Loading...
Browse 47 physical security tools
Social engineering testing service to assess employee security awareness
Social engineering testing service to assess employee security awareness
Penetration testing services by certified testers for security assessment
Penetration testing services by certified testers for security assessment
Simulated breach testing service to identify vulnerabilities and weaknesses
Simulated breach testing service to identify vulnerabilities and weaknesses
Threat intelligence platform for cyber, physical, vulnerability & national sec
Threat intelligence platform for cyber, physical, vulnerability & national sec
Red team penetration testing services simulating real-world attacks
Red team penetration testing services simulating real-world attacks
Offensive security services with penetration testing and vulnerability assessments
Offensive security services with penetration testing and vulnerability assessments
Command center software for managing security incidents and guard dispatch
Command center software for managing security incidents and guard dispatch
Intelligence platform for physical security threats to people, places, and assets
Intelligence platform for physical security threats to people, places, and assets
Social engineering assessment service testing human security controls
Social engineering assessment service testing human security controls
Adversary-led penetration testing services with continuous attack simulation
Adversary-led penetration testing services with continuous attack simulation
Subscription-based red team service with continuous attack simulations
Subscription-based red team service with continuous attack simulations
Physical penetration testing services with social engineering attacks
Physical penetration testing services with social engineering attacks
Continuous ethical hacking service simulating real-world cyber attacks
Continuous ethical hacking service simulating real-world cyber attacks
Continuous breach and attack simulation services by ethical hackers
Continuous breach and attack simulation services by ethical hackers
Platform for chip security testing and binary security analysis
Physical security intelligence platform monitoring digital threats to locations
Physical security intelligence platform monitoring digital threats to locations
Managed threat intelligence service with dedicated analysts for orgs
Managed threat intelligence service with dedicated analysts for orgs
Passive optical data diode for unidirectional data transmission
Passive optical data diode for unidirectional data transmission
Subscription-based continuous red team testing across digital, physical & social
Subscription-based continuous red team testing across digital, physical & social
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.
MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
Do Not Disturb is a free open-source macOS security tool that detects unauthorized physical access to laptops.
Do Not Disturb is a free open-source macOS security tool that detects unauthorized physical access to laptops.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance