your organization and delivering unrivaled security value. Offering a level of security that often seems out of reach for companies with limited budget and expertise, Alert Logic helps companies continuously identify and address breaches or gaps before they cause real damage.
Alert Logic Managed Detection and Response (MDR) platform is always on, protecting across your organization and delivering unrivaled security value. Offering a level of security that often seems out of...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
One-stop platform for managing machine digital IDs by discovering, organizing, and tracking digital certificates on autopilot.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview, easy-to-navigate inventory, expiration reporting and many more.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provid...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnera...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and licen...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Helping Security Teams, Enterprises, and MSSPs Prioritize and Respond to What Really Matters.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which includes co-editing several industry standards such as ISO 27043 and ISO 30121. Its flagship product, IncMan SOAR, is multi-patented, and it has been adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in EMEA Americas and APAC.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which ...
Vulnerability management to identify security vulnerabilities in enterprise networks suitable for any application area.
Greenbone solutions are based on open source software. They analyze IT networks for vulnerabilities and provide security reports and remediation advice before attackers can exploit the security holes. Part of the solutions is a daily, automatic security update. Our vulnerability management is available as a physical, virtual and cloud-based solution and is a key security component in over 50,000 professional installations.
Greenbone solutions are based on open source software. They analyze IT networks for vulnerabilities and provide security reports and remediation advice before attackers can exploit the security holes. ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It pro...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability manageme...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Automated testing that sends you weekly security reports generated after testing the site.
Automated testing that sends you weekly security reports generated after testing the site.
Automated testing that sends you weekly security reports generated after testing the site....
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Crashtest Security provides the simplest blackbox web app vulnerability scanning experience with advanced scan targets & automation.
The Crashtest Security Suite is an web application vulnerability scanner, designed with DevOps in mind. We are made & hosted in Germany and you can be assured of excellently engineered software and a low false-positive rate. We use the most advanced crawlers including market-leading Javascript crawling technology to provide deep scans of your applications and APIs. Our product is designed to be user friendly without compromising on capability or scan scope.
The Crashtest Security Suite is an web application vulnerability scanner, designed with DevOps in mind. We are made & hosted in Germany and you can be assured of excellently engineered software and a l...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software....
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software.
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step of the SDLC, which leads to less vulnerabilities, reduced fixes to older code, lower costs and, most importantly, far more secure applications. Allows to achieve PCI DSS Compliance. Free Demo available on web site.
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step o...
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowere...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Neverfail Cloud Backup and Recovery, built on Veeam®, provides fast, flexible, and reliable recovery of server applications and data.
Neverfail Cloud Backup and Recovery, built on Veeam, provides fast, flexible, and reliable recovery of server applications and data. Support for virtual, physical and cloud servers enables IT to deliver offsite disaster recovery (DR) services and ensure IT availability with the #1 VM Backup for VMware vSphere and Microsoft Hyper-V.
Neverfail Cloud Backup and Recovery, built on Veeam, provides fast, flexible, and reliable recovery of server applications and data. Support for virtual, physical and cloud servers enables IT to delive...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management
Modular system for automated OS and software deployment, patching, compliance, device inventory & configuration, MDM, backup/restore.
Modular, scalable and highly cost-effective UEM system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select and add modules as needed for OS Install & Cloning, Patch Management, Vulnerability Management, EMM & MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
Modular, scalable and highly cost-effective UEM system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select ...
  • Vulnerability Assessment
  • Risk Management
  • Web Scanning
  • Network Scanning
  • Asset Discovery
  • Patch Management