Loading...
Browse 2,071 cloud security tools
Data security platform providing in-use encryption for databases and apps
Data security platform providing in-use encryption for databases and apps
Automated ransomware protection for Microsoft 365 with detection and recovery
Automated ransomware protection for Microsoft 365 with detection and recovery
SaaS ransomware detection and automated recovery for Google Workspace & M365
SaaS ransomware detection and automated recovery for Google Workspace & M365
SSPM solution for Microsoft 365 with app/extension risk assessment & config mgmt
SSPM solution for Microsoft 365 with app/extension risk assessment & config mgmt
SSPM solution for Slack workspaces with app risk assessment & monitoring
SSPM solution for Slack workspaces with app risk assessment & monitoring
SSPM solution for Google Workspace managing misconfigurations and app risks
SSPM solution for Google Workspace managing misconfigurations and app risks
DLP solution for Google Workspace with automated data leak prevention
DLP solution for Google Workspace with automated data leak prevention
DLP solution for Microsoft 365 with automated data leak prevention capabilities
DLP solution for Microsoft 365 with automated data leak prevention capabilities
Real-time access analytics and threat detection for PAM with audit trails
Real-time access analytics and threat detection for PAM with audit trails
Passwordless MFA with SSO monitoring to detect and prevent authentication bypass
Passwordless MFA with SSO monitoring to detect and prevent authentication bypass
Passwordless MFA+SSO solution with phishing-resistant authentication
Passwordless MFA+SSO solution with phishing-resistant authentication
VPN add-on providing static dedicated IP addresses for consistent access
SaaS security posture management service for configuration and access control
SaaS security posture management service for configuration and access control
Bundle combining MDR and backup services for ransomware protection
Bundle combining MDR and backup services for ransomware protection
Vulnerability management platform for scanning, prioritizing, and remediating vulns
Vulnerability management platform for scanning, prioritizing, and remediating vulns
Encrypted cloud storage & collaboration platform with zero-knowledge E2EE
Encrypted cloud storage & collaboration platform with zero-knowledge E2EE
Policy-based EDR solution monitoring endpoints for IoCs with automated responses
Policy-based EDR solution monitoring endpoints for IoCs with automated responses
Biometric MFA solution using typing behavior patterns for authentication
Biometric MFA solution using typing behavior patterns for authentication
AI-powered deepfake voice detection using speech analysis algorithms
AI-powered deepfake voice detection using speech analysis algorithms
AI-powered data security platform for access control and policy automation
AI-powered data security platform for access control and policy automation
AI-powered platform for cryptographic asset discovery and PQC transition mgmt.
AI-powered platform for cryptographic asset discovery and PQC transition mgmt.
Third-party risk management platform with AI-powered vendor assessments
Third-party risk management platform with AI-powered vendor assessments
Passwordless authentication system using unique keys for identity management
Passwordless authentication system using unique keys for identity management
Enterprise password manager with passwordless SSO and MFA capabilities
Enterprise password manager with passwordless SSO and MFA capabilities
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance