Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis. Task: Cloud Security
Browse 39 security tools
Enterprise threat modeling platform for apps, cloud, and IaC.
Continuous AI-based cloud red teaming via digital twin simulation.
Continuous AI-based cloud red teaming via digital twin simulation.
Cloud BAS tool that continuously simulates attacks to identify exploitable paths.
Cloud BAS tool that continuously simulates attacks to identify exploitable paths.
AI-driven threat intel & forensics module for Google Cloud SOC teams.
AI-driven threat intel & forensics module for Google Cloud SOC teams.
Cloud attack emulation platform for validating AWS security controls
Cloud attack emulation platform for validating AWS security controls
Creates custom cloud attack techniques for AWS with auto-complete & MITRE mapping
Creates custom cloud attack techniques for AWS with auto-complete & MITRE mapping
AI-powered cloud adversary emulation platform for AWS, Azure, and Kubernetes
AI-powered cloud adversary emulation platform for AWS, Azure, and Kubernetes
DNS-layer threat protection blocking malware, phishing, and DNS attacks
DNS-layer threat protection blocking malware, phishing, and DNS attacks
Visual attack surface mapping and threat modeling for security teams
Visual attack surface mapping and threat modeling for security teams
Secure MFT with CDR malware protection for file transfers and storage
Secure MFT with CDR malware protection for file transfers and storage
Cloud-based DNS filtering solution for blocking malicious sites and content
Cloud-based DNS filtering solution for blocking malicious sites and content
CTI services combining human expertise and AI for threat analysis
CTI services combining human expertise and AI for threat analysis
File threat intelligence integration combining hash lookups & malware detection
File threat intelligence integration combining hash lookups & malware detection
Threat intelligence platform providing messaging threat data via API
Threat intelligence platform providing messaging threat data via API
Enterprise file analysis platform for high-volume malware detection
Enterprise file analysis platform for high-volume malware detection
AI-powered file & software analysis platform for threat detection & risk assessment
AI-powered file & software analysis platform for threat detection & risk assessment
Threat intelligence platform with automated detection logic deployment
Threat intelligence platform with automated detection logic deployment
Validates detective security controls through attack simulations and testing
Validates detective security controls through attack simulations and testing
Threat intelligence platform for managing security data and threat info
Threat intelligence platform for managing security data and threat info
CDR API for file sanitization via Content Disarm & Reconstruction
CDR API for file sanitization via Content Disarm & Reconstruction
AI-powered continuous threat modeling for cloud applications in runtime
AI-powered continuous threat modeling for cloud applications in runtime
Threat intelligence platform combining network security and threat exposure mgmt
Threat intelligence platform combining network security and threat exposure mgmt
API service providing IP geolocation data and intelligence for security use cases
API service providing IP geolocation data and intelligence for security use cases
IP geolocation databases and APIs for location-based content and traffic analysis
IP geolocation databases and APIs for location-based content and traffic analysis
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs