Discover 603 security tools used by companies, sorted by popularity
Used by 8 companies
Data Loss Prevention technologies protect sensitive data from unauthorized access and sharing.
Used by 8 companies
Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Used by 7 companies
CCTV is a surveillance system used for monitoring and security purposes.
Used by 7 companies
A digital forensic tool used for the acquisition and analysis of digital evidence.
Used by 7 companies
Privileged Access Management (PAM) tools help organizations manage and monitor access to critical systems and data.
Used by 7 companies
Prisma Cloud is a comprehensive cloud-native security platform that provides visibility and security for applications, data, and the entire cloud-native …
Used by 6 companies
ACAS (Assured Compliance Assessment Solution) is a tool used for vulnerability scanning and compliance assessment.
Used by 6 companies
Role-Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of …
Used by 6 companies
SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client.
Used by 5 companies
Antivirus software is designed to detect and destroy computer viruses and other malicious software.
Used by 5 companies
Centrify provides identity and access management solutions to secure access to applications and infrastructure.
Used by 5 companies
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources.
Used by 5 companies
FTK (Forensic Toolkit) is a computer forensic investigation software used for data analysis and recovery.
Used by 5 companies
TLS (Transport Layer Security) is a cryptographic protocol designed to provide secure communication over a computer network.
Used by 5 companies
VPNs (Virtual Private Networks) provide secure connections over the internet by encrypting data and masking the user's IP address.
Used by 5 companies
Volatility is an open-source memory forensics framework for incident response and malware analysis.
Used by 4 companies
Cloud Native Application Protection Platform (CNAPP) provides security for cloud-native applications.
Used by 4 companies
Cloud Security Posture Management (CSPM) tools help organizations manage their cloud security posture by continuously monitoring cloud environments for compliance …
Used by 4 companies
A certification that validates the baseline skills needed to perform core security functions and pursue an IT security career.
Used by 4 companies
A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.