Security Tools

Discover 610 security tools used by companies, sorted by popularity

VPN

Used by 66 companies

A Virtual Private Network (VPN) provides secure access to a private network over the internet.

AFIS

Used by 29 companies

Automated Fingerprint Identification Systems are used for the identification and comparison of fingerprints.

OAuth2

Used by 22 companies

OAuth2 is an authorization framework that enables applications to obtain limited access to user accounts on an HTTP service.

MFA

Used by 17 companies

Multi-Factor Authentication (MFA) adds an additional layer of security to the authentication process.

OIDC

Used by 16 companies

OpenID Connect (OIDC) is an authentication layer on top of OAuth2 that allows clients to verify the identity of the …

SAML

Used by 16 companies

SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between parties.

Security Information and Event Management (SIEM) is a solution that provides real-time analysis of security alerts generated by applications and …

Firewalls

Used by 10 companies

Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.

Conditional Access

Used by 8 companies

Conditional Access is a feature of Azure AD that helps organizations enforce access policies based on specific conditions.

DLP

Used by 8 companies

Data Loss Prevention technologies protect sensitive data from unauthorized access and sharing.

EnCase

Used by 8 companies

A digital forensic tool used for the acquisition and analysis of digital evidence.

PAM

Used by 8 companies

Privileged Access Management (PAM) tools help organizations manage and monitor access to critical systems and data.

CCTV

Used by 7 companies

CCTV is a surveillance system used for monitoring and security purposes.

Prisma Cloud

Used by 7 companies

Prisma Cloud is a comprehensive cloud-native security platform that provides visibility and security for applications, data, and the entire cloud-native …

ACAS

Used by 6 companies

ACAS (Assured Compliance Assessment Solution) is a tool used for vulnerability scanning and compliance assessment.

Antivirus

Used by 6 companies

Antivirus software is designed to detect and destroy computer viruses and other malicious software.

RBAC

Used by 6 companies

Role-Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of …

SSL

Used by 6 companies

SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client.

VPNs

Used by 6 companies

VPNs (Virtual Private Networks) provide secure connections over the internet by encrypting data and masking the user's IP address.

Centrify

Used by 5 companies

Centrify provides identity and access management solutions to secure access to applications and infrastructure.