Alternatives to Vega
Compare Vega alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Vega in 2026. Compare features, ratings, user reviews, pricing, and more from Vega competitors and alternatives in order to make an informed decision for your business.
-
1
Rezdy
Rezdy
Rezdy is the world’s leading independent B2B SaaS booking and distribution platform for tours, activities and attractions. Their powerful booking software helps thousands of tour and activity operators, in over 100 countries, save time and grow their direct business. Operators of all sizes, regardless of their chosen booking software, are further empowered to connect and trade with local and international agents at scale through their unparalleled B2B distribution platform, Rezdy Channel Manager. Founded in 2011, Rezdy has headquarters in Sydney, Australia and offices in Las Vegas and Raleigh, USA, with over $1.3 billion in experiences processed through their platform every year.Starting Price: $49 a month -
2
PHP Secure
PHP Secure
PHP Secure is a FREE code scanner that analyzes your PHP code for critical security vulnerabilities. Free online scanner: - Quickly and qualitatively finds web app vulnerabilities - Gives explicit reports and recommendations to fix vulnerabilities - Easy to use and requires no specialized knowledge - Reduces risk, saves budget, and boosts productivity PHP Secure Scanner is suitable for analyzing sites on Php, framework Laravel, and CMS Wordpress, Drupal and Joomla. PHP Secure detects the most common and dangerous types: -SQL injection vulnerabilities -Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections -Remote Code Executions -Double Escaping -Directory Traversal -Regular Expression Denial of Service (ReDos) -
3
Vega
Vega.Works
Vega is a complete Engagement, Payments, Communications, and Intelligent Profiling platform in the market anywhere. Vega + AI promises to offer breakthrough communications and fundraising for organizations of any size. Vega Widgets on your website or on Supporter's phones offer unique personalization of dialogues with your supporter community. Vega Workflows bring Intelligent Automation to your conversations with your supporter community. Vega Raffles & Lotteries gives you a wonderful Engagement and Fundraising opportunity included in your CRM. Vega.Works offers the best ROI, the highest feature set, ultimate integrity and leading-edge technology. Vega grew from the sector and is totally committed to, the for-purpose or non-profit sector.Starting Price: $75/month (unlimited users) -
4
API Fuzzer
Fuzzapi
API Fuzzer allows to fuzz-request attributes using common pentesting techniques and lists vulnerabilities. API Fuzzer gem accepts an API request as input and returns vulnerabilities possible in the API. Cross-site scripting vulnerability, SQL injection, blind SQL injection, XML external entity vulnerability, IDOR, API rate limiting, open redirect vulnerabilities, information disclosure flaws, info leakage through headers, and cross-site request forgery vulnerability.Starting Price: Free -
5
Vega Equity
Vega Equity
Vega Equity was designed to equip companies to manage their equity in the most effective way possible Along with accurate cap table management, Vega Equity’s platform offers an intuitive, error-free and paperless experience which is customized to suit the needs of the user and ensures that it is a one-stop destination for any information which the stakeholders require with pinpoint accuracy. Vega Equity also helps in measuring and analyzing KPIs and facilitates the creation of any data model based on the scenario, which has helped a lot of our clients in effectively tracking their performance with respect to their goals. We at Vega Equity are determined to help our clients on their path to being successful organizations.Starting Price: $8.41 per month -
6
VEGA
Epsilog
Vega Mobile Nurse. My mobile and connected patient management at your fingertips! Your job requires you to be mobile, your tour takes you to move around every day for several hours. And this time spent away from your office does not facilitate your administrative management of IDEL. This is why we offer Vega Mobile, a complete mobile application always connected, for liberal nurses. Permanent data synchronization SCOR prescription photo. Ergonomic. Geolocation. What are the features of Vega Mobile? Your tours represent a real organization in your daily life at IDEL, which is why Vega Mobile supports you during your tours and becomes an essential assistant. With Vega Mobile, you can: register your new prescriptions, add, modify or delete your sessions access the content of each treatment, capture the prescription in SCOR format (it will be teletransmitted to the cash register with the invoice). -
7
VEGAS Pro
MAGIX Software
VEGAS Pro 18 is here to make your video production more efficient than ever before. Explore multiple nested timelines, industry-leading HDR editing tools, and an easy-to-use, yet powerful color grading workflow. In combination with over 30 new features, VEGAS Pro 18 provides comprehensive workflow improvements that will supercharge your video production. Nobody edits faster than a passionate creative with VEGAS Pro at hand. The timeline editing tools make editing fast and easy. But more importantly, they bring out your creativity, because ideas flow freely when you're not preoccupied by clumsy editing tools. No NLE enables you to edit, think and create more effectively than VEGAS Pro. Organize projects and speed up your workflow with nested timelines. Move easily between timelines within the master project, or access your nested timelines as stand-alone projects to work on them independently.Starting Price: $599 -
8
Vega-Altair
Vega-Altair
The Vega-Altair open-source project is not affiliated with Altair Engineering, Inc. With Vega-Altair, you can spend more time understanding your data and its meaning. Altair’s API is simple, friendly and consistent and built on top of the powerful Vega-Lite visualization grammar. This elegant simplicity produces beautiful and effective visualizations with a minimal amount of code. The key idea is that you are declaring links between data columns and visual encoding channels, such as the x-axis, y-axis, color, etc. The rest of the plot details are handled automatically. Building on this declarative plotting idea, a surprising range of simple to sophisticated plots and visualizations can be created using relatively concise grammar.Starting Price: Free -
9
WebReaver
Websecurify
WebReaver is an elegant, easy to use and fully-automated, web application security security testing tool for Mac, Windows and Linux, suitable for novice as well as advanced users. WebReaver allows you easily test any web application for a large variety of web vulnerabilities from the sever kinds such as SQL Injection, local and remote file Includes, command Injection, cross-site scripting and expression Injection to the less severe ones such as variety of session and headers problems, information leakage and many more. Automated security testing technologies, such as those, which rely on scanning, fuzzing, sending arbitrary malicious data to detect security defects, can seriously damage the web applications they are used against. Therefore, it is often recommended to perform automated tests only against systems in demo, testing or pre-production environments. -
10
Affinda Invoice Extractor
Affinda
Affinda provides AI-powered document automation solutions that combine the adaptability of human understanding with the precision of computer accuracy to streamline document processing tasks. Affinda’s Invoice Extractor lets you easily extract data from even the most complex invoices. Quickly and successfully process batch of invoices in PDFs, DOC, PNG, and JPG. Affinda Invoice Extractor recognises 50+ fields including line-item detail to allow accounts payable departments to streamline their processes. Companies switch to Affinda because of our ability to extract data from even the most difficult invoices, thereby freeing up staff to focus on higher-value activities. The Affinda Invoice Extractor is powered by our AI Engine, VEGA. It uses innovations in NLP (Natural Language Processing), Transfer Learning and Computer Vision so it can understand documents like a human. VEGA constantly self-learns and continues to improve over time.Starting Price: $300 -
11
Vega Cloud
Vega Cloud
The most user-friendly cloud automation platform for all your cloud optimization needs. Vega unlocks the power of public cloud infrastructure, giving businesses the freedom to innovate and efficiently deliver world-class products and services. We believe we have created the most efficient SaaS products for cloud users. We've automated cloud optimization at scale, allowing you to focus on operations while managing your cloud infrastructure more effectively. A one-of-a-kind cloud management platform that automates cloud optimization. Access high-performance workstations from anywhere with zero-trust-inspired security. Creative access stations are designed to support multiple OS without loss of performance. Vega atelier remote studios for post-production and mastering eliminate the need for individuals to download assets. Customize workflows, Isolate content and users to specific projects with asset permissions based on role or job.Starting Price: $300 per month -
12
Web attack recognition is based on AI+ rules. It is anti-bypass and low in both false negative and false positive rates. Web attack recognition defends effectively against common web attacks including the OWASP top 10 web security threats (SQL injection, unauthorized access, cross-site scripting, cross-site request forgery, web shell trojan upload, etc). Users can cache core web contents to the cloud and publish cached web pages, which act as substitutes and can prevent the negative consequences of web page tampering. Backend data is well protected by pre-event server and application concealing, mid-event attack prevention and post-event sensitive data replacement and concealing. WAF performs nationwide DNS verification of the domain names submitted by the customer to detect and display the hijacking conditions of the protected domain names in various regions, helping avoid data theft and financial losses caused by the hijacking of website users.
-
13
Atomic ModSecurity Rules
Atomicorp
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - And much more * Atomicorp developed the first ModSecurity rule set and maintains the largest number of active WAF rules that support server types from Tomcat and Nginx to IIS, LightSpeed and Apache. * Atomic ModSecurity Rules are the most comprehensive WAF rule set in the industry, have the highest level of quality and are fully backed by expert support. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ ******* -
14
Azure Web Application Firewall
Microsoft
Azure Web Application Firewall is a cloud-native service that protects web apps from common web-hacking techniques such as SQL injection and security vulnerabilities such as cross-site scripting. Deploy the service in minutes to get complete visibility into your environment and block malicious attacks. Protect your web applications in just a few minutes with the latest managed and preconfigured rule sets. The Azure Web Application Firewall detection engine combined with updated rule sets increases security, reduces false positives, and improves performance. Use Azure Policy to help enforce organizational standards and assess compliance at scale for Web Application Firewall resources. Get an aggregated view to evaluate the overall state of your environment.Starting Price: $0.443 per gateway per hour -
15
Trusted Knight Protector Web
Trusted Knight Corporation
Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and DDoS protection. Protector Web eliminates website and application vulnerabilities such as cross-site scripting (XSS), SQL Injection, Remote File Inclusion (RFI) and the OWASP Top-10. It prevents attackers from gaining unauthorized access to web systems, compromising sensitive data and defacing websites while minimizing an organization’s dependency on secure development and 3rd party patches. Protector Web is an advanced alternative to a conventional web application firewall (WAF), which addresses the critical WAF deficiencies by using active learning, active content serving and cloud replication. As a result, it dramatically reduces false positives and false negatives, shortens deployment time to hours and eliminates operational complexity. -
16
Baidu AI Cloud Intrustion Detection System
Baidu AI Cloud
Based on the full-flow image and big data processing technology, the IDS can analyze the flow log authorized by the user, via a bypass. Also, it can identify the web application attack quickly and profoundly mines the remote command execution, web shell backdoor, and sensitive file leakage attacks against the web by hackers, and make the alarm accurately. Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection compliance services. Under the user authorization, IDS analyzes the bidirectional HTTP traffic log of user EIP in a real-time manner and quickly identifies various common web attacks, such as SQL injection, XSS cross-site scripting, web shell back door uploading and unauthorized access. -
17
APIsec
APIsec
Hackers are targeting loopholes in API logic. Learn how to secure APIs and prevent breaches and data leaks. APIsec finds critical flaws in API logic that attackers target to gain access to sensitive data. Unlike traditional security solutions that look for common security issues, such as injection attacks and cross-site scripting, APIsec pressure-tests the entire API to ensure no endpoints can be exploited. With APIsec you’ll know about vulnerabilities in your APIs before they get into production where hackers can exploit them. Run APIsec tests on your APIs at any stage of the development cycle to identify loopholes that can unintentionally give attackers access to sensitive data and functionality. Security doesn’t have to slow down Development. APIsec runs at the speed of DevOps, giving you continuous visibility into the security of your APIs. No need to wait for the next scheduled pen-test, APIsec tests are complete in minutes.Starting Price: $500 per month -
18
WebScanner
DefenseCode
DefenseCode WebScanner is a DAST (Dynamic Application Security Testing, BlackBox Testing) solution for comprehensive security audits of active web applications (websites). WebScanner will test a website’s security by carrying out a large number of attacks using the most advanced techniques, just as a real attacker would. DefenseCode WebScanner can be used regardless of the web application development platform. It can be used even when application source code is no longer available. WebScanner supports major web technologies such as HTML, HTML5, Web 2.0, AJAX/jQuery, JavaScript and Flash. It is designed to execute more than 5000 Common Vulnerabilities and Exposures tests for various web server and web technology vulnerabilities. WebScanner is capable of discovering more than 60 different vulnerability types (SQL Injection, Cross Site Scripting, Path Traversal, etc.), including OWASP Top 10. -
19
Perfect Master
Treskat USA
#1 Master Key Software in use by thousands of locksmiths worldwide. In use buy thousands of locksmiths, hospitals, schools, many Las Vegas Casinos, US Military, theme parks, restaurant chains and more. Flexible: Change pin sizes, step, MAC, and even manipulate the bitting array to hold constants if you want to. Create systems for all 4, 5, 6 & 7 pin locks incl. special ones like ASSA, Emhart, Medeco (including Keymark & Biaxial) and removable core like KABA Peaks, Best Falcon A2 and A4, Sargent, Corbin, and Russwin. -
20
Barracuda CloudGen Firewall
Barracuda
Get comprehensive protection for on-premises and multi-cloud deployment using the firewall built in and for the cloud. Frictionless, cloud-hosted Advanced Threat Protection detects and blocks advanced threats, including zero-day and ransomware attacks. Gain rapid protection against the newest threats with the help of a global threat intelligence network fed by millions of data collection points. Modern cyber threats such as ransomware and advanced persistent threats, targeted attacks, and zero-day threats, require progressively sophisticated defense techniques that balance accurate threat detection with fast response times. Barracuda CloudGen Firewall offers a comprehensive set of next-generation firewall technologies to ensure real-time network protection against a broad range of network threats, vulnerabilities, and exploits, including SQL injections, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many more. -
21
Wapiti
Wapiti
Wapiti is a web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications. It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed web app, looking for scripts and forms where it can inject data. Once it gets the list of URLs, forms, and their inputs, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. Search for potentially dangerous files on the server. Wapiti supports both GET and POST HTTP methods for attacks. It also supports multipart forms and can inject payloads in filenames (upload). Warnings are raised when an anomaly is found (for example 500 errors and timeouts). Wapiti is able to make the difference between permanent and reflected XSS vulnerabilities. Generates vulnerability reports in various formats (HTML, XML, JSON, TXT, CSV).Starting Price: Free -
22
Alibaba Cloud WAF
Alibaba
Web Application Firewall (WAF) protects your website servers against intrusions. Our service detects and blocks malicious traffic directed to your websites and applications. WAF secures your core business data and prevents server malfunctions caused by malicious activities and attacks. Alibaba Cloud WAF is a web application firewall that monitors, filters, and blocks HTTP traffic to and from web applications. Based on the big data capacity of Alibaba Cloud Security, Alibaba Cloud WAF helps to defend against common web attacks such as SQL injections, Cross-site scripting (XSS), web shell, Trojan, and unauthorized access, and to filter out massive HTTP flood requests. It protects web resources from being exposed and guarantees website security and availability. In this video we show how to use and how to configure Web Application Firewall. WAF will be used to protect website and we will showcase WAF in action. -
23
Vega HR
Vega HR
Vega-HR is the one-stop solution for your Employee Recognition and Rewards needs to make your organization a truly-rewarding workspace. We provide world-class employee rewards, on-spot recognition, feedback, and incentive solutions that can be monetized and redeemed with 3000+ Coupons and much more. With an aim to enrich company culture, we enable organizations to Plan, Communicate, and Benchmark both your short-term and long-term Incentives, perks, employee benefits in real-time. Our tools enable HR professionals to build and support strong company values — wherever their employees are working from. Join us today in making work more rewarding!Starting Price: $0.99/month/user -
24
Bubinga
NORTANA SERVICES LIMITED
Bubinga is a simple and user-friendly trading platform. Having all the necessary features for professionals, our trading platform is easily accessible even for newcomers. The main features: Free USD 10,000 demo account is available. Practice without any risk, using all the available features. Deposit from USD 5. Affordable start without any large investments. You can make deposit via Visa, Mastercard, LTC, ETH, XRP, BTC, USDT, Sticpay, Astropay, Tigerpay, iWallet, JCB, Perfect Money, Vega Wallet 12 trading indicators. Use popular trading indicators without breaking away from trade.Starting Price: $5 -
25
WatchGuard Firebox Cloud
WatchGuard
It’s a fact – businesses are migrating services from on-premises servers into the cloud. Email servers, web servers, customer relationship management systems (CRM), and file storage are migrating to public cloud services. With so much sensitive data moving to the cloud, security is essential. WatchGuard’s Firebox Cloud allows network administrators to extend their security perimeter to the cloud and protect servers running within a public cloud environment. WatchGuard Firebox Cloud brings the protection of WatchGuard’s leading Firebox Unified Threat Management (UTM) appliances to public cloud environments. Firebox Cloud can quickly and easily be deployed to protect a Virtual Private Cloud (VPC) from attacks such as botnets, cross-site scripting, SQL injection attempts, and other intrusion vectors. -
26
Azure Application Gateway
Microsoft
Protect your applications from common web vulnerabilities such as SQL injection and cross-site scripting. Monitor your web applications using custom rules and rule groups to suit your requirements and eliminate false positives. Get application-level load-balancing services and routing to build a scalable and highly available web front end in Azure. Autoscaling offers elasticity by automatically scaling Application Gateway instances based on your web application traffic load. Application Gateway is integrated with several Azure services. Azure Traffic Manager supports multiple-region redirection, automatic failover, and zero-downtime maintenance. Use Azure Virtual Machines, virtual machine scale sets, or the Web Apps feature of Azure App Service in your back-end pools. Azure Monitor and Azure Security Center provide centralized monitoring and alerting, and an application health dashboard. Key Vault offers central management and automatic renewal of SSL certificates.Starting Price: $18.25 per month -
27
RiskAMP
RiskAMP
RiskAMP is a full-featured Monte Carlo simulation engine for Microsoft Excel®, designed to integrate seamlessly with Excel’s interface and functions. The RiskAMP Add-in offers a complete toolkit for adding risk analysis to your spreadsheet models, making it quick and easy at a fraction of the price of competing packages. With deep integration into Excel, it features an integrated ribbon toolbar, VBA scripting support, automatic charts, and graphs. RiskAMP 6 introduces new functionalities such as the PERT distribution for cost and project modeling, more than 40 random distributions including correlated multivariate ones, and automatic histogram and correlation charts. The tool supports Latin Hypercube sampling, Las Vegas simulation algorithms, and distribution fitting, along with native support for Windows on ARM. RiskAMP is compatible with Excel versions from 2013 to 365 (32-bit and 64-bit), and a browser-based risk platform called RiskAMP Web is also available.Starting Price: $16.95 per month -
28
Aptiv
Aptiv
Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility. Aptiv is focused on developing and commercializing autonomous vehicles and systems that enable point-to-point mobility via large fleets of autonomous vehicles in challenging urban driving environments. With talented teams working across the globe, from Boston to Singapore, Aptiv is the first company to deploy a commercial, autonomous ride-hailing service based in Las Vegas. Aptiv has provided over 100,000 public passenger rides, with 98% of passengers rating their Aptiv self-driving experience 5-out-of-5 stars. At Aptiv, we believe that our mobility solutions have the power to change the world. -
29
Rosterfy
Rosterfy
Recruit, Retain and Reward volunteers, increase engagement and create brilliant opportunities to support your causes or put on game-changing events. Rosterfy is a highly rated Volunteer Management Software platform for Charities, Non-Profit Organisations, Sports Institutions, and Local Government Institutions. We’ve built a platform that will significantly reduce the time your team spends on admin, streamline your communication with simple automated emails and SMS messages and give you a complete view of your operation. What makes it stand out is how configurable it is to your business and how it can scale as your aspirations grow. From Las Vegas to London, Singapore to Sydney, Rosterfy helps communities connect with causes they care about all across the world. -
30
trivago
trivago
trivago’s hotel search allows users to compare hotel prices in just a few clicks from more than 400 booking sites for 1.8 million+ hotels in over 190 countries. With 1.4 billion visits annually to our site, travelers regularly use the hotel comparison to compare deals in the same city. Get information for trips to cities like Las Vegas or Orlando and you can find the right hotel on trivago quickly and easily. New York City and its surrounding area are great for trips that are a week or longer with the numerous hotels available. With trivago you can easily find your ideal hotel and compare prices from different websites. Simply enter where you want to go and your desired travel dates, and let our hotel search engine compare accommodation prices for you. To refine your search results, simply filter by price, distance (e.g. from the beach), star category, facilities and more. From budget hostels to luxury suites, trivago makes it easy to book online. -
31
Admin Labs' Website Monitoring
Admin Labs
You can't have reliable monitoring system if the system is located only in one location. In AdminLabs, we have distributed our monitoring network all-around the world based on the demand. Intelligent monitoring location selection combined with the distributed network is going to maximize the reliability of monitor results. Let us choose the best monitoring location for you, and false alarms shouldn't occur anymore. For example, if your website is hosted in Las Vegas, our system would probably use Los Angeles as a primary and Dallas as a secondary location. Based on your need, you could find useful to use custom monitoring settings. There are tons of settings attached to different monitors (URL, POST, and PING), but there are few common settings that you can select from. Monitor without notifications is like a car without wheels, useless. Email notifications are useful because of the most significant amount of information. -
32
Mark Text
Mark Text
Mark Text is an MIT licensed open source project, you will always be able to download the latest version from GitHub release page. Mark Text is still in development, and its development is inseparable from all sponsors. Support GFM table block, you can remove/add rows and columns. Support flowchart, sequence diagram, gantt diagram, vega chart. Support CommonMark and GitHub Flavored Markdown Spec. Realtime preview (WYSIWYG) and a clean and simple interface to get a distraction-free writing experience. Markdown extensions such as math expressions (KaTeX), front matter and emojis. Support paragraphs and inline style shortcuts to improve your writing efficiency. Paste images directly from clipboard. -
33
SevenRooms
SevenRooms
SevenRooms is a guest experience and retention platform that helps hospitality operators connect data across the guest journey. From neighborhood restaurants and bars to international, multi-concept hospitality groups, the end-to-end platform enables operators to automatically drive revenue and profitability by leveraging data to build direct relationships, deliver exceptional experiences, and increase repeat visits & orders. Founded in 2011 and venture-backed by Amazon, Comcast Ventures and Providence Strategic Growth, SevenRooms has dining, hotel F&B, nightlife and entertainment clients globally, including: Bloomin’ Brands, MGM Resorts International, Mandarin Oriental Hotel Group, The Cosmopolitan of Las Vegas, Jumeirah Group, Wolfgang Puck, Michael Mina, sbe, LDV Hospitality, Zuma, Altamarea Group, AELTC, D&D London, Corbin & King, Live Nation and Topgolf. -
34
Cloudbric
Cloudbric
Our cloud SWAP has been vetted to be one of the most comprehensive solutions against threats such as cross-site scripting (XSS), SQL injections, and Distributed Denial of Service (DDoS). Cloudbric’s patented logic-based SWAP (featuring pattern matching, semantic, and heuristic analysis) and core rulesets are fully automated and easy to use. Meaning, is no need for frequent signature updates or complicated configuration of security policies. Customization options are also available for private WAF deployments. Our service ensures your website. will stay online and be protected against distributed denial of service attacks (DDoS). Cloudbric actively blocks layers 3, 4, and 7 DDoS attacks scalable up to 20Tbps. Cloudbric is a fully managed cybersecurity service with policy optimization, malicious traffic monitoring, DDoS protection, online real-time dashboard and 24/7 technical support. -
35
Security and risk management platform for Google Cloud. Understand the number of projects you have, what resources are deployed, and manage which service accounts have been added or removed. Identify security misconfigurations and compliance violations in your Google Cloud assets and resolve them by following actionable recommendations. Uncover threats targeting your resources using logs and powered by Google’s unique threat intelligence; use kernel-level instrumentation to identify potential compromises of containers. Discover and view your assets in near-real time across App Engine, BigQuery, Cloud SQL, Cloud Storage, Compute Engine, Cloud Identity and Access Management, Google Kubernetes Engine, and more. Review historical discovery scans to identify new, modified, or deleted assets. Understand the security state of your Google Cloud assets. Uncover common web application vulnerabilities such as cross-site scripting or outdated libraries in your web applications.
-
36
Google Cloud Armor
Google
With Google Cloud Armor help protect your applications and websites against denial of service and web attacks. Enterprise-grade DDoS defense. Cloud Armor benefits from our experience of protecting key internet properties such as Google Search, Gmail, and YouTube. It provides built-in defenses against L3 and L4 DDoS attacks. Mitigate OWASP Top 10 risks. Cloud Armor provides predefined rules to help defend against attacks such as cross-site scripting (XSS) and SQL injection (SQLi) attacks. Managed Protection. With Cloud Armor Managed Protection Plus tier, you will get access to DDoS and WAF services, curated rule sets, and other services for a predictable monthly price. Cloud Armor benefits from our experience of protecting key internet properties such as Google Search, Gmail, and YouTube. It provides built-in defenses against L3 and L4 DDoS attacks. -
37
ASP.NET
Microsoft
Blazor is a feature of ASP.NET for building interactive web UIs using C# instead of JavaScript. Blazor gives you real .NET running in the browser on WebAssembly. .NET is a developer platform made up of tools, programming languages, and libraries for building many different types of applications. ASP.NET supports industry standard authentication protocols. Built-in features help protect your apps against cross-site scripting (XSS) and cross-site request forgery (CSRF). ASP.NET provides a built-in user database with support for multi-factor authentication and external authentication with Google, Twitter, and more.Starting Price: Free -
38
Cloudzy
Cloudzy
At Cloudzy, we are more than just a VPS provider; we are the infrastructure backbone for traders, gamers, developers, universities, and SMBs worldwide. With a robust network of data centers spanning the US, Europe, and Asia—including strategic locations in New York, Dallas, Miami, Las Vegas, Utah, London, Amsterdam, Frankfurt, Zurich, Singapore, and Dubai—we bring your data closer to you and your audience. Unmatched Versatility & The One-Click Marketplace Whether you prefer Windows or Linux, Cloudzy offers one of the industry's most extensive marketplaces. We provide instant, pre-configured solutions tailored to your specific needs: High-Performance & AI: Leverage our GPU VPS and AI-optimized servers for heavy workloads. Trading & Finance: Experience latency-free trading with dedicated Forex, MT5, NinjaTrader VPS, and Botting RDPs. Gaming: Host your own worlds with specialized servers for Minecraft, Terraria, Ark, and TeamSpeak. Web & Content: distinct hosting solutionsStarting Price: $2.48/month -
39
ViewLift
ViewLift
Best-in-class sports streaming and OTT solutions provider that help sports league, clubs, federations and right holders build scalable direct-to-consumer streaming services. ViewLift offers end-to-end distribution and monetization solutions for Live, Video On Demand, and 24x7 Linear streaming. ViewLift offers a scalable solution for deploying ready-made as well as custom video streaming solutions. The company's proprietary IP constitutes a full tech stack, providing extensive functionality at a reduced time to market. ViewLift's impressive client list includes National Hockey League(NHL), Vegas Golden Knight, LIV Golf, Monumental Sports Network, NBCUniversal, MyOutdoorTV, TEGNA, Nexstar, Hoichoi and Here TV. The company's innovative solutions in the sports technology industry have been acknowledged, having won the Best Digital Platform at Digiday Video & TV Awards 2023, Bronze for Best Tech Company in SportsPro OTT Awards 2024 and being a finalist in multiple technology awards. -
40
Rafter
Rafter
Rafter is a developer-friendly security scanning platform that lets you detect and address vulnerabilities in your GitHub repositories with a single click or command. It integrates seamlessly via a browser-based dashboard, CLI, or REST API to scan JavaScript, TypeScript, and Python code for a range of issues, including exposed API keys, SQL injection, XSS flaws, insecure dependencies, hardcoded credentials, and authentication weaknesses. Results are clearly categorized into “Errors,” “Warnings,” and “Improvements,” each offering detailed explanations, code locations, remediation steps, and formatted prompts ready to paste into AI coding assistants. You can view findings in JSON or Markdown, automate scans within CI/CD pipelines, and pull scan results directly into your workflows. Whether you prefer no-code, low-code, or full-code environments, Rafter adapts flexibly to your setup, making proactive security early in development effortless and scalable.Starting Price: $39 -
41
Monster VoIP
Monster VoIP
Monster VoIP was established to distribute superior voice quality and maximized uptime to customers from here in L.A. to New York to Washington, D.C. to Houston to Dallas to Chicago and beyond, while delivering unparalleled service and customer satisfaction. We started by setting up data centers in Las Vegas, New York, Dallas, and Minnesota to ensure geo-redundancy, with all endpoints multi-registered at all four facilities. (This is just a fancy way of saying that multiple locations means you can expect amazing voice quality and unparalleled business phone uptime.) We then made sure to offer a complete suite of communication tools in one platform. This means you and your team only have to learn our easy-to-use user interface for all of your communication efforts. To make good on our customer satisfaction promise, we then decided to provide personalized setup and ongoing 24/7/365 support to every business VoIP customer that walks through our (virtual) doors.Starting Price: $27 /month -
42
AWS WAF
Amazon
AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules. With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives. -
43
garak
garak
garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. garak's a free tool, we love developing it and are always interested in adding functionality to support applications. garak is a command-line tool, it's developed in Linux and OSX. Just grab it from PyPI and you should be good to go. The standard pip version of garak is updated periodically. garak has its own dependencies, you can to install garak in its own Conda environment. garak needs to know what model to scan, and by default, it'll try all the probes it knows on that model, using the vulnerability detectors recommended by each probe. For each probe loaded, garak will print a progress bar as it generates. Once the generation is complete, a row evaluating that probe's results on each detector is given.Starting Price: Free -
44
SiteLock
SiteLock
We secure websites by automatically finding and fixing threats. Automatically protect your website, reputation, and visitors against cyberthreats. Comprehensive website security software protects your website from malicious cyber threats. This includes the protection of your site code and web applications. Depending on your website security package, you’ll receive daily website scans, automated malware removal, and vulnerability/CMS patching, as well as a web application firewall to block harmful traffic before it ever reaches your site. Our website security scan instantly checks your website from malware, viruses and other cyber threats and alerts you to found issues. Detect and automatically remove malicious content from your website, creating a safe experience for your customers. Easily check for website vulnerabilities in your CMS with our vulnerability scanner before they are exploited. -
45
GamaShield
GamaSec
Web applications and Web Malware are proving to be the weakest link in overall corporate security. Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized access to corporate applications and data and to prevent the injection suspicious files and malware. GamaSec's Web application scanner, which protects applications and servers from hackers, is an automated security service that searches for software vulnerabilities within Web applications. A Web application scanner crawls the entire website, analyzes in-depth each & every file, and displays the entire website structure. The scanner performs an automatic audit for common security vulnerabilities while launching a series of simulated Web attacks. -
46
VulScan
RapidFire Tools, a Kaseya Company
Discover, prioritize and manage internal and external vulnerabilities. Harden the networks you manage and protect against evolving threats with vulnerability scanning from VulScan. VulScan is a powerful tool for complete and automated vulnerability scanning. It detects and prioritizes the weaknesses that hackers can exploit, empowering you to harden networks of any size or type and creating an extra layer of cybersecurity protection. Protect the networks you manage with flexible network scanning options. Vulscan includes on-prem internal network scanners, computer-based discovery agents, remote internal scanning by proxy, and hosted external scanners for comprehensive vulnerability management.Starting Price: $99 per month -
47
OpenVAS
Greenbone Networks
OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. The scanner obtains the tests for detecting vulnerabilities from a feed that has a long history and daily updates. OpenVAS has been developed and driven forward by the company Greenbone Networks since 2006. As part of the commercial vulnerability management product family Greenbone Enterprise Appliance, the scanner forms the Greenbone Vulnerability Management together with other Open Source modules. -
48
VulnSign
VulnSign
VulnSign is an online vulnerability scanner that is fully automated, customer-orient configurable and has advanced features. VulnSign can scan any type of web application, regardless of the technology it was built with. It uses a Chrome based crawling engine and can identify vulnerabilities in legacy, and custom built, modern HTML5, Web 2.0 applications and Single Page Applications (SPA). It also has vulnerability checks for popular frameworks. The VulnSign vulnerability scanner is very easy to use and most of the pre-scan configuration can be automated. It is an all in one vulnerability management solution, with multi user support and integration capabilities. Though to test it all you need to do is specify the URL and credentials (to scan password protected websites), and launch a vulnerability scan.Starting Price: $49/month/team -
49
Disqus
Disqus
The internet's favorite comment plug-in makes it easy for publishers to bring their content to life, fuel colorful discussions, efficiently moderate comments, and build engaged communities. Convert casual readers into regular contributors. Disqus helps publishers capture readers and keep them coming back for more with robust sign-in options, cross-site notifications and more. Audience Analytics provide actionable audience insights, helping publishers to understand their audience, monitor engagement, and optimize content strategy. Turn engagement into revenue with new inventory through Disqus and highly configurable ad serving from top demand partners on your site. Capture readers and keep them coming back for more with robust sign-in options and cross-site notifications. Turn engagement into revenue with new inventory through Disqus and highly configurable ad serving.Starting Price: $0 per month -
50
Probely
Probely
Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.Starting Price: $49.00/month