Best Network Security Software for Rapid7 InsightConnect

Compare the Top Network Security Software that integrates with Rapid7 InsightConnect as of September 2024

This a list of Network Security software that integrates with Rapid7 InsightConnect. Use the filters on the left to add additional filters for products that have integrations with Rapid7 InsightConnect. View the products that work with Rapid7 InsightConnect in the table below.

What is Network Security Software for Rapid7 InsightConnect?

Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats. Compare and read user reviews of the best Network Security software for Rapid7 InsightConnect currently available using the table below. This list is updated regularly.

  • 1
    Cylance

    Cylance

    BlackBerry

    Cylance uses cutting-edge algorithms and artificial intelligence to proactively protect you, preventing threats like malware, hackers, viruses, ransomware, and malicious websites. It does this whilst being lightweight and easy to use. We use cloud-based supercomputers and millions of examples of malicious programs to train a neural net, a kind of digital brain, to recognise threats. When you purchase Cylance, this is what you download onto your computer - a superlightweight 'brain', trained to catch and quarantine viruses. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds - unlike other antivirus software which must constantly scan for threats. Our AI quarantines files it identifies as threats, allowing you to review individual threats on you and your family's computers. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds.
    Starting Price: $29 per year
  • 2
    Splunk Cloud
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 3
    Forescout

    Forescout

    Forescout Technologies

    It seemed to happen overnight. Your organization became a veritable Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally. Here’s the thing: Every thing that touches your enterprise exposes you to potential risk. You must see it and secure it. Get to know Forescout. We offer the only solution that actively defends the Enterprise of Things at scale. Complex networks housing business-critical data and applications in physical, virtual and cloud environments create blind spots and security concerns. Gain Zero Trust security with 100% device visibility and control, network segmentation and unified policy enforcement with Forescout. Forescout offers agentless visibility and control of network-attached systems, allowing you to better secure your network.
  • 4
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 5
    NopSec

    NopSec

    NopSec

    We help cyber defenders get a handle on the fragmented processes that make cyber exposure unmanageable. NopSec's end-to-end platform brings these processes together and provides cyber defenders with a means to then discover, prioritize, remediate, simulate, and report on cyber exposures. If you don’t know what's in your environment you can’t protect it. With today's global scale of digital business transformation, complete visiblity of your IT assets is essential to adaptive cyber risk management. Nopsec shows you the business impact of your IT assets on a continuous basis helping you prevent any potential blind spots of unmanaged risk and cyber exposures.
  • 6
    FireMon

    FireMon

    FireMon

    Maintaining a strong security and compliance posture requires comprehensive visibility across your entire network. See how you can gain real-time visibility and control over your complex hybrid network infrastructure, policies and risk. Security Manager provides real-time visibility, control, and management for network security devices across hybrid cloud environments from a single pane of glass. Security Manager provides automated compliance assessment capabilities that help you validate configuration requirements and alert you when violations occur. Whether you need audit reports ready out-of-the-box or customizable reports tailored to your unique requirements, Security Manager reduces the time you spend configuring policies and gives you the confidence that you’re ready to meet your regulatory or internal compliance audit demands.
  • 7
    Cisco Secure Cloud Analytics
    Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​
  • 8
    RedSeal

    RedSeal

    RedSeal Networks

    Secure all your network environments—public clouds, private clouds, and on premises— in one comprehensive, dynamic visualization. Trusted by all four branches of the military, the world’s most trusted financial institutions, power grid companies, and mission-critical government agencies. A digital transformation is accelerating migration to the cloud, especially as so many people work remotely. Security teams are scrambling to manage security for resources in one, two or more public clouds as well as for resources remaining on premises. Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • Previous
  • You're on page 1
  • Next