113 resultaten
Waarom Capterra gratis is
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Meer informatie over Orca Security 100+ cloud assets? Get instant-on, workload-level security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Meer informatie over Orca Security
Autobahn is een innovatieve beveiligingsoplossing die is gebaseerd op jarenlange advieservaring op het gebied van cyberbeveiliging. Het biedt volledig geautomatiseerde activadetectie, scannen op kwetsbaarheden en uitgebreide benchmarking, evenals bruikbare herstelinzichten. Autobahn wordt gebruikt door toonaangevende Fortune 500-bedrijven en MKB-bedrijven, en het biedt een geschikt pakket voor elke bedrijfsomvang en fase van beveiligingsontwikkeling. De klanten waarderen het gebruiksgemak en de uitgebreide inzichten in de rapporten. Meer informatie over Autobahn Een nieuw soort oplossing voor vulnerability management gebaseerd op jarenlange advieservaring, geschikt voor ondernemingen en het MKB. Meer informatie over Autobahn
(0 reviews)
Bezoek website
Complete vulnerability magement solution Cyberwatch finds the vulnerabilities of your servers, desktops, network devices and containers, and reviews them based on your business context. Cyberwatch builds for you a full inventory of your assets and your vulnerabilities. With over 15 000 new vulnerabilities per year, Cyberwatch helps you to prioritize the vulnerabilties of your information system and to take the best decisions based on your real risk. Meer informatie over Cyberwatch French Vulnerability Management Solution Manage your vulnerabilities from their detection to their correction Meer informatie over Cyberwatch
(0 reviews)
Bezoek website
Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation. We offer the most advanced crawling options. Our software is able to directly detect attack vectors in all web applications: Revolutionary Single-Page application scanning Painless Multi-Page application setup Documentation-based API scanning Our software is user-friendly yet powerful and provides detailed and accurate vulnerability reports. Meer informatie over Crashtest Security Crashtest Security provides the simplest blackbox web app vulnerability scanning experience with advanced scan targets & automation. Meer informatie over Crashtest Security
(0 reviews)
Bezoek website
Skybox Vulnerability Control ondersteunt een systematische aanpak voor vulnerability management zoals geen enkele andere leverancier. Deze oplossing is gebaseerd op uitgebreide zichtbaarheid van je aanvalsoppervlak, en maakt gebruik van zijn context voor het snel analyseren, prioriteren en herstellen van je meest risicovolle kwetsbaarheden. Meer informatie over Vulnerability Control Stel de risico's voor je netwerk vast en prioriteer ze met uitgebreide scan- en analyseoplossingen voor kwetsbaarheden. Meer informatie over Vulnerability Control
Dark Web ID helpt MSP's en interne IT-teams hun organisatie en klanten te beschermen tegen een inbreuk op de cyberbeveiliging door het dark web 24/7/365 te bewaken en te waarschuwen als er gevoelige bedrijfs- of werknemersgegevens of wachtwoorden te koop worden aangeboden op het dark web. Meer informatie over Dark Web ID Dark Web ID bewaakt bedrijfs- en inloggegevens en waarschuwt je als deze te koop worden aangeboden op dark web-markten, zodat je een inbreuk kunt voorkomen. Meer informatie over Dark Web ID
Integreert en correleert gegevens van kwetsbaarheidsscanners en meerdere exploit feeds gecombineerd met bedrijfs- en IT-factoren en om cyberbeveiligingsrisico's te classificeren. Helpt CISO, Red Teams en Vulnerability Assessment Teams om tijd te besparen, prioriteiten te stellen en risico's te melden. Gebruikt door regeringen, militaire bedrijven, banken, financiële instellingen en e-commercebedrijven. Meer informatie over Centraleyezer Vulnerability Management dat samenwerking mogelijk maakt tussen beveiligingsanalisten, management en Asset Owners en zorgt voor prioriteitsstelling van risico's. Meer informatie over Centraleyezer
TOPIA is een uitgebreid vulnerability management-platform waarmee bedrijven voorop kunnen blijven lopen, tijd kunnen besparen en minder moeten patchen. Met zijn bedrijfseigen software biedt TOPIA bedrijven de tools om kwetsbaarheden in apps van derde partijen te analyseren en prioriteren, en de bevoegdheid om te handelen voordat er misbruik van kan worden gemaakt. Geen patch? Geen probleem. De innovatieve patchloze beschermingsfunctie van TOPIA beveiligt apps zonder dat er een patch nodig is, waardoor tijd wordt bespaard en kwetsbaarheden worden geneutraliseerd. Meer informatie over TOPIA Uitgebreid vulnerability management, met of zonder patch. Meer informatie over TOPIA
Cyber Hawk is een toonaangevend cyberbeveiligingsplatform waarmee Managed Service Providers hun merkeigen dienst voor detectie van interne bedreigingen kunnen maken, verkopen en leveren. Het detecteert schendingen van het IT-beveiligingsbeleid, abnormale gebruikersactiviteiten, verdachte wijzigingen in de netwerken en bedreigingen veroorzaakt door malware die externe beveiligingen weet te omzeilen. Cyber Hawk bevat ook ingebouwde serviceabonnementen, marketingmateriaal en meer. MSP-licenties ondersteunen onbeperkt gebruik voor alle klanten die door elke locatie worden ondersteund. Meer informatie over Cyber Hawk Cyber Hawk is een toonaangevend cyberbeveiligingsplatform waarmee Managed Service Providers hun merkeigen dienst voor detectie van interne bedreigingen kunnen maken, verkopen en leveren. Meer informatie over Cyber Hawk
Gebruik evenementgedreven automatiseringstechnologie om full-service, closed-loop automatisering voor IT-systeemcompliance en kwetsbaarheid te leveren. Meer informatie over SaltStack SecOps Gebruik evenementgedreven automatiseringstechnologie om full-service, closed-loop automatisering voor IT-systeemcompliance en kwetsbaarheid te leveren. Meer informatie over SaltStack SecOps
Nessus Professional is gebouwd voor beveiligingsprofessionals door beveiligingsprofessionals en is de de-facto standaard in de sector voor kwetsbaarheidsbeoordeling. Nessus voert point-in-time beoordelingen uit om beveiligingsprofessionals te helpen kwetsbaarheden snel te identificeren en op te lossen, waaronder softwarefouten, ontbrekende patches, malware en verkeerde configuraties. Met functies zoals vooraf gebouwd beleid en sjablonen, functionaliteit voor groepsluimeren en realtime updates, maakt het kwetsbaarheidsonderzoek eenvoudig en intuïtief. Nessus Pro, een marktleider op het gebied van kwetsbaarheidsbeoordeling, helpt je snel en eenvoudig kwetsbaarheden te identificeren en op te lossen.
Automox is cloudgebaseerd en wereldwijd beschikbaar en handhaaft OS- en extern patchbeheer, beveiligingsconfiguraties en aangepaste scripting in Windows, Mac en Linux vanaf één intuïtieve console. IT en SecOps kunnen snel de controle krijgen en de zichtbaarheid van lokaal geïnstalleerde, externe en virtuele eindpunten delen zonder dat je dure infrastructuur hoeft te implementeren. Automox is een cloudgebaseerd platform voor patchbeheer: moderne cyberhygiëne die het veiligheidsvertrouwen van de wereld zal verhogen.
Rubrik biedt directe beschikbaarheid van toepassingen aan hybride cloudgebaseerde bedrijven voor herstel, zoeken, cloud en ontwikkeling. Door gebruik te maken van dit toonaangevende cloudgebaseerde gegevensbeheerplatform kunnen klanten op één platform toepassingen mobiliseren, het beschermingsbeleid automatiseren, herstellen van ransomware en toepassingsgegevens op schaal zoeken en analyseren. Van dagen tot seconden. Oplossing voor gegevensbeheer en back-up waarmee bedrijven gegevens in cloudomgevingen kunnen beheren met behulp van geautomatiseerd beveiligingsbeleid.
Ken de kwetsbaarheden van je toepassing. Voeg Kiuwan Static Application Security Testing (SAST) en Software Composition Analysis (SCA) toe aan je broncodebeheer. Het is gemakkelijk in te stellen en te gebruiken. Scan je code lokaal en deel de resultaten vervolgens in de cloud. Op maat gemaakte rapporten met beveiligingsbeoordelingen volgens de sectornorm helpen je om technische schulden te verminderen en risico's te beperken. Kiuwan biedt uitgebreide taalopties, integreert met toonaangevende IDE's en past naadloos in je proces voor CI/CD/DevSecOps. DevSecOp platform met SAST, SCA, IDE integratie en gedistribueerde analyses om uw applicaties te beschermen tegen externe bedreigingen.
Acunetix is marktleider in automatische testtechnologie voor webbeveiliging die alle webapplicaties scant en controleert, inclusief HTML5, JavaScript en Single Page Applications. Scant op 4500 kwetsbaarheden waaronder SQLi en XSS en anderen. Gebruikt door de overheid, het leger, en de sectoren van onderwijs, telecommunicatie, bankwezen, financiën en e-commerce, waaronder veel Fortune 500-bedrijven. Acunetix biedt een kosteneffectieve, eenvoudige, schaalbare oplossing met hoge beschikbaarheid. Beschikbaar op Windows, Linux en online Oplossing voor vulnerability management die je website scant, kwetsbaarheden zoals XSS of SQL-injectie detecteert en herstelmogelijkheden biedt.
Netsparker Security Scanner is een accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Met de unieke scanning-technologie op basis van bewijs van Netsparker kun je meer tijd besteden aan het verhelpen van de gemelde fouten door de geïdentificeerde kwetsbaarheden automatisch op een "alleen-lezen" en veilige manier te bekijken. De software produceert ook een bewijs van exploitatie. Daarom kun je meteen de impact van kwetsbaarheid zien en hoef je het niet handmatig te verifiëren. Accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
What is the use of detecting Vulnerabilities if you cannot patch them? With SanerNow Integrated Patch and Vulnerability Management Tool, you can do both! In LESS THAN 5 MINUTES, it automatically scans and, most accurately, detects vulnerabilities, assessing and prioritizing them based on their severity. It, then, efficiently patches them instantly using integrated remediation through a centralized cloud-based console. SecPod SanerNow is the Best Tool to combat cyber attacks by quickly Detecting, Assessing, Prioritizing and Remediating Vulnerabilities.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction. Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting & more.
Probely helpt technici van Beveiliging en DevOps om veilige web-apps te leveren zonder afbreuk te doen aan deadlines. Integreer veiligheidstests soepel en automatisch in je flexibele ontwikkelingslevenscyclus, zonder je huidige workflow te verstoren. Voer continue beveiliging uit in de vroege stadia van je flexibele ontwikkelingslevenscyclus en los kwetsbaarheden snel op. Je ontvangt in je probleemtracker eenvoudige stapsgewijze instructies over waar en hoe je elk beveiligingslek kunt oplossen. Begin met een gratis proefversie. 100% gratis. Geen creditcard Probely helpt technici van Beveiliging en DevOps om veilige web-apps te leveren zonder afbreuk te doen aan deadlines en je huidige werk te verstoren.
Computer en mobiel op afstand wissen, vergrendelen en lokaliseren voor alle besturingssystemen en hardware. Computer en mobiel op afstand wissen, vergrendelen en lokaliseren voor alle besturingssystemen en hardware.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring. Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Keyhub is een alles-in-één platform voor het levenscyclusbeheer van certificaten. Het is ontworpen om digitale ID's van machines te beheren via het detecteren, organiseren en volgen van digitale certificaten op autopilot. Het biedt diepe scans van subdomeinen en interne netwerken, een in-dashboard overzicht van de systeemstatus, eenvoudig te navigeren inventaris, expiratierapportage en nog veel meer. Alles-in-één platform voor het beheren van digitale ID's van machines via het ontdekken, organiseren en volgen van digitale certificaten op autopilot.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs. Managed security platform that includes monitoring and management of security infrastructure around the clock.
Analyse van gebruikersgedrag en oplossing voor vulnerability management die helpt bij het identificeren van interne en externe bedreigingen. Analyse van gebruikersgedrag en oplossing voor vulnerability management die helpt bij het identificeren van interne en externe bedreigingen.
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
A set of SSL-secured vulnerability management tools including system scanner and access control manager. A set of SSL-secured vulnerability management tools including system scanner and access control manager.
AppTrana is a fully managed 24x7 application security solution that identifies application-layer vulnerabilities; protects & accelerates them instantly through a WAF and CDN; monitors traffic through proprietary machine learning algorithms and with its in-house security experts blocking emerging threats and DDoS attacks. We are trusted by over 2000+ global customers. We currently serve the Government, Banking, Finance, E-Commerce and SaaS based sectors. Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. Find & fix security and compliance issues in open source libraries in real-time
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software. Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step of the SDLC, which leads to less vulnerabilities, reduced fixes to older code, lower costs and, most importantly, far more secure applications. Allows to achieve PCI DSS Compliance. Free Demo available on web site. Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software.
Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach with true continuous data protection. CE delivers near-zero recovery times by monitoring the health of your applications and instantly failing over if a threat is detected. Simply put, we can help you prepare for and protect your applications, servers, and data from disaster and unplanned outages. Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime.
Automatic scanning and dashboard presentation of all PCs and servers for known and documented vulnerabilities. User-defined rules for regular comprehensive checks. Automated review of device configuration settings. Drill down by endpoint or by potential threat for detailed threat assessment. Combine with patch and update management capabilities for comprehensive and continuous security. Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance. Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Intruder spoort zwakke punten op in je online digitale eigendommen, legt de risico’s uit en helpt met herstel voordat een inbreuk kan plaatsvinden. Cloud Connectors voor AWS, Google Cloud en Azure helpen je bij het synchroniseren van je systemen, zodat geen enkel middel onbeproefd blijft. Dankzij developer-integraties met Slack en Jira wordt het een fluitje van een cent om up-to-date te blijven. Een oplossing om zwakke punten in je online digitale eigendommen op te sporen, de risico’s uit te leggen en te helpen met herstel voordat een inbreuk kan plaatsvinden.
Cryptosense Analyzer-software helpt klanten om zwakke plekken te vinden in de cryptografie die ze gebruiken in hun infrastructuur en applicaties, en ze vervolgens te repareren voordat er misbruik van wordt gemaakt. De oplossing traceert cryptogebruik in toepassingen, netwerkprotocollen en cryptografische hardware en geeft deze door aan de analysealgoritmen om kwetsbaarheden te vinden in sleutelbeheer, het genereren van willekeurige gegevens, cryptogebruik en meer. Cryptosense biedt software voor het detecteren en elimineren van kwetsbaarheden die worden veroorzaakt door misbruik van cryptografie in apps en infrastructuren.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
Hybrid approach to vulnerability scanning with accurate security assessment results. Hybrid approach to vulnerability scanning with accurate security assessment results.
Security program and vulnerability management tool that allows you to manage your application security program. Security program and vulnerability management tool that allows you to manage your application security program.
Een on-premises en gehoste oplossing die gestandaardiseerde, gecoördineerde reacties in je beveiligingsproductstack mogelijk maakt. Een on-premises en gehoste oplossing die gestandaardiseerde, gecoördineerde reacties in je beveiligingsproductstack mogelijk maakt.
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
Fyde helpt bedrijven met een steeds meer verspreid personeelsbestand om het risico op inbreuken te verminderen door het ondersteunen van veilige toegang tot kritieke bedrijfsmiddelen voor hun werknemers, partners, aannemers en outsourcers. Veilige toegang tot internet en bedrijfsbronnen met één enkele oplossing.
Detectify automates the knowledge of the best ethical hackers in the world to secure websites against 1500+ known vulnerabilities beyond OWASP Top 10. In agile tech, the potential attack surface increases with each release. With Detectify, users monitor subdomains for potential takeovers and remediate security bugs in staging and production as soon as they are known, to stay on top of threats. Detectify automates the knowledge of the best ethical hackers in the world to secure websites. Stay on top of threats with Detectify.
Automated testing that sends you weekly security reports generated after testing the site. Automated testing that sends you weekly security reports generated after testing the site.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility. CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
Record and evaluate configurations of your AWS resources Record and evaluate configurations of your AWS resources
Symantec Control Compliance Suite (CCS) delivers the core assessment technologies to enable security and compliance programs, as well as support IT operations in the data center. Control Compliance Suite delivers asset autodiscovery, automates security assessments across procedural, technical, and third-party controls, and calculates and aggregates risk scores according to business-defined threshholds. Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies.
(0 reviews)
Bekijk profiel
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner-agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.
(0 reviews)
Bekijk profiel
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data. Network security solution that helps businesses predict and identify vulnerabilities while calculating organizational risk scores.
(0 reviews)
Bekijk profiel
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world. Vulnerability management solution that helps businesses reduce cyber risk, prevent data breaches, and protect customer data.
RIPS is de enige codeanalyseoplossing die gewijd is aan de talen Java en PHP. Het detecteert de meest complexe kwetsbaarheden die diep genesteld zijn in Java- en PHP-code en onvindbaar zijn voor andere tools. Het ondersteunt alle belangrijke Java- en PHP-frameworks, SDLC-integratie en relevante industriestandaarden en kan worden ingezet als een zelfgehoste software of als een cloudservice. Dankzij de hoge nauwkeurigheid en geen foutpositieve ruis is RIPS de ideale keuze voor het analyseren van je code. Detecteer automatisch echte beveiligingsproblemen in Java- en PHP-applicaties zonder foutpositieve ruis om de efficiëntie van het team te optimaliseren.
Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security.
Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention.
(0 reviews)
Bekijk profiel
Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes.
(0 reviews)
Bekijk profiel
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Network security platform that helps businesses prevent malware, ransomware, and other network attacks from impacting firms.
(0 reviews)
Bekijk profiel
Mageni provides a free vulnerability scanning and vulnerability management solution that empowers you to find, prioritize, remediate and manage the cyber vulnerabilities. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors it offers a cost-effective, simple, scalable, and high availability solution. Mageni provides a free vulnerability scanning and management platform which helps you need to find and remediate the vulnerabilities.
(0 reviews)
Bekijk profiel
Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments.
(0 reviews)
Bekijk profiel
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.
(0 reviews)
Bekijk profiel
SWAT is a continuous vulnerability management solution for Web applications allowing a full vulnerability coverage thanks to the combination of vulnerability scanning tools and Outpost24 experienced security technicians. SWAT adjusts its scanning to new threats discovred and adapts to any changes in the application. All deployment and maintenance is performed by Outpost24 experts team and the customer support is available 24/7. Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning.
Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results.
(0 reviews)
Bekijk profiel
Protect your website or web application 365 days a year thanks to daily automated audits to detect your security flaws. Adopt the Offensive Cyber Security method to protect your business. Discover the high-performance web vulnerability scanner by HTTPCS: - Zero False Positive Guarantee - 100% Mapping (Headless Technology to crawl dynamic content) - Security Flaws listing : Top 10 OWASP, CVE and much more! - Countermeasures to apply - Replay the attacks to understand the risks incurred. Without technical expertise, run automated security audits to detect security flaws on your site or web application. Support provided.
(0 reviews)
Bekijk profiel
An automated, integrated, data-driven platform that provides the most effective method of prioritizing and remediating the vulnerabilities and exposures that represent the greatest risk to your business. NorthStars flexible scoring model empowers organizations with the freedom and transparency to decide what factors best reflect their business needs and risk appetite. NorthStar Delivers: - Single Source of Truth - Completely customizable scoring - Simplified and Faster Data Integrations Prioritize and remediate the vulnerabilities and exposures that matter most to your business.
(0 reviews)
Bekijk profiel
SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code.
(0 reviews)
Bekijk profiel
With cfxRealize you get continuous visibility and intelligence to optimize hardware and software assets usage and spend. Also enables faster adoption of new hardware and software consumption models. .
(0 reviews)
Bekijk profiel
IKare assists all company sizes to sustainably improve their IT security level. IKare assists all company sizes to sustainably improve their IT security level.
(0 reviews)
Bekijk profiel
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks.
(0 reviews)
Bekijk profiel
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.
Vulnerability Management enables IT security teams to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, cloud, container, and virtual infrastructuresdelivering risk analysis in context. Vulnerability Management allows IT security professionals to scan working system, detect weaknesses, and prevent intrusions.
(0 reviews)
Bekijk profiel
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
(0 reviews)
Bekijk profiel
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.
(0 reviews)
Bekijk profiel
Helps you find the code vulnerabilities and secure your app. Helps you find the code vulnerabilities and secure your app.
Met Vulnerability Manager Plus worden met behulp van een gecentraliseerde console alle aspecten van vulnerability management gemakkelijk gemaakt, vanaf detectie en beoordeling van kwetsbaarheden tot het elimineren ervan met een geautomatiseerde patching-workflow. Je kunt ook beveiligingsconfiguraties beheren, webservers verharden, zero-day kwetsbaarheden verminderen, end-of-life audits uitvoeren en riskante software verwijderen. Vereenvoudig vulnerability management met een op afstand inzetbare medewerker, webgebaseerde interface en eindeloze schaalbaarheid. Een eenvoudig te implementeren, betaalbare, gecentraliseerde consolegebaseerde tool waarmee je kwetsbaarheden en misconfiguraties kunt prioriteren en elimineren.
(0 reviews)
Bekijk profiel
Julia Analyzer is an in-depth static analyzer for Java, Android and .NET (C#) code. The technology is based on the scientific method of abstract interpretation, which makes it possible to detect vulnerabilities and defects not identifiable using traditional approaches based on pattern matching. Julia analysis server can be installed on premises or used in cloud.The solution is complete with plugins for the most common IDEs and integrates in your CI environment. Julia Analyzer is an in-depth static analyzer for Java, Android and .NET (C#) code for efficient vulnerability detection.
(0 reviews)
Bekijk profiel
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites
(0 reviews)
Bekijk profiel
Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Endpoint protection platform that reduces the cost and complexity of your endpoint environment.
(0 reviews)
Bekijk profiel
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
(0 reviews)
Bekijk profiel
Provides comprehensive view of vulnerabilities and risks from applications. Provides comprehensive view of vulnerabilities and risks from applications.
(0 reviews)
Bekijk profiel
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
(0 reviews)
Bekijk profiel
Help avoid breaches with continuous risk prediction and a prioritized list of mitigation actions. Help avoid breaches with continuous risk prediction and a prioritized list of mitigation actions.
(0 reviews)
Bekijk profiel
Manage security operations from end to end, never miss an alert and respond with speed and precision. Manage security operations from end to end, never miss an alert and respond with speed and precision.
(0 reviews)
Bekijk profiel
Arm your security team with cyber threat intelligence to identify and prioritize threats. Arm your security team with cyber threat intelligence to identify and prioritize threats.
(0 reviews)
Bekijk profiel
Risk protection solution that helps secure, govern, manage and modernize applications in SharePoint & Office365 environments. Risk protection solution that helps secure, govern, manage and modernize applications in SharePoint & Office365 environments.
(0 reviews)
Bekijk profiel
ZeroNorth is a comprehensive orchestrated risk management tool aid companies in gaining competitive advantages ZeroNorth is a comprehensive orchestrated risk management tool aid companies in gaining competitive advantages
(0 reviews)
Bekijk profiel
Vind snel relevante informatie uit bronnen op het open web, deep web en dark web, zonder je standaard webbrowser te verlaten. Scan marktplaatsen, discussieforums en plak sites om bedreigingen te herkennen en voor te blijven en je organisatie te beschermen. Beacon is de snelste manier om belangrijke informatie uit het dark web te halen.
Stop reacting. Gain control. Stay secure. It takes organizations too long to identify and address software vulnerabilities. Our solutions provide vulnerability intelligence and world-class technology so our customers are confident that they don't just react to crisis when attacks happen. Instead, they gain control and stay secure. Identify and address software vulnerabilities; reduce attacks and stay secure.
(0 reviews)
Bekijk profiel
Makes DevSecOps a reality with threat modeling and SDLC risk management. Makes DevSecOps a reality with threat modeling and SDLC risk management.
(0 reviews)
Bekijk profiel
Provides rapid reporting for red teams as well as tracking and attestation for blue teams. Provides rapid reporting for red teams as well as tracking and attestation for blue teams.
Bekijk profiel
Business risk intelligence to help companies prevent fraud, insider threat, and enterprise risk. Business risk intelligence to help companies prevent fraud, insider threat, and enterprise risk.
The Columbus Collaboratory Vulnerability Management Solution provides a 360-degree, single-console view via a managed service that helps organizations make informed business decisions and mitigate threats.Rather than staff an expensive threat-intelligence team, the Columbus Collaboratory Vulnerability Management Solution affordably delivers the knowledge, recommendations, and service of a threat-smart team. A managed service that allows you to assess applications and networks, continuously track vulnerabilities, and manage priorities.
(0 reviews)
Bekijk profiel
Open source is a critical part of your software. In the average modern software product, over 80% of the source code shipped is derived from open source. Each component can have cascading legal, security, and quality implications for your customers, making it one of the most important things to manage correctly. FOSSA helps you manage your open source components. We plug into your development workflow to help automatically track, manage, and remediate issues with the open source you use. FOSSA provides a platform that helps enterprises manage and maximize open-source use at scale.
(0 reviews)
Bekijk profiel
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization. Strobes is a risk-based Vulnerability Management Platform for Enterprises with 25+ open-source vulnerability assessment scanners!
(0 reviews)
Bekijk profiel
Vulcan Cyber is the industry's first vulnerability remediation platform, built to help security and IT ops teams collaborate to secure digital business. Vulcan SaaS closes gaps between detection and remediation to reduce vulnerability dwell time and business risk. Vulcan is used to orchestrate the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. The SaaS platform for vulnerability remediation orchestration.