Alternatives to ARX

Compare ARX alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ARX in 2024. Compare features, ratings, user reviews, pricing, and more from ARX competitors and alternatives in order to make an informed decision for your business.

  • 1
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 2
    TOPIA

    TOPIA

    Vicarius

    With hundreds of new software and OS vulnerabilities detected each month, reducing organizational security risk can become overwhelming. TOPIA's vulnerability management toolbox provides a quick and efficient way to analyze, prioritize, and remediate cyber threats before they're exploited—with or without a security patch. TOPIA's is a cloud-based cost-effective vulnerability assessment tool, actively identifies risks, and eliminates threats using proprietary xTags™ and Patchless Protection™ that go beyond traditional vulnerability management. TOPIA continuously conducts real-time risk analysis and tracks each phase of remediation, so you're always in the loop about your organization's cyber health. TOPIA allows you to get more done faster with risk-prioritization parameters, auto-security patch and efficient reports on your team's progress and performance.
    Starting Price: $5/month/machine
  • 3
    Zeguro

    Zeguro

    Zeguro

    Get holistic risk management with Zeguro Cyber Safety, our cybersecurity solution, and cyber insurance. Holistic risk management consists of four steps: avoid, mitigate, accept, and transfer. While you can’t avoid all risk, mitigate and reduce it to an acceptable level with our intuitive cybersecurity tools. Finally, transfer your risk by purchasing our cyber insurance, tailored to your organization’s unique risk profile. Prevent cyber attacks with our security tools, and get potential Zeguro Cyber Safe discounts on your insurance. It’s a win-win for your business and peace of mind. The regulatory landscape is ever-evolving, making compliance a challenging task for businesses. Depending on your industry, the data you process, and other factors, there are several frameworks and regulations you may need to comply with. Failure to meet requirements can result in hefty fines. Simplify your compliance efforts. Zeguro Cyber Safety can help you meet several requirements.
  • 4
    Microsoft Supply Chain Center
    Create a more resilient and sustainable supply chain using an open, flexible, collaborative, and secured supply chain platform—and meet your business and customer commitments profitably, every time. Get more value from your data across new and existing solutions with a platform that connects your entire supply chain. Predict supply chain disruptions before they happen and proactively address risks through intelligent orchestration. Keep goods flowing with the agility to rapidly adjust to changing markets and meet evolving customer demands. Meet your sustainability goals, improve brand perceptions, and minimize the carbon impact of your organization.
  • 5
    Blackwell Security

    Blackwell Security

    Blackwell Security

    Blackwell’s hyper-specialized security operations are tailor-made to deliver the most complete protection and rapid response aligned to the unique needs of healthcare organizations. Secure your entire environment with full MDR signals, customized healthcare intelligence, and advanced security tooling that ensures 24/7 protection against complex cyber threats. Blackwell Security provides managed security operations designed exclusively for healthcare organizations, so you can reduce risk, maintain compliance, and build a secure continuum of care. Optimize existing tooling, expand your SOC team, and partner with expert healthcare threat hunters for continuous visibility, incident prevention, and compliance alignment using your current tools. Elevate your organization’s cybersecurity maturity with specialized guidance to streamline and strengthen your security practices, mitigate gaps in your cyber compliance posture, and proactively drive improvements across your program.
  • 6
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner
  • 7
    Picus

    Picus

    Picus Security

    Picus is an award-winning complete security control validation platform. Get an effective proactive approach with Picus by validating your cyber threat readiness 24x7, identifying detection gaps, and having mitigation insights empowered by the largest technology alliance ecosystem in the industry. Picus evaluates security controls against the entire cyber kill chain with thousands of virtual cyber threats. It shows you exactly where gaps exist and how to mitigate them on prevention and detection layers. Fully continuous. Automatic. Flexible. Picus is deeply embedded into the cyber security ecosystem. Every security vendor we work with has the same unwavering commitment to delivering excellent level of security, whether it's enabling Picus to successfully execute our product strategy or providing in depth integrations that make Picus the complete security validation platform.
  • 8
    Sphera Supply Chain Risk Management
    Sphera Supply Chain Risk Management helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help. The Sphera Supply Chain Risk Management Solution helps you proactively identify, analyze and mitigate all types of supply chain risk. You can turn risk into opportunity to rise above the competition—and we can help. Prevent risk from costing you by strengthening your categories with Impact Analyzer. Assess supplier criticality and detect vulnerabilities at the category. Save valuable time by making the right moves with Action Planner. Collaborate across your organization and with your suppliers to proactively mitigate risk. For certain areas of your risk exposure, your suppliers themselves are the only ones who can provide the answers. This is where you need a professional. Establish a new level of collaboration by inviting your suppliers to join you in the next frontier of supply chain risk visibility.
  • 9
    SupplyShift

    SupplyShift

    SupplyShift

    Supply chain transparency and responsibility software that helps you discover the insights you need to mitigate risk and improve supplier performance — protecting your business, people, and the planet. You can't manage what you can't see. Know your supply chain, manage supplier risk, and collaborate to drive improvement from source to shelf. Engage your supply chain in a meaningful way. Get insights that enable you to reduce your risk exposure, advance your sustainability goals, and improve your resiliency. Get valuable intelligence to the right people, at the right time. Use a purpose-built tool to engage suppliers, keep key departments informed, and drive productive supplier improvement.
  • 10
    ChainPoint

    ChainPoint

    ChainPoint

    ChainPoint is a software platform for monitoring and securing supply chains. Our customers use our software to manage and share product, process and supplier information, from raw material to finished product. With our software and services we help companies improve quality and sustainability whilst reducing cost and risk. ChainPoint is a highly configurable software platform, that is easy to adapt to our customers' requirements. With our functional areas and excellent integrations with mobile apps and external systems, companies in every industry will benefit from our software. Our high-security standards and highly experienced team will make sure companies are able to monitor and secure their supply chain in the most efficient way. Our sustainability solutions offer companies the possibilities to create a sustainable supply chain in any industry, textile & apparel, food, minerals, agriculture and many more.
  • 11
    Z2Data

    Z2Data

    Z2Data

    Get instant access to 1 Billion+ components' data ranging from lifecycle status, lifecycle forecast, regulatory compliance, market availability, cross references and more. Easily upload your Bill of Materials and Approved Vendor Lists to run detailed reports and risk analyses. Exporting data to a variety of formats is simple and you can even automatically integrate with leading PLM tools. Monitor your supply chain instantly by mapping your components to suppliers' manufacturing sites such as FABs, factories and assemblies. Compare location site risk and conduct disaster mitigation planning easily with Z2Data's Risk Scores for supply chain. What-if analysis for supplier sites enable you to prepare for disaster recovery and comply with business continuity goals. Manage supplier selection risk by accessing data on over 20,000+ suppliers.
  • 12
    Advanced Cyber Security
    Cyber Security Services. Secure your IT with ISO 27001 and National Cyber Security Center compliant services built to provide peace of mind in securing your organisation's future. Per your organization's requirements, our Cyber Security Services are tiered, providing service flexibility and choice beyond the standard support included with all of our services. What we can offer your Organization? Our Cyber Security Services portfolio is built from modular tiered service offerings to provide our customers tailored solutions to meet their individual needs. Cyber Security Discovery Service. This service is made up of one tier. It is designed to provide basic security protection by discovering estate, scanning for vulnerabilities and PCI compliance, performing Cloud security configuration checks as well as extended endpoint protection. This extended endpoint protection sits alongside anti-malware and discovers anomalies in behaviour that may indicate a compromised endpoint.
  • 13
    IntegrityNext

    IntegrityNext

    Integrity Next GmbH

    IntegriytNext is a leading solution for supply chain sustainability management that empowers companies to improve supply chain sustainability and meet regulatory ESG requirements. The cloud-based platform enables companies to quickly and cost-effectively check their supplier base against sustainability-related regulations (e.g. the German Supply Chain Act), standards (e.g. international human and labour rights), and voluntary commitments (e.g. supply chain decarbonization / Net Zero). IntegrityNext helps its clients identify and manage ESG risks along the value chain, reducing reputational and financial risks and improving sustainability performance.
  • 14
    Brinqa

    Brinqa

    Brinqa

    Present a complete and accurate picture of your IT and security ecosystem with Brinqa Cyber Risk Graph. Deliver actionable insights, intelligent tickets, and timely notifications to all your stakeholders. Protect every attack surface with solutions that evolve with your business. Build a stable, robust, and dynamic cybersecurity foundation that supports and enables true digital transformation. Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes. The Cyber Risk Graph is a real-time representation of an organization’s infrastructure and apps, delineation of interconnects between assets and to business services, and the knowledge source for organizational cyber risk.
  • 15
    Access COINS
    Make weak links in your supply chain a thing of the past with software that ties even the most disconnected parts of your supply chain together under a single system. From issuing requests to performance scoring, Access COINS enables your chain to work smarter and optimize your operations. Access COINS is cloud-based, all-in-one construction supply chain management software that helps contractors gain visibility across their entire supply chain. Access COINS’ supply chain management software has been designed specifically for the construction industry. It improves efficiencies by ensuring your team and subcontractors are always working from one source of truth. With Access COINS, supply chain managers can better predict project finances, as invoices and payments are instantly deployed, putting an end to late payments and creating security and predictability across every stage of your supply chain. 
  • 16
    Cyber Legion

    Cyber Legion

    Cyber Legion

    At Cyber Legion Ltd, a UK-EU-based cybersecurity company, we are your trusted partner in securing the digital age, with a particular emphasis on remote work environments and product security. As a CREST Approved organization in EMEA, we specialize in offering comprehensive services tailored to meet the evolving challenges of the digital landscape. Our experienced team specializes in advanced cybersecurity testing and consultancy services, with a focus on the unique challenges posed by remote work. We empower businesses, individuals, and families to enhance their cyber resilience, safeguarding their reputations and well-being in an increasingly interconnected digital world. Committed to advancing cyber maturity and business continuity, Cyber Legion leverages cutting-edge technologies and best practices. We prioritize the security intricacies of remote work and the integrity of digital products to ensure your peace of mind. In addition to our core services, we provide a comprehe
    Starting Price: $45 per month
  • 17
    Sourcemap

    Sourcemap

    Sourcemap

    The only full-suite solution for supply chain transparency and traceability, including end-to-end supply chain due diligence, customs compliance, environmental and social sustainability, business continuity, operations planning, and more. Sourcemap gives procurement teams unprecedented insights into the end-to-end supply chain to ensure that best practices are implemented every step of the way. Award-winning visualizations designed to give your team rapid insights into your end-to-end supply chain. Map your sub-tier supply chain using the most powerful, secure, easy-to-use supplier discovery software and unparalleled supplier outreach. Automatically assess supply chain risk exposure using best-available databases, AI name-matching, risk heat maps, and built-in GIS processing. Supplier selection is made easy through automated data collection, scoring, and interactive dashboards.
  • 18
    Coupa

    Coupa

    Coupa Software

    Coupa’s cloud-native suite of Business Spend Management applications lets customers gain visibility and control over their spend and supply chains. Customers get an end-to-end process that helps drive collaboration across procurement, finance, treasury, compliance, and supply chain leaders to help their companies spend smarter, mitigate risk, deliver on ESG commitments, and improve resilience. A unified platform approach provides usability and flexibility, freeing up IT from customizations and complex integrations to help leaders deliver on these goals.
  • 19
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 20
    StrataFlows

    StrataFlows

    StrataFlows

    StrataFlows automates processes to help organizations like yours achieve supply chain efficiency and resilience. Avoid disruptions due to part shortages by automating part expedites from external warehouses. Automatically track issues impairing material flow to ensure resolution. Automates the full process of expediting parts from a supplier, from submission, supplier communication, through delivery, providing visibility throughout. Useful for cycle counts or one-off sampling of inventory in the warehouse or plant floor. Analyze the cause of missing parts. Nothing impacts the bottom line more than the underutilization of production capacity due to unplanned downtime. Our flexible workflow system ensures teams and individuals know what part they play and when to do their part. Improve efficiency, consistency, and traceability through automation. Automatic notifications prompt staff to play their part and keep everyone informed.
    Starting Price: $375 per month
  • 21
    AWS Supply Chain
    Mitigate overstock and stock-out risks to improve customer experiences while lowering excess inventory costs. Quickly gain visibility across your supply chain without replatforming, upfront licensing fees, or long-term commitments. Make more informed supply chain decisions with machine learning (ML)–powered actionable insights. View the overall health of your supply chain network, and get ML-powered insights about potential inventory risks such as excess stock or stock outs. Quickly set up AWS Supply Chain using ML models that understand, extract, and transform disparate data into a unified data lake. Review recommended actions that can mitigate risks, and use built-in contextual collaboration capabilities to agree on and implement decisions faster. Generate more accurate demand forecasts to reduce stock outs. Increase demand planning accuracy with ML models that continually improve over time.
  • 22
    Criminal IP

    Criminal IP

    AI Spera

    Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time and facilitates preemptive responses accordingly. Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth. With Criminal IP’s 4 main features (Asset Search, Domain Search, Exploit Search, and Image Search), you can find IP risk scores and related vulnerabilities of searched IP addresses and domains, details on the exploit codes for each service, and assets that are left wide open to cyber threats in the form of images respectively.
  • 23
    PURVEYOR

    PURVEYOR

    COUNTERVEIL

    Counterveil was founded to deliver high confidence Cyber Defense capabilities. A decision was made to find a better way of mitigating risks, detecting threats and preventing exploits. The Counterveil Team has many years of experience in providing solutions to problems ranging from but not limited to risk management, maturity assessment, IR & threat intelligence. Our S.O.A.R. platform was designed from scratch to solve many of today’s existing problems like virtual analytics. PURVEYOR™ (SasS) the cyber defense console and toolkit. Helping leaders understand their risks, providing defenders the ability to secure their organizations. S.O.A.R. (SIEM Orchestration Automation Response). Counterveil, providing solutions and service offerings you can depend on. The tools and support you need to give you peace of mind.
  • 24
    AIMMS

    AIMMS

    AIMMS

    Increase speed, collaboration and confidence in your decisions with advanced analytics. AIMMS helps supply chain teams make informed decisions quickly and with confidence, using scenario modeling and math. AIMMS puts the tools for adaptive planning in your hands so you can make a difference. In a rapidly changing world, slow decisions have implications. We empower supply chain planners with friendly tools that help them find reliable answers fast, with clarity about implications and trade-offs for your current situation, as well as for potential futures. AIMMS helps you make confident decisions to lower costs, improve service levels, and mitigate risks to support your ambitious growth plans. Our software is meant to empower, not intimidate you. It’s made for supply chain professionals by supply chain professionals, with an intuitive workflow and UI that helps your key stakeholders answer critical questions.
  • 25
    CyberCAST

    CyberCAST

    Zyston

    CyberCAST is our comprehensive cybersecurity software that enhances our managed security services. Our platform illuminates critical insights into an organization’s threat susceptibility and informs a dynamic cybersecurity strategy that matures over time. Starting with a combination of technical penetration testing and a detailed security audit, this results in a quantitative security risk score that provides a foundation for developing a comprehensive cybersecurity strategy. Our security professionals examine all findings to tailor our approach to the organization’s specific needs. The penetration test component evaluates findings based on business risk and categorizes vulnerabilities based on systemic and process-related issues. Best of all, you don’t have to be a technical genius to understand it. CyberCAST delivers all security findings in plain business language that’s easy to understand and communicate to executive leadership and your board.
  • 26
    CTM360

    CTM360

    CTM360

    CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep & Dark Web Monitoring, Security Ratings, Third Party Risk Management and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.
  • 27
    Filigran

    Filigran

    Filigran

    Embrace a proactive approach with end-to-end cyber threat management, from anticipation to response. Tailored to elevate cybersecurity through comprehensive threat intelligence, advanced adversary simulation, and strategic cyber risk management solutions. Get a holistic view of your threat environment and improved decision-making for faster incident response. Organize your cyber threat intelligence knowledge to enhance and disseminate actionable insights. Access consolidated view of threat data from multiple sources. Transform raw data into actionable insights. Enhance sharing and actionable insights dissemination across teams and tools. Streamline incident response with powerful case management capabilities. Create dynamic attack scenarios, ensuring accurate, timely, and effective response during real-world incidents. Build both simple and intricate scenarios tailored to various industry needs. Improve team dynamics with instant feedback on responses.
  • 28
    Appgate

    Appgate

    Appgate

    Bringing together a set of differentiated cloud- and hybrid-ready security and analytics products and services. Today, Appgate secures more than 1,000 organizations across 40 countries. A Focused Approach to Zero Trust. Distributed, on-demand IT created a security problem. With more assets to defend and more complexity to overcome, security leaders are stuck solving today’s problems with yesterday’s solutions. Become a smaller target, making resources invisible and resilient to threat actors. Adopt an identity-centric, Zero Trust mindset that factors in context before granting access. Proactively detect and remove internal and external threats targeting your organization. Global enterprises and government agencies trust our industry-leading, proven secure access solutions. Strengthen and simplify network security with the most comprehensive, feature-rich ZTNA solution available. Reduce risk while providing consumers with seamless, secure network access to your digital services.
  • 29
    XGRC Product Range

    XGRC Product Range

    XGRC Product Range

    An Information Security Management System (ISMS) is a set of policies and procedures implemented by organizations to manage information risks such as cyber attacks or data theft. ISO 27001 is the auditable international standard that requires a company to establish, implement and maintain best-practice information processes via its ISMS. As with any other compliance standards, ISO 27001 follows the plan-do-check-act (PDCA) cycle. An accredited certification to ISO/IEC 27001 is essential to demonstrate world-class information security standards to customers and potential clients. An ISO 27001-certified ISMS helps to protect your organization against information security threats like cyber attacks, data leaks or theft. Also, effective security measures minimize the financial and reputational damage that can result from weak security policies and catastrophic data breaches.
  • 30
    aDolus FACT Platform

    aDolus FACT Platform

    aDolus Technology

    The aDolus FACT platform provides dynamic visibility into the software supply chain for critical systems. It generates continuous risk intelligence for CISOs and product security executives, providing real-time visibility, peace of mind, proactive cost-effective compliance, and invaluable insights. FACT hunts and correlates information from many sources about IT, ICS, IIoT, and IoT software supply chains. It then provides unprecedented visibility —right down into the very bits of the software— to prevent the installation of unsafe software in critical systems. We use artificial intelligence (AI) techniques to correlate data across components, products and products lines, and produce a trust score for software as well as enriched Software Bill of Materials (SBOMs).
  • 31
    Intelligent Technologies Labs

    Intelligent Technologies Labs

    Intelligent Technologies Labs

    End-to-end solutions that organizations can rely on to address their security challenges, mitigate their risks & provide a safe and undisrupted operating business environment. ITL’s scalable, proactive, and comprehensive security solutions protect organizations from internal & external threats and help them operate with peace of mind through agile and powerful security solutions to protect from threats. In today's information-driven economy, keeping your organization's critical data secure and compliant is a huge undertaking that requires specialized skills and experience. ITL offers end-to-end expertise that keeps your organization's information secure while reducing costs and complexities. Emerging innovations allow organizations to transform their current business environments by implementing technologies that add true business value and support growth. ITL helps organiza tions maintain a competitive advantage through utilizing cutting-edge technologies.
  • 32
    Threatcop

    Threatcop

    Threatcop

    Threatcop is a cyber security simulator and awareness tool that launches dummy cyber attacks on employees followed with awareness modules and gamified assessment. It simulates and imparts customized awareness based on top 6 attack vectors namely Phishing, Ransomware, Vishing, SMiShing, Cyber Scam and Removable Media. It compares the pre and post cybersecurity awareness levels of employees and provides a comprehensive report on individual user awareness as 'Employee Vulnerability Score (EVS)'. The awareness videos, advisories, newsletters and gamified quiz are customized with respect to the EVS score, thus, ensuring cyber resilience. It is a complete suite for your employees' cyber security awareness.
  • 33
    Greenstone SupplierPortal
    SupplierPortal is a sustainable supply chain software solution providing your business with transparency and compliance across your entire supplier network. Align supplier management practices with sustainability goals. Consolidate supplier engagement into one platform. Identify and manage supply chain risk. Calculate scope 3 GHG emissions. Run a robust supplier due diligence process using key sustainability and wider business metrics. Measure and improve supplier performance in areas important to your business. Cloud-based sustainable supply chain solution accessed on any browser, from anywhere, and by an unlimited number of users. Deploy SupplierPortal across multiple business areas and project teams, with users and data segregated accordingly. Use a combination of customised and best practice content to create supplier assessments that are relevant to your business and suppliers.
  • 34
    Mission Secure

    Mission Secure

    Mission Secure

    Protecting OT networks and safeguarding operations with a patented OT cybersecurity platform and 24/7 expert managed services. As IT and OT systems converge, organizations are left exposed. This convergence leaves operations and operational technology (OT) networks vulnerable to new cyber threats and risks that cannot be overcome with traditional IT security solutions. Other IT cybersecurity solutions only provide visibility and detection; we’ve developed the first integrated OT cybersecurity protection platform backed by an expert managed services team that stops OT cyber threats head-on. Protect your productivity, assets, and OT network. Proprietary technology-based assessments to baseline overall OT security posture. A patented platform built to protect operational networks in a digital age. OT cybersecurity as a turnkey service, we can be there to manage your protections around the clock. Extended network monitoring and passive pen testing.
  • 35
    GreenBizCheck

    GreenBizCheck

    GreenBizCheck

    Simple, online assessment covering energy, water, waste, recycling, transportation, procurement, supply chain and optional GHG calculator. Your scorecard with easy to use, effective action plan to reach 60% score for Bronze 70% score for Silver 80% score for Gold certification. Seamless, online desktop audit by Bureau Veritas. You provide documentary evidence Bureau Veritas verifies it and issues CSR certificate. Covering energy, water, waste & recycling, transportation & travel, IT / Data Centre, Supply Chain and GHG tracking. Your supplier's scorecard with easy to use, effective action plan to improve supplier performance and buyer / supplier relationship. Your tailored dashboard with the info you want and need to simplify your reporting, manage risk and minimize cost. Cloud-based solution that helps organisations identify and reduce risk, increase efficiency and engage with suppliers, covering governance, human rights, labour, environment, fair operating practices, etc.
  • 36
    Deepwatch

    Deepwatch

    Deepwatch

    Advanced managed detection and response to secure the distributed enterprise. Expert guided security operations for early detection and automated response to mitigate risk across the enterprise. Preemptively detect malicious activity and respond to active threats before the endpoint is compromised. Efficiently discover and remediate critical threats and vulnerabilities across the enterprise. Extensive experience across our team has led us to an important realization too often overlooked: each organization has unique aspects and requirements for its cyber solutions. No team is exactly the same and your threats aren’t either. We developed the Squad Delivery Model to foster collaborative, high touch, tailored services that meet your specific needs and requirements.
  • 37
    Hyver

    Hyver

    CYE

    Hyver is a cloud-based cybersecurity optimization platform that helps organizations reclaim control over their cyber resilience. Create a full visualization of the attack surface, displaying complete attack routes and vulnerabilities that can be assessed in real-time. Route modeling and machine learning capabilities accurately quantify the risk that each vulnerability poses to organizations’ business assets and business continuity. Actionable mitigation plan based on the prioritization of attack routes, enabling organizations to optimize resource allocation and adhere to budget constraints. Hyver conducts a comprehensive cybersecurity assessment that covers your entire organization and any third-party vendors you work with.With highly experienced red teams performing real attacks, Hyver reveals complete attack routes that place your business assets at risk.
  • 38
    Defendify

    Defendify

    Defendify

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning
  • 39
    Firesec

    Firesec

    Network Intelligence

    Firesec leverages the power of an integrated security platform to fulfill the diverse needs of an organization’s security team. It automates the process of network devices configuration analysis, intelligently optimize your security architecture, scrutinizes it against the acclaimed regulatory standards, and provides visibility into the entire organization network. Firesec – an integrated security platform, with the focus on the diverse needs of the security team, uses ‘Magnified Vision’ to keep an eye on enterprise security, compliance levels, and helping it run without hiccups now and into the future. Firesec empowers security teams to inspect the vast accumulated network data and convert it into relevant, actionable intelligence. Also, put into effect a secure cyber-defence program running in an enterprise that is smartly secure and exponentially safe.
  • 40
    Nudge Security

    Nudge Security

    Nudge Security

    Discover every cloud and SaaS asset in your organization—in minutes. Expose shadow IT, eliminate SaaS sprawl, and take control of your supply chain. In just minutes, Nudge Security discovers, inventories, and continuously monitors every cloud and SaaS account employees have ever created. No network changes, endpoint agents, or browser extensions required. Accelerate security reviews to match the pace of SaaS adoption with insights on each provider’s security, risk, and compliance programs. Gain visibility across the SaaS supply chain to know if you’re in the blast radius of a data breach. The only way to manage SaaS security at scale is to engage with your workforce—not block them. Deliver helpful security cues based on proven behavioral science to nudge employees toward better decisions and behaviors.
    Starting Price: $4 per user per month
  • 41
    CDCAT®

    CDCAT®

    APMG International

    Irrespective of an organization's size or cyber security maturity - CDCAT is the definitive means of measuring operational risk to establish effective cyber risk management and drive an organization's cyber transformation. The tool itself was developed by the Ministry of Defence's (MOD) Defence Science and Technology Laboratory (Dstl), made commercially available through APMG. The CDCAT service utilises this tool together with a plethora of frameworks, models, standards and sciences to run a full assessment of an organization's current cyber defenses and controls - highlighting any capability vulnerabilities. The assessment is crucial in creating an actionable plan to establish world-class cyber risk management, based on comprehensive and contemporary evidence. For public sector clients, CDCAT’s services are available on the Crown Commercial Service’s (CCS) supplier framework, Digital Outcomes and Specialists (DOS).
  • 42
    Strike Graph

    Strike Graph

    Strike Graph

    Strike Graph helps companies build a simple, reliable and effective compliance program so that they can get their security certifications quickly and focus on revenue and sales. WE ARE serial entrepreneurs who have built a compliance SAAS solution that simiplifies security certifications such as SOC 2 Type I/II or ISO 27001. We know from experience that these certifications dramatically improve revenue for B2B companies. Facilitated by the Strike Graph platform, key actors in the process including Risk Managers, CTO's, CISO's and Auditors can work collaboratively to achieve trust and move deals. We believe that every organization should have a fair shot at meeting cyber security standards regardless of security framework. As CTO's, sales leaders and founders, we reject the busy-work, security theater and arcane practices currently in the marketplace to achieve certification. We are a security compliance solution company.
  • 43
    SeeMetrics

    SeeMetrics

    SeeMetrics

    Introducing a cybersecurity performance management platform for security leaders to see, track, and improve operations. See your security program performance in one place. Turn to one centralized place to understand how your stack has been performing and how it can perform better. Stop chasing after and consolidating data. Decide, plan and invest based on data, not on intuition. Actionable information about products, people and budget allow you to make more informed decisions about your corporate security. Identify gaps in your cyber resilience and performance based on cross-product insights and real-time threats. Enjoy out of-the-box, dynamic metrics that you can share and communicate easily with non-technical audiences. SeeMetrics’ agentless platform integrates with all of your existing tools so you can start generating insights within minutes.
  • 44
    Ecodesk

    Ecodesk

    Ecodesk

    Tools and expertise for transparency and performance improvement in global value chains to drive lasting ESG success. We are data and technology experts who make it easier, faster, more flexible, and less expensive for any business to source, manage and interpret data to make smarter ESG driven decisions. Collect supply chain data and analyses fit for any type of reporting. Develop a program to meet your ESG targets and goals. Analyze and track risk, performance, and compliance to your business standards. We've recognized for a while that we needed a way of collecting data, and traditionally that meant lots and lots of different Excel spreadsheets going out to lots of different suppliers. It's always a nightmare to manage that. So we needed a centralized tool to collate all the data together. Tools and support to improve the performance of your value chain.
  • 45
    Planning In A Box

    Planning In A Box

    Planning In A Box

    Improve decision-making across supply chain operations by building a digital replica of your physical supply chains with end-to-end visibility, advanced analytics, event-driven alert management, and collaboration across teams. High-performing Supply Chain enabling business efficiency, responsiveness and enhancing better decision making. Centralized Data empowers enterprises to choose digital architecture connecting all the nodes of a Supply Chain. Smart Control Towers provide end-to-end visibility across the Supply Chains improving resiliency, managing exceptions and responding to unplanned events. Improving supply network efficiency with AI-Driven optimization & simulation by master inventory visibility with improved demand forecasting and automation. Streamlining the Supply Chain to continue to meet and exceed customer expectations by innovating and optimizing every step.
    Starting Price: $500 per month
  • 46
    Secro

    Secro

    Secro

    All of our services come integrated on the Secro cloud-based platform, different teams and organizations can use them to securely collaborate and efficiently perform all the functions needed to negotiate, sign, finance, execute and audit the most complex cross-border supply chain operations. We Increase trust, reduce risk and make global trade more equitable for everyone. Secro e-Bill (TM) is a new-generation electronic bill of lading. It allows parties to perform all the functions of a paper bill of lading with increased speed, lower cost, and unmatched security without the need for a private agreement. Secro enables parties to write, negotiate and sign contracts on a secure and intuitive digital platform. Secro provides a collaborative environment where both team members and trading partners can execute and audit the most complex contracts, safely and confidentially. Secro complements and augments your existing ERPs and TMS by managing processes.
  • 47
    anyLogistix

    anyLogistix

    The AnyLogic Company

    anyLogistix is supply chain analytics software that combines analytical optimization and dynamic simulation to help design, optimize and analyze your company’s supply chain. Determine the best supply chain configuration using Network optimization. With the Transportation optimization experiment, find optimal delivery routes, determine fleet-mix, choose between own and third-party vehicles, and much more. Easily convert analytical optimization results into a dynamic simulation model and analyze time-dependent factors, random events, potential risks, actual system behavior, and dynamic interactions between elements of your supply chain. Taking into account the dynamics of the network operations and risks, simulation allows for accurate inventory planning and more precise forecasts increasing your supply chain’s resilience. All that with flexible statistics and map-based animation.
  • 48
    CormSquare

    CormSquare

    CormSquare

    Visibility, insight and transparency across company boundaries, improve collaboration, track progress and streamline processes. CormSquare decision support system provides in transaction analytics across all it's modules. Whether you are approving a purchase requisition, vendor selection, commercial proposal or contract, you always have relevant information at your fingertips in order to make right and fast decisions. Visibility across supplier and partner networks ensures timely, accurate information lowers transaction costs, easily scales the level of engagement with better controls and collaboration. CormSquare leverages external network data and combines it with internal data to produce truly actionable insights. Excercise greater agility and control by bringing in workflows, spend and supply-chain under management. Dynamically managing workflows with the ability to deploy business logic within and across supply networks can help realize agile organization.
  • 49
    Astrix Security

    Astrix Security

    Astrix Security

    Astrix ensures your core systems are securely connected to third-party cloud services by extending access management and threat prevention to API keys, OAuth tokens, service accounts, and more. Our agentless, easy-to-deploy solution enables you to discover and remediate risky app-to-app connections that expose you to supply chain attacks, data breaches, and compliance violations. Get a consolidated view of all the connections to your critical systems: internal and external apps, access keys, secrets, and workflows. Uncover over-privileged, unnecessary, and untrusted connections. Get an alert when an app behaves suspiciously.
  • 50
    Defense.com

    Defense.com

    Defense.com

    Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.
    Starting Price: $30 per node per month