Xitoring
xitoring.com
Xitoring is an all-in-one monitoring solution for your IT infrastructure to keep it fast, and simple! Key Features: - Uptime monitoring (Ping, HTTP, API, DNS, FTP, Mail, Heartbeat, Cronjob, TCP, UDP) - 1 minute interval - Linux Server Monitoring - Windows Server Monitoring - SSL monitoring - Monitor your server software (Web servers, databases, Docker, etc.) - Public and Private Status page - Over 20 notification channels included (Email, WhatsApp, SMS, Telegram, Pagerduty, and more!) - Over 15 global probing nodes - iOS and Android app Alerts and Notifications via: - Email - SMS - Mobile Push Notification - Phone Call - Telegram - WhatsApp - Slack - Microsoft Teams - Mattermost - Discord - Google Chat - Atlassian OpsGenie - Ntfy - Gotify - Spike.sh - Splunk on-call - PushOver - Pushbullet - PagerDuty - Webhooks - Zapier OS Support and Integrations: - Windows Server 2012 and earlier - Major Linux distros (Ubuntu +14, CentOS +6) Integrations: - Basic Server metrics (CPU, Memory, Disk usage & IO, Network, etc) - Services and Processes - Apache - Nginx - PHP - MySql - MongoDB - HAProxy - Redis - KeyDB - MariaDB - Docker host and containers - Supervisor - IIS - Varnish - RabbitMQ - CouchDB - Kafka - and more! Register and start monitoring at no cost for 2 servers and 8 uptime checks forever.
Ubiq
ubiqsecurity.com
The Ubiq platform is an API-based developer platform that enables developers to quickly build customer-side data encryption (your data stays with you) into any application, across multiple programming languages, without requiring prior encryption knowledge or expertise. And as new cryptography and encryption innovations emerge, we adopt them into our platform, so you don't have to. CLIENT LIBRARIES We offer fully interoperable client libraries for all major programming languages, enabling interaction with our API layer. API LAYER Our extensible API layer interfaces with our client libraries and enables interaction with our SaaS-based encryption platform. ENCRYPTION PLATFORM We eliminate the guesswork, jargon, and complexity of cryptography and encryption, through an elegant and simple developer dashboard, powered by scalable cloud-based infrastructure that provides key management and tamper-proof, FIPS 140-2 Level 3-compliant hardware security modules (HSM) for secure key storage.
Heimdal
heimdalsecurity.com
Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.
Infisical
infisical.com
Infisical is an open secret management platform that helps companies manage secrets across their engineers and infrastructure. In addition, Infisical provides automatic secret scanning capabilities and secret leak prevention.
Formal
joinformal.com
Formal is building a unified, developer-friendly data and infrastructure security access platform. We have built a protocol-aware reverse proxy supporting various datastores like Postgres, AWS S3, Snowflake to help enterprises solve a range of problems from data security and compliance, to data quality management and infrastructure access.
Backbone
backboneiq.com
Backbone is the world's first supply mesh software providing supply chain solutions for an interconnected world.
Hypervault
hypervault.com
Say goodbye to your traditional password manager. Store all your companies' sensitive data in our digital vault. Collaborate securely, with your team or your customers. Create your own data categories to store your data. Separate data over different workspaces.
Corbado
corbado.com
Corbado provides the most secure and convenient passwordless authentication with passkeys to onboard, authenticate and engage users. We take care of your cross-platform and cross-device aspects. You boost conversion rates and improve the user experience.
Trustle
trustle.com
Trustle helps front-line teams get their permissioning under control, so they can get back to the jobs they’re hired to do. Trustle makes it easy for developers and ops teams to go in and and out of access to cloud systems like AWS, which cuts out hassles, time, and headaches, while making the whole cloud environment safer and more secure.
Vaultody
vaultody.com
VAULTODY is a custody technology platform that provides a secure MPC wallet infrastructure for seamless and flexible crypto assets management. The platform combines industry-leading protection technologies and intuitive user dashboard for operating with digital assets, sending and receiving transactions, generating hot and warm wallets and more.
Cyqur
cyqur.com
Cyqur is a revolutionary security solution developed by Binarii Labs that provides secure encryption, fragmentation, and distribution of sensitive data, such as passwords and cryptocurrency seed phrases. The key differentiator of Cyqur is that it doesn't store your data, unlike other password management services. This allows Cyqur to offer such a competitive price while providing unprecedented security through encryption, fragmentation, and distributed storage.
Opal Security
opal.dev
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
Adaptive
adaptive.live
Adaptive is a data security platform that allows organizations to manage and govern access to data sources, monitor database activity, classify and protect sensitive data. * Share Access, not Credentials Share privileged access to all data sources without sharing the actual credentials. Improve the security posture of your organization. * Non-Human Data Access Connect third-party tools or ETL pipelines through a central interface without exposing your datasource credentials. * Data Masking and Tokenization Mask and tokenize all sensitive data for non-privileged users without changing any access workflows, minimizing data exposure in case of a leak. * Comprehensive Auditability Enable identity-based audit trails across all resources. Monitor all commands, queries, and access attempts in real-time for compliance and forensics. * Data Classification Discover sensitive data automatically and classify them under different default and customizable labels. * Anomaly Detection Identify and alert unauthorized or malicious data activities on structured data sources using predefined policies. * Terraform Provider Use Terraform to provision and manage access and authorizations * Authorization Privileges Efficiently manage authorization with dynamic role-based access control * Automated Data Classification Identify sensitive data and apply appropriate protection measures * Request-Approval Workflows Request and approve resource access seamlessly via Slack, Teams, or email * SSO and Directory Sync Sync users directly from all SSO providers like Google, Okta, etc. * Compliance-enabled Policies Enable policies to stay compliant with standards like GDPR, HIPAA, etc. Adaptive’s integrated approach to data access and protection addresses blind spots in data security, making it well-suited for modern organizations where data is continually moving. Thanks to Adaptive’s agentless architecture, end users enjoy faster, auditable access and data protection across the infrastructure without altering existing workflows and tools.
Varonis
varonis.com
Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property. The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation. Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, energy and utilities, technology, consumer and retail, media and entertainment, and education sectors.
Lumos
lumos.com
You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos is the first app governance platform that automates access requests, enforces least privilege, speeds up user access reviews, and eliminates extra SaaS app spending. Gone are the technology silos that left IT, Security, Compliance, and Finance in the dark. With Lumos, you have visibility into app usage, entitlements, and spending - and the power to take action on that data. The impact? Disappearing IT support costs, Just-in-Time Access (JIT) with no audit spreadsheets and VLookups. All this equals guaranteed software savings.
1Fort
1fort.com
1Fort streamlines the process of placing cyber insurance for middle-market businesses, saving insurance brokers and their clients time and money. Brokers use 1Fort to quote more markets in less time by helping their clients get insurable in days, not weeks. Businesses use 1Fort to automate up to 90% of the work to meet security requirements, enabling them to unlock better-priced policies and more comprehensive coverage.
DoxyChain
doxychain.com
Doxychain Certificates is a SaaS solution for certification, accreditation and credentialing life cycle management. From issuing to revoking with API bulk automations, custom online verifier, white labeling and template customization. With blockchain technology to make the certificates secure and decentralized. Learn more on www.doxychain.com
Venafi
venafi.com
Venafi solutions find, protect and secure machine identities for our hyper-connected world.
Keystash
keystash.io
Keystash is a full Identity Access Management and SSH Key Management in one integrated platform. - Full Linux user account and group management - SSH Key deployment and management - SSH server policy management - SSH server two factor authentication enforcement, user privilege management, full audit log history and so much more. Keystash is geared for businesses who are scaling with it's disruptive pricing model and generous bundles of included user accounts.
TrackSSL
trackssl.com
An app that regularly scans your SSL certificates to check for any errors such as a past-due expiry date and common misconfigurations. Trusted by nearly 2,000 users to track close to 20,000 certificates.
CloudEagle.ai
cloudeagle.ai
CloudEagle.ai helps IT, finance and procurement teams at Ringcentral, Shiji, Recroom save 10-30% on their software spend and hundreds of hours managing and renewing their SaaS apps. It provides 100% visibility into all applications, spend and vendors. With no code slack-enabled workflows customers automate procurement, renewals, employee onboarding/offboarding, and license harvesting. With detailed usage and benchmarking data, customers negotiate better with vendors & optimize tech stack.
Foxpass
foxpass.com
Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need. Our cloud-hosted LDAP and RADIUS systems help you bring best-practices to your infrastructure. And they're backed by your existing Google Apps accounts.
Equinix Deploy
deploy.equinix.com
Deploy in minutes, not months. Improve application performance and supercharge your network with automated, as-a-service infrastructure at Equinix. Deploy globally and then connect privately to thousands of destinations.
© 2025 WebCatalog, Inc.