Suomi Näytä paikalliset tuotteet
235 tulosta
DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Lue lisää tuotteesta Kiuwan
Know your application's vulnerabilities. Add Kiuwan Static Application Security Testing (SAST) and Software Composition Analysis (SCA) to your source code management. It's easy to set up and use. Scan your code locally, then share results in the cloud. Tailored reports with industry standard security ratings help you reduce technical debt and mitigate risk. Kiuwan provides comprehensive language coverage, integrates with leading IDEs, and fits seamlessly into your CI/CD/DevSecOps process. Lue lisää tuotteesta Kiuwan

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Crashtest Security is a DAST vulnerability scanner helping you automate your security scanning and achieve protection at DevOps speed. Lue lisää tuotteesta Crashtest Security
Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation. We offer the most advanced crawling options. Our software is able to directly detect attack vectors in all web applications: Revolutionary Single-Page application scanning Painless Multi-Page application setup Documentation-based API scanning Our software is user-friendly yet powerful and provides detailed and accurate vulnerability reports. Lue lisää tuotteesta Crashtest Security

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Proactive Best Practice & Security Analysis for AWS, Azure, Kubernetes, VMware & Windows & Linux OS. Lue lisää tuotteesta Runecast Analyzer
An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere. Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. Runecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance. Lue lisää tuotteesta Runecast Analyzer

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Unified Vulnerability Management. Remotely & automatically mitigate cyber threats in your environment - with or without security patch. Lue lisää tuotteesta TOPIA
Remotely & automatically mitigate threats in your digital environment. TOPIA is a consolidated cloud-based vulnerability management platform that efficiently reduce your organizational cyber risk. Lue lisää tuotteesta TOPIA

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Rencore Governance gives you maximum flexibility and efficiency in your governance approach for the Microsoft cloud. Lue lisää tuotteesta Rencore Governance
Rencore Governance provides you with maximum flexibility and efficiency in your governance approach for Microsoft 365, Microsoft Teams, SharePoint, Azure, and Power Platform. Monitor end-user activity, discover deviations from your governance plan and automate fixing. Lue lisää tuotteesta Rencore Governance

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Lue lisää tuotteesta Centraleyezer
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Lue lisää tuotteesta Centraleyezer

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Lue lisää tuotteesta Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Lue lisää tuotteesta Dark Web ID

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
HackerOne is the industry standard for hacker-powered security. Lue lisää tuotteesta HackerOne
Tap into the experience of hundreds of security researchers helping you identify vulnerabilities in your digital landscape. Whether you need a Vulnerability Disclosure Program (VDP) for compliance or simply want to reduce the risk of security incidents, HackerOne can help you establish a responsible disclosure program that fits where your organization needs to go. Lue lisää tuotteesta HackerOne

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times. Lue lisää tuotteesta Pentera
Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations Lue lisää tuotteesta Pentera

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Lue lisää tuotteesta ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Lue lisää tuotteesta ManageEngine Vulnerability Manager Plus

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
The most proven open source scanning solution to help organizations understand their license compliance and security vulnerability risk Lue lisää tuotteesta FlexNet Code Insight
An on-premise Software Composition Analysis solution using automated scans to help organizations understand their license compliance and security vulnerability exposure to open source packages. FlexNet Code Insight easily provides users with a Software Bill of Materials from across the software supply chain and offers continuous monitoring of assets, proactive vulnerability alerts, and recommended remediation actions. The solution helps development teams deliver secure products to customers whil Lue lisää tuotteesta FlexNet Code Insight

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets. Lue lisää tuotteesta Holm Security VMP
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Lue lisää tuotteesta Holm Security VMP

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
esChecker verifies runtime defenses and protections against reverse engineering. Lue lisää tuotteesta esChecker
esChecker, your MAST automation companion Reduce the time wasted to qualify your Mobile Application Protections thanks to MAST automation (SAST static tests and DAST dynamic tests). The slow, manual days of pentesting mobile applications are over. esChecker is an online tool, combined with a set of APIs and plugins to facilitate your recurring security testing, designed by world-class pentesters. The tool follows OWASP standards. Lue lisää tuotteesta esChecker

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform. Lue lisää tuotteesta Malwarebytes for Business

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Lue lisää tuotteesta WebTitan

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
PDQ Deploy is the best way to automate your patch management. Update software, deploy scripts, and make configuration changes.
Automate your patch management with PDQ Deploy. Select the software you want to deploy (we have a pre-built library of over 200), specify which machines require updates, and set a preferred schedule for deployment. PDQ Deploy will automatically and silently apply updates — all without bothering end users. Lue lisää tuotteesta PDQ Deploy

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Lue lisää tuotteesta Nessus

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
System Mechanic Ultimate Defense is designed to provide a complete solution for all PC optimization needs.
System Mechanic Ultimate Defense provides PC performance optimization, system cleaning and protection against malicious attacks. This program helps prevent PC crashes, freezes and poor performance with two simple steps:1. System Mechanic cleans up junk files and shortcuts from your hard drive to free up space. System Mechanic removes registry errors that slow down your PC. Lue lisää tuotteesta System Mechanic Ultimate Defense

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time. Lue lisää tuotteesta Elastic Stack

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus endpoint security all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Lue lisää tuotteesta Syxsense

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Remediate discovered vulnerabilities and ensure proper system configurations with automated cyber hygiene from Automox.
Streamline vulnerability management by automating custom cyber hygiene tasks and defining policies that enforce system compliance across Windows, macOS, and Linux systems. Define policies that enforce system compliance with the latest OS and software updates, and configuration controls. Lue lisää tuotteesta Automox

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Lue lisää tuotteesta Beagle Security

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Tech-enabled website and vulnerability management service that helps businesses manage server health checks, WordPress staging and more
Tech-enabled website and vulnerability management service that helps businesses manage server health checks, WordPress staging and more. Lue lisää tuotteesta SiteGround

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Within minutes, Orca's agentless platform detects vulnerabilities across the cloud and prioritizes your riskiest vulnerabilities.
Orca leverages 20+ vulnerability data sources to discover and prioritize vulnerabilities across your entire cloud estate within minutes of deployment. For each vulnerability, Orca provides an asset map that visualizes the relationships between assets, enabling effective context-based risk prioritization and efficient remediation. Don't rely on traditional vulnerability management solutions for your data—they aren't built for the cloud, are resource intensive, and lead to gaps in your coverage. Lue lisää tuotteesta Orca Security

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Data management and backup solution that helps businesses manage data across cloud environments using automated protection policies.
Rubrik is a backup and recovery solution best suited for midsized to enterprise businesses (500+ employees). Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize applications, automate protection policies, recover from Ransomware, search and analyze application data at scale on one platform. From days to seconds. Lue lisää tuotteesta Rubrik

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Lue lisää tuotteesta Acunetix

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report. Lue lisää tuotteesta AppTrana

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Qualys VMDR – All-in-One Vulnerability Management, Detection, and Response.
Qualys VMDR enables organizations to automatically discover every asset in their environment, including unmanaged assets appearing on the network, inventory all hardware and software, and classify and tag critical assets. VMDR continuously assesses these assets for the latest vulnerabilities and applies the latest threat intel analysis to prioritize actively exploitable vulnerabilities. Lue lisää tuotteesta Qualys Cloud Platform

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.
Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company. A bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities. Lue lisää tuotteesta Hackrate Bug Bounty Platform

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies. Lue lisää tuotteesta Privileged Access Security Solution

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Falcon Spotlight provides real-time visibility across your enterprise, giving you relevant and timely information to reduce exposure.
As part of an integrated platform that prevents exploits and post-exploit activity, Falcon Spotlight allows you to research common vulnerabilities and exposures (CVEs) to examine threat actor profiles and targets. Falcon Spotlight provides real-time visibility across your enterprise giving you relevant and timely information you need to reduce your exposure to attacks with zero impact on your endpoints. Lue lisää tuotteesta Falcon

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Invicti Enterprise is a comprehensive automated web vulnerability scanning solution.
Invicti is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence. Lue lisää tuotteesta Invicti

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
It is a configuration management solution that helps businesses handle compliance, audit, security analysis, and more.
It is a configuration management solution that helps businesses handle compliance, audit, security analysis, and more. Lue lisää tuotteesta AWS Config

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
DataDome provides state-of-the-art protection against online fraud and bot attacks for mobile apps, websites and APIs.
DataDome protects mobile apps, websites and APIs from online fraud and bot attacks, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. Our AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time. Lue lisää tuotteesta DataDome

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. Lue lisää tuotteesta KACE

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Lue lisää tuotteesta DriveStrike

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Accurately scan vulns in 5 mins. Assess, Prioritize and Immediately Patch them with the SanerNow Vulnerability Management Software.
In > 5 MIN, SanerNow automatically and accurately scans your entire network. Post that it assesses and prioritizes vulnerabilities based on their severity i.e. CVSS score. SanerNow comes with the world's largest SCAP repository and with 160,000+ continuous checks. These features ensure that your organization remains secure from ever-evolving cyber attacks. With SanerNow, you can also patch vulnerabilities instantly. It supports all OSs and 400+ Third-Party Apps (Most in industry). Lue lisää tuotteesta SanerNow

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting & more.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction. Lue lisää tuotteesta InsightVM

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Snyk's Developer Security Platform puts security expertise in the toolbox of every developer.
Snyk is the leader in developer security. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST. Lue lisää tuotteesta Snyk

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Automate configuration management across virtual and physical servers, workstations, and desktops.
Automate configuration management across virtual and physical servers, workstations, and desktops. Lue lisää tuotteesta vRealize Automation

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Lue lisää tuotteesta USM Anywhere

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Alert Logic is the industry's first SaaS-enabled managed detection and response provider, delivering unrivaled security value.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas. Lue lisää tuotteesta Alert Logic MDR

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Helping Security Teams, Enterprises, and MSSPs Prioritize and Respond to What Really Matters.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which includes co-editing several industry standards such as ISO 27043 and ISO 30121. Its flagship product, IncMan SOAR, is multi-patented, and it has been adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in EMEA Americas and APAC. Lue lisää tuotteesta IncMan SOAR

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Probely is a DAST scanner designed to empower Security and DevOps teams working together to reduce the security risk of web apps & APIs
Probely is the premier cloud-based automated application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. With over 30 000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them. Lue lisää tuotteesta Probely

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
The first Click&Play Cyber Security platform. CyLock finds out if your systems are hacker safe in one click!
CyLock Anti-Hacker is a software designed to defend your systems from hacker attacks, identifying weaknesses on your systems and websites, providing information to address vulnerabilities (those used by cyber criminal to access to your computers). Lue lisää tuotteesta CyLock Anti-Hacker

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret Lue lisää tuotteesta Cyber Chief

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats. Lue lisää tuotteesta ArcSight

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Lue lisää tuotteesta Veriato RansomSafe

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
One-stop platform for managing machine digital IDs by discovering, organizing, and tracking digital certificates on autopilot.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview, easy-to-navigate inventory, expiration reporting and many more. Lue lisää tuotteesta Keyhub

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta
AppSec Phoenix is a next-generation XSPM Extensive Security Posture management correlating Application Security and Cloud Security.
Vulnerability Management: we help organizations get in control of their vulnerabilities regardless of the source. We cover - Infrastructure (Container, Cloud, Server) - Application Security (SAST, DAST, SCA) Pentesting/Red Team Consolidation: Pentest Results, Red Team, Burpsuite Results As a cross-domain Vulnerability management solution, We help scaling security and 10X devsecops professionals We help engineer focus on what's matter most We empower executives to set risk-based Lue lisää tuotteesta AppSec Phoenix

Ominaisuudet

  • Haavoittuvuuksien määritys
  • Riskien hallinta
  • Resurssien tietojenkeruu
  • Korjaustiedostojen hallinta