Townsend Security headquartered in Olympia is a provider of encryption and key management systems. The vendor states their aim is to help customers achieve … achieve industry standard data protection and meet compliance regulations in less time and at an affordable price.
Search Results
Listings (251-275 of 10,000)
Security Onion is a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management, developed by the company … products include both the Security Onion software and specialized hardware appliances that are built and tested to run Security Onion.…
Allure Security protects brands by finding and stopping online brand impersonation attacks before customers fall victim. … apps. Allure Security’s multi-pronged approach to response – blocklisting, decoy data, and takedown – also can reduce the lifespan of a scam and the damage … Allur…
of security analysts and researchers, who aim to deliver a safely interconnected experience with a suite of solutions that meet the crypto security needs … Uppsala Security headquartered in Singapore built a crowdsourced Threat Intelligence Platform known as the Sentinel Protocol, which is po…
Axis Security is an application security solution that enables organizations to quickly deliver global access to employees, partners, and other stakeholders … through a zero-trust cloud security platform. Unlike legacy solutions that create excess access and unnecessary risk, Axis Security’s …
Beagle Security is a web-based solution that helps to discover website security issues at the right time and address them in the right way, from the Indian
provides content protection and digital rights management (DRM) software solutions to protect videos, documents, images and audio files. Vitrium’s solutions … solutions enable businesses to protect, control and track their confidential, sensitive or revenue-generating content to ensure their …
Picus Security, headquartered in San Francisco, offers Continuous Security Validation and Mitigation as the most proactive approach to ensure cyber-resilience … production environments, providing the insight required to build the right security strategy to better manage complex operations.
Material Security in Redwood City aims to help users secure critical messages without sacrificing productivity. Material automatically classifies and redacts
Abnormal Security, headquartered in San Francisco, offers a secure email gateway to that protects Microsoft 365 and Google Workspace accounts with AI threat … threat detection. The solution is designed to prevent phishing and scams, high-level account impersonation, or supply chain attacks (i…
provide phishing testing and security awareness training designed to create a positive and healthy security culture for the company, mitigating risk while … Hook Security aims to help to reduce the risk of security threats to companies, all while creating a positive and productive company cul…
Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses, aiming to turn … turn employees into a human firewall with simulated attacks and an E-Learning platform with hundreds of preconfigured videos, training, q…
Elevate Security, headquartered in Berkeley and founded in 2017 by two former Salesforce security executives, aims to address one of the most challenging … breach. Elevate Security’s cloud-based platform integrates with other security technologies to identify users most likely to cause a brea…
Sonrai Security delivers enterprise cloud security for companies running on AWS, Azure, and Google Cloud. … Sonrai combines CSPM, CIEM, and data security in one platform. Sonrai enables companies to understand, monitor, and enforce security across public cloud infrastructures
automates vulnerability analysis, prioritization and response, to help organizations make better risk decisions and mitigate vulnerabilities. … analysis, prioritization and response, to help organizations make better risk decisions and mitigate vulnerabilities. Nucleus can manage and monito…
provides next-generation secure access solutions to improve security, productivity, visibility, and usability. Zentry empowers modern enterprises by delivering
manage risk. RSI Security provides cyber engineering, assessment, advisory services, and technical testing to amp up clients' security posture while mitigating … RSI Security is a cybersecurity-focused technology company headquartered in San Diego, that helps private and public sector organiz…
Legit Security is a cyber security company offering a SaaS-based solution that secures an organization’s software supply chain. … enterprise security companies with the visibility and contextual information they need to minimize risk, and provides software development and DevOps leaders &hell…
Polar Security’s DSPM (Data Security Posture Management) platform automatically and continuously discovers, classifies, maps and follows data in real-time … real-time, to provide deep visibility and protection across cloud-native data assets to prevent data vulnerabilities and compliance viol…
The Noname API Security Platform proactively secures environments from API security vulnerabilities, misconfigurations, design flaws, and provides API attack … attack protection with automated detection and response.
Redbot Security, headquartered in Denver, identifies, evaluates, exploits, reports (proof of concept) and provides best practice remediation steps for … applications, systems and networks. They offer Manual Controlled Penetration Testing (MCPT-TM) Real world manual hacking tactics & technique…
Cequence Security is a cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating … consolidating multiple security functions into an open, AI-powered software platform that protects customers’ APIs and web-base…
Emsisoft offers antivirus and anti-malware software for small to medium sized businesses and managed service providers, offering real-time protection technology … technology with a focus on behavioral analysis technology to detect new and unknown threats. The company specializes in a multi-l…
actors, and malicious code. It deploys as software over AWS, Azure, and other public clouds with the goal of replacing complex legacy perimeter security without
solution covers all assets in the user's infrastructure, and services include the monitoring and assessment of any anomalies that arise in the environment … to mid-sized business needs in mind. They assess the user's current setup and provide insight as to which applications may benefit from …
