Loading...
Browse 2,190 threat detection tools
Behavioral-based insider data risk detection using intent & anomaly analysis.
Behavioral-based insider data risk detection using intent & anomaly analysis.
Integrated platform combining sandbox analysis, CDR, and workflow automation.
Integrated platform combining sandbox analysis, CDR, and workflow automation.
Workflow platform combining malware sandbox analysis and CDR file sanitization.
Workflow platform combining malware sandbox analysis and CDR file sanitization.
Automated malware analysis via hypervisor-level sandbox & static analysis.
Automated malware analysis via hypervisor-level sandbox & static analysis.
Hypervisor-level dynamic sandbox for real-time malware behavioral analysis.
Hypervisor-level dynamic sandbox for real-time malware behavioral analysis.
Cloud-based email filtering blocking phishing, malware, spam & BEC attacks.
Cloud-based email filtering blocking phishing, malware, spam & BEC attacks.
Managed endpoint security service offered by MSSP Magna5.
Managed endpoint security service offered by MSSP Magna5.
Managed detection and response (MDR) service by Magna5.
Managed detection and response (MDR) service by Magna5.
Managed SIEM service providing outsourced security monitoring for orgs.
Managed SIEM service providing outsourced security monitoring for orgs.
Magna5 managed security service using a multi-layered defense approach.
Magna5 managed security service using a multi-layered defense approach.
Managed security monitoring service for Microsoft 365 environments.
Managed security monitoring service for Microsoft 365 environments.
Secures MCP sessions in AI dev environments via proxy, discovery, and policy enforcement.
Secures MCP sessions in AI dev environments via proxy, discovery, and policy enforcement.
Detects login intrusions and fires countermeasures via Mugshot + Password SHOCK.
Detects login intrusions and fires countermeasures via Mugshot + Password SHOCK.
Automated countermeasure tool that responds to unauthorized login attempts.
Automated countermeasure tool that responds to unauthorized login attempts.
Hardware DDoS mitigation appliance using Deep DDoS Inspection (DDI™) tech.
Hardware DDoS mitigation appliance using Deep DDoS Inspection (DDI™) tech.
AI-driven ATO fraud prevention via login monitoring & bot detection.
AI-driven ATO fraud prevention via login monitoring & bot detection.
Detects and blocks fraudulent new account registrations using identity risk scoring.
Detects and blocks fraudulent new account registrations using identity risk scoring.
Ecommerce fraud detection and chargeback management platform.
Ecommerce fraud detection and chargeback management platform.
Agentless browser security platform for threat detection and DLP.
Agentless browser security platform for threat detection and DLP.
Hardened encrypted smartphone with custom OS for enterprise mobile security.
Hardened encrypted smartphone with custom OS for enterprise mobile security.
Managed EDR service with SOC-backed threat detection and response for endpoints.
Managed EDR service with SOC-backed threat detection and response for endpoints.
Deep malware & phishing analysis via static, dynamic, and hybrid methods.
Deep malware & phishing analysis via static, dynamic, and hybrid methods.
IoT-focused detect & response platform with embedded agent and SOC integration.
IoT-focused detect & response platform with embedded agent and SOC integration.
Automated email monitoring tool for analyzing suspicious emails and URLs.
Automated email monitoring tool for analyzing suspicious emails and URLs.
Get strategic cybersecurity insights in your inbox