Loading...
Browse 2,190 threat detection tools
Network monitoring and detection solution for threat analysis
Network monitoring and detection solution for threat analysis
AI-driven SOC platform with unified data lake, threat intel, and automation
AI-driven SOC platform with unified data lake, threat intel, and automation
SIEM platform for log management, threat detection, and security monitoring
SIEM platform for log management, threat detection, and security monitoring
Protects against account abuse across lifecycle using ML and risk indicators
Protects against account abuse across lifecycle using ML and risk indicators
Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.
Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.
Managed threat hunting service detecting evasive threats in network environments
Managed threat hunting service detecting evasive threats in network environments
API security platform for discovery, testing, and protection of APIs
Bot detection & mitigation platform protecting against abuse & scraping
Bot detection & mitigation platform protecting against abuse & scraping
Microsegmentation solution for preventing lateral movement in networks
Microsegmentation solution for preventing lateral movement in networks
AI security solution protecting models, agents, data, and prompts
AI security solution protecting models, agents, data, and prompts
Security operations platform combining SIEM, UEBA, and SOAR capabilities
Security operations platform combining SIEM, UEBA, and SOAR capabilities
AI-powered security assistant for autonomous threat detection and response
AI-powered security assistant for autonomous threat detection and response
AI-driven NDR platform detecting threats across network, identity, and cloud
AI-driven NDR platform detecting threats across network, identity, and cloud
AI security testing platform for red teaming, vulnerability assessment & defense
AI security testing platform for red teaming, vulnerability assessment & defense
AI-powered cloud WAF with DDoS protection, bot management, and rate limiting
AI-powered cloud WAF with DDoS protection, bot management, and rate limiting
AI-powered security operations platform for automated threat analysis and response
AI-powered security operations platform for automated threat analysis and response
GenAI-powered malware analysis tool for unknown & zero-day threats
GenAI-powered malware analysis tool for unknown & zero-day threats
AI-powered security platform for threat detection, automation, and AI protection
AI-powered security platform for threat detection, automation, and AI protection
AI-powered threat intelligence platform with generative AI capabilities
AI-powered threat intelligence platform with generative AI capabilities
A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.
A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.
A collection of YARA rules for Windows, Linux, and Other threats.
A collection of YARA rules for Windows, Linux, and Other threats.
Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.
Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
Get strategic cybersecurity insights in your inbox