Discover 610 security tools used by companies, sorted by popularity
Used by 1 company
Semperis provides identity-driven cyber resilience solutions for Active Directory and Azure Active Directory.
Used by 1 company
SonicWALL Firewalls are network security appliances that protect networks from unauthorized access and threats.
Used by 1 company
Sublime Security provides advanced security solutions to protect organizations from cyber threats.
Used by 1 company
Syzkaller is a kernel fuzzer for Linux that is used to find bugs in the kernel by generating random inputs.
Used by 1 company
A cybersecurity company that provides tools for network security and compliance.
Used by 1 company
Torq is a security automation platform that helps organizations streamline their security operations through automation.
Used by 1 company
A security solution that provides endpoint protection and threat detection.
Used by 1 company
A provider of email authentication solutions that help organizations protect their domains from phishing and spoofing.
Used by 1 company
Vectra provides AI-driven cybersecurity solutions to detect and respond to cyber threats in real-time.
Used by 1 company
AWS WAF (Web Application Firewall) helps protect your web applications from common web exploits that could affect application availability, compromise …
Used by 1 company
WebInspect is a dynamic application security testing tool that helps identify vulnerabilities in web applications.
Used by 1 company
Windows Defender Application Control helps organizations control which applications can run on their devices, enhancing security.
Used by 1 company
WireGuard is a simple and fast VPN that utilizes state-of-the-art cryptography.
Used by 1 company
A hardware authentication device that supports multiple authentication protocols.
Used by 1 company
Zscaler Internet Access provides secure internet access for users, protecting against threats and ensuring compliance.
Used by 5113 companies
Next Generation Identification is a system used for biometric identification and criminal justice.
Used by 522 companies
Endpoint Detection and Response (EDR) refers to a category of security solutions that monitor end-user devices to detect and respond …
Used by 292 companies
Single Sign-On (SSO) is an authentication process that allows a user to access multiple applications with one set of login …
Used by 92 companies
Network Access Control (NAC) solutions enforce security policy on devices seeking to access network resources.
Used by 66 companies
SIEM (Security Information and Event Management) tools are used for real-time analysis of security alerts generated by applications and network …