GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.
Read more about Chariot
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.
The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.
Read more about Guardz
Syxsense delivers comprehensive vulnerability scanning, including security configurations. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.
Read more about Syxsense
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.
Read more about CyLock Anti-Hacker
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.
Read more about Acunetix
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling
Read more about EcoTrust
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.
Read more about Qualys Cloud Platform
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.
TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.
Read more about RayVentory
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.
Read more about Axonius
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.
Read more about PingSafe
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.
Read more about Bytesafe
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.
Read more about VulScan
Aikido Security is an all-in-one software vulnerability scanner. Scan your source code, containers & cloud to see which vulnerabilities are crucial to solve.
Read more about Aikido Security
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.
Read more about Holm Security VMP
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.
Read more about CODA Footprint
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.
Read more about CloudWize
You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Red Sentry is an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable.
Read more about Red Sentry
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.
Read more about Strobes RBVM
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.
Read more about Intruder
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.
Read more about cyberscan.io
ShiftLeft CORE is an application security platform that improves collaboration between Dev and AppSec teams and provides early scans of code at scale.
Read more about ShiftLeft CORE
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.
Read more about Secomea
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.
The solution that provides real-time analysis of security alerts generated by applications and network hardware.
Read more about tbSIEM