Related Products
|
||||||
About
The IoT edge that protects from inside. Continuously monitoring and identifying threats at every stage of development. For all your devices. Automate the analysis and identification of security vulnerabilities inside your devices. All in one place, with intelligent prioritization and proprietary rating. Get all the intel you need about the security of your device in one place: simple and convenient. Know exactly where the most dangerous vulnerabilities are, and address them in a smart way. Pulsar is a modern runtime threat detection and response engine. Designed for IoT and edge computing, Pulsar is optimized for performance, runtime cost, and edge security. Pulsar's modular architecture is written entirely in Rust, a modern and secure language. Pulsar combines its edge AI threat detection engines with deterministic security policies to achieve state-of-the-art performance.
|
About
Heeler is an application security platform that helps development and security teams automate the detection, prioritization, and remediation of open source and application risks by unifying contextual data from code, runtime, deployment, dependencies, and business logic into a single actionable model. It combines static and runtime analysis, software composition analysis, threat modeling, and secrets scanning with a context engine that maps how code runs in production, enabling real-time threat prioritization based on exploitability and business impact rather than raw vulnerability counts. Heeler automatically generates validated remediation guidance and can even produce merge-ready pull requests to upgrade libraries or fix issues, reducing manual research and accelerating fixes. It provides end-to-end visibility across the software development lifecycle, tracking vulnerabilities from identification through resolution and monitoring fixes across deployments.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies looking for a security framework for IoT, SCADA firmware systems
|
Audience
Application security, DevSecOps, and development teams in cloud-centric organizations who need automated, context-driven security risk prioritization and remediation integrated into modern development pipelines
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$250 per developer
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationExein
Founded: 2018
Italy
www.exein.io
|
Company InformationHeeler
Founded: 2023
United States
www.heeler.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IoT Features
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|