60 sonuç
Dahili yamalama sunan kurumlar için önceliklendirmeye dayalı tehdit ve güvenlik açığı yönetim yazılımı. ManageEngine Vulnerability Manager Plus hakkında daha fazla bilgi
Vulnerability Manager Plus, kapsamlı içerik, sürekli görünürlük, risk tabanlı değerlendirme ve merkezi bir konsoldan güvenlik açıklarının ve yanlış yapılandırmaların entegre olarak düzeltilmesini sağlar. Güvenlik açığı değerlendirmesi, otomatik yama, CIS uyumluluk yönetimi, güvenlik yapılandırma yönetimi, yüksek riskli yazılım denetimi, antivirüs denetimi ve aktif port denetimi gibi kapsamlı özellikler sunar. Vulnerability Manager Plus, pek çok rapor, gösterge tablosu ve sonsuz ölçeklenebilirlik ile birlikte gelir. ManageEngine Vulnerability Manager Plus hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Nessus hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus endpoint security all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Syxsense hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Beagle Security hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
100’den fazla bulut varlığı mı? AWS, Azure ve GCP için aracı kaynaklı kapsama boşlukları ve zorluklar olmadan anında başlatılan, iş yükü derinliğinde güvenlik elde edin.
100’den fazla bulut varlığınız mı var? Orca Security, aracı kaynaklı kapsama boşlukları, uyarı yorgunluğu ve işletim maliyetleri olmadan AWS, Azure ve GCP için iş yükü derinliğinde güvenlik ve uyumluluk sağlar. Orca ile gözden kaçırılan varlıklar, DevOps zorlukları ve canlı ortamlarda performans düşüşleri olmaz. Güvenlik açıklarını, kötü amaçlı yazılımları, yanlış yapılandırmaları, yanal hareket saldırısı riskini, zayıf ve sızdırılmış parolaları, PII (kimliği tanımlayabilecek bilgiler) gibi yüksek riskli verileri tespit edip çevresel bağlama göre riski önceliklendirir. Orca Security hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
UserWay creates digital accessibility solutions that include WCAG scans, audits, and automated website and PDF remediation tools.
UserWay creates digital accessibility solutions that improve ADA compliance without refactoring your website's existing code. Among its full suite of solutions is the AI-Powered UserWay Accessibility Widget, which exceeds WCAG 2.1 AA requirements and has been installed on more than 1 million websites. From Fortune 1,000 enterprises to SMBs, UserWay simplifies digital accessibility for organizations of all sizes. Its services include site scans, audits, website remediation and PDF remediation. UserWay hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Acunetix hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report. AppTrana hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Qualys Cloud Platform hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Invicti Enterprise is a comprehensive automated web vulnerability scanning solution.
Invicti is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence. Invicti hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Our Active Directory Audit Tool is free and runs on Windows Server 2008 & later. The audit results are provided in a clickable report.
FREE tool that scans your Active Directory, and detects security-related weaknesses, specifically related to password policies. Collect and display interactive reports containing user and password policy information. This includes checking user account passwords against a list of vulnerable passwords obtained from leaks and ones observed in real attacks. The audit can also help you identify which accounts may be violating your security policy by using the same password across multiple accounts. Specops Password Auditor hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. USM Anywhere hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Probely is a DAST scanner designed to empower Security and DevOps teams working together to reduce the security risk of web apps & APIs
Probely is the premier cloud-based automated application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. With over 30 000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them. Probely hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret Cyber Chief hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
If you want to assess your online assets' vulnerabilities, Security for Everyone is the tool for you whether you are a tech expert or a digital asset owner who does not have any coding experience. You can have: 1-Automated vulnerability assessment, 2- API integration, 3- Manual scanning options. Whichever opiton you choose, your vulnerabilities will be shown with video and pdf outputs. You can either send them to an expert or use them yourself to make your fixing process easier. Security for Everyone hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats. ArcSight hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
HackerOne is the industry standard for hacker-powered security.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. HackerOne hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
The Unified Data Platform combines complete IT visibility as well as data enrichment and transformation in one central solution.
IT landscapes are subject to constant change, making it increasingly difficult for companies to maintain transparency. The multitude of hardware and software applications as well as geographically distributed branches ensure that a holistic overview of the IT landscape (internal, hosted and cloud) can‘t be guaranteed. Raynet Unified Data Platform collects all relevant data for you and prepares them in a meaningful and targeted way: The central point for all data. RayVentory hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Vulnerability Scanning and Management platform that empowers developers to create secure applications by providing continuous security.
GuardRails provides the perfect customizable Vulnerability Scanning and Management security solution for organizations, that need a flexible approach to their internal process. With thousands of possible coding vulnerabilities, you can stay ahead of threats and weaknesses in your organizations software by tracking which ones matter the most and need the most prior attention! GuardRails hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework. CODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment. CODA Footprint hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
CloudWize gives maximum cloud security and compliance from architecture design to runtime.
CloudWize gives maximum cloud security and compliance from architecture design to runtime. Get 360° protection for your cloud in minutes from onboarding. This drag and drop, no code solution saves you resources by detecting and fixing cloud issues in minutes. You can now investigate your cloud like a pro. See how security and compliance impact business cost, performance, and operations. CloudWize hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
The platform provides real-time visibility for all stakeholders, including insights regarding risk, patch & SLA, and compliance.
Strobes Security is leading the way to disrupt the vulnerability management space. Our flagship product VM365 consolidates & de-duplicates assets and vulnerabilities from various sources, seamlessly integrating with other key tools of cybersecurity & IT infrastructure. VM365 prioritizes vulnerabilities based on temporal threat exposure and predicts the impact of vulnerabilities to expedite remediation implementation. Strobes VM365 hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Red Sentry hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems. It saves you time by proactively scanning for new threats as well as offering a unique threat prioritisation solution. Our vulnerability scanner uses the same underlying engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity. Intruder also integrates with AWS, Google Cloud Platform and Microsoft Azure cloud providers. Intruder hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Hybrid approach to vulnerability scanning with accurate security assessment results.
Hybrid approach to vulnerability scanning with accurate security assessment results. SaaS Vulnerability Scanner hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Detectify hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
SecOps Solution is a full-stack cybersecurity assessment platform.
SecOps Solution is a full-stack cybersecurity assessment platform. It identifies the top 1% security risks that could have the maximum impact on the organisation, thereby saving millions of dollars and hundreds of hours of engineering effort in patchwork and remediation. It is an AI-powered agent-less platform for Vulnerability Management and remediating misconfigurations in applications and the cloud. SecOps configures and starts protecting your assets - within seconds not days. SecOps Solution hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Trava's vulnerability assessment tool scans external/internal environments; provides insights to build better defenses against hackers.
Trava's vulnerability assessment tool scans external and internal environments and provides insights for building better defenses against hackers. External Scans: Weaknesses in your systems that could help avoid a potential incident. Pressing security issues. Changes like services or server setup and whether they present any new threats to the organization. Internal Scans: Known vulnerabilities that could compromise your network Verification that all issues are patched properly and up to date Trava hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Offensity the Nr. 1 fully automated cloud-based vulnerability scanner than enables businesses to manage threat detection & security.
Offensity the Nr. 1 fully automated cloud-based vulnerability scanner that enables all businesses to manage network security, threat detection and reporting in just 1-click. It continuously checks the enterprise customers'​ externally accessible IT systems for vulnerabilities, evaluates their risks and provides actionable recommendations on how to eliminate those. With our professional offensity red we created a tool which combines vulnerability assessment & pentest in one tool. Offensity hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Software-based security segmentation that turns every host into a sensor to detect unauthorized traffic and enforce security policies.
Illumio reduces risk and increases cyber resiliency for modern organizations by providing visibility and protection of critical applications and data. As the only proven segmentation platform that is purpose-built for the Zero Trust security model, Illumio allows organizations to see their risk, isolate breaches, and better protect their data. The world’s leading organizations across the industries rely on Illumio's Zero Trust segmentation. Illumio hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Simplify the management of your vulnerabilities Monitor all of your vulnerabilities, from their detection to their correction.
Cyberwatch Vulnerability Manager provides you with a global and continuous overview of your vulnerabilities Cyberwatch makes an inventory of your technologies, detects the vulnerabilities of your servers, workstations, network equipment, containers, and reviews them based on your business requirements. Cyberwatch allows you to gain visibility and prioritize risks, to build a simple and motivating action plan for your team, and to deploy the adapted security fixes for your vulnerabilities. Cyberwatch Vulnerability Manager hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
SaaS and on-premise enterprise CMDB software solution based on historizied configuration items.
SaaS and on-premise enterprise CMDB software solution based on historizied configuration items. Versio.io hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets.
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Holm Security VMP hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Easy-to-use SaaS network, website and code vulnerability scanner for small and medium enterprises
Vulkyrie believes that basic vulnerability discovery should be free. Importantly, solutions should be easy-to-use for small and medium enterprises who may not have the resources and expertise of large companies. Our Free Plan offers a cloud-based solution for unlimited network and website vulnerability scanning. With our Pro Plan, you get a static code analyzer for scanning your software code. Vulkyrie hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale.
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale. ShiftLeft CORE hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more.
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more. Reconwithme hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
The industry’s ONLY vulnerability management solution for storage & backup systems, helping you protect your most valuable data.
Ransomware gangs are now targeting storage & backup systems. StorageGuard is the industry’s ONLY vulnerability management solution for storage & backup systems, helping organizations protect their most valuable data - and ensure recoverability. StorageGuard helps you automatically detect, prioritize and remediate vulnerabilities and security misconfigurations - for your enterprise storage & backup systems. StorageGuard hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Astra’s cloud-based hacker-style Pentest covers all aspects of pentesting for web apps, mobile apps, APIs, and cloud infrastructure.
Astra Pentest is comprehensive platform featuring an automated vulnerability scanner, manual pentest capabilities, and an all-purpose vulnerability management dashboard that helps you streamline every step of the pentest process - from detection and prioritization of vulnerabilities to collaborative remediation. Astra integrates with GitLab, GitHub, Bitbucket, Slack & Jira to superpower your tech stack. You can use the integrations to automate continuous scanning and accelerate the remediation. Astra Pentest hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Attack surface management solution that automatically scans services, IPS, domains, networks and more for ransomware and other attacks.
Attack surface management solution that automatically scans services, IPS, domains, networks, and more for ransomware and other attacks. Randori hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Trend Micro Cloud One: automated, flexible, all-in-one security on AWS. Try it yourself with a free, 30-day trial.
1 platform. 7 security services. Trend Micro Cloud One has cloud builders on AWS covered with security services for all your needs—from file storage security to open source security, and everything in between. Turn-key integrations into your CI/CD pipelines, customizable APIs, and automated deployment, enable you to go further. Try it yourself with a free, 30-day trial. Trend Micro Cloud One hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning.
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning. OpenVAS hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Allows companies to monitor and fix vulnerabilities within their network.
Allows companies to monitor and fix vulnerabilities within their network. Nexpose hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities.
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities and enhance the security and compliance of applications across AWS. With Amazon Inspector, IT administrators and security professionals can quickly discover vulnerabilities, prioritize patch remediation, meet compliance requirements, and identify zero-day vulnerabilities as soon as they appear. Amazon Inspector hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Uleska helps security and dev teams manage application security at scale by automating and orchestrating their preferred security tools
Uleska helps security and development teams manage application security at scale by automating and orchestrating their preferred security tools within CI/CD. With Uleska, teams can confidently start an AppSec program using open-source, commercial, and custom tools and then quickly change, add or scale tools as the technology and business needs evolve. Uleska also brings speed and scale when integrating into development tools, and reporting of metrics and risk. Uleska hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database.
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database. Vulners hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system.
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system. Arcules doesn't lock you into ripping and replacing your existing cameras. We support over 6,000+ devices so you can keep what you have, or mix in the right new ones for your needs - saving you up-front costs and offering the flexibility of choosing what works best for you. The platform also auto updates to improve your security so you don’t have to worry about things shutting down. Arcules hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities.
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities. It combines IT asset discovery and inventory, identification and management both internal and external threats. Vulnerability Management gives you visibility into shadow IT and maps your full attack surface and responds to critical vulnerabilities associated with cyber threats. Adversaries don’t need many vulnerabilities – one is enough. WithSecure Elements Vulnerability Management hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
ESOF VMDR Next–Generation, Single Platform for Discovery, Assessment, Detection, and Response with Cyber Score Calculation.
ESOF® VMDR allows forward-looking enterprises to automatically discover every vulnerability in the asset within their IT infrastructure without human intervention, including unmanaged assets, hardware/ software inventory, etc. Identifying these assets is followed by tagging and communication with teams. ESOF VMDR hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API
A cybersecurity application that helps secure employee accounts by screening for unsafe credentials and passwords in Active Directory.
With Enzoic for AD, enterprises can eliminate unsafe passwords and adopt NIST requirements. Fully automate password screening and remediation Checks at creation and continuously against the latest exposures Evaluate both passwords and full credential combinations Prevent common passwords and predictable user behaviors Easily comply with NIST 800-63B guidelines Scans check against Enzoic’s complete database of billions of unsafe passwords, updated every day by Enzoic’s threat intelligence team. Enzoic for Active Directory hakkında daha fazla bilgi

Özellikler

  • Uyarılar/Bildirimler
  • Web Sitesinde Gezinme
  • Güvenlik Açığı/Tehdit Önceliği Belirleme
  • API