Security Tools

Discover 603 security tools used by companies, sorted by popularity

DDoS

Used by 2 companies

DDoS (Distributed Denial of Service) is a malicious attempt to disrupt the normal functioning of a targeted server, service, or …

Enterprise Browser

Used by 2 companies

A security solution designed to protect users while accessing applications across various environments, including in the office, at home, or …

FIDO2

Used by 2 companies

FIDO2 is an open authentication standard that enables users to authenticate to online services using devices like security keys.

FortiOS

Used by 2 companies

FortiOS is the operating system for Fortinet's security appliances, providing advanced security features.

Fortitoken

Used by 2 companies

Fortitoken is a multi-factor authentication solution that provides secure access to accounts through a virtual token on a mobile device.

HBSS

Used by 2 companies

HBSS (Host Based Security System) is a suite of tools used to monitor and protect information systems.

IDS

Used by 2 companies

IDS (Intrusion Detection System) is a device or software application that monitors a network or systems for malicious activity or …

IPS

Used by 2 companies

IPS (Intrusion Prevention System) is a network security technology that inspects network traffic for malicious activity and can take action …

IPS/IDS

Used by 2 companies

Intrusion Prevention System/Intrusion Detection System, used to monitor network or system activities for malicious activities or policy violations.

ISE

Used by 2 companies

Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources.

Kantech

Used by 2 companies

Kantech is a provider of security management solutions.

MS Entra ID

Used by 2 companies

MS Entra ID is a cloud identity and access management service that helps organizations manage user identities and secure access …

Malware protection

Used by 2 companies

Malware protection refers to software designed to detect and eliminate malicious software.

NIST 800-53

Used by 2 companies

NIST 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations …

Orca

Used by 2 companies

Orca is a cloud security platform that provides visibility and security for cloud workloads.

Cortex XSOAR is a security orchestration, automation, and response platform that helps organizations automate their security operations and incident response …

SAML 2.0

Used by 2 companies

Security Assertion Markup Language (SAML) 2.0 is an open standard for exchanging authentication and authorization data between parties, particularly between …

SAST

Used by 2 companies

Static Application Security Testing (SAST) is a method of debugging by examining source code before a program is run.

SCA

Used by 2 companies

Software Composition Analysis (SCA) is a process for identifying open source and third-party components in software to manage security and …

SOC

Used by 2 companies

Managed SOC services provide 24x7 monitoring and incident response for security events.