+
+

Related Products

  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • ManageEngine Log360
    140 Ratings
    Visit Website
  • Graylog
    385 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website

About

The IoT edge that protects from inside. Continuously monitoring and identifying threats at every stage of development. For all your devices. Automate the analysis and identification of security vulnerabilities inside your devices. All in one place, with intelligent prioritization and proprietary rating. Get all the intel you need about the security of your device in one place: simple and convenient. Know exactly where the most dangerous vulnerabilities are, and address them in a smart way. Pulsar is a modern runtime threat detection and response engine. Designed for IoT and edge computing, Pulsar is optimized for performance, runtime cost, and edge security. Pulsar's modular architecture is written entirely in Rust, a modern and secure language. Pulsar combines its edge AI threat detection engines with deterministic security policies to achieve state-of-the-art performance.

About

Heeler is an application security platform that helps development and security teams automate the detection, prioritization, and remediation of open source and application risks by unifying contextual data from code, runtime, deployment, dependencies, and business logic into a single actionable model. It combines static and runtime analysis, software composition analysis, threat modeling, and secrets scanning with a context engine that maps how code runs in production, enabling real-time threat prioritization based on exploitability and business impact rather than raw vulnerability counts. Heeler automatically generates validated remediation guidance and can even produce merge-ready pull requests to upgrade libraries or fix issues, reducing manual research and accelerating fixes. It provides end-to-end visibility across the software development lifecycle, tracking vulnerabilities from identification through resolution and monitoring fixes across deployments.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for a security framework for IoT, SCADA firmware systems

Audience

Application security, DevSecOps, and development teams in cloud-centric organizations who need automated, context-driven security risk prioritization and remediation integrated into modern development pipelines

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$250 per developer
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Exein
Founded: 2018
Italy
www.exein.io

Company Information

Heeler
Founded: 2023
United States
www.heeler.com

Alternatives

Pulsar

Pulsar

Pulsar-Edit

Alternatives

Pulsar Music Player

Pulsar Music Player

Rhythm Software
Pulsar

Pulsar

Pulsar AI
Aardvark

Aardvark

OpenAI
Pulsar

Pulsar

Venera Technologies

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Integrations

No info available.

Integrations

No info available.
Claim Exein and update features and information
Claim Exein and update features and information
Claim Heeler and update features and information
Claim Heeler and update features and information