Loading...
Browse 0 cybersecurity solutions, with 0 security professionals searching monthly
CLI scanner that detects security threats in AI agent skills before installation.
AI-driven IAM risk mitigation with automated least privilege enforcement & JIT access.
MCP governance platform for securing and controlling enterprise AI agents.
Agentic TPRM platform automating vendor risk across the full third-party lifecycle.
Cloud entitlement mgmt platform for managing & right-sizing cloud permissions.
Data access observability tool for monitoring user permissions and usage.
SaaS excessive privilege detection and remediation platform.
Secures Salesforce Agentforce AI workflows via visibility, monitoring & governance.
Mobile app that scans & manages third-party app permissions on devices & services.
JIT cloud permissions mgmt platform enforcing least privilege access.
Incident investigation tool for info risks, user activity, and file exposure.
ML-driven access governance for entitlement visibility & outlier detection.
Automates user access reviews with real-time visibility and audit-ready logging.
Audits and manages user permissions to reduce security risks.
DSPM platform for file auditing, permissions, data classification & tracking.
Maps GCP service account key permissions and access for incident response
IAM solution for auditing and managing data access permissions across environments
Cloud IAM permission rightsizing tool for human and non-human identities
M365 access control & data governance tool for managing permissions & oversharing
Unified platform for auditing, threat detection & data security across AD & M365
Permission analysis and supervision tool for Microsoft 365 and file servers
Cloud Infrastructure Entitlement Management (CIEM) for managing cloud permissions
Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
Get strategic cybersecurity insights in your inbox