Discover 610 security tools used by companies, sorted by popularity
Used by 2 companies
IAM systems are frameworks for managing digital identities and controlling user access to resources within an organization.
Used by 2 companies
MS Entra ID is a cloud identity and access management service that helps organizations manage user identities and secure access …
Used by 2 companies
Malware protection refers to software designed to detect and eliminate malicious software.
Used by 2 companies
NIST 800-53 is a publication that provides a catalog of security and privacy controls for federal information systems and organizations …
Used by 2 companies
OpenSCAP is a framework for compliance monitoring and vulnerability management.
Used by 2 companies
Orca is a cloud security platform that provides visibility and security for cloud workloads.
Used by 2 companies
Cortex XSOAR is a security orchestration, automation, and response platform that helps organizations automate their security operations and incident response …
Used by 2 companies
Security Assertion Markup Language (SAML) 2.0 is an open standard for exchanging authentication and authorization data between parties, particularly between …
Used by 2 companies
Static Application Security Testing (SAST) is a method of debugging by examining source code before a program is run.
Used by 2 companies
Software Composition Analysis (SCA) is a process for identifying open source and third-party components in software to manage security and …
Used by 2 companies
Managed SOC services provide 24x7 monitoring and incident response for security events.
Used by 2 companies
SailPoint IdentityIQ is an identity governance solution that helps organizations manage user access and compliance across various systems.
Used by 2 companies
Semgrep is a static analysis tool that helps developers find bugs and enforce coding standards in their codebases.
Used by 2 companies
ServiceNow VR is a module within ServiceNow that focuses on vulnerability response and management.
Used by 2 companies
Shield is a security tool designed to protect cloud environments from various threats and vulnerabilities.
Used by 2 companies
A provider of electronic design automation (EDA) software and services, including application security solutions.
Used by 2 companies
An open-source tool for collaborative forensic timeline analysis.
Used by 2 companies
A security solution designed to protect endpoints from threats and vulnerabilities.
Used by 2 companies
WebAuthn is a web standard published by the World Wide Web Consortium (W3C) that enables web applications to use public …