Security Tools

Discover 603 security tools used by companies, sorted by popularity

DLP

Used by 8 companies

Data Loss Prevention technologies protect sensitive data from unauthorized access and sharing.

Firewalls

Used by 8 companies

Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.

CCTV

Used by 7 companies

CCTV is a surveillance system used for monitoring and security purposes.

EnCase

Used by 7 companies

A digital forensic tool used for the acquisition and analysis of digital evidence.

PAM

Used by 7 companies

Privileged Access Management (PAM) tools help organizations manage and monitor access to critical systems and data.

Prisma Cloud

Used by 7 companies

Prisma Cloud is a comprehensive cloud-native security platform that provides visibility and security for applications, data, and the entire cloud-native …

ACAS

Used by 6 companies

ACAS (Assured Compliance Assessment Solution) is a tool used for vulnerability scanning and compliance assessment.

RBAC

Used by 6 companies

Role-Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of …

SSL

Used by 6 companies

SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client.

Antivirus

Used by 5 companies

Antivirus software is designed to detect and destroy computer viruses and other malicious software.

Centrify

Used by 5 companies

Centrify provides identity and access management solutions to secure access to applications and infrastructure.

Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources.

FTK

Used by 5 companies

FTK (Forensic Toolkit) is a computer forensic investigation software used for data analysis and recovery.

TLS

Used by 5 companies

TLS (Transport Layer Security) is a cryptographic protocol designed to provide secure communication over a computer network.

VPNs

Used by 5 companies

VPNs (Virtual Private Networks) provide secure connections over the internet by encrypting data and masking the user's IP address.

Volatility

Used by 5 companies

Volatility is an open-source memory forensics framework for incident response and malware analysis.

CNAPP

Used by 4 companies

Cloud Native Application Protection Platform (CNAPP) provides security for cloud-native applications.

CSPM

Used by 4 companies

Cloud Security Posture Management (CSPM) tools help organizations manage their cloud security posture by continuously monitoring cloud environments for compliance …

CompTIA Security +

Used by 4 companies

A certification that validates the baseline skills needed to perform core security functions and pursue an IT security career.

Data Loss Prevention

Used by 4 companies

A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.