Security Compliance

These solutions can help automate compliance monitoring, risk assessment, and policy enforcement—while still allowing for human oversight and control. Many platforms support a hybrid approach, combining AI-driven efficiencies with expert guidance to align with evolving regulatory requirements and security standards. Key features often include audit management, documentation control, and compliance reporting across multiple frameworks.

60
Total Listings
0
Subcategories
60
Verified
0
Active Deals

Security Compliance Products

60 shown
Drata logo
DrataVerified
Entity Management
Drata is a compliance automation platform that helps organizations achieve and maintain SOC 2, ISO 27001, HIPAA, GDPR,...
View Profile
Cerbos logo
CerbosVerified
Security Compliance
Cerbos is an open-source authorization layer for fine-grained access.
View Profile
Aikido Security logo
Aikido SecurityVerified
OT Security
Aikido Security brings together code, cloud, dependency, and runtime security workflows in a more approachable platform...
View Profile
Descope logo
DescopeVerified
Customer Identity and Access Management
Descope provides drag-and-drop auth workflows for user management.
View Profile
Cascade Security logo
Cascade SecurityVerified
Compliance Monitoring
Cascade provides security monitoring and control for AI agents.
View Profile
Fortinet logo
FortinetVerified
Carrier Management
Fortinet provides enterprise-grade cybersecurity solutions including next-generation firewalls (FortiGate), SD-WAN, end...
View Profile
Unkey logo
UnkeyVerified
Cybersecurity
Unkey is an open-source API key management platform that handles API key creation, validation, rate limiting, and usage...
View Profile
Mosyle logo
MosyleVerified
Patch Management
Mosyle provides a unified Apple device management platform combining MDM, endpoint security, encrypted DNS, app managem...
View Profile
P
Pearl Meyer DeferredVerified
Security Compliance
Executive compensation and deferred comp consulting.
View Profile
Propel Auth logo
Propel AuthVerified
Cybersecurity
PropelAuth is a B2B authentication platform providing multi-tenant user management, organization management, and role-b...
View Profile
Jamf logo
JamfVerified
Password Management
Jamf is the leading Apple device management platform providing MDM, security, and identity solutions for organizations...
View Profile
Auth0 logo
Auth0Verified
OT Security
Auth0 (by Okta) is an identity platform providing authentication, authorization, and user management APIs for web, mobi...
View Profile
StepSecurity logo
StepSecurityVerified
Supply Chain Management
StepSecurity provides security tools for GitHub Actions workflows, including runtime security monitoring, network polic...
View Profile
Authentik logo
AuthentikVerified
Remote Support Tools
Authentik is an open-source identity provider that supports SAML, OAuth, OIDC, LDAP, and SCIM, providing a self-hosted...
View Profile
Better Auth logo
Better AuthVerified
Email Security Platforms
Better Auth is a framework-agnostic TypeScript authentication library providing email/password, social login, two-facto...
View Profile
Socket logo
SocketVerified
Supply Chain Management
Socket detects malicious open-source dependencies and supply chain risks.
View Profile
Clam logo
ClamVerified
AI Agents & Sidekicks
Clam builds security infrastructure for AI agents ensuring safe behavior.
View Profile
FOSSA logo
FOSSAVerified
Customer Win-Loss Analysis
FOSSA is a software composition analysis platform that automates open-source license compliance, vulnerability scanning...
View Profile
1Password logo
1PasswordVerified
OT Security
1Password is a password manager that stores credentials, secrets, and sensitive data for individuals and teams with zer...
View Profile
Zscaler logo
ZscalerVerified
Zero Trust Security
Zscaler provides cloud-native security services including secure web gateway, zero trust network access, and data prote...
View Profile
GitGuardian logo
GitGuardianVerified
CI/CD
GitGuardian is a code security platform that detects secrets and sensitive data in source code, preventing credential l...
View Profile
Hexnode logo
HexnodeVerified
Optical Retail POS
Hexnode is a unified endpoint management platform that provides device management, app management, and security for mul...
View Profile
Lacework logo
LaceworkVerified
Cybersecurity
Lacework is a cloud-native security platform using AI-driven threat detection to protect cloud workloads, containers, a...
View Profile
Laika logo
LaikaVerified
Workflow Automation
Laika provides compliance automation for SOC 2, ISO 27001, and GDPR with AI.
View Profile
Doppler SecretOps logo
Doppler SecretOpsVerified
API Security Platforms
Doppler SecretOps provides centralized secret management, rotation, and sync across applications, environments, and inf...
View Profile
N
Newport Deferred CompVerified
Security Compliance
Nonqualified deferred compensation plan administration.
View Profile
Bitwarden logo
BitwardenVerified
Mobile Device Management
Bitwarden is an open-source password management solution for individuals, teams, and enterprises providing encrypted cr...
View Profile
M
MullinTBGVerified
Security Compliance
Nonqualified executive benefits and deferred comp services.
View Profile
CyberArk logo
CyberArkVerified
Entity Management
CyberArk is the leader in privileged access management and identity security, protecting the most critical enterprise c...
View Profile
Tines logo
TinesVerified
Workflow Automation
Tines is a no-code security automation platform that enables security teams to build workflows and automate repetitive...
View Profile
Twingate logo
TwingateVerified
Zero Trust Security
Twingate is a zero-trust network access platform that replaces traditional VPNs with identity-based access controls, pr...
View Profile
Fleet logo
FleetVerified
Version Control Hosting
Fleet is an open-source device management platform built on osquery that provides real-time visibility, vulnerability m...
View Profile
SuperTokens logo
SuperTokensVerified
Password Management
SuperTokens is an open-source authentication platform providing session management, social login, email/password, and p...
View Profile
P
Principal ESOPVerified
Security Compliance
ESOP recordkeeping and trustee services platform.
View Profile
B
Blue Ridge ESOPVerified
Security Compliance
ESOP recordkeeping and administration services.
View Profile
HashiCorp Vault logo
HashiCorp VaultVerified
Entity Management
HashiCorp Vault is a secrets management and data protection platform that provides centralized secret storage, encrypti...
View Profile
F
Fulcrum PartnersVerified
Security Compliance
Executive deferred compensation consulting and admin.
View Profile
Agentic Fabriq logo
Agentic FabriqVerified
OT Security
Agentic Fabriq builds identity and authorization for AI agents in enterprises.
View Profile
Okta logo
OktaVerified
Employee Directory
Okta is a cloud identity and access management platform providing single sign-on, multi-factor authentication, lifecycl...
View Profile
Arcjet logo
ArcjetVerified
OT Security
Arcjet provides security as code for developers with bot detection, rate limiting, email validation, and attack protect...
View Profile
Lucia logo
LuciaVerified
Privileged Session Management
Lucia is a lightweight, framework-agnostic authentication library for TypeScript that provides a simple API for session...
View Profile
Orca Security logo
Orca SecurityVerified
Kubernetes Security
Orca Security provides agentless cloud security platform covering workloads, configurations, identities, and data acros...
View Profile
OneSpan logo
OneSpanVerified
AI Customer Onboarding
OneSpan provides digital agreements, identity verification, and fraud prevention solutions that secure high-value trans...
View Profile
N
Newport ESOPVerified
Security Compliance
ESOP administration and consulting platform.
View Profile
Kandji logo
KandjiVerified
Expert Witness Management
Kandji is an Apple device management and security platform that combines MDM with automated compliance enforcement and...
View Profile
Oneleet logo
OneleetVerified
Workflow Automation
Oneleet is a compliance automation platform focused on SOC 2 that combines automated evidence collection, policy genera...
View Profile
StrongDM logo
StrongDMVerified
Database Tools
StrongDM provides infrastructure access management for databases, servers, Kubernetes, and cloud services with audit lo...
View Profile
Teleport logo
TeleportVerified
Zero Trust Security
Teleport is an identity-native infrastructure access platform providing secure SSH, Kubernetes, database, and applicati...
View Profile
Thoropass logo
ThoropassVerified
Innovation Management
Thoropass (formerly Laika) is a compliance and audit management platform that streamlines SOC 2, ISO 27001, HIPAA, and...
View Profile
P
Prairie Capital AdvisorsVerified
Security Compliance
ESOP advisory and valuation platform.
View Profile
Ory logo
OryVerified
API Gateway Platforms
Ory provides open-source identity infrastructure including authentication (Kratos), authorization (Keto), OAuth2 (Hydra...
View Profile
NextAuth.js / Auth.js logo
NextAuth.js / Auth.jsVerified
Remote Support Tools
Auth.js (NextAuth.js) is the most popular authentication library for Next.js and other web frameworks, providing OAuth,...
View Profile
Mondoo logo
MondooVerified
Cybersecurity
Mondoo is a security and compliance platform that continuously assesses infrastructure, workloads, and SaaS application...
View Profile
E
ESOP PartnersVerified
Security Compliance
ESOP administration and consulting software.
View Profile
Snyk logo
SnykVerified
Cybersecurity
Snyk is a developer security platform that helps teams find and fix vulnerabilities in code, open-source dependencies,...
View Profile
TruffleHog logo
TruffleHogVerified
Cybersecurity
TruffleHog by Truffle Security scans code repositories, file systems, and other data sources for accidentally committed...
View Profile
FusionAuth logo
FusionAuthVerified
Entity Management
FusionAuth is a customer identity and access management platform providing authentication, authorization, and user mana...
View Profile
Tailscale logo
TailscaleVerified
Floral Wire Service Software
Tailscale is a zero-configuration VPN built on WireGuard that creates a secure mesh network between devices and servers...
View Profile
HashiCorp Boundary logo
HashiCorp BoundaryVerified
Entity Management
HashiCorp Boundary provides identity-based access management for dynamic infrastructure, enabling secure remote access...
View Profile
SentinelOne logo
SentinelOneVerified
Cyber Range Platforms
SentinelOne provides AI-powered endpoint protection, detection, and response (EDR/XDR) for enterprises. Its Singularity...
View Profile
Explore deeper. Search and filter across all products in the discovery workbench.Open Workbench