Loading...
Browse 52 security architecture tools
Cybersecurity consulting firm serving federal govt and commercial clients.
Cybersecurity consulting firm serving federal govt and commercial clients.
IAM services firm offering consulting, implementation, and compliance audits.
IAM services firm offering consulting, implementation, and compliance audits.
Cybersecurity consulting firm offering advisory, assessment, and IR services.
Cybersecurity consulting firm offering advisory, assessment, and IR services.
Enterprise threat modeling platform for apps, cloud, and IaC.
Secure collaboration solutions and consultancy for high-security orgs.
Secure collaboration solutions and consultancy for high-security orgs.
Packaged cloud security consulting engagements with workshops for AWS and Azure.
Packaged cloud security consulting engagements with workshops for AWS and Azure.
Consulting service assessing cloud/network security architecture and roadmap.
Consulting service assessing cloud/network security architecture and roadmap.
Security consulting & managed services for physical/operational security ecosystems.
Security consulting & managed services for physical/operational security ecosystems.
Customized security engineering consulting covering architecture, risk, and compliance.
Customized security engineering consulting covering architecture, risk, and compliance.
DDoS infrastructure audit & config optimization service for enterprises.
DDoS infrastructure audit & config optimization service for enterprises.
Australian consulting firm serving defence, govt & industry in security.
Australian consulting firm serving defence, govt & industry in security.
Managed GRC service covering risk assurance, compliance, and security advisory.
Managed GRC service covering risk assurance, compliance, and security advisory.
Automotive TARA, security requirements & architecture review services.
Automotive TARA, security requirements & architecture review services.
Security assessment service covering product SDL, architecture review & MASA.
Security assessment service covering product SDL, architecture review & MASA.
Maps security stack to NIST 2.0 framework to identify gaps & redundancies.
Maps security stack to NIST 2.0 framework to identify gaps & redundancies.
Managed security engineering & SOC onboarding service by ITC Secure.
Managed security engineering & SOC onboarding service by ITC Secure.
Auto-generates threat models from IaC files with risk & control mapping.
Auto-generates threat models from IaC files with risk & control mapping.
Threat modeling tool for dev teams to identify security design flaws pre-code.
Threat modeling tool for dev teams to identify security design flaws pre-code.
Automated threat modeling platform for OT/ICS environments with compliance support.
Automated threat modeling platform for OT/ICS environments with compliance support.
Threat modeling platform for identifying & managing software security risk by design.
Threat modeling platform for identifying & managing software security risk by design.
Threat modeling library for AI/ML systems with 28 security components.
Threat modeling library for AI/ML systems with 28 security components.
Automated threat modeling platform integrating security into the SDLC.
Automated threat modeling platform integrating security into the SDLC.
Threat modeling platform that finds design flaws and generates countermeasures.
Threat modeling platform that finds design flaws and generates countermeasures.
IOT/ICS security assessments, architecture, and mgmt for industrial environments.
IOT/ICS security assessments, architecture, and mgmt for industrial environments.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance