Discover 610 security tools used by companies, sorted by popularity
Used by 2 companies
WinHex is a universal hex editor, particularly useful for computer forensics, data recovery, and low-level data processing.
Used by 2 companies
XRY is a forensic software tool used for data extraction from mobile devices and other digital sources.
Used by 2 companies
XSIAM is a security platform that integrates various security tools and processes to enhance threat detection and response.
Used by 1 company
AES (Advanced Encryption Standard) is a symmetric encryption algorithm widely used for securing data.
Used by 1 company
AMP (Advanced Malware Protection) is a security solution that helps detect and respond to malware threats.
Used by 1 company
AWS WAF is a web application firewall that helps protect web applications from common web exploits.
Used by 1 company
A directory service developed by Microsoft for Windows domain networks, providing authentication and authorization services.
Used by 1 company
A solution for managing Active Directory and Azure Active Directory identities.
Used by 1 company
Airlock is a security tool focused on application and API security.
Used by 1 company
A security solution that provides application whitelisting and execution control.
Used by 1 company
A system designed to detect unauthorized entry or other emergencies and alert the user or authorities.
Used by 1 company
Ansul R102 is a fire suppression system designed for commercial kitchens to protect against fire hazards.
Used by 1 company
Software designed to detect and destroy malware, including viruses, worms, and spyware.
Used by 1 company
AppGate provides secure access solutions for enterprises, focusing on zero trust security.
Used by 1 company
AppLocker is a feature of Windows that helps administrators control which applications and files users can run.
Used by 1 company
A security measure that allows organizations to control which applications can run on their systems.
Used by 1 company
A security measure that allows only approved applications to run on a system.
Used by 1 company
The AESCSF provides guidelines and best practices for managing cybersecurity risks in the energy sector.
Used by 1 company
The Information Security Manual (ISM) provides guidelines for managing security risks and ensuring compliance with security standards in Australian government …