Security Tools

Discover 610 security tools used by companies, sorted by popularity

Authentication

Used by 1 company

Authentication is the process of verifying the identity of a user or device.

Axis

Used by 1 company

Axis is a manufacturer of network cameras and video surveillance solutions.

Azure AD B2C

Used by 1 company

Azure Active Directory B2C is a cloud identity management solution for your web and mobile apps that can scale to …

Azure Defender

Used by 1 company

Azure Defender is a unified security management system that provides advanced threat protection across hybrid cloud workloads.

Azure Firewall

Used by 1 company

Azure Firewall is a cloud-native network security service that protects Azure Virtual Network resources.

Azure Information Protection Data Loss Prevention (DLP) helps organizations protect sensitive information from accidental sharing.

BSCP

Used by 1 company

The Bugcrowd Security Certification Program is designed to validate the skills of security researchers in bug bounty programs.

BishopFox

Used by 1 company

BishopFox provides security testing services to help organizations identify vulnerabilities in their systems.

Blackpoint

Used by 1 company

A cybersecurity tool that offers managed detection and response services.

BloodHound

Used by 1 company

BloodHound is a tool used to analyze Active Directory environments and identify potential attack paths.

Building Management Systems are used to monitor and control building services such as lighting, heating, and security.

C-Tec

Used by 1 company

C-Tec manufactures fire alarm systems and emergency lighting solutions.

CIS Controls

Used by 1 company

CIS Controls are a set of best practices for securing IT systems and data.

CISA

Used by 1 company

CISA is a certification for information systems audit, control, and security professionals.

COMSEC

Used by 1 company

COMSEC (Communications Security) refers to measures taken to protect communications from unauthorized access and exploitation.

CWEE

Used by 1 company

Certified Web Application Ethical Hacker certification focuses on ethical hacking techniques for web applications.

Cato

Used by 1 company

Cato provides cloud-based SASE and VPN solutions for secure connectivity.

Censys

Used by 1 company

A search engine that allows users to discover and analyze devices and services exposed to the internet.

Check Point NGX

Used by 1 company

Check Point NGX is a firewall and security management solution that protects networks from threats.

Check Point Quantum Security Gateways provide advanced threat prevention and secure network access.