Loading...
Browse 259 security monitoring tools
Identity security platform for threat detection and access management
Identity security platform for threat detection and access management
SOCRadar Supply Chain Intelligence monitors over 50 million companies to assess and manage cybersecurity risks across organizational supply chains through automated detection, dynamic risk scoring, and real-time threat intelligence.
SOCRadar Supply Chain Intelligence monitors over 50 million companies to assess and manage cybersecurity risks across organizational supply chains through automated detection, dynamic risk scoring, and real-time threat intelligence.
SOCRadar DNS Monitoring provides real-time monitoring of DNS infrastructure with automated discovery, record change alerts, and detection of DNS-based security threats.
SOCRadar DNS Monitoring provides real-time monitoring of DNS infrastructure with automated discovery, record change alerts, and detection of DNS-based security threats.
A cloud-based web application firewall that protects applications from various cyber threats through rule-based filtering, machine learning detection, and integrated security features.
A cloud-based web application firewall that protects applications from various cyber threats through rule-based filtering, machine learning detection, and integrated security features.
A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.
A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.
A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.
A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.
A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.
A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
A free online service that scans the dark web for exposed credentials and sensitive data associated with specific domains or email addresses.
A free online service that scans the dark web for exposed credentials and sensitive data associated with specific domains or email addresses.
Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.
Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.
SaaS platform for incident response, vulnerability scanning, and cyber insurance
SaaS platform for incident response, vulnerability scanning, and cyber insurance
SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.
SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
Enterprise security workflow automation platform for vulnerability management
Enterprise security workflow automation platform for vulnerability management
Decision Focus is an integrated GRC platform offering modules for audit, risk, compliance, governance, third-party management, and information security with no-code configuration capabilities.
Decision Focus is an integrated GRC platform offering modules for audit, risk, compliance, governance, third-party management, and information security with no-code configuration capabilities.
A risk management platform for banks and payment service providers that automates merchant onboarding, provides real-time monitoring, simplifies PCI-DSS compliance, and delivers actionable business intelligence.
A risk management platform for banks and payment service providers that automates merchant onboarding, provides real-time monitoring, simplifies PCI-DSS compliance, and delivers actionable business intelligence.
Oracle Identity Governance is an identity governance and administration solution that manages user identities, access entitlements, and compliance requirements across cloud and on-premises environments.
Oracle Identity Governance is an identity governance and administration solution that manages user identities, access entitlements, and compliance requirements across cloud and on-premises environments.
AWS Verified Access is a zero trust security service that provides secure application access based on user identity and device security posture without requiring a VPN.
AWS Verified Access is a zero trust security service that provides secure application access based on user identity and device security posture without requiring a VPN.
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
Managed security services with SOC, MDR, and security infrastructure operations
Managed security services with SOC, MDR, and security infrastructure operations
Snort is an open-source network intrusion detection and prevention system that analyzes traffic in real-time to identify and block malicious activity using rule-based detection methods.
Snort is an open-source network intrusion detection and prevention system that analyzes traffic in real-time to identify and block malicious activity using rule-based detection methods.
Detects and prevents insider threats with visibility into risky user behavior
Detects and prevents insider threats with visibility into risky user behavior
External attack surface management platform for discovering digital assets
External attack surface management platform for discovering digital assets
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance