Business Software for Revelstoke - Page 3

Top Software that integrates with Revelstoke as of September 2024 - Page 3

  • 1
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 2
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 3
    OpenSearch

    OpenSearch

    OpenSearch

    OpenSearch is a community-driven, open source search and analytics suite derived from Apache 2.0 licensed Elasticsearch 7.10.2 & Kibana 7.10.2. It consists of a search engine daemon, OpenSearch, and a visualization and user interface, OpenSearch Dashboards. OpenSearch enables people to easily ingest, secure, search, aggregate, view, and analyze data. These capabilities are popular for use cases such as application search, log analytics, and more. With OpenSearch people benefit from having an open source product they can use, modify, extend, monetize, and resell how they want. At the same time, OpenSearch will continue to provide a secure, high-quality search and analytics suite with a rich roadmap of new and innovative functionality.
  • 4
    Britive

    Britive

    Britive

    Permanent elevated privileges leave you open to increased data loss & account damage due to insider threats & hackers 24/7. Temporarily granting & expiring Just In Time Privileges with Britive instead minimizes the potential blast radius of your privileged human and machine identities. Maintain zero standing privileges (ZSP) across your cloud services, without the hassle of building a DIY cloud PAM solution. Hardcoded API keys and credentials, typically with elevated privileges, are sitting targets for exploits, and there are 20x more machine IDs using them than there are human users. Granting & revoking Just-in-Time (JIT) secrets with Britive can significantly reduce your credential exposure. Eliminate static secrets & maintain zero standing privileges (ZSP) for machine IDs. Most cloud accounts become over-privileged over time. Contractors & employees often maintain access after they leave.
  • 5
    Halcyon.ai

    Halcyon.ai

    Halcyon

    Threats like ransomware are designed to evade modern security tools, and just one miss can have a catastrophic impact on your organization. Halcyon is the first anti-ransomware and cyber resilience platform with automated encryption key capture and autonomous decryption capabilities to keep your operations running 24/7/365. Most security vendors are quick to update their solutions once a threat is seen in the real world. Without a dedicated anti-ransomware engine, the protection gap can range from 24 hours to several days or even weeks. Traditional rules-based EDR and other endpoint protection products rely on convolutional neural network AI models for detection that are generally too complex to quickly train on emerging threats.
  • 6
    Check Point Harmony Endpoint

    Check Point Harmony Endpoint

    Check Point Software Technologies

    Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat.
  • 7
    Panther

    Panther

    Panther Labs

    Panther is a security analytics platform built for the cloud and designed to alleviate the problems of traditional SIEMs. Security teams love Panther because of its detections-as-code, extreme scalability, and low operational overhead. Trusted by Silicon Valley leaders like GitLab, Figma, Earnin, and many more. Loved by cloud-first security teams: - Detections-as-code with Python & SQL - Real-time and historical alerting - Process terabytes of data per day with zero-ops - 200+ built-in detections - Log pullers for popular SaaS apps - Comprehensive security monitoring for AWS - 12-month minimum data retention
  • 8
    ThreatConnect SOAR

    ThreatConnect SOAR

    ThreatConnect

    ThreatConnect’s intelligence-driven, Security Orchestration, Automation and Response (SOAR) Platform includes intelligence, automation, analytics, and workflows in a single platform. The platform drives collaboration across threat intelligence, security operations, and incident response teams by providing the ability to put security data in context with intelligence and analytics, establish process consistency with Playbooks, integrate disparate technologies across the stack with workflows work from a centralized system of record, and measure the effectiveness of the organization with cross-platform analytics and customizable dashboards.
  • 9
    SynSaber

    SynSaber

    SynSaber

    Today’s industrial asset and network monitoring solutions are broken. Sensors are too big to be adaptable. End-to-end visibility is non-existent. Scalability is out of the question. SynSaber shifts the paradigm with a flexible, future-proof solution that empowers operators to defend their industrial environments with ease. Deploy rapidly. Integrate with current technology. Scale as needed. Detect threats at-speed. Your mission means your rules. Discover the power of a more flexible, more effective industrial asset and network monitoring solution. SynSaber decouples collections and sensing from detection platforms, data lakes, and SIEMs. Supplying curated data to your existing infrastructure, security, and workflow tools. Allowing for unparalleled freedom and flexibility.
  • 10
    CrowdStrike Falcon
    The Falcon Platform is flexible and extensible when it comes to meeting your endpoint security needs. You can purchase the bundles above or any of the modules listed below. The additional modules can be added to Falcon Endpoint Protection bundles. Stand-alone modules can be purchased by anyone and do not require a Falcon Endpoint Protection bundle. Our specialized products are for customers working with more stringent compliance or operational requirements. Purpose-built in the cloud to eliminate complexity and simplify deployment across an organization’s entire estate of endpoints. Lightweight Falcon agent running on each endpoint includes all the prevention technologies required to protect the endpoint, whether it is online or offline. Cloud-native platform operates without constant signature updates, complex integrations or on-premises equipment. Minimal CPU overhead does not impact system performance and end-user productivity.