Troy

Troy

BigBear.ai
+
+

Related Products

  • Guardz
    106 Ratings
    Visit Website
  • NeuBird
    2 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • Feroot
    27 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website

About

Secure.com is a cybersecurity platform that helps organizations operationalize security through governed workflows—covering SOC operations and incident response, exposure remediation (vulnerability/patch + cloud/config), and continuous compliance evidence. It’s built for CISOs and SOC/SecOps leaders who need consistent execution and accountability, CTOs/engineering leaders who want security embedded into operational workflows, GRC/compliance teams who need audit-ready evidence without scrambles, and fractional CISOs/consultants standardizing security programs.

About

Troy is an AI-powered, machine-assisted binary analysis platform developed by BigBear.ai to enhance cybersecurity vulnerability assessment and testing. It automates the process of binary reverse engineering, providing better visibility into the code running on sensors and devices. By intelligently automating common tools and techniques, Troy extracts significant data and produces unique insights, accelerating the identification of software vulnerabilities. A key feature of Troy is its ability to generate a reverse Software Bill of Materials (SBOM) for binaries lacking available source code, reducing manual labor and increasing analysis speed. The platform's modular and customizable design allows for the integration of new tools, techniques, and AI-backed analysis into expanding workflows, offering a scalable and flexible framework for cybersecurity professionals.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Secure.com is ideal for mid-sized to enterprise organizations and lean security teams that need enterprise-grade cybersecurity automation, visibility, and compliance without increasing headcount

Audience

Cybersecurity analysts looking for a solution to expedite binary reverse engineering processes and gain deeper insights

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Secure.com
Founded: 2024
United Arab Emirates
secure.com

Company Information

BigBear.ai
United States
bigbear.ai/solutions/troy/

Alternatives

SAGE

SAGE

HolistiCyber

Alternatives

ObjectSecurity BinLens

ObjectSecurity BinLens

ObjectSecurity
Cloud IQ

Cloud IQ

Cloudnosys
TroySwap

TroySwap

Troy Trade
AirCISO

AirCISO

Airiam

Categories

Categories

Integrations

No info available.

Integrations

No info available.
Claim Secure.com and update features and information
Claim Secure.com and update features and information
Claim Troy and update features and information
Claim Troy and update features and information