Alternatives to Visore

Compare Visore alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Visore in 2024. Compare features, ratings, user reviews, pricing, and more from Visore competitors and alternatives in order to make an informed decision for your business.

  • 1
    KernelCare Enterprise
    Global organizations trust Tuxcare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the Tuxcare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. Tuxcare automates the patching process and eliminates the need to wait weeks or months for reboot cycles to apply patches. Tuxcare currently protects over 1 million workloads worldwide. Tight integrations with popular patch management and vulnerability scanners, including Qualys, Crowdstrike, and Rapid7, enable Tuxcare to fit seamlessly into existing infrastructure. The Tuxcare secure patch server, ePortal, allows operations in gated and air-gapped environments. Reduce risk by significantly reducing the mean time to patch vulnerabilities
    Starting Price: $3.95 per month
  • 2
    Pentera

    Pentera

    Pentera

    Pentera (formerly Pcysys) is an automated security validation platform that helps you improve security so you can know where you stand at any given moment. It tests all cybersecurity layers by safely emulating attacks, arming you with a risk-based remediation roadmap. Pentera identifies true risk and security exposure so you can focus on the 5% of weaknesses that constitute 95% of the actual risk. Pentera is an agentless, low-touch, fully automated platform that requires no prior knowledge of the environment. The solution can see what no one else does, providing immediate discovery and exposure validation across a distributed network infrastructure. With Pentera, security teams can think and act as your adversary does, giving you the insights required for anticipating and preventing an attack before it happens. Hundreds of organizations trust Pentera‘s do-no-harm policy with no locked users, zero network downtime, and no data manipulation.
  • 3
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 4
    Orca Security

    Orca Security

    Orca Security

    Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment. Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.
  • 5
    Arctic Wolf

    Arctic Wolf

    Arctic Wolf Networks

    Get better security effectiveness for your organization with the Arctic Wolf® Platform and Concierge Security® Team. Cybersecurity is a field that requires 24x7 vigilance and constant adaptation. Arctic Wolf’s cloud native platform and Concierge Security® Team delivers uniquely effective solutions. Spanning thousands of installations, the Arctic Wolf® Platform processes over 65 billion security events daily. The platform collects and enriches endpoint, network, and cloud telemetry, and then analyzes it with multiple detection engines. Machine learning and custom detection rules then deliver personalized protection for your organization. While other products have limited visibility, the vendor-neutral Arctic Wolf® Platform enables broad visibility and works seamlessly with existing technology stacks, making it easy to adopt while eliminating blind spots and vendor lock-in.
  • 6
    XM Cyber

    XM Cyber

    XM Cyber

    Networks change constantly and that creates problems for IT and security operations. Gaps open exposing pathways that attackers can exploit. While enterprise security controls like firewalls, intrusion prevention, vulnerability management and endpoint tools attempt to secure your network, breaches are still possible. The last line of defense must include constant analysis of daily exposures caused by exploitable vulnerabilities, common configuration mistakes, mismanaged credentials and legitimate user activity that exposes systems to risk of attack. Why are hackers still successful despite significant investments in security controls? Several factors make securing your network difficult, mostly because of overwhelming alerts, never-ending software updates and patches, and numerous vulnerability notifications. Those responsible for security must research and evaluate piles of data without context. Risk reduction is almost impossible.
  • 7
    Cymulate

    Cymulate

    Cymulate

    Continuous Security Validation Across the Full Kill Chain. Cymulate’s breach and attack simulation platform is used by security teams to determine their security gaps within seconds and remediate them. Cymulate’s full kill chain attack vectors simulations analyze all areas of your organization including for example web apps, email, phishing, and endpoints, so no threats slip through the cracks.
  • 8
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 9
    SafeBreach

    SafeBreach

    SafeBreach

    The biggest reason security controls fail is that their improperly configured, or drifted over time. Maximize the efficiency and effectiveness of the security controls you have by seeing how they perform in orchestration during an attack. Then fix the gaps before attackers can find them. How safe is your enterprise against known and emerging threats? Pinpoint security gaps with precision. Safely run the latest attacks seen in the wild using the most comprehensive playbook in the industry and integrations with threat intelligence solutions. Proactively report to executives on your risk posture. And get a mitigation plan in place before attackers exploit the gaps. The fastly changing cloud environment, and the different security model, introduces a challenge in visibility and enforcement of cloud security. Validate your cloud and container security by executing attacks that test your cloud control (CSPM) and data (CWPP) planes to ensure the security of your critical cloud operations.
  • 10
    SeeMetrics

    SeeMetrics

    SeeMetrics

    Introducing a cybersecurity performance management platform for security leaders to see, track, and improve operations. See your security program performance in one place. Turn to one centralized place to understand how your stack has been performing and how it can perform better. Stop chasing after and consolidating data. Decide, plan and invest based on data, not on intuition. Actionable information about products, people and budget allow you to make more informed decisions about your corporate security. Identify gaps in your cyber resilience and performance based on cross-product insights and real-time threats. Enjoy out of-the-box, dynamic metrics that you can share and communicate easily with non-technical audiences. SeeMetrics’ agentless platform integrates with all of your existing tools so you can start generating insights within minutes.
  • 11
    Picus

    Picus

    Picus Security

    Picus is an award-winning complete security control validation platform. Get an effective proactive approach with Picus by validating your cyber threat readiness 24x7, identifying detection gaps, and having mitigation insights empowered by the largest technology alliance ecosystem in the industry. Picus evaluates security controls against the entire cyber kill chain with thousands of virtual cyber threats. It shows you exactly where gaps exist and how to mitigate them on prevention and detection layers. Fully continuous. Automatic. Flexible. Picus is deeply embedded into the cyber security ecosystem. Every security vendor we work with has the same unwavering commitment to delivering excellent level of security, whether it's enabling Picus to successfully execute our product strategy or providing in depth integrations that make Picus the complete security validation platform.
  • 12
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 13
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface. You get a clear view of every single asset an attacker could reach — what they are and how they relate to your business. Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 14
    Onyxia

    Onyxia

    Onyxia

    Onyxia is a Dynamic Cybersecurity Management platform that empowers Chief Information Security Officers and cybersecurity leaders with a centralized view of their cybersecurity environment and provides actionable insights for high-performing cyber defense strategies that align with business objectives. With Onyxia, security leaders can easily measure, manage and convey the business value of their cybersecurity program, enabling their organizations to stay safe from emerging threats, focus on what matters, and make smarter and more efficient decisions. The Onyxia platform identifies gaps in cybersecurity management and prioritizes recommendations for proactive cybersecurity strategy. Transform your team from being reactive to proactive, solving daily management, strategic planning and operational problems. Our mission is to empower CISOs with a holistic view and customized insights based upon real-time data.
  • 15
    CrowdStrike Falcon Exposure Management
    CrowdStrike Falcon Exposure Management is an attack surface management platform delivering autonomous, 24/7 discovery of exposed assets across all environments and the supply chain. Leading enterprises worldwide use CrowdStrike Falcon Exposure Management to gain unparalleled visibility of their internet-facing assets and actionable security insights for eliminating shadow IT risks. CrowdStrike Falcon Exposure Management's proprietary technology maps the world's internet exposed assets in real-time. Cutting edge ML classification and association engines analyze all the assets and automatically create your complete inventory. CrowdStrike EASM stands out with its deep adversary intelligence, allowing for precise risk prioritization. Understand threats from an attacker’s perspective and act quickly to secure your assets.
  • 16
    Criminal IP

    Criminal IP

    AI Spera

    Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time and facilitates preemptive responses accordingly. Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth. With Criminal IP’s 4 main features (Asset Search, Domain Search, Exploit Search, and Image Search), you can find IP risk scores and related vulnerabilities of searched IP addresses and domains, details on the exploit codes for each service, and assets that are left wide open to cyber threats in the form of images respectively.
  • 17
    Armis

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 18
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 19
    Tenable

    Tenable

    Tenable

    Tenable’s Cyber Exposure Platform gives you all the insight, research and data you need to uncover weaknesses across your entire attack surface. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk and aligning business goals with security initiatives. Products include: - Tenable.ep - Tenable.io - Tenable.sc - Tenable.ad - Tenable.ot - Tenable Lumin
  • 20
    Trend Vision One

    Trend Vision One

    Trend Micro

    Stopping adversaries faster and taking control of your cyber risks starts with a single platform. Manage security holistically with comprehensive prevention, detection, and response capabilities powered by AI, leading threat research and intelligence. Trend Vision One supports diverse hybrid IT environments, automates and orchestrates workflows, and delivers expert cybersecurity services, so you can simplify and converge your security operations. The growing attack surface is challenging. Trend Vision One brings comprehensive security to your environment to monitor, secure, and support. Siloed tools create security gaps. Trend Vision One serves teams with these robust capabilities for prevention, detection, and response. Understanding risk exposure is a priority. Leveraging internal and external data sources across the Trend Vision One ecosystem enables greater command of your attack surface risk. Minimize breaches or attacks with deeper insight across key risk factors.
  • 21
    Humanize Salience
    Externally visible vulnerabilities and misconfigurations. Detect and address external vulnerabilities proactively with continuous, advanced scanning. Continuously monitor and secure your APIs, safeguarding against unauthorized access and data breaches. Get custom-tailored hardening tips to bolster your system's defenses. Gain valuable threat intelligence without risking real data. Quantify risks and focus resources for maximum ROI. Gain in-depth insights into compliance. Replace multiple tools with one unified platform. Proactively anticipate and neutralize cyber threats. Optimize your cybersecurity process by leveraging the power of machine learning and deep learning. Extended Attack Surface Management (xASM) ensures comprehensive visibility and control over your entire digital presence, including Internal, external, and API attack surfaces. xASM enables proactive mitigation of cyber threats, thereby safeguarding your business continuity.
    Starting Price: $199 per month
  • 22
    IBM Security Randori Recon
    Get the most authentic view of what’s exposed. Discover what is exposed with our black-box approach. IBM Security Randori Recon builds a map of your attack surface to find exposed assets (on-prem or cloud), shadow IT, and misconfigured systems attackers can find, but you may be missing. Unlike other ASM solutions that rely on IPv4 range scans, our unique center of mass approach enables us to find IPv6 and cloud assets others miss. Only IBM Security Randori Recon gets you on target faster – automatically prioritizing the exposed software attackers are most likely to attack first. Built by attackers to identify attackable software, only Randori Recon provides you a real-time inventory of each instance of exposed and attackable software. Going far beyond vulnerabilities, Randori Recon looks at each target in context to build a unique priority score for each target. Practice makes perfect. Go beyond scanning and improve your team by testing your defenses under real-world conditions.
  • 23
    BIMA

    BIMA

    Peris.ai

    BIMA by Peris.ai is an all-encompassing Security-as-a-Service platform that combines the advanced functionalities of EDR, NDR, XDR, and SIEM into one powerful solution. This integration ensures proactive threat detection across all network points and endpoints, utilizing AI-driven analytics to predict and mitigate potential breaches before they escalate. BIMA streamlines incident response and enhances security intelligence, providing organizations with a formidable defense against sophisticated cyber threats. With BIMA, organizations benefit from a unified, intelligent approach to cybersecurity, enabling faster detection, improved incident response, and comprehensive protection. The platform’s AI capabilities continuously analyze data to identify patterns and anomalies, offering predictive insights that help prevent attacks. BIMA’s integration of multiple security technologies simplifies management and reduces the complexity of securing diverse IT environments.
    Starting Price: $168
  • 24
    Defense.com

    Defense.com

    Defense.com

    Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.
    Starting Price: $30 per node per month
  • 25
    Cortex Xpanse
    Cortex Xpanse continuously discovers and monitors assets across the entire internet to ensure your security operations team has no exposure blind spots. Get an outside-in view of your attack surface. Identify and attribute all internet connected assets, discover sanctioned and unsanctioned assets, monitor for changes and have a single source of truth. Prevent breaches and maintain compliance by detecting risky communications in global data flow. Reduce third-party risk by identifying exposures potentially caused by misconfigurations. Don’t inherit M&A security issues. Xpanse provides a complete, accurate and continuously updated inventory of all global internet-facing assets. This allows you to discover, evaluate and mitigate attack surface risks. You can also flag risky communications, evaluate supplier risk and assess the security of acquired companies. Catch exposures and misconfigurations before a breach.
  • 26
    Blue Lava

    Blue Lava

    Blue Lava Inc.

    Built with, by, and for the community, Blue Lava’s security program management platform provides security leaders the ability to measure, optimize, and communicate the business value of security. Blue Lava helps CISOs and security executives align cybersecurity risks, projects, and resources with business priorities. Reporting is tailored for Board and C-Suite communications including the alignment of security initiatives to business areas, coverage against frameworks like NIST-CSF, risk-based project prioritization, peer benchmarking, and progress against targets over time.
    Starting Price: upon request
  • 27
    RidgeBot

    RidgeBot

    Ridge Security

    Fully automated penetration testing that discovers and flags validated risks for remediation by SOC teams. RidgeBot® is a tireless software robot, it can run security validation tasks every month, every week or every day with a historical trending report provided. Provides a continuous peace of mind for our customers. Evaluate the effectiveness of your security policies by running emulation tests that follow mitre Attack framework. RidgeBot® botlet simulates the behavior of malicious software or downloads malware signatures to validate the security controls of the target endpoints. RidgeBot® botlet simulates the unauthorized movement of data from your server—for example, personal data, financial, confidential, software source codes, and more.
  • 28
    Balbix

    Balbix

    Balbix

    Balbix automatically analyzes the enterprise attack surface using specialized AI to provide a 100x more accurate view of breach risk. The platform continuously identifies and prioritizes vulnerabilities and other risk items, dispatching them for automatic and supervised mitigation. Balbix helps you reduce cyber risk by 95%, while making your security team 10x more efficient. Most data breaches happen because of known security issues which are missed and not fixed. Security teams try to discover and mitigate vulnerabilities but can’t keep up! To accurately quantify breach risk, Balbix continuously analyzes up to several hundred billion time-varying signals from your network. Balbix dispatches prioritized tickets with relevant context to risk owners for automatic and supervised mitigation. Leaderboards and incentives can be set up for a gamified approach to cyber risk reduction.
  • 29
    Hadrian

    Hadrian

    Hadrian

    Hadrian reveals the hacker’s perspective so the risks that matter most can be remediated with less effort. - Hadrian scans the internet to identify new assets and configurations changes to existing assets in real time. Our Orchestrator AI gathers contextual insights to reveal unseen links between assets. - - Hadrian’s platform detects over 10,000 3rd party SaaS applications, 1,000s of different software packages and versions, plugins for common tools, and open source repositories. - Hadrian identifies vulnerabilities, misconfigurations and exposed sensitive files. Risks are validated by Orchestrator AI to ensure accuracy, and ranked based on exploitability and business impact. - Hadrian finds exploitable risks the moment they appear in your attack surface. The tests are triggered immediately by Hadrian’s event-based Orchestrator AI.
  • 30
    Pure Signal Orbit
    Remain one step ahead, avoid costly indirect attacks by monitoring third parties. Proactively eliminate the weakest links in the security chain. Get over language barriers, IT talks technical, business speaks finance, both understand metrics. Get ready for changing regulations, enable GRC and IT to function harmoniously. Minimize financial impact of sensitive customer data and online services being exposed. Orbit is a cloud based attack surface management platform that enables discovery, monitoring and managing of external digital risks and vulnerabilities. Gain immediate value through visibility of hidden assets, unknown vulnerabilities and third party risks that otherwise go undetected. Orbit empowers our customers to face their external digital risk challenges head on. All Orbit products are accessed through intuitive and easy to navigate GUIs, there is nothing for customers or managed service partners to deploy or manage.
  • 31
    SightGain

    SightGain

    SightGain

    Cybersecurity leaders: Stop worrying and know that you are protected. SightGain is the only integrated risk management solution focused on cybersecurity readiness. SightGain tests and measures readiness using real-world attack simulations in your live environment. SightGain first quantifies your organization’s risk exposure including potential financial loss, downtime, or data loss. Then it assesses your readiness posture identifying the specific strengths and weaknesses in your production environment. Finally, it enables you to prioritize investments that will optimize your security readiness across people, processes, and technology. SightGain is the first automated platform to provide verifiable insights into your security people, process and Technology. We go beyond what Breach and Attack Simulation platforms do to now include people and process. With SightGain, you can continuously test, measure, and improve your security posture against the latest attacks.
  • 32
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.
    Starting Price: $8,000 per year
  • 33
    Vijilan

    Vijilan

    Vijilan Security

    Guaranteeing an organization’s safety includes detecting any malicious and unusual activity, which takes time, expertise, and the right technology. The retention of log data for a certain time is required for regulated industries such as finance or healthcare. In addition, the stored data can be used for further investigations. We are the last line of defense when hackers have already passed through the organization’s security appliances and tools. To offer an end-to-end solution to businesses of any size at an affordable price. A continuous monitoring system requires robust technology and advanced processes to collect logs from on-premises or cloud sources. Such a solution must translate them into standard events before submitting them to a storage destination for the necessary lifecycle. Technology is a medium, not an end. MSP-oriented solution accessible to small and medium size organizations.
  • 34
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 35
    Splunk Enterprise
    Go from data to business outcomes faster than ever before with Splunk. Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results. Collect and index log and machine data from any source. Combine your machine data with data in your relational databases, data warehouses and Hadoop and NoSQL data stores. Multi-site clustering and automatic load balancing scale to support hundreds of terabytes of data per day, optimize response times and provide continuous availability. The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project. Developers can build custom Splunk applications or integrate Splunk data into other applications. Apps from Splunk, our partners and our community enhance and extend the power of the Splunk platform.
  • 36
    NetSPI Breach and Attack Simulation
    It takes one click to give an adversary everything they need to access your global environment. Our proven technology and expert teams will evaluate your detective controls to prepare you for real-world threats throughout the cyber kill chain. Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% detection does not exist. So, how can we improve our security controls to better detect attacks across the kill chain? With breach and cyber attack simulation. We deliver a centralized detective control platform that gives organizations the ability to create and execute customized procedures utilizing purpose-built technology and professional human pentesters. Simulate real-world attack behaviors, not just IOC’s, and put your detective controls to the test in a way no other organization can.
  • 37
    Avalance

    Avalance

    Avalance

    The premier cyber security company that protects you before, during and after a breach. Our aim is to abolish the possibility of unauthorized access to databases by classifying the weaknesses in the digital space. From preventative maintenance to customized solutions, we put our experience to work to provide you with greater operating time. We have a robust portfolio of solutions specially designed for your unique critical environment. Avalance assures zero day exploits, provides custom remediation. Our aim is to solve the world's most difficult cybersecurity problems to make everyone safe in this digital space. Avalance promises an off-the-shelf software solution that can be installed and configured in hours. After software deployment, our users get their results within only minutes. Identify security gaps in real-time and take action in minutes with Avalance mitigation guidance. Interactive dashboards present the overall picture with objective metrics and list the gaps revealed.
  • 38
    AttackIQ

    AttackIQ

    AttackIQ

    AttackIQ gives customers the most consistent, trusted, and safest way to test and validate security controls at scale and in production. While competitors test in sandboxes, AttackIQ tests in production across the entire kill chain, the same as real-world adversaries do. AttackIQ can make every system in your networks and clouds a test point for the platform. We do this at scale, in your production environment, building connections to your controls and visibility platforms to capture evidence. Scenarios test your controls, validating their presence and posture using the same behaviors the adversary employs so you can be confident your program works as you intended. The AttackIQ platform provides a variety of insights for technical operators and executives alike. No longer is your security program a “black box” or managed by wishful thinking, AttackIQ produces threat-informed knowledge in reports and dashboards on a continuous basis.
  • 39
    Group-IB Unified Risk Platform
    The Unified Risk Platform strengthens security by identifying the risks your organization faces. The platform automatically configures your Group-IB defenses with the precise insights required to stop attacks by threat actors, thereby making it less likely that an attack will be successful. Group-IB's platform monitors threat actors at all times in order to detect advanced attacks and techniques. The Unified Risk Platform quickly and accurately identifies early warning signs before attacks develop, fraud occurs or your brand is damaged, which reduces the risk of undesirable consequences. The Unified Risk Platform counters threat actors with insight into their modus operandi. The platform leverages a variety of solutions and techniques to stop attacks that target your infrastructure, endpoints, brand and customers, reducing the risk that an attack will cause disruption or recur.
  • 40
    FireMon

    FireMon

    FireMon

    Maintaining a strong security and compliance posture requires comprehensive visibility across your entire network. See how you can gain real-time visibility and control over your complex hybrid network infrastructure, policies and risk. Security Manager provides real-time visibility, control, and management for network security devices across hybrid cloud environments from a single pane of glass. Security Manager provides automated compliance assessment capabilities that help you validate configuration requirements and alert you when violations occur. Whether you need audit reports ready out-of-the-box or customizable reports tailored to your unique requirements, Security Manager reduces the time you spend configuring policies and gives you the confidence that you’re ready to meet your regulatory or internal compliance audit demands.
  • 41
    Mandiant Advantage
    Prioritize effort and increase capacity to detect and respond to attacks with Mandiant Advantage, a software-as-a-service (SaaS) platform that automates our expertise and intelligence into your environment. Effective security is not only based on the security controls deployed, but the expertise and intelligence behind them. Without a significant increase in human expertise, it is impossible for organizations to win the global war on cyber crime. Mandiant Advantage is tipping the balance on attackers, productizing our extensive attacker expertise and threat intelligence capabilities into accessible, automated solutions that instantly provide the scale and capability teams so desperately need. The Mandiant Advantage software-as-a-service platform is a controls-agnostic suite of products that automate our expertise and intelligence into your environment. Deliver detection, response and security validation capabilities at machine speed.
  • 42
    appNovi

    appNovi

    appNovi

    Connect your existing tools and consolidate your asset inventory. Gain an authoritative data source to empower your analyst and decrease escalations. Prioritize vulnerable assets based on network exposure and business impact. Understand the threat exposure of assets and alert on compliance drifts. Gain an authoritative source of data to understand your environment. Gain complete asset inventories, identify missing security agents, understand exposure, and prioritize vulnerabilities effectively. Maintain complete asset inventories using your existing tools. Prioritize risk based on network exposure and business impact. Gain total visibility of your environment and threat exposure. Streamline operations and reach outcomes faster by eliminating IT data uncertainty. Understand cardholder data protection, enhance vulnerability management processes, and identity where compensating controls are needed.
  • 43
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 44
    ThreadFix

    ThreadFix

    Denim Group

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever. From Application Security Managers to CISOs, ThreadFix helps increase efficiency across teams and provides powerful reporting to upper management. Explore the powerful benefits of ThreadFix, the industry leading application vulnerability management platform. Automatically consolidate, de-duplicate, and correlate vulnerabilities in applications to the infrastructure assets that support them using results from commercial and open source application and network scanning tools. Knowing which vulnerabilities exist is important, but it’s just a start. With ThreadFix, you will quickly spot vulnerability trends and make smart remediation decisions based on data in a centralized view. When vulnerabilities are discovered, it can be tough to go back and fix them.
    Starting Price: $2000 per month
  • 45
    ASPIA

    ASPIA

    ASPIA

    To offer intelligent security and vulnerability management, ASPIA's security orchestration automation comprises data collection, alerting, reporting, and ticketing. ASPIA can help you improve enterprise security by providing a comprehensive picture of security status. ASPIA reduces time-consuming human data processing by combining asset information and vulnerability data from scanning technologies. ASPIA consolidates assets, correlates vulnerabilities, and deduplicates data, lowering the cost of risk management and giving meaningful insights into your organization's security posture. Users may assess, prioritize, and administer corporate security controls using ASPIA's management dashboard. The platform gives near-real-time information regarding the security state of an organization.
    Starting Price: $0
  • 46
    XRATOR

    XRATOR

    XRATOR

    Our unified proactive cybersecurity platform combines tech and non-tech methods to drive personalized, automated cyber risk management solutions. Cyber risk management is complex and demanding. With our role-tailored, unified platform, overcome resource constraints and knowledge gaps. XRATOR simplifies the process, empowering you to focus on business objectives. With our platform, you're not juggling multiple tools. Everything you need is all in one place, for all roles involved in your organization. With evolving regulatory landscapes, maintaining compliance can be a complex process. Our solution automates compliance tasks, freeing you to focus on strategic initiatives. Witness how XRATOR AutoComply seamlessly integrates with your systems to monitor, identify and address potential compliance issues before they escalate.
  • 47
    Semperis

    Semperis

    Semperis

    In today’s cloud-first, mobile-first world, dependency on Active Directory is rapidly growing—and so is the attack surface. Expose blind spots. Paralyze attackers. Minimize downtime. Identity-driven cyber resilience for the hybrid enterprise. With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital future. For 90% of enterprises, Active Directory is the primary source of trust for identity and access. But it’s also the cyber kill chain’s weakest link – exploited in virtually every modern attack. And since Active Directory extends to the cloud, any tampering of it will cause a ripple effect across the entire identity infrastructure.
  • 48
    SecurityHive Vulnerability Management
    Discover and monitor weak spots in your network according to your company's policies. SecurityHive's Vulnerability Management guides and provides you with information. Learn more about 1 of 4 solutions in our platform. SecurityHive Vulnerability Management allows you to easily discover vulnerabilities in your network. It gives you advice on how to solve these weak spots and secure your environment without installing agents. Security is a continuous process, our software enables you to log the actions you take to solve vulnerabilities. It will also show when vulnerabilities were found or solved. Having an audit trail helps you in your next audit or when an incident occurs. Perform a scan on your internal network from network appliances to endpoints and more. Get to know how a hacker sees your network from the outside and discover how vulnerable you are. Scan and manage according to your company's policies. Let us help you to become compliant.
  • 49
    OPSWAT

    OPSWAT

    OPSWAT

    Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise. That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance. Solutions built to protect critical infrastructure. MetaDefender Kiosk ensures compliance with security policies by acting as a digital security guard—inspecting all media for malware, vulnerabilities, and sensitive data. MetaDefender Drive creates a portable perimeter, inspecting devices, even before they boot up. MetaDefender Vault is a secure file storage and retrieval solution that protects critical files.
    Starting Price: $0
  • 50
    OUTSCAN

    OUTSCAN

    Outpost24

    Outpost24 Netsec solutions provide capabilities to identify, categorize, manage, and report on network-attached Information Technology (IT) assets and their security vulnerabilities such as insecure system configurations or missing security updates. Customers may choose how frequently they assess their IT assets. Results of assessments are typically used to inform supporting operations teams of recommendations for remediation and mitigation. Once remediated, users can choose to verify the vulnerability has been resolved with a focused re-assessment of the IT asset. Additionally, results are used by security teams to measure compliance and reduce cyber exposure or enterprise risk. Outpost24 customers contract for an annual subscription to use the Netsec service. The scope of service scales based on the number of IP addresses to be assessed, the frequency of assessment, and optionally on the number of HIAB virtual appliances that are licensed.