Security Onion is a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management, developed by the company … products include both the Security Onion software and specialized hardware appliances that are built and tested to run Security Onion.…
Search Results
Listings (251-275 of 10,000)
Skybox Security offers vulnerability and threat management solutions. … automation, and intelligence improve the efficiency and performance of security operations in vulnerability and threat management and firewall and security policy … integrating with 120 networking and security tech…
Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses, aiming to turn … turn employees into a human firewall with simulated attacks and an E-Learning platform with hundreds of preconfigured videos, training, q…
Elevate Security, headquartered in Berkeley and founded in 2017 by two former Salesforce security executives, aims to address one of the most challenging … breach. Elevate Security’s cloud-based platform integrates with other security technologies to identify users most likely to cause a brea…
Sonrai Security delivers enterprise cloud security for companies running on AWS, Azure, and Google Cloud. … Sonrai combines CSPM, CIEM, and data security in one platform. Sonrai enables companies to understand, monitor, and enforce security across public cloud infrastructures
automates vulnerability analysis, prioritization and response, to help organizations make better risk decisions and mitigate vulnerabilities. … analysis, prioritization and response, to help organizations make better risk decisions and mitigate vulnerabilities. Nucleus can manage and monito…
provides next-generation secure access solutions to improve security, productivity, visibility, and usability. Zentry empowers modern enterprises by delivering
Legit Security is a cyber security company offering a SaaS-based solution that secures an organization’s software supply chain. … enterprise security companies with the visibility and contextual information they need to minimize risk, and provides software development and DevOps leaders &hell…
Polar Security’s DSPM (Data Security Posture Management) platform automatically and continuously discovers, classifies, maps and follows data in real-time … real-time, to provide deep visibility and protection across cloud-native data assets to prevent data vulnerabilities and compliance viol…
The Noname API Security Platform proactively secures environments from API security vulnerabilities, misconfigurations, design flaws, and provides API attack … attack protection with automated detection and response.
Redbot Security, headquartered in Denver, identifies, evaluates, exploits, reports (proof of concept) and provides best practice remediation steps for … applications, systems and networks. They offer Manual Controlled Penetration Testing (MCPT-TM) Real world manual hacking tactics & technique…
Cequence Security is a cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating … consolidating multiple security functions into an open, AI-powered software platform that protects customers’ APIs and web-base…
during traffic fluctuations, and provide inherent resilience against hostile load patterns. Bot Management – Detection and defense tools that differentiate … misuse, scraping activity, and credential-based attacks. EU CAPTCHA – Secure websites and APIs against bots, fraud, spam, and credenti…
Eye Security protects small and medium-sized European enterprises from cyber threats and the high costs that follow after a successful attack, offering … background in intelligence services as well as commercial environments. Eye Security states its goal is to unburden SME's with all-in-one s…










