Discover 610 security tools used by companies, sorted by popularity
Used by 66 companies
A Virtual Private Network (VPN) provides secure access to a private network over the internet.
Used by 29 companies
Automated Fingerprint Identification Systems are used for the identification and comparison of fingerprints.
Used by 22 companies
OAuth2 is an authorization framework that enables applications to obtain limited access to user accounts on an HTTP service.
Used by 17 companies
Multi-Factor Authentication (MFA) adds an additional layer of security to the authentication process.
Used by 16 companies
OpenID Connect (OIDC) is an authentication layer on top of OAuth2 that allows clients to verify the identity of the …
Used by 16 companies
SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between parties.
Used by 12 companies
Security Information and Event Management (SIEM) is a solution that provides real-time analysis of security alerts generated by applications and …
Used by 10 companies
Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Used by 8 companies
Conditional Access is a feature of Azure AD that helps organizations enforce access policies based on specific conditions.
Used by 8 companies
Data Loss Prevention technologies protect sensitive data from unauthorized access and sharing.
Used by 8 companies
A digital forensic tool used for the acquisition and analysis of digital evidence.
Used by 8 companies
Privileged Access Management (PAM) tools help organizations manage and monitor access to critical systems and data.
Used by 7 companies
CCTV is a surveillance system used for monitoring and security purposes.
Used by 7 companies
Prisma Cloud is a comprehensive cloud-native security platform that provides visibility and security for applications, data, and the entire cloud-native …
Used by 6 companies
ACAS (Assured Compliance Assessment Solution) is a tool used for vulnerability scanning and compliance assessment.
Used by 6 companies
Antivirus software is designed to detect and destroy computer viruses and other malicious software.
Used by 6 companies
Role-Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of …
Used by 6 companies
SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client.
Used by 6 companies
VPNs (Virtual Private Networks) provide secure connections over the internet by encrypting data and masking the user's IP address.
Used by 5 companies
Centrify provides identity and access management solutions to secure access to applications and infrastructure.