Loading...
Task: Threat Detection
Browse 38 security tools
Deception-based breach detection tools including honeypots & canary tokens.
Deception-based breach detection tools including honeypots & canary tokens.
Deception platform using decoys to detect lateral movement & identity attacks.
Deception platform using decoys to detect lateral movement & identity attacks.
Network deception tool deploying lures to detect & analyze advanced threats.
Network deception tool deploying lures to detect & analyze advanced threats.
Agentless network defense platform using deception to preemptively disrupt threats.
Agentless network defense platform using deception to preemptively disrupt threats.
Agentless deception platform with internal & external decoy deployment.
Agentless deception platform with internal & external decoy deployment.
Deception tech using decoys to detect recon, lateral movement & insider threats.
Deception tech using decoys to detect recon, lateral movement & insider threats.
Deception-based threat detection using decoys to catch lateral movement & recon.
Deception-based threat detection using decoys to catch lateral movement & recon.
Open-source nonprofit org developing honeypot tools & threat research.
Open-source nonprofit org developing honeypot tools & threat research.
SaaS cyber deception platform deploying decoy sensors to detect attackers.
SaaS cyber deception platform deploying decoy sensors to detect attackers.
Active Directory deception technology for threat detection and response
Active Directory deception technology for threat detection and response
Real-time ransomware attack deflection through deception and diversion
Real-time ransomware attack deflection through deception and diversion
Deception-based intrusion detection system for CRITIS compliance
Deception-based intrusion detection system for CRITIS compliance
Crowd-sourced honeynet providing real-time threat intelligence and protection
Crowd-sourced honeynet providing real-time threat intelligence and protection
AI-driven deception tech creating cyber clones to trap attackers & detect threats
AI-driven deception tech creating cyber clones to trap attackers & detect threats
Deception platform that diverts attackers & provides threat intelligence
Deception platform that diverts attackers & provides threat intelligence
AI-driven deception platform using honeypots and decoys to detect threats.
AI-driven deception platform using honeypots and decoys to detect threats.
Adversary engagement & deception platform for detecting advanced threats
Adversary engagement & deception platform for detecting advanced threats
AI-powered deception platform for cloud threat detection using honeytokens
AI-powered deception platform for cloud threat detection using honeytokens
AI-powered deception platform for early APT and advanced threat detection
AI-powered deception platform for early APT and advanced threat detection
Credential-based deception platform that lures attackers to capture stolen creds
Credential-based deception platform that lures attackers to capture stolen creds
Deception-based detection engine integrated into LMNTRIX XDR platform
Deception-based detection engine integrated into LMNTRIX XDR platform
AI-powered deception platform using honeypots to detect & disrupt attacks
AI-powered deception platform using honeypots to detect & disrupt attacks
Cloud-native deception platform deploying dynamic security canaries
Cloud-native deception platform deploying dynamic security canaries
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs