Cybersecurity

Advanced security solutions that protect digital assets, prevent cyber threats, and ensure data privacy. These tools provide comprehensive protection through threat detection, encryption, access control, and security monitoring.

60
Total Listings
0
Subcategories
60
Verified
0
Active Deals

Cybersecurity Products

60 shown
Permit.io logo
Permit.ioVerified
Cybersecurity
Permit.io is a full-stack authorization platform that provides policy-based access control (RBAC, ABAC, ReBAC) with a v...
View Profile
Stytch logo
StytchVerified
Customer Identity and Access Management
Stytch is an authentication and identity platform providing passwordless login, multi-factor authentication, OAuth, and...
View Profile
WorkOS logo
WorkOSVerified
Customer Identity and Access Management
WorkOS is an authentication and user management platform that helps B2B SaaS companies add enterprise features like SSO...
View Profile
Infisical logo
InfisicalVerified
Development Environment Setup
Infisical is an open-source secrets management platform that provides centralized management of API keys, database cred...
View Profile
Clerk logo
ClerkVerified
Email Security Platforms
Clerk is a developer-first authentication and user management platform providing drop-in components for sign-in, sign-u...
View Profile
Fortinet logo
FortinetVerified
Carrier Management
Fortinet provides enterprise-grade cybersecurity solutions including next-generation firewalls (FortiGate), SD-WAN, end...
View Profile
Trojan AI logo
Trojan AIVerified
Cybersecurity
AI security platform detecting and preventing attacks on machine learning models.
View Profile
Unkey logo
UnkeyVerified
Cybersecurity
Unkey is an open-source API key management platform that handles API key creation, validation, rate limiting, and usage...
View Profile
Bitdefender logo
BitdefenderVerified
Patch Management
Bitdefender provides enterprise cybersecurity solutions including endpoint protection, extended detection and response,...
View Profile
Abnormal Security logo
Abnormal SecurityVerified
Customer Experience Platforms
Abnormal Security uses behavioral AI to detect and prevent email attacks including business email compromise, phishing,...
View Profile
Propel Auth logo
Propel AuthVerified
Cybersecurity
PropelAuth is a B2B authentication platform providing multi-tenant user management, organization management, and role-b...
View Profile
Heimdal logo
HeimdalVerified
Patch Management
Heimdal provides a unified cybersecurity platform with advanced DNS security that uses machine learning and AI-powered...
View Profile
Auth0 logo
Auth0Verified
OT Security
Auth0 (by Okta) is an identity platform providing authentication, authorization, and user management APIs for web, mobi...
View Profile
StepSecurity logo
StepSecurityVerified
Supply Chain Management
StepSecurity provides security tools for GitHub Actions workflows, including runtime security monitoring, network polic...
View Profile
Authentik logo
AuthentikVerified
Remote Support Tools
Authentik is an open-source identity provider that supports SAML, OAuth, OIDC, LDAP, and SCIM, providing a self-hosted...
View Profile
KnowBe4 Training logo
KnowBe4 TrainingVerified
Security Awareness Platforms
KnowBe4 is the world's largest security awareness training platform with simulated phishing, compliance training, and c...
View Profile
Better Auth logo
Better AuthVerified
Email Security Platforms
Better Auth is a framework-agnostic TypeScript authentication library providing email/password, social login, two-facto...
View Profile
NETSCOUT logo
NETSCOUTVerified
Cybersecurity
NETSCOUT provides DDoS protection through its Arbor product line, offering both on-premise and cloud-based mitigation f...
View Profile
CalypsoAI Moderator logo
CalypsoAI ModeratorVerified
Cybersecurity
GenAI security platform with content filtering and policy enforcement for enterprise LLMs.
View Profile
Semgrep logo
SemgrepVerified
CI/CD
Semgrep is a fast, open-source static analysis tool for finding bugs and security vulnerabilities in code, with support...
View Profile
FOSSA logo
FOSSAVerified
Customer Win-Loss Analysis
FOSSA is a software composition analysis platform that automates open-source license compliance, vulnerability scanning...
View Profile
Palo Alto AI Security logo
Palo Alto AI SecurityVerified
AI Security Platforms
Palo Alto Networks provides comprehensive cybersecurity with AI-powered threat detection across network, cloud, and end...
View Profile
YesWeHack logo
YesWeHackVerified
Penetration Testing
YesWeHack is a European bug bounty and vulnerability disclosure platform that connects organizations with ethical hacke...
View Profile
Curricula logo
CurriculaVerified
Security Awareness Platforms
Curricula provides security awareness training that uses storytelling and gamification to make cybersecurity education...
View Profile
Zscaler logo
ZscalerVerified
Zero Trust Security
Zscaler provides cloud-native security services including secure web gateway, zero trust network access, and data prote...
View Profile
Prompt Armor logo
Prompt ArmorVerified
Cybersecurity
AI security platform detecting and preventing prompt injection attacks on LLM applications.
View Profile
GitGuardian logo
GitGuardianVerified
CI/CD
GitGuardian is a code security platform that detects secrets and sensitive data in source code, preventing credential l...
View Profile
Hoxhunt logo
HoxhuntVerified
Security Awareness Platforms
Hoxhunt is a human risk management platform that uses gamified phishing simulations and adaptive training to drive meas...
View Profile
Lacework logo
LaceworkVerified
Cybersecurity
Lacework is a cloud-native security platform using AI-driven threat detection to protect cloud workloads, containers, a...
View Profile
Aembit Workload logo
Aembit WorkloadVerified
Cybersecurity
Workload identity and access management platform from Aembit for non-human connections.
View Profile
Zitadel logo
ZitadelVerified
Cybersecurity
Zitadel is an open-source identity management platform providing authentication, authorization, and user management wit...
View Profile
Twingate logo
TwingateVerified
Zero Trust Security
Twingate is a zero-trust network access platform that replaces traditional VPNs with identity-based access controls, pr...
View Profile
Copilot for Security logo
Copilot for SecurityVerified
Cybersecurity
Microsoft's generative AI security product helping defenders identify and respond to threats.
View Profile
SuperTokens logo
SuperTokensVerified
Password Management
SuperTokens is an open-source authentication platform providing session management, social login, email/password, and p...
View Profile
Crowdstrike Falcon logo
Crowdstrike FalconVerified
Zero Trust Security
CrowdStrike Falcon provides AI-native endpoint protection, threat detection, and zero trust security through a cloud-de...
View Profile
Sophos Endpoint logo
Sophos EndpointVerified
SOP Management
Sophos provides endpoint protection with AI-powered threat prevention, EDR, and managed threat response for organizatio...
View Profile
Veriff logo
VeriffVerified
AI Customer Onboarding
Veriff is an identity verification platform that uses AI-powered biometric analysis to verify user identities for onboa...
View Profile
Bearer logo
BearerVerified
Code Snippet Management
Bearer is an open-source static analysis tool that scans code for security risks and data privacy violations in applica...
View Profile
CrowdStrike Falcon ZT logo
CrowdStrike Falcon ZTVerified
Zero Trust Security
CrowdStrike Falcon provides AI-native endpoint protection, threat detection, and zero trust security.
View Profile
CrowdStrike Falcon logo
CrowdStrike FalconVerified
AI Security Platforms
CrowdStrike Falcon is an AI-native cybersecurity platform providing endpoint protection, threat intelligence, and incid...
View Profile
Arcjet logo
ArcjetVerified
OT Security
Arcjet provides security as code for developers with bot detection, rate limiting, email validation, and attack protect...
View Profile
NINJIO logo
NINJIOVerified
Security Awareness Platforms
NINJIO provides security awareness training through Hollywood-style animated episodes that use real breach stories to e...
View Profile
Lucia logo
LuciaVerified
Privileged Session Management
Lucia is a lightweight, framework-agnostic authentication library for TypeScript that provides a simple API for session...
View Profile
Orca Security logo
Orca SecurityVerified
Kubernetes Security
Orca Security provides agentless cloud security platform covering workloads, configurations, identities, and data acros...
View Profile
Hypori logo
HyporiVerified
Cybersecurity
Virtual mobile infrastructure platform offering secure mobile access for government and enterprises.
View Profile
Sectra RIS logo
Sectra RISVerified
Radiology Information Systems
Sectra provides radiology information systems and PACS solutions for healthcare organizations, supporting enterprise im...
View Profile
Infosec IQ logo
Infosec IQVerified
Phishing Simulation
Infosec IQ is a security awareness and phishing simulation platform that provides role-based training paths and adaptiv...
View Profile
Teleport logo
TeleportVerified
Zero Trust Security
Teleport is an identity-native infrastructure access platform providing secure SSH, Kubernetes, database, and applicati...
View Profile
Cipherpoint logo
CipherpointVerified
Cybersecurity
Australian data security and governance platform for enterprise content.
View Profile
Onyxia AI logo
Onyxia AIVerified
Cybersecurity
Cybersecurity performance management platform unifying data across security tools and programs.
View Profile
NextAuth.js / Auth.js logo
NextAuth.js / Auth.jsVerified
Remote Support Tools
Auth.js (NextAuth.js) is the most popular authentication library for Next.js and other web frameworks, providing OAuth,...
View Profile
Mondoo logo
MondooVerified
Cybersecurity
Mondoo is a security and compliance platform that continuously assesses infrastructure, workloads, and SaaS application...
View Profile
Snyk logo
SnykVerified
Cybersecurity
Snyk is a developer security platform that helps teams find and fix vulnerabilities in code, open-source dependencies,...
View Profile
TruffleHog logo
TruffleHogVerified
Cybersecurity
TruffleHog by Truffle Security scans code repositories, file systems, and other data sources for accidentally committed...
View Profile
Wiz logo
WizVerified
Cybersecurity
Wiz is a cloud security platform that provides agentless scanning across cloud environments to identify risks, misconfi...
View Profile
Traliant Compliance logo
Traliant ComplianceVerified
Learning Management
Traliant provides modern compliance training with interactive courses on harassment, DEI, ethics, cybersecurity, and wo...
View Profile
Tailscale logo
TailscaleVerified
Floral Wire Service Software
Tailscale is a zero-configuration VPN built on WireGuard that creates a secure mesh network between devices and servers...
View Profile
HashiCorp Boundary logo
HashiCorp BoundaryVerified
Entity Management
HashiCorp Boundary provides identity-based access management for dynamic infrastructure, enabling secure remote access...
View Profile
SentinelOne logo
SentinelOneVerified
Cyber Range Platforms
SentinelOne provides AI-powered endpoint protection, detection, and response (EDR/XDR) for enterprises. Its Singularity...
View Profile
Terranova Security logo
Terranova SecurityVerified
Phishing Simulation
Terranova Security provides phishing simulation and security awareness training with multilingual content, compliance t...
View Profile
Explore deeper. Search and filter across all products in the discovery workbench.Open Workbench