Alternatives to middleBrick
Compare middleBrick alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to middleBrick in 2026. Compare features, ratings, user reviews, pricing, and more from middleBrick competitors and alternatives in order to make an informed decision for your business.
-
1
KrakenD
KrakenD
KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance. It supports various protocols and API specifications, with features like fine-grained access controls, data transformation, and caching. Unique to KrakenD is its ability to aggregate multiple API responses into one, streamlining client-side operations. Security-wise, KrakenD aligns with OWASP standards and doesn't store data, making compliance simpler. It offers a declarative configuration and integrates with third-party logging and metrics tools. With transparent pricing and an open-source option, KrakenD is a comprehensive API Gateway solution for organizations prioritizing performance and scalability. -
2
Resurface
Resurface Labs
Resurface is a runtime API security solution. Detect and respond to API threats and risk in real-time with Resurface continuous API scanning. Purpose-built for API data, Resurface captures complete request and response payloads (including GraphQL) to instantly see threats and failures. Get alerts on data breaches for zero-day detection and response. Mapped to OWASP Top10, Resurface alerts on threats with complete data security patterns and behaviors. Resurface is self-hosted, all data is first-party, installed with a single Helm command. Resurface is the only API security solution engineered for deep inspection at scale. Handling millions of API calls, Resurface detects and alerts on active attacks. Machine learning models indicate anomalies and identify low-and-slow attack patterns.Starting Price: $9K/node/year -
3
Unprotected web applications and APIs are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb's AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. FortiWeb ML customizes the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions. With ML, FortiWeb identifies anomalous behavior and, more importantly, distinguishes between malicious and benign anomalies. The solution also features robust bot mitigation capabilities, allowing benign bots to connect (e.g. search engines) while blocking malicious bot activity. FortiWeb also features API discovery and security, as well as threat analytics to identify meaningful security incidents. FortiWeb is available as an appliance, VM, and fully featured WAF-as-a-Service - which is available to trial and purchase in most cloud marketplaces.Starting Price: $30/mo for 1 app on SaaS
-
4
Operant
Operant AI
Operant AI shields every layer of modern applications, from Infra to APIs. Within minutes of a single-step deployment, Operant provides full-stack security visibility and runtime controls, blocking a wide range of common and critical attacks including data exfiltration, data poisoning, zero day vulns, lateral movement, cryptomining, prompt injection, and more. All with zero instrumentation, zero drift, and zero friction between Dev, Sec, and Ops. Operant's in-line runtime protection of all data-in-use, across every interaction from infra to APIs, brings a new level of defense to your cloud-native apps with zero instrumentation, zero application code changes and zero integrations. -
5
BugDazz
SecureLayer7
BugDazz API Security Scanner by SecureLayer7 is a comprehensive tool designed to automatically detect vulnerabilities, misconfigurations, and security gaps in API endpoints, aiding security teams in protecting digital assets against increasing API-related threats and potential exploits. It offers real-time scanning capabilities, enabling the automatic detection of vulnerabilities as they arise. It supports authentication and access control management, allowing for the management of API controls within a single platform. BugDazz assists in achieving compliance by accelerating the generation of reports for standards such as PCI DSS and HIPAA. It integrates seamlessly with existing CI/CD pipelines, facilitating the acceleration of product rollouts. The scanner goes beyond standard OWASP Top 10 vulnerabilities, providing comprehensive protection against critical API security risks.Starting Price: $3,999 per year -
6
Pangea
Pangea
Pangea is the first Security Platform as a Service (SPaaS) delivering comprehensive security functionality which app developers can leverage with a simple call to Pangea’s APIs. The platform offers foundational security services such as Authentication, Authorization, Audit Logging, Secrets Management, Entitlement and Licensing. Other security functions include PII Redaction, Embargo, as well as File, IP, URL and Domain intelligence. Just as you would use AWS for compute, Twilio for communications, or Stripe for payments - Pangea provides security functions directly into your apps. Pangea unifies security for developers, delivering a single platform where API-first security services are streamlined and easy for any developer to deliver secure user experiences.Starting Price: $0 -
7
Alice
Alice
Alice (formerly ActiveFence) is a security, safety, and trust platform built to protect AI systems and online platforms in the GenAI era. Powered by the world’s largest adversarial intelligence dataset, Alice safeguards over 3 billion users across more than 120 languages. Its Rabbit Hole intelligence engine continuously analyzes billions of toxic and manipulative data samples to detect emerging threats in real time. The WonderSuite platform includes tools like WonderBuild for pre-launch stress testing, WonderFence for runtime guardrails, and WonderCheck for automated red-teaming. By defending against prompt injection, jailbreaks, governance gaps, and harmful AI behavior, Alice enables enterprises and foundation model labs to innovate with confidence. -
8
AppSecure Security
AppSecure Security
Anticipate and prevent system attacks from the most sophisticated adversaries with AppSecure’s offensive security stance. Discover critical exploitable vulnerabilities and continuously patch them with our advanced security solutions. Continuously fortify your security posture and uncover concealed vulnerabilities from a hacker’s perspective. Evaluate the efficacy of your security team’s readiness posture, detection, and response measures to tenacious hacker attacks on your network’s susceptible pathways. Identify and redress the key security lapses with our balanced approach that tests your APIs in accordance with the OWASP paradigm, along with tailored test cases for preventing any recurrences. Pentest as a service offers continuous, expert-led security testing to identify and remediate vulnerabilities, enhancing your website’s defenses against evolving cyber threats and making it secure, compliant, and reliable. -
9
Vorlon
Vorlon
Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence. -
10
LangProtect
LangProtect
LangProtect is an AI-native security and governance platform that protects LLM and Generative AI applications from prompt injection, jailbreaks, sensitive data leakage, and unsafe or non-compliant outputs. Built for production GenAI, it enforces real-time runtime controls at the AI execution layer by inspecting prompts, model responses, and tool/function calls as they happen. This allows teams to block high-risk behavior before it reaches end users, triggers downstream actions, or exposes confidential data. LangProtect integrates into existing LLM stacks via an API-first approach with minimal latency and supports cloud, hybrid, and on-prem deployments for enterprise security and data residency needs. It also secures modern architectures such as RAG pipelines and agentic workflows with policy-driven enforcement, continuous visibility, and audit-ready governance. -
11
WebOrion Protector Plus
cloudsineAI
WebOrion Protector Plus is a GPU-powered GenAI firewall engineered to provide mission-critical protection for generative AI applications. It offers real-time defenses against evolving threats such as prompt injection attacks, sensitive data leakage, and content hallucinations. Key features include prompt injection attack protection, safeguarding intellectual property and personally identifiable information (PII) from exposure, content moderation and validation to ensure accurate and on-topic LLM responses, and user input rate limiting to mitigate risks of security vulnerability exploitation and unbounded consumption. At the core of its capabilities is ShieldPrompt, a multi-layered defense system that utilizes context evaluation through LLM analysis of user prompts, canary checks by embedding fake prompts to detect potential data leaks, pand revention of jailbreaks using Byte Pair Encoding (BPE) tokenization with adaptive dropout. -
12
Wardstone
JRL Software LTD
Wardstone is an LLM security API that sits between applications and language model providers, scanning inputs and outputs for threats across four categories in a single call: prompt attacks, content violations, data leakage, and unknown links. It detects jailbreaks, prompt injections, harmful content (hate, violence, self-harm), PII (SSNs, credit cards, emails, phone numbers), and suspicious URLs. Each response returns risk bands per category with sub-30ms latency. Works with any LLM provider. REST API with SDKs for TypeScript, Python, Go, Ruby, PHP, Java, and C#. Free tier at 10,000 calls/month, no credit card required. Includes a browser-based playground for testing.Starting Price: $0/month -
13
Backslash Security
Backslash
The software development lifecycle has fundamentally changed. Developers across engineering organizations are using AI coding tools — GitHub Copilot, Cursor, Windsurf, Claude Code, Gemini CLI — at scale. The security controls built for traditional development were not designed for this environment. Backslash Security addresses this gap directly. The platform gives security teams visibility into AI coding tool usage, the code being generated, MCP server connections made by AI agents, and the risk introduced before it reaches production. Core capabilities: AI coding tool inventory and policy enforcement MCP server visibility and access control Vibe coding security — risk detection in AI-generated code Continuous monitoring without disrupting engineering workflows Purpose-built for AI-native development — not a legacy scanner repositioned for a new market. For security leaders governing an environment they didn't design, Backslash provides the visibility and control you need. -
14
Noname Security
Noname Security
APIs drive business, from revenue-generating customer experiences to cost-saving back-end operations, and everything in between. Secure it all with complete API security from Noname. Automatically discover APIs, domains, and issues. Build a robust API inventory and easily find exploitable intelligence, such as leaked information, to understand the attack paths available to adversaries. Understand every API in your organization’s ecosystem with full business context. Uncover vulnerabilities, protect sensitive data, and proactively monitor changes to de-risk your APIs and reduce your API attack surface. with automated machine learning-based detection to identify the broadest set of API vulnerabilities, including data leakage, data tampering, misconfigurations, data policy violations, suspicious behavior, and API security attacks. -
15
Curri
Curri
Grow sales, reduce risk, and provide superior customer experiences with Curri's software and services. Transform your middle and final-mile construction and industrial supplies deliveries. Grow revenue by enabling the opportunities right in front of you. Gone are the days of losing business to competition. Our technology platform will improve your on-time stats, reduce costs, and make you look like a genius. The brick & mortar front lines are where the true problems arise. With Curri at your fingertips, your operations will run as smoothly as butter. Our expertise, technology, and knowledge within middle & final-mile logistics will help you take your business to the next level. With access to our nationwide carrier network, handle spikes in demand or degradation in your fleet like a pro. From dedicated drivers to on-demand fleets, rate-shopping, and route planning software, we have solutions for every logistics pain.Starting Price: Free -
16
API Critique
Entersoft Information Systems
API critique is penetration testing solution. A major leap in REST API Security has been achieved with our first in the world pentesting tool. With the growing number of attacks targeted towards APIs, we have an extensive checks covered from OWASP and from our experiences in penetration testing services to provide comprehensive test coverage. Our scanner generates the issue severity based on CVSS standard which is widely used among many reputed organizations. Your development and operations teams can now prioritize on the vulnerabilities without any hassle. View all the results of your scans in various reporting formats such as PDF and HTML for your stakeholders and technical teams. We also provide XML & JSON formats for your automation tools to generate customized reports. Development and Operations teams can learn from our exclusive Knowledge Base about the possible attacks and countermeasures with remediation steps to mitigate the risks to your APIs.Starting Price: $199 per month -
17
MCP Defender
MCP Defender
MCP Defender is an open source desktop application that functions as an AI firewall, designed to monitor and protect Model Context Protocol (MCP) communications. It acts as a secure proxy between AI applications and MCP servers, analyzing all communications for potential threats in real-time. It automatically scans and protects all MCP tool calls, providing advanced LLM-powered detection of malicious activity. Users can manage the signatures used during scanning, allowing for customizable security measures. MCP Defender identifies and blocks common AI security threats, including prompt injection, credential theft, arbitrary code execution, and remote command injection. It supports integration with various AI applications such as Cursor, Claude, Visual Studio Code, and Windsurf, with more applications to be supported in the future. It offers intelligent threat detection, alerting users as soon as it identifies any malicious activity being performed by AI apps.Starting Price: Free -
18
NeuralTrust
NeuralTrust
NeuralTrust is the leading platform for securing and scaling LLM applications and agents. It provides the fastest open-source AI gateway in the market for zero-trust security and seamless tool connectivity, along with automated red teaming to detect vulnerabilities and hallucinations before they become a risk. Key Features: - TrustGate: The fastest open-source AI gateway, enabling enterprises to scale LLMs and agents with zero-trust security, advanced traffic management, and seamless app integration. - TrustTest: A comprehensive adversarial and functional testing framework that detects vulnerabilities, jailbreaks, and hallucinations, ensuring LLM security and reliability. - TrustLens: A real-time AI observability and monitoring tool that provides deep insights and analytics into LLM behavior.Starting Price: $0 -
19
Vizo361
Proeffico Solutions Pvt Ltd
Vizo361 transforms existing CCTV infrastructure into an intelligent analytics layer. Deploy 9 specialized modules — facial recognition, ANPR, fire/smoke detection, footfall counting, phone-in-hand violation, cash-handling theft, guard alertness, and VMS — across retail chains, manufacturing facilities, and smart infrastructure. ISO 27001 certified. Cloud or on-prem deployment. Trusted by 50+ enterprises across India and the Middle East.Starting Price: $15 USD per channel -
20
Tumeryk
Tumeryk
Tumeryk Inc. specializes in advanced generative AI security solutions, offering tools like the AI trust score for real-time monitoring, risk management, and compliance. Our platform empowers organizations to secure AI systems, ensuring reliable, trustworthy, and policy-aligned deployments. The AI Trust Score quantifies the risk of using generative AI systems, enabling compliance with regulations like the EU AI Act, ISO 42001, and NIST RMF 600.1. This score evaluates and scores the trustworthiness of generated prompt responses, accounting for risks including bias, jailbreak propensity, off-topic responses, toxicity, Personally Identifiable Information (PII) data leakage, and hallucinations. It can be integrated into business processes to help determine whether content should be accepted, flagged, or blocked, thus allowing organizations to mitigate risks associated with AI-generated content. -
21
EarlyCore
EarlyCore
EarlyCore is a security platform built for AI agents. It automates pre-production attack testing, real-time monitoring, and compliance reporting across the full agent lifecycle. Scans agents against thousands of attack scenarios covering prompt injection, jailbreaking, data exfiltration, tool misuse, and supply chain threats. In production, tracks every agent action, establishes behavioral baselines, and flags anomalies in real time. Alerts push to Slack, email, or webhooks. Compliance docs generate automatically, mapped to ISO 42001, NIST AI RMF, EU AI Act, SOC 2, and GDPR. Always audit-ready. Deploys in 15 minutes with zero code changes. Integrates with AWS Bedrock, Gemini Enterprise Agent Platform, LangChain, and more. Multi-tenant support for agencies and MSSPs. Built for security teams, agencies, and MSSPs securing AI agents at scale.Starting Price: $100/month -
22
Wallarm API Security Platform
Wallarm
Built by security practitioners for practitioners, Wallarm's API security platform provides robust protection for APIs, web apps, microservices, and serverless workloads in cloud-native, multi-cloud, Kubernetes, and on-premises environments. It delivers coverage against OWASP API Top-10 risks and advanced threats, ensuring visibility and rapid vulnerability remediation. The Wallarm platform is a best-in-class API security solution that supports multiple deployment options. Trusted by security teams globally, Wallarm's API security platform is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their applications and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. -
23
Intruder
Intruder
Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases. Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze. -
24
open-appsec
open-appsec
automatic web application & API security using machine learning open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions. -
25
Imperva API Security
Imperva
Imperva API Security protects your APIs with an automated positive security model, detecting vulnerabilities in your applications, and shielding them from exploitation. Organizations manage a minimum of 300 APIs on average. Imperva’s API Security amplifies your security posture by automatically generating a positive security model for every uploaded API swagger file. APIs are being churned out faster than security teams can review, influence, and sign off on before they’re pushed into production. Imperva’s API Security enables your teams to stay ahead of DevOps via automation. Imperva API Security empowers your approach with out-of-the-box security rules adjusted to your APIs. This ensures complete OWASP API coverage and promotes visibility for all security events per API endpoint. With API Security, simply upload the OpenAPI specification file that your DevOps team has created and Imperva will automatically build a positive security model. -
26
Astra API Security Platform
Astra Security
Astra is a powerful API security platform designed to discover, test, and protect every API across your infrastructure. It continuously scans for over 10,000 vulnerabilities, including the OWASP API Top 10, data leaks, and authorization flaws. With Astra, teams can detect Shadow, Zombie, and Orphan APIs, identify sensitive data exposures, and fix vulnerabilities before attackers exploit them. The platform combines automated scanning with manual penetration testing from certified experts to deliver enterprise-grade protection. Seamless integrations with AWS, GCP, Postman, and CI/CD tools make security part of your DevOps workflow. Trusted by over 1,000 engineering teams, Astra empowers businesses to secure their APIs continuously and confidently.Starting Price: $499/month -
27
Tenable AI Exposure
Tenable
Tenable AI Exposure is an agentless, enterprise-grade solution embedded within the Tenable One exposure management platform that provides visibility, context, and control over how teams use generative AI tools like ChatGPT Enterprise and Microsoft Copilot. It enables organizations to monitor user interactions with AI platforms, including who is using them, what data is involved, and how workflows are executed, while detecting and remediating risks such as misconfigurations, unsafe integrations, and exposure of sensitive information (like PII, PCI, or proprietary enterprise data). It also defends against prompt injections, jailbreak attempts, policy violations, and other advanced threats by enforcing security guardrails without disrupting operations. Supported across major AI platforms and deployed in minutes with no downtime, Tenable AI Exposure helps organizations govern AI usage as a core part of their cyber risk strategy. -
28
CrowdStrike Falcon AIDR
CrowdStrike
CrowdStrike Falcon AI Detection and Response (AIDR) is an enterprise security platform designed to protect the rapidly expanding AI attack surface by delivering real-time visibility, detection, and response across AI systems, users, and interactions. It provides unified visibility into how employees and AI agents use generative AI by mapping relationships between users, prompts, models, agents, and supporting infrastructure, while capturing detailed runtime logs for monitoring, compliance, and investigation. It continuously monitors AI activity across endpoints, cloud environments, and applications, enabling organizations to understand how data flows through AI systems and how agents operate within defined boundaries. AIDR detects and blocks AI-specific threats such as prompt injection, jailbreak attempts, malicious entities, harmful outputs, and unauthorized interactions, using behavioral analysis and integrated threat intelligence. -
29
ZeusLock
ZeusLock
AI tools like ChatGPT, Copilot, Claude, and DeepSeek are widely used at work - often without IT oversight. Up to 78% of employees admit using ChatGPT professionally, risking exposure of financial data, API keys, passwords, source code, and personal records. Legacy DLP and proxies weren't built for this threat. ZeusLock is the purpose-built DLP for the AI era. It automatically detects and blocks sensitive data before it reaches any AI service. Deployment takes 2 minutes via a browser extension and workstation agent, covering web apps, IDEs, terminals, and AI agents via MCP. When a risk is detected, ZeusLock either alerts the user or blocks the submission - based on your policy - and logs every incident for a full audit trail. It also guards against Prompt Injection, Jailbreak attacks, and unauthorized shadow AI tools like DeepSeek. Detection runs locally, with an ML API hosted in Europe for full data sovereignty. Zero latency, zero productivity impact. -
30
Scanner
Scanner
Scanner.dev is a cloud-native security data lake and lightweight security information and event management (SIEM) platform that indexes logs directly in your own Amazon S3 buckets, letting you retain unlimited logs and run full-text searches across petabytes of data in seconds without additional ETL or schema requirements. It builds lightweight indexes that make any log format instantly searchable and supports hyper-fast search and investigation, continuous threat detection with customizable detection rules managed as code via GitHub, and integrated alerting with APIs for automation and integration into existing security workflows. Scanner’s streaming detection engine continuously evaluates rule queries in near real time and can backtest detection logic against historical data, while its API and Model Context Protocol (MCP) enable programmatic access and AI-assisted analysis of security data.Starting Price: $30,000 per year -
31
Cisco AI Defense
Cisco
Cisco AI Defense is a comprehensive security solution designed to enable enterprises to safely develop, deploy, and utilize AI applications. It addresses critical security challenges such as shadow AI—unauthorized use of third-party generative AI apps—and application security by providing full visibility into AI assets and enforcing controls to prevent data leakage and mitigate threats. Key components include AI Access, which offers control over third-party AI applications; AI Model and Application Validation, which conducts automated vulnerability assessments; AI Runtime Protection, which implements real-time guardrails against adversarial attacks; and AI Cloud Visibility, which inventories AI models and data sources across distributed environments. Leveraging Cisco's network-layer visibility and continuous threat intelligence updates, AI Defense ensures robust protection against evolving AI-related risks. -
32
TROJAI
TROJAI
Even the best AI models can have hidden risks. Identify and address potential problems before they impact your business, ensuring smooth AI adoption and compliance. AI applications are vulnerable to new and sophisticated attacks. Stay ahead of the curve by protecting your models and applications from data poisoning, prompt injection, and other emerging threats. Leverage cutting-edge public AI services with confidence. We help you ensure responsible use and prevent data leaks, so you can focus on innovation without worry. The TROJAI security platform enables organizations to comply with benchmarks such as the OWASP AI framework as well as privacy regulations by testing models prior to deployment and protecting applications from things such as sensitive data loss once deployed. -
33
ZeroLeaks
ZeroLeaks
ZeroLeaks is an AI prompt security platform that helps organizations identify and fix exposed system prompts, internal tools, and logic vulnerabilities that could allow prompt injection, prompt extraction, or other forms of leakage that expose internal instructions or intellectual property to unauthorized actors. It provides an interactive dashboard where users can scan system prompts manually or automate scanning via CI/CD integration to catch leaks and injection vectors before code is deployed, and it uses an AI-powered red-team-style analysis engine to assess prompt surfaces for logic flaws, extraction risks, and potential misuse with evidence, scoring, and remediation recommendations. ZeroLeaks targets enterprise-grade security for large-language-model-based products by offering vulnerability assessments that highlight prompt exposure depth, prioritized risks, proof, and access paths for issues found, and suggested fixes such as prompt restructuring, tool gating, etc.Starting Price: $499 per month -
34
TrendAI Vision One
Trend Micro
TrendAI Vision One™ is an enterprise cybersecurity platform developed by Trend Micro to secure organizations in the AI era. It provides comprehensive visibility across an organization’s entire digital environment, helping eliminate security blind spots. The platform uses AI-driven analytics to prioritize risks based on business impact and urgency. It enables real-time threat detection, response, and mitigation to protect against evolving cyber threats. TrendAI Vision One™ integrates multiple security functions, including endpoint, cloud, network, and data protection, into a unified platform. It also supports secure AI adoption by safeguarding AI applications and systems from risks like data leakage and prompt injection. Overall, the platform transforms security from reactive defense into proactive risk management for modern enterprises. -
35
SoBricks
SoBricks Lab
SoBricks is a highly creative online platform. upload your photo, and it can be transformed into unique custom bricks. Here, users can preview the design in 3D online and freely adjust the custom bricks model. The platform also provides an interactive building tutorial page to help you create easily. Come and experience it now!Starting Price: $99 -
36
CloudGuard AppSec
Check Point Software Technologies
Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud-native application security solution. Eliminate the need to manually tune rules and write exceptions every time you make an update to your web application or APIs. Modern applications demand modern security solutions. Protect your web applications and APIs, eliminate false positives and stop automated attacks against your business. CloudGuard uses contextual AI to prevent threats with absolute precision, without any human intervention as the application is updated. Protect web applications, and prevent OWASP Top 10 attacks. From implementation through runtime, CloudGuard AppSec automatically analyzes every user, transaction, and URL to create a risk score to stop attacks without creating false positives. In fact, 100% of CloudGuard customers maintain fewer than 5 rule exceptions per deployment. -
37
integraERP
integraSoft
integraERP is the #1 masonry software and the best solution for the brick and block industry. Features created to maximize your time and investment include brick configurator, product/lot tracking, pricing, and quote management. These features were designed to help brick-and-block companies maximize resources with inventory controls and improve customer service. Companies in this industry manufacture and distribute bricks, blocks, mortars, ceramic tiles, concrete pipes, and related products. integraSoft provides specific industry solutions for masonry and brick & block distributors. Reduce operational costs, increase sales revenue and customer satisfaction, get paid faster, and reduce errors through vertical solutions provided by integraSoft. Our experienced and innovative staff is ready to help your business with its next project by providing the tools to manage the process and assist in the success of your business. -
38
CountBricks
CountBricks
CountBricks construction estimating, mobile estimating, and AI estimating apps for web and mobile give you the ultimate productivity solution. With easy-to-use and efficient estimating capabilities, you can create accurate project estimates quickly and without hassle. Get the most out of your construction estimating process with CountBricks' advanced AI estimating technology. Reduce takeoff time & increase accuracy with CountBricks construction estimating. Our AI-powered software helps you quickly and easily generate estimates. Our web and mobile apps make estimating accessible from anywhere, anytime. CountBricks' construction estimating apps for web and mobile makes it easy to use AI to generate materials, tasks, and pricing for accurate estimating. CountBricks provides digital mobile estimating as a great solution that makes construction estimating more efficient than ever before.Starting Price: $30 per user -
39
HiddenLayer
HiddenLayer
Your AI algorithms represent a unique competitive advantage for your company and come at a considerable expense. A successful adversarial attack against them could cost you that advantage and you would never know it happened. HiddenLayer is the first productized solution for the next security frontier – your AI. HiddenLayer offers a drop-in software approach that provides a lightweight, real-time awareness of your model’s health and attack surface — without ever needing insight into it or the training set used to create it. Most adversarial AI security firms need to engage panels of expensive experts to take your algorithm apart and harden it from the inside, adding complexity and cost. HiddenLayer was founded by ML professionals and security specialists with first-hand experience of how insidious adversarial ML attacks can be to detect and defend against. -
40
Vega
Subgraph
Vega can help you find and validate SQL Injection, cross-site scripting, inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. Vega can help you find vulnerabilities such as: reflected cross-site scripting, stored cross-site scripting, blind SQL injection, remote file include, shell injection, and others. Vega also probes for TLS / SSL security settings and identifies opportunities for improving the security of your TLS servers. Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection. The Vega scanner finds, SQL injection, and other vulnerabilities. Vega includes a website crawler powering its automated scanner. Vega can automatically log into websites when supplied with user credentials. -
41
Forum Sentry
Forum Systems
Secure PEP, SSO, and Federation. Cyber-secure Identity Policy Enforcement Point (PEP) with built-in SSO and Federation. Combine identity with payload attributes for multi-context and multi-factor authentication. Built-in support for all modern IdM systems, PKI, and identity formats. Data Security. Bi-directional information assurance.Modern information security combining content-aware cyber-security intrusion, data leakage protection, antivirus, access control, and PKI cryptography. SLA enforcement with real-time monitoring and alerting. Cloud Integration. Point-and-click policies for REST APIs, SOAP APIs, and REST/SOAP Conversion. Supports B2B, Cloud, Mobile, and IoT Technology formats. Translates protocols and messages for legacy system modernization Recognized by KuppingerCole as the Only API Management Vendor “with a Primary Focus on Security” and an overall leader in both product and leadership categories in their Leadership Compass: API Security Managementq -
42
Zenity
Zenity
Enterprise copilots and low-code/no-code development platforms make it easier and faster than ever to create powerful business AI applications and bots. Generative AI makes it easier and faster for users of all technical backgrounds to spur innovation, automate mundane processes, and craft efficient business processes. Similar to the public cloud, AI and low-code platforms secure the underlying infrastructure, but not the resources or data built on top. As thousands of apps, automation, and copilots are built, prompt injection, RAG poisoning, and data leakage risks dramatically increase. Unlike traditional application development, copilots and low-code do not incorporate dedicated time for testing, analyzing, and measuring security. Unlock professional and citizen developers to safely create the things they need while meeting security and compliance standards. We’d love to chat with you about how your team can unleash copilots and low-code development. -
43
Straiker
Straiker
Straiker is an AI-native security platform built specifically to protect enterprise AI applications and autonomous agents, focusing on the emerging risks of “agentic AI” systems that interact with tools, APIs, and sensitive data. It provides full visibility and control across the entire AI stack by analyzing behavioral signals from models, prompts, tools, identities, and infrastructure, enabling real-time detection and prevention of AI-specific threats such as prompt injection, privilege escalation, data exfiltration, and malicious tool usage. It combines continuous discovery, adversarial testing, and runtime protection through core components like Discover AI, Ascend AI, and Defend AI, which together identify all active agents, simulate attacks to uncover vulnerabilities, and enforce real-time safeguards during execution. Its multi-layered architecture captures deep contextual signals across user interactions, networks, and agent workflows. -
44
APIsec
APIsec
Hackers are targeting loopholes in API logic. Learn how to secure APIs and prevent breaches and data leaks. APIsec finds critical flaws in API logic that attackers target to gain access to sensitive data. Unlike traditional security solutions that look for common security issues, such as injection attacks and cross-site scripting, APIsec pressure-tests the entire API to ensure no endpoints can be exploited. With APIsec you’ll know about vulnerabilities in your APIs before they get into production where hackers can exploit them. Run APIsec tests on your APIs at any stage of the development cycle to identify loopholes that can unintentionally give attackers access to sensitive data and functionality. Security doesn’t have to slow down Development. APIsec runs at the speed of DevOps, giving you continuous visibility into the security of your APIs. No need to wait for the next scheduled pen-test, APIsec tests are complete in minutes.Starting Price: $500 per month -
45
SplxAI
SplxAI
SplxAI offers an automated platform specifically designed for conversational AI applications. Their flagship product, Probe, proactively identifies and mitigates vulnerabilities in AI systems by simulating domain-specific attack scenarios. Key features of Probe include detailed risk analysis, framework and compliance checks, domain-specific penetration testing, continuous and automated testing, and multi-language precision, supporting over 20 languages. The platform integrates seamlessly into development cycles, ensuring AI applications remain secure throughout their lifecycle. SplxAI's mission is to secure and safeguard generative AI-powered conversational apps by providing advanced security and penetration testing solutions, enabling organizations to unlock AI's full potential without compromising security. Evaluate and refine your app’s boundaries for optimal security and user experience without being overly restrictive. -
46
Simaril
Simaril
Silmaril is a self-healing prompt injection defense designed to protect AI systems from increasingly complex, multi-step attacks that traditional guardrails fail to stop. It operates by wrapping inference calls and evaluating whether an execution sequence is leading toward a harmful outcome, rather than simply filtering inputs. It uses a multihead classifier that analyzes user intent, application context, and execution states together, enabling it to detect indirect injection, multi-turn attack chains, context poisoning, and tool abuse before damage occurs. Silmaril continuously strengthens its defenses through autonomous threat hunting agents that probe systems, discover vulnerabilities, and generate synthetic training data from real attack scenarios. These insights are used to retrain the model automatically, deploying updated protections in under an hour and propagating anonymized defenses across all deployments. -
47
Proofpoint AI Security
Proofpoint
Proofpoint AI Security is a unified platform designed to help enterprises govern, monitor, and protect the use of AI systems, large language models, and autonomous agents across the organization. It provides visibility into both sanctioned and unsanctioned AI usage, enabling security teams to discover shadow AI tools, observe prompts and responses, and understand how AI interacts with sensitive data in real time. It applies intent-based detection and behavioral analysis to identify anomalies, prompt injection attempts, and risky interactions, while enforcing policies directly during runtime to prevent data leakage and misuse. It reconstructs full AI transactions, from user input to agent actions and outcomes, giving organizations complete traceability and audit readiness. With controls that extend across endpoints, browsers, and AI agent connections, it enables granular access governance and ensures that AI systems only access and share appropriate information. -
48
EthicalCheck
EthicalCheck
Submit API test requests via the UI form or invoke EthicalCheck API using cURL/Postman. Request input requires a public-facing OpenAPI Spec URL, an API authentication token valid for at least 10 mins, an active license key, and an email. EthicalCheck engine automatically creates and runs custom security tests for your APIs covering OWASP API Top 10 list Automatically removes false positives from the results, creates a custom developer-friendly report, and emails it to you. According to Gartner, APIs are the most-frequent attack vector. Hackers/bots have exploited API vulnerabilities resulting in major breaches across thousands of organizations. Only see real vulnerabilities; false positives are automatically separated. Generate enterprise-grade penetration test reports. Confidently share it with developers, customers, partners, and compliance teams. Using EthicalCheck is similar to running a private bug-bounty program.Starting Price: $99 one-time payment -
49
garak
garak
garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. garak's a free tool, we love developing it and are always interested in adding functionality to support applications. garak is a command-line tool, it's developed in Linux and OSX. Just grab it from PyPI and you should be good to go. The standard pip version of garak is updated periodically. garak has its own dependencies, you can to install garak in its own Conda environment. garak needs to know what model to scan, and by default, it'll try all the probes it knows on that model, using the vulnerability detectors recommended by each probe. For each probe loaded, garak will print a progress bar as it generates. Once the generation is complete, a row evaluating that probe's results on each detector is given.Starting Price: Free -
50
LLM Guard
LLM Guard
By offering sanitization, detection of harmful language, prevention of data leakage, and resistance against prompt injection attacks, LLM Guard ensures that your interactions with LLMs remain safe and secure. LLM Guard is designed for easy integration and deployment in production environments. While it's ready to use out-of-the-box, please be informed that we're constantly improving and updating the repository. Base functionality requires a limited number of libraries, as you explore more advanced features, necessary libraries will be automatically installed. We are committed to a transparent development process and highly appreciate any contributions. Whether you are helping us fix bugs, propose new features, improve our documentation, or spread the word, we would love to have you as part of our community.Starting Price: Free