129 resultat
Varför Capterra är gratis
DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Lär dig mer om Kiuwan
Know your application's vulnerabilities. Add Kiuwan Static Application Security Testing (SAST) and Software Composition Analysis (SCA) to your source code management. It's easy to set up and use. Scan your code locally, then share results in the cloud. Tailored reports with industry standard security ratings help you reduce technical debt and mitigate risk. Kiuwan provides comprehensive language coverage, integrates with leading IDEs, and fits seamlessly into your CI/CD/DevSecOps process. Lär dig mer om Kiuwan
Know your application's vulnerabilities. Add Kiuwan Static Application Security Testing (SAST) and Software Composition Analysis (SCA) to your source code management. It's easy to set up and use. Scan ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Lär dig mer om Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Lär dig mer om Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With O...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Högautomatiserad lösning för sårbarhetshantering som bygger på många års konsultverksamhet och passar alla IT-avtryck från små och medelstora företag till storföretag Lär dig mer om Autobahn
Autobahn är en innovativ lösning för att mäta och förbättra hackningsmotståndet. Autobahn sparar tid och ökar ditt försvar. Plattformen automatiserar upptäckt av tillgångar, sårbarhetsskanning och cyberjämförelser. Viktigast av allt är att det ger en av marknadens bästa insikter om åtgärder. Autobahn används av företag över hela världen både Fortune 500-storföretag och små och medelstora företag. Autobahn har lämpliga paket för alla storlekar och säkerhetsmedvetenhetsnivåer. Autobahns kunder värdesätter Autobahns användarvänlighet och detaljrika insikter. Lär dig mer om Autobahn
Autobahn är en innovativ lösning för att mäta och förbättra hackningsmotståndet. Autobahn sparar tid och ökar ditt försvar. Plattformen automatiserar upptäckt av tillgångar, sårbarhetsskanning och cyb...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Lär dig mer om Skybox Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Lär dig mer om Skybox Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its con...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Crashtest Security provides the simplest blackbox web app vulnerability scanning experience with advanced scan targets & automation. Lär dig mer om Crashtest Security
Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation. We offer the most advanced crawling options. Our software is able to directly detect attack vectors in all web applications: Revolutionary Single-Page application scanning Painless Multi-Page application setup Documentation-based API scanning Our software is user-friendly yet powerful and provides detailed and accurate vulnerability reports. Lär dig mer om Crashtest Security
Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation. We offer the most advanced crawling options. Our software is able ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Lär dig mer om Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Lär dig mer om Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Sårbarhetshantering som underlättar samarbetet mellan säkerhetsanalytiker, ledning och ägare av tillgångar samt riskprioritering. Lär dig mer om Centraleyezer
Integrerar och korrelerar data från sårbarhetsskannrar och flera flöden i kombination med affärs- och IT-faktorer för att prioritera cybersäkerhetsrisker. Hjälper IT-säkerhetsdirektörer (chief information security officer, CISO), Red Teams och sårbarhetsbedömningsteam att minska tiden för att åtgärda, prioritera och rapportera risker. Används av myndigheter, militär, banker, finans- och e-handelsföretag Lär dig mer om Centraleyezer
Integrerar och korrelerar data från sårbarhetsskannrar och flera flöden i kombination med affärs- och IT-faktorer för att prioritera cybersäkerhetsrisker. Hjälper IT-säkerhetsdirektörer (chief informat...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Detectify automates the knowledge of the best ethical hackers in the world to secure web apps. Stay on top of threats with Detectify. Lär dig mer om Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilities within the OWASP top 10 categories and beyond. Detectifys Deep Scan and Asset Monitoring services identifies security vulnerabilities and misconfigurations across all layers of your internet-facing assets and keeps you up to date for the latest threats. Lär dig mer om Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilit...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
The most proven open source scanning solution to help organizations understand their license compliance and security vulnerability risk Lär dig mer om FlexNet Code Insight
An on-premise Software Composition Analysis solution using automated scans to help organizations understand their license compliance and security vulnerability exposure to open source packages. FlexNet Code Insight easily provides users with a Software Bill of Materials from across the software supply chain and offers continuous monitoring of assets, proactive vulnerability alerts, and recommended remediation actions. The solution helps development teams deliver secure products to customers whil Lär dig mer om FlexNet Code Insight
An on-premise Software Composition Analysis solution using automated scans to help organizations understand their license compliance and security vulnerability exposure to open source packages. FlexNet...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network.
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help secur...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help securi...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Data management and backup solution that helps businesses manage data across cloud environments using automated protection policies.
Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize applications, automate protection policies, recover from Ransomware, search and analyze application data at scale on one platform. From days to seconds.
Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Allt i ett-säkerhetslösning som skannar din hemsida, upptäcker sårbarheter och erbjuder åtgärder i tre steg: Hitta-fastställ-förhindra.
Acunetix är en av marknadsledarna inom automatisk teknik för webbsäkerhetstestning som skannar och granskar alla webbapplikationer inklusive HTML5, JavaScript och Single Page-applikationer, vilket ger den bredaste sårbarhetstäckningen, skanningshastigheten och precisionen. Sök efter över 6 500 webbsårbarheter, 50 000 nätverkssårbarheter och skadlig webbprogramvara. Används av de statliga, militära, utbildnings-, telekommunikations-, bank-, finans- och e-handelssektorerna, inklusive många Fortune 500-företag. Tillgänglig på Windows, Linux och Online.
Acunetix är en av marknadsledarna inom automatisk teknik för webbsäkerhetstestning som skannar och granskar alla webbapplikationer inklusive HTML5, JavaScript och Single Page-applikationer, vilket ger ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution that includes web vulnerability scanning, vulnerability assessment, and vulnerability management. Its strongest points are scanning precision, unique asset discovery technology, and integration with leading issue management and CI/CD solutions.
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution that includes web vulnerability scanning, vulnerability assessment, and vulnerability management. Its strongest po...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Allt-i-ett-sårbarhetshantering. Minska den organisatoriska säkerhetsrisken effektivt – med eller utan programfix!
Minska effektivt den organisatoriska säkerhetsrisken Det kan kännas överväldigande att försöka minska de organisatoriska säkerhetsriskerna i en värld där hundratals nya programvaru- och OS-sårbarheter upptäcks varje månad. TOPIA:s verktygslåda för sårbarhetshantering har smart prioritering och snabb sanering med eller utan programfix för säkerhet. Allt-i-ett-sårbarhetshantering för att analysera, prioritera och åtgärda cyberhot innan de utnyttjas.
Minska effektivt den organisatoriska säkerhetsrisken Det kan kännas överväldigande att försöka minska de organisatoriska säkerhetsriskerna i en värld där hundratals nya programvaru- och OS-sårbarheter ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Security management platform offering fully integrated security controls for threat detection and compliance management.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the O...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Detect risks in 5 mins, Assess, Prioritize and Immediately Remediate them with the SanerNow Vulnerability Management Software
What is the use of detecting Vulnerabilities if you cannot patch them? With SanerNow Integrated Vulnerability and Patch Management Software, you can do both! In LESS THAN 5 MINUTES, it automatically scans and, most accurately, detects vulnerabilities, assessing and prioritizing them based on their severity. It, then, efficiently patches them instantly using integrated remediation through a centralized cloud-based console.
What is the use of detecting Vulnerabilities if you cannot patch them? With SanerNow Integrated Vulnerability and Patch Management Software, you can do both! In LESS THAN 5 MINUTES, it automatically sc...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting & more.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, tu...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines and disturbing your current work
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without disturbing your current workflow. Perform continuous security in the early stages of your agile development lifecycle and quickly fix vulnerabilities. Get in your issue tracker easy step-by-step instructions on where and how to fix each vulnerability. Start a free trial.100% free. No Credit Card
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Alert Logic is the industry's first SaaS-enabled managed detection and response provider, delivering unrivaled security value.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and respo...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Falcon Spotlight provides real-time visibility across your enterprise, giving you relevant and timely information to reduce exposure.
As part of an integrated platform that prevents exploits and post-exploit activity, Falcon Spotlight allows you to research common vulnerabilities and exposures (CVEs) to examine threat actor profiles and targets. Falcon Spotlight provides real-time visibility across your enterprise giving you relevant and timely information you need to reduce your exposure to attacks with zero impact on your endpoints.
As part of an integrated platform that prevents exploits and post-exploit activity, Falcon Spotlight allows you to research common vulnerabilities and exposures (CVEs) to examine threat actor profiles ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
One-stop platform for managing machine digital IDs by discovering, organizing, and tracking digital certificates on autopilot.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview, easy-to-navigate inventory, expiration reporting and many more.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provid...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and licen...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Helping Security Teams, Enterprises, and MSSPs Prioritize and Respond to What Really Matters.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which includes co-editing several industry standards such as ISO 27043 and ISO 30121. Its flagship product, IncMan SOAR, is multi-patented, and it has been adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in EMEA Americas and APAC.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Vulnerability management to identify security vulnerabilities in enterprise networks suitable for any application area.
Greenbone solutions are based on open source software. They analyze IT networks for vulnerabilities and provide security reports and remediation advice before attackers can exploit the security holes. Part of the solutions is a daily, automatic security update. Our vulnerability management is available as a physical, virtual and cloud-based solution and is a key security component in over 50,000 professional installations.
Greenbone solutions are based on open source software. They analyze IT networks for vulnerabilities and provide security reports and remediation advice before attackers can exploit the security holes. ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Dark Web ID övervakar affärsdata och inloggningsuppgifter och varnar dig om du finns till försäljning på mörka webbmarknader så att du kan förhindra intrång.
Dark Web ID hjälper leverantörer av hanterade tjänster (managed service provider, MSP) och interna IT-team att skydda sin organisation och sina kunder från ett cybersäkerhetsbrott genom att övervaka det mörka nätet 24/7, året runt och varna om känsliga företags- eller personaldata eller lösenord hittas för försäljning på det mörka nätet.
Dark Web ID hjälper leverantörer av hanterade tjänster (managed service provider, MSP) och interna IT-team att skydda sin organisation och sina kunder från ett cybersäkerhetsbrott genom att övervaka de...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It pro...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability manageme...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Automated testing that sends you weekly security reports generated after testing the site.
Automated testing that sends you weekly security reports generated after testing the site.
Automated testing that sends you weekly security reports generated after testing the site....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to ...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software.
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step of the SDLC, which leads to less vulnerabilities, reduced fixes to older code, lower costs and, most importantly, far more secure applications. Allows to achieve PCI DSS Compliance. Free Demo available on web site.
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step o...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime.
Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach with true continuous data protection. CE delivers near-zero recovery times by monitoring the health of your applications and instantly failing over if a threat is detected. Simply put, we can help you prepare for and protect your applications, servers, and data from disaster and unplanned outages.
Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach wi...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management.
Automatic scanning and dashboard presentation of all PCs and servers for known and documented vulnerabilities. User-defined rules for regular comprehensive checks. Automated review of device configuration settings. Drill down by endpoint or by potential threat for detailed threat assessment. Combine with patch and update management capabilities for comprehensive and continuous security.
Automatic scanning and dashboard presentation of all PCs and servers for known and documented vulnerabilities. User-defined rules for regular comprehensive checks. Automated review of device configurat...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Security program and vulnerability management tool that allows you to manage your application security program.
Security program and vulnerability management tool that allows you to manage your application security program.
Security program and vulnerability management tool that allows you to manage your application security program....
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowere...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more....
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
ImmuniWeb® leverages Machine Learning and Artificial Intelligence for intelligent automation and acceleration of app security testing.
ImmuniWeb Application Security Testing platform facilitates DevSecOps and helps our customers monitor, detect, mitigate and prevent application security risks in the most reliable and cost-efficient way. ImmuniWeb provides flexible one time and continuous subscription for DAST, SAST, IAST and SCA for web internal and external applications.
ImmuniWeb Application Security Testing platform facilitates DevSecOps and helps our customers monitor, detect, mitigate and prevent application security risks in the most reliable and cost-efficient wa...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Intruder är en proaktiv sårbarhetsskanner som hittar svagheter i dina exponerade system och hjälper till med att åtgärda dessa svagheter.
Intruder är en proaktiv sårbarhetsskanner som hittar svagheter i ditt digitala onlinesystem, förklarar riskerna och hjälper till att åtgärda problemen innan ett brott kan inträffa. Cloud Connectors för AWS, Google Cloud och Azure hjälper dig att synkronisera dina system, så att ingenting lämnas ogjort. Utvecklarintegrationer med Slack och Jira gör det enkelt att hålla sig uppdaterad.
Intruder är en proaktiv sårbarhetsskanner som hittar svagheter i ditt digitala onlinesystem, förklarar riskerna och hjälper till att åtgärda problemen innan ett brott kan inträffa. Cloud Connectors fö...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering
Cryptosense Analyzer Platform gives you full control of the cryptography used in your applications.
- Use cloud cryptography services without fear of compromising security or compliance. - Continuously monitor applications in the cloud. - Verify the configuration of the cloud KMS or HSM. - Find vulnerabilities in application cryptography.
- Use cloud cryptography services without fear of compromising security or compliance. - Continuously monitor applications in the cloud. - Verify the configuration of the cloud KMS or HSM. - Find vul...
Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime p...
  • Bedömning av sårbarhet
  • Riskhantering
  • Webbsökning
  • Nätverksskanning
  • Upptäckt av tillgångar
  • Patchhantering