Discover 610 security tools used by companies, sorted by popularity
Used by 5 companies
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources.
Used by 5 companies
FTK (Forensic Toolkit) is a computer forensic investigation software used for data analysis and recovery.
Used by 5 companies
Multi Factor Authentication (MFA) is a security mechanism that requires multiple forms of verification to access an account or system.
Used by 5 companies
Single Sign-On (SSO) is an authentication process that allows a user to access multiple applications with one set of login …
Used by 5 companies
TLS (Transport Layer Security) is a cryptographic protocol designed to provide secure communication over a computer network.
Used by 5 companies
Trellix is a cybersecurity platform that provides endpoint protection and threat detection.
Used by 5 companies
Volatility is an open-source memory forensics framework for incident response and malware analysis.
Used by 4 companies
CMMC (Cybersecurity Maturity Model Certification) is a unified cybersecurity standard for future DoD acquisitions.
Used by 4 companies
Cloud Native Application Protection Platform (CNAPP) provides security for cloud-native applications.
Used by 4 companies
Cloud Security Posture Management (CSPM) tools help organizations manage their cloud security posture by continuously monitoring cloud environments for compliance …
Used by 4 companies
A certification that validates the baseline skills needed to perform core security functions and pursue an IT security career.
Used by 4 companies
A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.
Used by 4 companies
Endpoint Detection and Response (EDR) tools provide continuous monitoring and response to advanced threats on endpoints.
Used by 4 companies
MDR (Managed Detection and Response) services provide organizations with threat detection and response capabilities.
Used by 4 companies
Public Key Infrastructure (PKI) is a framework for managing digital certificates and public-key encryption.
Used by 4 companies
Palo Alto Prisma is a cloud security suite that provides comprehensive security for applications and data across cloud environments.
Used by 4 companies
Secure Access Service Edge (SASE) is a network architecture that combines network security functions with WAN capabilities to support the …
Used by 4 companies
Security Orchestration Automation and Response (SOAR) platforms help unify security tools and processes to improve incident response.
Used by 4 companies
A security orchestration, automation, and response platform that helps teams respond to incidents faster and more efficiently.
Used by 4 companies
A tool for endpoint visibility and response, allowing for digital forensic investigations.