Loading...
Browse 294 real time monitoring tools
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Vehicle cybersecurity intrusion detection for commercial fleets and OEMs
Vehicle cybersecurity intrusion detection for commercial fleets and OEMs
Antivirus software with real-time malware protection for Windows and macOS
Antivirus software with real-time malware protection for Windows and macOS
Adaptive phishing simulation platform with AI-generated attacks and training.
Adaptive phishing simulation platform with AI-generated attacks and training.
Managed log aggregation system for storing and querying application logs
Managed log aggregation system for storing and querying application logs
AI agent security platform providing visibility, risk mgmt & governance
AI agent security platform providing visibility, risk mgmt & governance
Slack-integrated phishing simulator with real-time training capabilities
Slack-integrated phishing simulator with real-time training capabilities
EASM platform for continuous external attack surface monitoring and detection
EASM platform for continuous external attack surface monitoring and detection
24/7 monitoring service for external threats, data leaks, and brand mentions
24/7 monitoring service for external threats, data leaks, and brand mentions
Application delivery controller with load balancing, WAF, and traffic mgmt.
Application delivery controller with load balancing, WAF, and traffic mgmt.
IT asset discovery tool providing real-time visibility of network devices
IT asset discovery tool providing real-time visibility of network devices
Real-time threat detection and telemetry routing platform for security data
Real-time threat detection and telemetry routing platform for security data
Mobile app for security operations incident response and threat management
Mobile app for security operations incident response and threat management
DDoS mitigation service that absorbs and neutralizes large-scale attacks.
DDoS mitigation service that absorbs and neutralizes large-scale attacks.
Threat intelligence platform with AI-powered monitoring and analysis
Threat intelligence platform with AI-powered monitoring and analysis
Behavioral analytics platform for identity security risk detection and response
Behavioral analytics platform for identity security risk detection and response
SIEM platform with compliance reporting for regulatory standards
SIEM platform with compliance reporting for regulatory standards
SOAR platform automating threat detection, incident response, and workflows
SOAR platform automating threat detection, incident response, and workflows
AI-powered fraud detection platform for transaction monitoring and prevention
AI-powered fraud detection platform for transaction monitoring and prevention
AI-powered callback/voice phishing simulation platform for employee training
AI-powered callback/voice phishing simulation platform for employee training
QR code phishing simulation platform for security awareness training
QR code phishing simulation platform for security awareness training
Mobile threat defense platform for iOS, Android, and ChromeOS devices
Mobile threat defense platform for iOS, Android, and ChromeOS devices
AI-powered SIEM with automated threat detection and response capabilities
AI-powered SIEM with automated threat detection and response capabilities
Security data platform combining SIEM, SOAR, UEBA, and threat hunting
Security data platform combining SIEM, SOAR, UEBA, and threat hunting
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.