Loading...
Browse 519 monitoring tools
SOCRadar DNS Monitoring provides real-time monitoring of DNS infrastructure with automated discovery, record change alerts, and detection of DNS-based security threats.
SOCRadar Digital Footprint provides comprehensive discovery and monitoring of an organization's external digital assets and attack surface from an attacker's perspective.
AI-powered observability platform for IT infrastructure monitoring
Suped is an email deliverability platform that provides DMARC monitoring, email authentication management, and deliverability optimization tools to protect domains from spoofing and improve inbox placement rates.
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
Cloud-based WAF protecting websites from attacks, DDoS, and exploits
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
Supply chain security platform for IT infrastructure hardware and firmware
Application monitoring and security platform that provides runtime visibility, threat detection, and automated response capabilities for application-layer security
Governance layer for monitoring and controlling AI coding agents within policy rules
CI/CD security platform for GitHub Actions with runtime threat detection
File integrity monitoring system detecting changes to critical files & registry
Secret Bridge monitors GitHub repositories to detect and alert on leaked secrets and sensitive data exposure.
A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.
A CLI program that simplifies cybersecurity solution management through automated deployment, configuration, monitoring, and lifecycle operations across multiple hosts.
A Docker-based utility that monitors TLS certificate expiration dates and exposes the data as Prometheus metrics with support for Kubernetes ingress discovery and configurable domain filtering.
A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.
An automated security response system for Google Cloud that processes Security Command Center findings and executes predefined remediation actions like disk snapshots, IAM revocation, and notifications.
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
Get strategic cybersecurity insights in your inbox