100 risultati
Perché Capterra è gratis
Consente di conoscere le vulnerabilità delle proprie applicazioni. Aggiungi Kiuwan Static Application Security Testing (SAST) e Static Code Analysis (SCA) alla gestione del codice sorgente. Facile da configurare e utilizzare. Permette di eseguire la scansione locale del codice, quindi di condividere i risultati nel cloud. Report tagliati su misura con valutazioni della sicurezza basate su standard del settore consentono di ridurre il debito tecnico e mitigare i rischi. Kiuwan offre una copertura dei linguaggi completa e si integra perfettamente con i principali IDE e nel processo CI/CD/DevSecOps. Ulteriori informazioni su Kiuwan Piattaforma DevSecOps con SAST e SCA, integrazione IDE e analisi distribuita che permette di proteggere le applicazioni dalle minacce esterne. Ulteriori informazioni su Kiuwan
Sfrutta la tecnologia di automazione basata su eventi per offrire automazione a ciclo chiuso e servizio completo per la conformità e la vulnerabilità dei sistemi IT. Ulteriori informazioni su SaltStack SecOps Sfrutta la tecnologia di automazione basata su eventi per offrire automazione a ciclo chiuso e servizio completo per la conformità e la vulnerabilità dei sistemi IT. Ulteriori informazioni su SaltStack SecOps

da Skybox Security

(0 recensioni)
Visita il sito web
A differenza di qualsiasi altro fornitore, Skybox Vulnerability Control offre un approccio sistematico alla gestione delle vulnerabilità, Questa soluzione si basa sulla visibilità completa della superficie di attacco, utilizzando il suo contesto per analizzare, dare priorità e correggere in fretta le tue vulnerabilità più rischiose. Ulteriori informazioni su Vulnerability Control Identifica e assegna priorità ai rischi della tua rete, con soluzioni complete di scansione e analisi delle vulnerabilità. Ulteriori informazioni su Vulnerability Control
Integra e mette in relazione i dati degli scansioni delle vulnerabilità e i molteplici feed di exploit in combinazione con i fattori aziendali e IT e per assegnare le priorità ai rischi di sicurezza informatica. Aiuta i team CISO, Red Teams e di valutazione delle vulnerabilità a ridurre i tempi di risoluzione, a stabilire le priorità e a segnalare i rischi. Utilizzato da governi, eserciti, istituzioni bancarie, istituzioni finanziarie e aziende di e-commerce. Ulteriori informazioni su Centraleyezer Gestione delle vulnerabilità che facilita la collaborazione tra gli analisti della sicurezza, i proprietari di gestione e risorse e l'assegnazione di priorità ai rischi. Ulteriori informazioni su Centraleyezer

da RapidFire Tools

(1 recensione)
Visita il sito web
Cyber Hawk è un'ottima soluzione di sicurezza informatica per gli MSP che consente loro di creare, vendere e fornire il proprio servizio di rilevamento delle minacce interne personalizzato. Rileva violazioni delle politiche di sicurezza IT, attività utente anomale, modifiche sospette delle reti e minacce causate da malware che superano le protezioni esterne. Cyber Hawk include anche piani di servizio integrati, materiali di marketing e molto altro ancora. Le licenze MSP consentono un utilizzo illimitato per tutti i client serviti da ciascuna posizione. Rimborso garantito a 30 giorni. Ulteriori informazioni su Cyber Hawk Cyber Hawk è un'ottima soluzione di sicurezza informatica per gli MSP che consente loro di creare, vendere e fornire il proprio servizio di rilevamento delle minacce interne personalizzato. Ulteriori informazioni su Cyber Hawk

da ManageEngine

(0 recensioni)
Visita il sito web
Con Vulnerability Manager Plus tutti gli aspetti della gestione delle vulnerabilità sono semplificati con una console centralizzata: dal rilevamento e la valutazione delle vulnerabilità all'eliminazione con un flusso di lavoro automatizzato di patch. Puoi anche gestire le configurazioni di sicurezza, rafforzare i server web, mitigare le vulnerabilità di tipo zero-day, eseguire ispezioni finali ed eliminare il software rischioso. Semplifica la gestione delle vulnerabilità con l'agente distribuibile in remoto, l'interfaccia basata sul web e la scalabilità infinita. Ulteriori informazioni su ManageEngine Vulnerability Manager Plus Uno strumento basato su console centralizzato, facile da implementare e conveniente per stabilire le priorità ed eliminare vulnerabilità e configurazioni errate. Ulteriori informazioni su ManageEngine Vulnerability Manager Plus
Patch Manager Plus è un software per la gestione automatizzata delle patch che offre alle aziende un'unica interfaccia per tutte le attività di gestione delle patch. Compatibile con più piattaforme, consente di eseguire patch su Windows, Mac, Linux e su oltre 300 applicazioni di terze parti. Potrai automatizzare la ricerca di patch mancanti, testare e approvare l'applicazione di patch senza problemi, personalizzare le politiche di distribuzione per soddisfare le esigenze aziendali, rifiutare le patch e generare report di vulnerabilità. Patch Manager Plus è ora disponibile sia nel cloud che sul posto. Ulteriori informazioni su Patch Manager Plus Patch Manager Plus è un software per la gestione delle patch automatizzato che permette di eseguire patch su Windows, Mac, Linux e su oltre 300 applicazioni di terze parti. Ulteriori informazioni su Patch Manager Plus
Il software Cryptosense Analyzer aiuta i suoi clienti a trovare le vulnerabilità della sicurezza nella crittografia utilizzata in infrastrutture e applicazioni, per poi correggerle prima che vengano sfruttate. Monitora l'utilizzo della crittografia in applicazioni, protocolli di rete e hardware crittografico e lo analizza attraverso appositi algoritmi, per trovare vulnerabilità nella gestione delle chiavi, generazione della casualità, uso della crittografia e altro ancora. Ulteriori informazioni su Cryptosense Cryptosense fornisce software per rilevare ed eliminare le vulnerabilità causate dalle violazioni della crittografia in applicazioni e infrastrutture. Ulteriori informazioni su Cryptosense

da Tenable Network Security

(50 recensioni)
Visualizza profilo
Creato da professionisti della sicurezza per i loro pari, Nessus Professional è di fatto lo standard industriale per la valutazione delle vulnerabilità. Nessus esegue valutazioni temporali che aiutano i professionisti della sicurezza a identificare e correggere rapidamente le vulnerabilità, compresi eventuali difetti del software, patch mancanti, malware e configurazioni errate. Con funzionalità come criteri e modelli predefiniti, funzionalità snooze di gruppo e aggiornamenti in tempo reale, rende semplice e intuitiva la valutazione delle vulnerabilità. Nessus Pro, la soluzione leader del settore nella valutazione delle vulnerabilità, consente di identificare e correggere le vulnerabilità in modo rapido e semplice.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize applications, automate protection policies, recover from Ransomware, search and analyze application data at scale on one platform. From days to seconds. Data management and backup solution that helps businesses manage data across cloud environments using automated protection policies.
Acunetix è leader nel mercato della tecnologia di verifica automatica della sicurezza web che analizza e ispeziona tutte le applicazioni web tra cui HTML5, JavaScript e applicazioni a pagina singola. Scansione di 4.500 vulnerabilità tra cui SQLi e XSS. Viene utilizzato dai settori governativo, militare, istruzione, telecomunicazioni, bancario, finanziario e eCommerce, comprese molte aziende della classifica Fortune 500. Acunetix fornisce una soluzione conveniente, semplice, scalabile e a disponibilità elevata. Disponibile su Windows, Linux e online È uno strumento per la gestione delle vulnerabilità che esegue la scansione del sito web, rileva vulnerabilità come XSS o SQL Injection e fornisce una soluzione.
Netsparker Security Scanner è una soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web. L'esclusiva tecnologia di scansione basata su prove di Netsparker, consente di allocare più tempo per correggere i difetti segnalati, sfruttando automaticamente le vulnerabilità identificate in modo sicuro e di sola lettura e produce anche una prova di sfruttamento. Pertanto è possibile vedere immediatamente l'impatto della vulnerabilità e non è necessario verificarlo manualmente. Soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
Oltre 1.000 tra le più grandi organizzazioni del mondo si affidano al software per indagini di Resolver. Questo programma esamina i risultati eseguendo un'analisi delle cause principali per determinare i fattori che hanno contribuito a determinare i problemi e i controlli non superati. Potrai comunicare facilmente i risultati e le azioni correttive alle principali parti interessate. Inoltre, potrai possibile gestire i dati delle indagini da un'unica posizione centralizzata e visualizzare le relazioni tra incidenti, persone e luoghi affinché il tuo team possa identificare le tendenze e prevenire incidenti in futuro. Il software di Resolver offre al tuo team un quadro completo per consentirgli di identificare i collegamenti tra indagini e incidenti monitorati.
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction. Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting & more.
Probely consente ai tecnici della sicurezza e DevOps di fornire app web sicure senza compromettere le scadenze. Integra in modo semplice e automatico i test di sicurezza nel tuo ciclo di vita dello sviluppo Agile, senza disturbare il flusso di lavoro attuale. Esegui continuamente funzioni di sicurezza nelle prime fasi del tuo ciclo di vita dello sviluppo Agile e correggi rapidamente le vulnerabilità. Ottieni istruzioni semplici e dettagliate dal sistema di monitoraggio dei problemi per vedere dove e come risolvere ogni vulnerabilità. Inizia una prova gratuita al 100%. Non è richiesta alcuna carta di credito. Probely consente ai tecnici della sicurezza e DevOps di fornire app web sicure senza compromettere le scadenze e interferire con il lavoro attuale.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Funzioni di cancellazione remota, blocco e individuazione per tutti i sistemi operativi. DriveStrike è una soluzione di protezione di dati e dispositivi per i dispositivi smarriti, rubati, mancanti o ritirati. Ti consente di proteggere i dispositivi che sono sfuggiti al tuo controllo, per prevenire la compromissione dei dati. Dagli account personali alle organizzazioni Fortune 500 che operano in ambito sanitario, legale, dei servizi finanziari, governativo, e-commerce e intrattenimento, DriveStrike previene le violazioni dei dati per garantire riservatezza, conformità e vantaggio competitivo. Cancellazione remota dei dati di computer e dispositivi mobili per tutti i sistemi operativi e tipi di hardware.
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring. Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.

da Micro Focus

(8 recensioni)
Visualizza profilo
User behavior analytics and vulnerability management solution that helps identify internal and external threats. User behavior analytics and vulnerability management solution that helps identify internal and external threats.

da Greenbone Networks

(7 recensioni)
Visualizza profilo
A set of SSL-secured vulnerability management tools including system scanner and access control manager. A set of SSL-secured vulnerability management tools including system scanner and access control manager.
Keyhub è una piattaforma completa per la gestione del ciclo di vita dei certificati. È progettata per gestire gli ID digitali delle macchine attraverso il rilevamento, l'organizzazione e il monitoraggio dei certificati digitali in automatico. Fornisce sottodomini approfonditi e scansioni delle reti interne, panoramica dell'integrità del sistema nella dashboard, inventario di facile navigazione, creazione di report sulle scadenze e molto altro ancora. Piattaforma unica per la gestione degli ID digitali delle macchine attraverso il rilevamento, l'organizzazione e il monitoraggio dei certificati digitali in automatico.

da WhiteSource Software

(5 recensioni)
Visualizza profilo
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. Find & fix security and compliance issues in open source libraries in real-time
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
AppTrana is a fully managed 24x7 application security solution that identifies application-layer vulnerabilities; protects & accelerates them instantly through a WAF and CDN; monitors traffic through proprietary machine learning algorithms and with its in-house security experts blocking emerging threats and DDoS attacks. We are trusted by over 1700+ global customers. We currently serve the Government, Banking, Finance, E-Commerce and SaaS based sectors. Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.

da SecPod Technologies

(2 recensioni)
Visualizza profilo
SanerNow provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. SanerNow combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy to manage solution. SanerNow creates computer security software for proactively managing endpoint computer risks.
Visualizza profilo
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step of the SDLC, which leads to less vulnerabilities, reduced fixes to older code, lower costs and, most importantly, far more secure applications. Allows to achieve PCI DSS Compliance. Free Demo available on web site. Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach with true continuous data protection. CE delivers near-zero recovery times by monitoring the health of your applications and instantly failing over if a threat is detected. Simply put, we can help you prepare for and protect your applications, servers, and data from disaster and unplanned outages. Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime.

da RedSeal Networks

(1 recensione)
Visualizza profilo
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Intruder trova i punti deboli delle proprietà digitali online, spiega i rischi e consente di eliminare i problemi prima che possa verificarsi una violazione. I connettori cloud per AWS, Google Cloud e Azure consentono di sincronizzare i sistemi, pertanto non viene trascurato alcun aspetto. Le integrazioni degli sviluppatori con Slack e Jira consentono di mantenere facilmente sempre aggiornato il sistema. Questa soluzione permette di trovare i punti deboli nella proprietà digitali online, spiegare i rischi e di eliminare i problemi prima che possa verificarsi una violazione.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
Hybrid approach to vulnerability scanning with accurate security assessment results. Hybrid approach to vulnerability scanning with accurate security assessment results.
Visualizza profilo
Automatic scanning and dashboard presentation of all PCs and servers for known and documented vulnerabilities. User-defined rules for regular comprehensive checks. Automated review of device configuration settings. Drill down by endpoint or by potential threat for detailed threat assessment. Combine with patch and update management capabilities for comprehensive and continuous security. Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management.
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
Fyde aiuta le aziende con una forza lavoro sempre più distribuita a mitigare il rischio di violazioni, consentendo l'accesso sicuro alle risorse aziendali critiche a dipendenti, partner, appaltatori e addetti all'outsourcing. Accesso sicuro a Internet e alle risorse aziendali con un'unica soluzione.
Detectify automates the knowledge of the best ethical hackers in the world to secure websites against 1500+ known vulnerabilities beyond OWASP Top 10. In agile tech, the potential attack surface increases with each release. With Detectify, users monitor subdomains for potential takeovers and remediate security bugs in staging and production as soon as they are known, to stay on top of threats. Detectify automates the knowledge of the best ethical hackers in the world to secure websites. Stay on top of threats with Detectify.
Automated testing that sends you weekly security reports generated after testing the site. Automated testing that sends you weekly security reports generated after testing the site.
Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation. Software developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance. Sonatype's Nexus Platform automates open source governance to reduce risk and accelerate software innovation.

da Symantec

(0 recensioni)
Visualizza profilo
Symantec Control Compliance Suite (CCS) delivers the core assessment technologies to enable security and compliance programs, as well as support IT operations in the data center. Control Compliance Suite delivers asset autodiscovery, automates security assessments across procedural, technical, and third-party controls, and calculates and aggregates risk scores according to business-defined threshholds. Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies.

da NopSec

(0 recensioni)
Visualizza profilo
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner-agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

da Kenna Security

(0 recensioni)
Visualizza profilo
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data. Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk.

da UpGuard

(0 recensioni)
Visualizza profilo
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world. Reduce cyber risk, prevent data breaches and protect customer data.

da RIPS Technologies

(0 recensioni)
Visualizza profilo
RIPS è l'unica soluzione di analisi del codice dedicata al linguaggio Java e PHP. RIPS è in grado di rilevare le più complesse vulnerabilità di sicurezza, profondamente annidate nel codice Java e PHP, che nessun altro strumento è in grado di trovare. Supporta tutte le principali infrastrutture Java e PHP, l'integrazione SDLC, gli standard di settore pertinenti e può essere implementata come software ospitato o utilizzata come servizio cloud. Grazie alla sua elevata precisione e all'assenza di falsi positivi, RIPS è la scelta ideale per analizzare il codice. Rileva automaticamente i problemi di sicurezza reali nelle applicazioni Java e PHP senza falsi positivi, consentendo di ottimizzare l'efficienza del team.

da CA Technologies

(0 recensioni)
Visualizza profilo
Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security.

da MetricStream

(0 recensioni)
Visualizza profilo
Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention.

da Isograph

(0 recensioni)
Visualizza profilo
Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes.

da Sentinel IPS

(0 recensioni)
Visualizza profilo
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

da Mageni Security

(0 recensioni)
Visualizza profilo
Mageni provides a free vulnerability scanning and vulnerability management solution that empowers you to find, prioritize, remediate and manage the cyber vulnerabilities. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors it offers a cost-effective, simple, scalable, and high availability solution. Mageni provides a free vulnerability scanning and management platform which helps you need to find and remediate the vulnerabilities.

da SecludIT

(0 recensioni)
Visualizza profilo
Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments.

da Cyberwatch

(0 recensioni)
Visualizza profilo
Complete vulnerability magement solution Cyberwatch finds the vulnerabilities of your servers, desktops, network devices and containers, and reviews them based on your business context. Cyberwatch builds for you a full inventory of your assets and your vulnerabilities. With over 15 000 new vulnerabilities per year, Cyberwatch helps you to prioritize the vulnerabilties of your information system and to take the best decisions based on your real risk. French Vulnerability Management Solution Manage your vulnerabilities from their detection to their correction

da VigiTrust

(0 recensioni)
Visualizza profilo
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.

da Outpost24

(0 recensioni)
Visualizza profilo
SWAT is a continuous vulnerability management solution for Web applications allowing a full vulnerability coverage thanks to the combination of vulnerability scanning tools and Outpost24 experienced security technicians. SWAT adjusts its scanning to new threats discovred and adapts to any changes in the application. All deployment and maintenance is performed by Outpost24 experts team and the customer support is available 24/7. Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning.

da Alert Logic

(0 recensioni)
Visualizza profilo
Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Get Vulnerability Management as part of Alert Logic's SIEMless Threat Management offerings, connecting platform, intel & experts.

da SecurityMetrics

(0 recensioni)
Visualizza profilo
Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results.

da 10Security

(0 recensioni)
Visualizza profilo
Security program and vulnerability management tool that allows you to manage your application security program. Security program and vulnerability management tool that allows you to manage your application security program.

da Ziwit

(0 recensioni)
Visualizza profilo
Protect your website or web application 365 days a year thanks to daily automated audits to detect your security flaws. Adopt the Offensive Cyber Security method to protect your business. Discover the high-performance web vulnerability scanner by HTTPCS: - Zero False Positive Guarantee - 100% Mapping (Headless Technology to crawl dynamic content) - Security Flaws listing : Top 10 OWASP, CVE and much more! - Countermeasures to apply - Replay the attacks to understand the risks incurred. Without technical expertise, run automated security audits to detect security flaws on your site or web application. Support provided.

da Conventus

(0 recensioni)
Visualizza profilo
An automated, integrated, data-driven platform that provides the most effective method of prioritizing and remediating the vulnerabilities and exposures that represent the greatest risk to your business. NorthStars flexible scoring model empowers organizations with the freedom and transparency to decide what factors best reflect their business needs and risk appetite. NorthStar Delivers: - Single Source of Truth - Completely customizable scoring - Simplified and Faster Data Integrations Prioritize and remediate the vulnerabilities and exposures that matter most to your business.

da Software Secured

(0 recensioni)
Visualizza profilo
SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code.

da CloudFabrix

(0 recensioni)
Visualizza profilo
With cfxRealize you get continuous visibility and intelligence to optimize hardware and software assets usage and spend. Also enables faster adoption of new hardware and software consumption models. .

da ITrust.fr

(0 recensioni)
Visualizza profilo
IKare assists all company sizes to sustainably improve their IT security level. IKare assists all company sizes to sustainably improve their IT security level.

da CloudPassage

(0 recensioni)
Visualizza profilo
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks.

da RiskSense

(0 recensioni)
Visualizza profilo
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

da BeyondTrust

(0 recensioni)
Visualizza profilo
Vulnerability Management enables IT security teams to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, cloud, container, and virtual infrastructuresdelivering risk analysis in context. Vulnerability Management allows IT security professionals to scan working system, detect weaknesses, and prevent intrusions.

da Humming Heads

(0 recensioni)
Visualizza profilo
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.

da Brinqa

(0 recensioni)
Visualizza profilo
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.

da AppScanOnline

(0 recensioni)
Visualizza profilo
Helps you find the code vulnerabilities and secure your app. Helps you find the code vulnerabilities and secure your app.

da JuliaSoft

(0 recensioni)
Visualizza profilo
Julia Analyzer è un analizzatore statico approfondito per codice Java, Android e .NET (C#). La tecnologia si basa sul metodo scientifico di interpretazione astratta, che consente di rilevare vulnerabilità e difetti non identificabili utilizzando approcci tradizionali basati sul pattern matching. Il server di analisi Julia può essere installato in locale o utilizzato nel cloud. La soluzione è completa di plug-in per gli IDE più comuni e si adatta al tuo ambiente di integrazione continua. Julia Analyzer è un analizzatore statico approfondito per codice Java, Android e .NET (C#) che permette i rilevare con efficienza le vulnerabilità.

da WP Hacked Help

(0 recensioni)
Visualizza profilo
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites

da EndGame

(0 recensioni)
Visualizza profilo
Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Endpoint protection platform that reduces the cost and complexity of your endpoint environment.

da DigitalDefense

(0 recensioni)
Visualizza profilo
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

da Denim Group

(0 recensioni)
Visualizza profilo
Provides comprehensive view of vulnerabilities and risks from applications. Provides comprehensive view of vulnerabilities and risks from applications.

da IntSights

(0 recensioni)
Visualizza profilo
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

da Balbix

(0 recensioni)
Visualizza profilo
Help avoid breaches with continuous risk prediction and a prioritized list of mitigation actions. Help avoid breaches with continuous risk prediction and a prioritized list of mitigation actions.

da Siemplify

(0 recensioni)
Visualizza profilo
Manage security operations from end to end, never miss an alert and respond with speed and precision. Manage security operations from end to end, never miss an alert and respond with speed and precision.

da Anomali

(0 recensioni)
Visualizza profilo
Arm your security team with cyber threat intelligence to identify and prioritize threats. Arm your security team with cyber threat intelligence to identify and prioritize threats.

da Kogni

(0 recensioni)
Visualizza profilo
Kogni is a global leader in the data and privacy security market. Kogni continuously discovers, classifies and protects sensitive data across organizations, regardless of source or location of data. Kogni's use of advanced AI & machine learning capabilities mitigates the possibility of data breaches with near-perfect detection capabilities for even the most uncommon data sources and data formats. Kogni automatically discovers, classifies and protects sensitive data.

da Orca Security

(0 recensioni)
Visualizza profilo
The Orca Cloud Visibility Platform provides you with full-stack cloud security visibility for your IAAS and PAAS environments - using one time, read-only, zero risks, I/S level integration. The platform detects and alerts on vulnerabilities, security misconfigurations, and even breaches. We are utilizing data from the entire stack, including the assets' run time block storage, to give you comprehensive coverage without the hassle of agents or network scanners. Eliminate unseen and unknown risks in less than five minutes with seamless full-stack visibility.

da Rencore

(0 recensioni)
Visualizza profilo
Risk protection solution that helps secure, govern, manage and modernize applications in SharePoint & Office365 environments. Risk protection solution that helps secure, govern, manage and modernize applications in SharePoint & Office365 environments.

da ZeroNorth

(0 recensioni)
Visualizza profilo
ZeroNorth is a comprehensive orchestrated risk management tool aid companies in gaining competitive advantages ZeroNorth is a comprehensive orchestrated risk management tool aid companies in gaining competitive advantages

da Echosec

(0 recensioni)
Visualizza profilo
Aiuta a trovare rapidamente informazioni pertinenti da fonti su web, deep web e dark web, senza dover uscire dal proprio browser web standard. Consente di analizzare mercati, forum di discussione e siti web per identificare e anticipare le minacce e proteggere la propria organizzazione. Beacon è un modo veloce per trovare importanti informazioni sul dark web.

da Flexera

(0 recensioni)
Visualizza profilo
Stop reacting. Gain control. Stay secure. It takes organizations too long to identify and address software vulnerabilities. Our solutions provide vulnerability intelligence and world-class technology so our customers are confident that they don't just react to crisis when attacks happen. Instead, they gain control and stay secure. Identify and address software vulnerabilities; reduce attacks and stay secure.

da Continuum Security

(0 recensioni)
Visualizza profilo
Makes DevSecOps a reality with threat modeling and SDLC risk management. Makes DevSecOps a reality with threat modeling and SDLC risk management.

da PlexTrac

(0 recensioni)
Visualizza profilo
Provides rapid reporting for red teams as well as tracking and attestation for blue teams. Provides rapid reporting for red teams as well as tracking and attestation for blue teams.

da Flashpoint

(0 recensioni)
Visualizza profilo
Business risk intelligence to help companies prevent fraud, insider threat, and enterprise risk. Business risk intelligence to help companies prevent fraud, insider threat, and enterprise risk.

da Columbus Collaboratory

(0 recensioni)
Visualizza profilo
The Columbus Collaboratory Vulnerability Management Solution provides a 360-degree, single-console view via a managed service that helps organizations make informed business decisions and mitigate threats.Rather than staff an expensive threat-intelligence team, the Columbus Collaboratory Vulnerability Management Solution affordably delivers the knowledge, recommendations, and service of a threat-smart team. A managed service that allows you to assess applications and networks, continuously track vulnerabilities, and manage priorities.

da Crashtest Security

(0 recensioni)
Visualizza profilo
Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation. Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation.

da Security Research Labs

(0 recensioni)
Visualizza profilo
A new breed of vulnerability management solution based on years of consulting experience, Autobahn provides fully automated asset discovery, vulnerability scanning and comprehensive benchmarking, as well as actionable remediation insights. Autobahn is used by leading Fortune 500 companies as well as SMBs and provides a suitable package for each company size and stage of security maturity. A new breed of vulnerability management solution based on years of consulting experience, suitable for Enterprise and SMB.

da FOSSA

(0 recensioni)
Visualizza profilo
Provides defenses against open sourced vulnerabilities. Provides defenses against open sourced vulnerabilities.

da WeSecureApp

(0 recensioni)
Visualizza profilo
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization. Strobes is a risk-based Vulnerability Management Platform for Enterprises with 25+ open-source vulnerability assessment scanners!

da Vicarius

(0 recensioni)
Visualizza profilo
Vicarius helps SMEs protect critical apps and assets against software exploitation with the world's first all-in-one vulnerability management platform designed for CISOs, MSSPs and IT Admins. Backed by JVP and E.ON, Vicarius's mission is to provide today's organizations with powerful solutions that ensure regulatory compliance and top-tier, military-grade cyber protection. Patch-less Vulnerability Management

da Vulcan Cyber

(0 recensioni)
Visualizza profilo
Continuous vulnerability remediation platform. Continuous vulnerability remediation platform.

da Cybellum Technologies

(0 recensioni)
Visualizza profilo
Cybellum is an automatic cybersecurity risk assessment for automotive components. Cybellum is an automatic cybersecurity risk assessment for automotive components.

da McAfee

(0 recensioni)
Visualizza profilo
Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network. Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network.