Anomaly Detection
Explore 201 curated cybersecurity tools, with 15,161 visitors searching for solutions
FEATURED
Behavioral ransomware detection engine with automated blocking capabilities
Behavioral ransomware detection engine with automated blocking capabilities
Unified XDR platform consolidating security data across endpoints, network, IAM, and cloud
Unified XDR platform consolidating security data across endpoints, network, IAM, and cloud
AI-powered SOC agent for autonomous threat detection and response
AI-powered SOC agent for autonomous threat detection and response
Autonomous AI SOC platform for automated threat response and remediation
Autonomous AI SOC platform for automated threat response and remediation
Distributed SIEM with edge processing, AI filtering, and autonomous response
Distributed SIEM with edge processing, AI filtering, and autonomous response
NDR platform for detecting threats via network analytics and traffic analysis.
NDR platform for detecting threats via network analytics and traffic analysis.
SIEM-integrated NDR platform for network traffic monitoring and threat detection
SIEM-integrated NDR platform for network traffic monitoring and threat detection
Hosted SIEM-as-a-Service with 24/7 SOC monitoring and MXDR integration
Hosted SIEM-as-a-Service with 24/7 SOC monitoring and MXDR integration
Network traffic analysis tool for real-time intrusion detection and monitoring
Network traffic analysis tool for real-time intrusion detection and monitoring
Monitors email user behavior with AI/ML to detect and block account takeover attacks
Monitors email user behavior with AI/ML to detect and block account takeover attacks
Cloud-native email security platform for phishing & BEC detection
Cloud-native email security platform for phishing & BEC detection
ML-based email security detecting BEC, impersonation, and advanced threats
ML-based email security detecting BEC, impersonation, and advanced threats
Protects login endpoints from account takeover attacks and credential fraud
Protects login endpoints from account takeover attacks and credential fraud
Centralized platform for managing field-level data protection policies
Centralized platform for managing field-level data protection policies
DLP solution for Linux systems to prevent data leaks and protect sensitive data
DLP solution for Linux systems to prevent data leaks and protect sensitive data
DSPM and DDR platform for data discovery, classification, monitoring & response
DSPM and DDR platform for data discovery, classification, monitoring & response
AI agent for detecting and stopping insider risks to critical data
AI agent for detecting and stopping insider risks to critical data
DLP solution using data lineage and content analysis to prevent data loss
DLP solution using data lineage and content analysis to prevent data loss
Data visibility and accountability platform with chain-of-custody tracking
Data visibility and accountability platform with chain-of-custody tracking
Real-time data surveillance platform for data discovery, monitoring, and threat detection
Real-time data surveillance platform for data discovery, monitoring, and threat detection
Enterprise DLP solution for preventing corporate data leakage
Enterprise DLP solution for preventing corporate data leakage
Data-centric audit and protection platform with file lifecycle tracking
Data-centric audit and protection platform with file lifecycle tracking
AI-powered insider threat detection with behavior analysis and risk scoring
AI-powered insider threat detection with behavior analysis and risk scoring
User behavior analytics platform for insider threat detection and DLP
User behavior analytics platform for insider threat detection and DLP