Skip to main content
TrustRadius
      • Applicant Tracking
      • Corporate Learning Management
      • Corporate Volunteering
      • Employee Monitoring
      • HR Management
      • More
      • A/B Testing
      • Ad Serving & Retargeting
      • All-in-One Marketing
      • Content Management
      • Email Marketing
      • More
      • 3D Printing
      • API Management
      • Business Process Automation
      • Cloud Storage
      • Compliance Consulting
      • More
      • Project Management
      • Help Desk
      • Web and Video Conferencing
      • Customer Relationship Management (CRM)
      • Government Contracting
      • Lead Generation
      • Social Commerce
      • Business Intelligence (BI)
      • Calibration Management
      • Collaboration
      • Embedded Business Intelligence (BI)
      • Integrated Workplace Management (IWMS)
      • Accounting
      • Accounting and Tax Services
      • Payment Gateway
      • Spend Management
      • Batch Management Software
      • Mobile App Development
      • Performance Testing
      • Car Rental
      • Estate Planning
      • Insurance Agency Management
      • Medical Billing
      • Certificate Lifecycle Management
      • Secure Access Service Edge (SASE)
    • Browse all categories
    • Vendor Portal login
    • How we help vendors
  • Write a review
  • Research Boards
    • Log in
    • Sign up

Search Results

Listings (3,876-3,900 of 10,000)

SFTP To Go

SFTP To Go

We don't have enough ratings and reviews to provide an overall score.

built for reliability and scalability, and is designed to make file sharing simple and secure. With compliance to SOC 2, HIPAA, and GDPR, SFTP To Go ensures … protocols like SFTP, FTPS, S3, and HTTPS are used, with encryption for data both in transit and at rest. Multi-factor authentication a…

  • SFTP To Go Alternatives
  • Other Managed File Transfer (MFT) Software
NexiTech

NexiTech

We don't have enough ratings and reviews to provide an overall score.

solving data storage obsolescence and cyber security issues. The vendor states that in 2017, the Department of Homeland Security selected NexiTech’s patented … NexiTech specializes in storage networking solutions and advanced cyber security techniques for actively defending against cyber thre…

  • NexiTech Alternatives
  • Other Deception Technology Software
Breach Secure Now

Breach Secure Now

2 Ratings

weekly micro training, simulated phishing attacks, security policies, a security risk assessment and our Employee Vulnerability Assessment (EVA). EVA helps … Unlimited Clients Subscriptions provides clients with employee security awareness training and Dark Web Breach Assessments. The Breac…

  • Reviews (1)
  • Alternatives
  • Other Security Awareness Training Software
Solink

Solink

We don't have enough ratings and reviews to provide an overall score.

video security and loss prevention system. The platform that combines video cameras with integrated data, along with analytics that inform security, loss … loss prevention and operations to protect an organization's people, patrons and profits. … video security and loss prevention syst…

  • Solink Alternatives
  • Other Video Surveillance Software
SentinelOne Purple AI

SentinelOne Purple AI

9 Ratings

An AI security analyst that helps organizations stay ahead of security threats. The tool streamlines investigations by intelligently combining common tools … tools, synthesizing threat intelligence and contextual insights into a single conversational user experience. … An AI security a…

  • Reviews (1)
  • Alternatives
  • Other Security Analytics Software
Aurascape

Aurascape

We don't have enough ratings and reviews to provide an overall score.

Aurascape closes AI security gaps created by traditional security. Aurascape extends organizations' security architecture to detect, analyze, and control AI use … Aurascape closes AI security gaps created by traditional security. Aurascape extends organizations' security architecture to detec…

  • Aurascape Alternatives
  • Other AI Governance Tools
Teamlead CRM

Teamlead CRM

We don't have enough ratings and reviews to provide an overall score.

linking it with issues, and making reports of actions and outcomes, ultimately providing a solution to manage contacts, companies, and any customer-facing … consulting and makes add-ons such as CRM, Calendar, HelpDesk, which expand usage of Atlassian products. Teamlead's CRM for Jira is used …

  • Teamlead CRM Alternatives
  • Other Customer Relationship Management (CRM) Software
Samsung SMART Signage

Samsung SMART Signage

We don't have enough ratings and reviews to provide an overall score.

conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and collaboration, and related purposes … conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and col…

  • Samsung SMART Signage Alternatives
  • Other Digital Signage Software
Veracode

Veracode

Top Rated
215 Ratings

Veracode provides advanced application security solutions, trusted by enterprises to develop and maintain secure software. Its platform identifies exploitable … exploitable risks, speeds up vulnerability remediation, and reduces security debt at scale using a proprietary AI-assisted remediati…

  • Reviews (137)
  • Alternatives
  • Other Application Security Tools
  • Learn More
Check Point Infinity SOC

Check Point Infinity SOC

We don't have enough ratings and reviews to provide an overall score.

SOC, from Check Point, is a security analytics solution that aims to provide security teams with the confidence to expose and shut down attacks faster, before … platform, to increase security operations efficiency and ROI. Infinity SOC uses AI to pinpoint real attacks from millions of daily l…

  • Check Point Infinity SOC Alternatives
  • Other Security Analytics Software
Palo Alto Networks Prisma Cloud

Palo Alto Networks Prisma Cloud

34 Ratings

the Evident Security Platform) is presented as a comprehensive Cloud Native Security Platform (CNSP) that delivers full lifecycle security and full stack … or custom signatures of threats and provides daily risk reports, and also detects what users were responsible for risk and provides remed…

  • Reviews (7)
  • Alternatives
  • Other Cloud-Native Application Protection Platforms
Rocket AS

Rocket AS

We don't have enough ratings and reviews to provide an overall score.

programming and modeling, and project management facilities. In addition, AS can be used to build custom procedures to automate data analysis and repetitive … development and business intelligence tools for IBM zSystems mainframes. The flagship Rocket AS product is a tool used to query, repor…

  • Rocket AS Alternatives
  • Other App Development Platforms
Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps

36 Ratings

Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker. … applying organization-wide policies and threat intelligence, and ensuring identities are verified and authenticated and devices are safe. It conditionally … access to data, ap…

  • Reviews (12)
  • Alternatives
  • Other Cloud Access Security Brokers
Joan Workplace

Joan Workplace

We don't have enough ratings and reviews to provide an overall score.

rooms both on the spot and remotely. The platform integrates with popular apps like G Suite, Office 365, Microsoft Exchange, and iCalendar, so users can … door and a check-in feature that prevents ghost meetings or double bookings, the product ensures all team members have access to accurate…

  • Joan Workplace Alternatives
  • Other Digital Signage Software
Minder by Stacklok

Minder by Stacklok

We don't have enough ratings and reviews to provide an overall score.

developers and communities use open source security tools and standards to continuously secure their software projects, and provide proof of that security to their … developers and communities use open source security tools and standards to continuously secure their software projects, and pro…

  • Minder by Stacklok Alternatives
  • Other DevSecOps Tools
Zscaler Internet Access

Zscaler Internet Access

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener'>Customer Verified: Read more.</a>
301 Ratings

(SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps. … access to the internet and SaaS apps, ZIA ensures fast, direct, and secure connections to the internet and SaaS applications, eliminating the need for traditional … traditional …

  • Reviews (183)
  • Alternatives
  • Other Zero Trust Security Solutions Software
  • Learn More
Pathlock

Pathlock

7 Ratings

platform to unify access governance, automate audit and compliance processes, and fortify application security. Pathlock helps complex organizations in the world … world to confidently handle the security and compliance requirements in their core ERP and beyond. … gains and cost savin…

  • Reviews (1)
  • Alternatives
  • Other Application Security Tools
Acclaim Product by Sopheon

Acclaim Product by Sopheon

We don't have enough ratings and reviews to provide an overall score.

prioritize trade-offs, inform stakeholders, and make decisions without having to spend hours cobbling information together.

  • Acclaim Product by Sopheon Alternatives
  • Other Product Management Software
LEAMAP

LEAMAP

We don't have enough ratings and reviews to provide an overall score.

LEAMAP from Lynx Information Systems (Lynx Exploration Archivist Map Scanning and Vectorising) is an application that converts seismic maps in hard copy

  • LEAMAP Alternatives
  • Other Oil and Gas Software
OpenText Core Business Communication Archive

OpenText Core Business Communication Archive

7 Ratings

(formerly Carbonite Information Archiving or ZixArchive before that), stores an unlimited number of files and communications across email, SMS, and emerging platforms … (formerly Carbonite Information Archiving or ZixArchive before that), stores an unlimited number of files and communications…

  • Reviews (3)
  • Alternatives
  • Other Archiving Software
Cadmatic Marine Design

Cadmatic Marine Design

We don't have enough ratings and reviews to provide an overall score.

save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting of blocks, thereby reducing … save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting…

  • Cadmatic Marine Design Alternatives
  • Other Computer-Aided Design (CAD) Software
WithSecure Elements Collaboration Protection

WithSecure Elements Collaboration Protection

We don't have enough ratings and reviews to provide an overall score.

Messaging Security Gateway, their email security platform for companies, enterprise to SMB, featuring email encryption with high level (99%) of spam and (the … Elements brings together vulnerability management, automated patch management, dynamic threat intelligence and continuous behavioral …

  • WithSecure Elements Collaboration Protection Alternatives
  • Other Secure Email Gateway Software
Avira Password Manager

Avira Password Manager

5 Ratings

Manager generates and remembers secure passwords. Extra safeguards available include touch and face ID login, 2-factor authenticated login, and secrets (e.g … g. payment card information, notes, etc) storage.

  • Reviews (1)
  • Alternatives
  • Other Password Management System Software
SolarWinds Log Analyzer (LA)

SolarWinds Log Analyzer (LA)

30 Ratings

Analyzer is log management and analysis tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualization … performance and availability of the monitored IT infrastructure. According to the vendor, key feature and business benefits include:…

  • Reviews (1)
  • Alternatives
  • Other Log Management Tools
Cymulate

Cymulate

5 Ratings

optimize a business's security posture any time, and empower companies to safeguard their business-critical assets. Cymulate challenges security controls by initiating … showing the user exactly where a network is exposed and how to fix it—making security continuous, fast and part of every-da…

  • Cymulate Alternatives
  • Other Vulnerability Management Tools
  • FirstFirst
  • Previous
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • Next
  • LastLast
TrustRadius

TrustRadius

  • About Us
  • Team
  • Careers
  • News
  • Contact Us

For Buyers

  • Categories
  • Buyer Blog

For Vendors

  • Vendor Solutions
  • Claim Your Profile
  • Vendor Blog and Resources
  • YouTube
  • Facebook
  • Twitter
  • LinkedIn
  • Terms of Use
  • Security
  • Privacy Policy
  • Your Privacy Choices
  • Cal. Notice at Collection

© Copyright 2013–2026 TrustRadius