Business Software for Scuba Database Vulnerability Scanner - Page 2

Top Software that integrates with Scuba Database Vulnerability Scanner as of July 2025 - Page 2

  • 1
    Forcepoint CASB
    Give your company the full potential of the cloud. But don't let it cost you the control of your data. Now a Cloud Access Security Broker solution can support any cloud app, managed or unmanaged, securely. Forcepoint CASB works with IdP like Ping and Okta. Segments you’ve already built can be re-used with CASB. Don’t have IdP yet? CASB works like an IdP allowing your team to easily add apps and control individual access to apps. The simple interface is easy for employees to use too. Shadow IT puts data outside of your control. Quickly identify managed and unmanaged cloud apps in real-time using your web proxy and firewall logs. Detect stolen credentials sooner with a patent-pending Zero Trust Impossible Travel which shows individual device method, location, and time of day. Data moves up to the cloud, down from it, and from cloud to cloud. Protect data in motion or at rest. Block data in transit, encrypt or mask it, redact it, or watermark it to track sensitive data.
  • 2
    Vormetric Data Security Platform
    The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the data security protection platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. This data security solution prepares your organization for the next security challenge and new compliance requirements at the lowest TCO. The Vormetric Data Security Platform is one data security platform, centrally managed for delivering comprehensive data security solutions.
  • 3
    Buyer Discovery

    Buyer Discovery

    Gartner Digital Markets

    Expand your funnel to target, market and convert buyer prospects into highly-qualified leads with traffic insights. Identify sales-ready prospects actively looking for your product. Buyer Discovery leverages Gartner Digital Markets’ unparalleled volume of more than 9 million monthly software buyers to identify new marketing and sales prospects. Enhance your sales and marketing efforts with targeted lists of in-market software buyers interested in products like yours. Identifiable sales prospecting with the Buyer Discovery API. Daily access to download your recent buyer intent data. Visual analysis for ad-hoc discovery and tailored data deliverables.
  • 4
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 5
    Red Hat Cloud Suite
    Red Hat® Cloud Suite provides a container-based application development platform, built on massively scalable cloud infrastructure, all managed through a common management framework. Customers can move existing workloads to scale-out cloud infrastructure and accelerate new cloud-based services for private cloud and application development. With Red Hat Cloud Suite, the operations team can deliver public cloud-like services to developers and the business while maintaining control and visibility. Key product advantages include: Integrated components — Tightly integrated, fully supported components that act in concert to provide an open hybrid cloud. Unified management — A single management framework across infrastructure and application development layers, plus complete operation and life cycle management with proactive risk mitigation. Full-featured application development and containers — Flexible container-based application development abilities via OpenShift Enterprise