Discover 610 security tools used by companies, sorted by popularity
Used by 1 company
The System for Cross-domain Identity Management is a standard for automating the exchange of user identity information.
Used by 1 company
A certification that allows individuals to work in the private security industry in the UK, ensuring they meet specific training …
Used by 1 company
A license required to work in the security industry in the UK, ensuring that security personnel meet specific training and …
Used by 1 company
SPHEREboard is a platform for managing identity hygiene and security.
Used by 1 company
Security Technical Implementation Guides (STIGs) are documents that outline security requirements for IT systems.
Used by 1 company
STIGS (Security Technical Implementation Guides) are documents that outline security requirements for various technologies and systems.
Used by 1 company
STIX (Structured Threat Information Expression) is a language for describing cyber threat information.
Used by 1 company
Salto Systems specializes in electronic locking and access control solutions.
Used by 1 company
Scantronic provides intruder alarm systems and security solutions.
Used by 1 company
Secure Firewall is a network security solution that protects against unauthorized access and threats.
Used by 1 company
Secure Service Edge is a security architecture that integrates networking and security services.
Used by 1 company
SecureWorks Taegis is a security platform that provides threat detection and response capabilities.
Used by 1 company
Cisco Security Cloud is a platform that integrates security capabilities across various Cisco products to provide comprehensive protection.
Used by 1 company
Security Orchestration and automation involves integrating security tools and processes to improve response times and efficiency.
Used by 1 company
A search engine for Internet-connected devices, allowing users to find specific types of computers connected to the internet.
Used by 1 company
Siemplify is a security orchestration and automation platform that streamlines security operations and incident response.
Used by 1 company
Southwest Microwave provides advanced perimeter security solutions.
Used by 1 company
Splunk Processing Language (SPL) is a language used to query and manipulate data in Splunk.
Used by 1 company
StealthBits is a cybersecurity solution focused on data security and identity management.
Used by 1 company
TAXII (Trusted Automated eXchange of Indicator Information) is a protocol for sharing cyber threat information.