Discover 603 security tools used by companies, sorted by popularity
Used by 2 companies
DDoS (Distributed Denial of Service) is a malicious attempt to disrupt the normal functioning of a targeted server, service, or …
Used by 2 companies
A security solution designed to protect users while accessing applications across various environments, including in the office, at home, or …
Used by 2 companies
FIDO2 is an open authentication standard that enables users to authenticate to online services using devices like security keys.
Used by 2 companies
FortiOS is the operating system for Fortinet's security appliances, providing advanced security features.
Used by 2 companies
Fortitoken is a multi-factor authentication solution that provides secure access to accounts through a virtual token on a mobile device.
Used by 2 companies
HBSS (Host Based Security System) is a suite of tools used to monitor and protect information systems.
Used by 2 companies
IDS (Intrusion Detection System) is a device or software application that monitors a network or systems for malicious activity or …
Used by 2 companies
IPS (Intrusion Prevention System) is a network security technology that inspects network traffic for malicious activity and can take action …
Used by 2 companies
Intrusion Prevention System/Intrusion Detection System, used to monitor network or system activities for malicious activities or policy violations.
Used by 2 companies
Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources.
Used by 2 companies
MS Entra ID is a cloud identity and access management service that helps organizations manage user identities and secure access …
Used by 2 companies
Malware protection refers to software designed to detect and eliminate malicious software.
Used by 2 companies
NIST 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations …
Used by 2 companies
Orca is a cloud security platform that provides visibility and security for cloud workloads.
Used by 2 companies
Cortex XSOAR is a security orchestration, automation, and response platform that helps organizations automate their security operations and incident response …
Used by 2 companies
Security Assertion Markup Language (SAML) 2.0 is an open standard for exchanging authentication and authorization data between parties, particularly between …
Used by 2 companies
Static Application Security Testing (SAST) is a method of debugging by examining source code before a program is run.
Used by 2 companies
Software Composition Analysis (SCA) is a process for identifying open source and third-party components in software to manage security and …
Used by 2 companies
Managed SOC services provide 24x7 monitoring and incident response for security events.