Discover 603 security tools used by companies, sorted by popularity
Used by 1 company
Tunneling technologies encapsulate data packets to allow secure transmission over a public network.
Used by 1 company
UBA (User Behavior Analytics) tools analyze user behavior to detect anomalies that may indicate security threats.
Used by 1 company
User and Entity Behavior Analytics (UEBA) is a security process that uses machine learning to analyze user behavior and detect …
Used by 1 company
UNIX LDAP is a protocol used to access and maintain distributed directory information services over an Internet Protocol (IP) network.
Used by 1 company
The process of identifying, classifying, and mitigating vulnerabilities in software and systems.
Used by 1 company
A cybersecurity company that provides network security solutions for small and medium-sized businesses.
Used by 1 company
A security system that monitors and filters HTTP traffic to and from a web application.
Used by 1 company
A technology that restricts or controls the content a user is able to access on the internet.
Used by 1 company
A cybersecurity company that provides antivirus and internet security services.
Used by 1 company
Whitesource is a software composition analysis tool that helps organizations manage open source security and compliance.
Used by 1 company
Windows Defender is an antivirus and anti-malware component of Microsoft Windows.
Used by 1 company
Yara-L is a language used for creating rules to identify and classify malware.
Used by 1 company
Zero Trust Architecture is a security model that requires strict identity verification for every person and device trying to access …
Used by 1 company
Zero Trust solutions are security frameworks that require strict identity verification for every person and device trying to access resources.
Used by 1 company
Ziton provides fire alarm systems and solutions for various applications.
Used by 1 company
Container security refers to the measures taken to secure containerized applications and their underlying infrastructure.
Used by 1 company
Technologies used to store digital data for retrieval and use.
Used by 1 company
The process of capturing and storing audio and video data in a digital format.
Used by 1 company
eMASS is a tool used for managing cybersecurity compliance and risk management framework.
Used by 1 company
Enterprise anti-virus solutions are security software designed to protect computer networks from malware and other security threats.