GitLab
gitlab.com
GitLab is a web-based DevOps lifecycle tool that provides a Git-repository manager providing wiki, issue-tracking and continuous integration and deployment pipeline features, using an open-source license, developed by GitLab Inc. The software was created by Ukrainian developers Dmitriy Zaporozhets and Valery Sizov.The code was originally written in Ruby, with some parts later rewritten in Go, initially as a source code management solution to collaborate within a team on software development. It later evolved to an integrated solution covering the software development life cycle, and then to the whole DevOps life cycle. The current technology stack includes Go, Ruby on Rails and Vue.js. It follows an open-core development model where the core functionality is released under an open-source (MIT) license while the additional functionality is under a proprietary license.
Wiz
wiz.io
Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empowering development teams to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) drives visibility, risk prioritization, and business agility and is #1 based on customer reviews. Wiz's CNAPP consolidates and correlates risks across multiple cloud security solutions in a truly integrated platform, including CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, Container security, AI SPM, Code security, and CDR into a single platform. Hundreds of organizations worldwide, including 40 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman & Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.
Duo Admin
duosecurity.com
Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identity protection and endpoint visibility. Duo verifies users' identities with strong passwordless authentication and industry-leading Multi-Factor Authentication (MFA). Paired with deep insights into your users’ devices, Duo gives you the policies and control to limit access based on endpoint or user risk.
HackerOne
hackerone.com
HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with penetration testers and cybersecurity researchers. It was one of the first companies, along with Synack and Bugcrowd, to embrace and utilize crowd-sourced security and cybersecurity researchers as linchpins of its business model; it is the largest cybersecurity firm of its kind. As of May 2020, HackerOne's network had paid $100 million in bounties.
Alibaba Cloud
alibabacloud.com
Alibaba Cloud is one of the world's largest cloud computing companies, providing scalable, secure, and reliable cloud computing services globally to accelerate digitalization empowered by comprehensive cloud products and solutions.
Sprinto
sprinto.com
#1 Rated security compliance automation platform Move fast without breaking things Ambitious cloud companies all over the world trust Sprinto to power their security compliance programs and sprint through security audits without breaking their stride. Integration-first Automation-enabled Audit-aligned Over 1 Million compliance checks evaluated every month Security compliances don’t have to be hard The broad nature...
Atera
atera.com
Atera’s AI-powered IT management platform enables enterprise IT teams and Managed Service Providers (MSPs) to achieve operational excellence across their organization, at any scale. Manage your entire IT operations—from remote monitoring and management (RMM), helpdesk, and ticketing to patching and automation—in a single intuitive dashboard. Streamline your operations, get real-time oversight of your IT, and boost everyday productivity across your organization. Customize your IT environment end-to-end with dozens of curated best-in-class solutions for security, backup and recovery, network monitoring, and more. Discover how AI can help you create unparalleled IT efficiency. Try Atera for free for 30 days or book a demo at: www.atera.com
GoTo
goto.com
An industry leader in online video conferencing for companies around the world, GoTo Meeting now comes as part of GoTo Connect, the all-in-one communications software built for SMBs. The Meeting solution, available to buy standalone, is trusted by millions of people every day for real time virtual communication and collaboration. Get a fast, easy and reliable professional online meeting solution that enables customers to meet face to face, connect with colleagues through in-meeting chat or conference calling, and screenshare their presentations, all with the click of a button. Nothing can match the momentum of your team or business when it’s fueled by an award-winning collaboration solution, the Meeting solution from GoTo Connect pairs productivity with flexibility to let employees work effectively anytime, anywhere on any device.
Tresorit
tresorit.com
Tresorit is an end-to-end encrypted, zero-knowledge content collaboration platform that enables security-conscious companies to manage, sync, sign, and share their files safely. Unlike other public cloud vendors, Tresorit has no access to users’ files, which ensures maximum confidentiality. - Uncompromised security: Your files are protected from the moment you upload them to the cloud until they reach the intended recipient. It is technically impossible for anyone else to gain unauthorized access to your files. - Seamless and secure teamwork: Whether it’s personal data for HR documents, legal contracts, financial plans, or top-secret R&D prototypes – Tresorit provides a digital workspace where your highly sensitive documents remain safe. - Powerful control and monitoring options: Manage and oversee all users and their information and activities. Tresorit offers powerful control features so you can be sure that the right employees access the right files. -Tresorit is the ideal complementary solution for any business operating in a highly regulated industry where compliance with strict standards is a must. Tresorit can be deployed alongside Microsoft's solutions to support GDPR, CCPA, HIPAA, TISAX, FINRA, or ITAR compliance. Our client-side end-to-end encryption technology guarantees that your most sensitive documents always remain protected.
Acronis
acronis.com
Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the entire environment. Key features of Acronis Cyber Protect include: · Cyberthreat protection: Using artificial intelligence (AI) and machine learning (ML), proactively secures data, applications and systems, from advanced cyberattacks, including ransomware and other forms of malware. · Rapid Recovery: Reduced dependency on central IT support empowers users to initiate one-click recovery of distributed endpoints, including bare-metal recovery of physical workloads. · Reduced TCO: Broad, multigenerational OS support, enables vendor consolidation while ensuring comprehensive protection. · Simplified management: Centralized management includes local autonomy and seamless integration with existing third-party tools to provide a unified view of backup and recovery operations along with broad, multigenerational OS support. · Data sovereignty: With the use of Acronis’ extensive network of global data centers, users can ensure compliance and master regional data sovereignty laws, offering peace of mind and regulatory compliance.
Cisco
cisco.com
Cisco Spaces is a cloud platform that connects people & things with spaces to transform buildings into smart spaces. Using the power of Cisco devices as sensors (Catalyst, Meraki, Webex) and the Spaces ecosystem, the platform aims to make buildings safe, smart, sustainable, and seamless. Cisco Spaces harnesses the power of Cisco hardware and sensors (Catalyst, Meraki, Webex) making buildings safe, smart and sustainable with seamless people experiences.
StackPath
stackpath.com
StackPath is an American edge computing platform provider headquartered in Dallas, Texas. Its founding team was led by Lance Crosby, who also co-founded SoftLayer Technologies, acquired by IBM in 2013.
Red Hat
redhat.com
Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, hybrid cloud, edge, and Kubernetes technologies.
Synack
synack.com
The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategic penetration testing that provides full control and visibility, reveals patterns and deficiencies in your security program, enables organizations to improve overall security posture and provides executive-level reporting for the leadership and the board of directors. Synack’s Smart Security Testing Platform includes automation and augmented intelligence enhancements for greater attack surface coverage, continuous testing, and higher efficiency, delivering more insights into the challenges you face. The platform seamlessly orchestrates the optimal combination of human testing talent and smart scanning on a 24/7/365 basis—all under your control. As always, Synack not only deploys the elite Synack Red Team (SRT) to test your asset, but now simultaneously deploys SmartScan or integration with your company's scanner application tool. Synack’s SmartScan Product harnesses Hydra, our Platform’s proprietary scanner, to continuously discover suspected vulnerabilities for the SRT who then triage for only best-in-class results. On top of this, we provide an additional level of testing rigor through crowd-led penetration tests where the SRT researchers proactively hunt for vulnerabilities and complete compliance checklists. Using their own tools and techniques, they provide unparalleled human creativity and rigor. While leveraging the Synack platform to perform high-level, automated assessments of all apps and incentivizing the Synack Red Team to continuously and creatively stay engaged, Synack offers a unique coupling of our human intelligence and artificial intelligence, resulting in the most effective, efficient crowdsourced penetration test on the market. Also, now available on FedRAMP and the Azure Marketplace: Synack Platform delivers Penetration Testing as a Service (PTaaS)
Splunk
splunk.com
Splunk Inc. is an American technology company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a Web-style interface.The Splunk Enterprise and Enterprise Cloud solutions capture, index and correlate real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.Splunk makes machine data accessible across an organization by identifying data patterns, providing metrics, diagnosing problems and providing intelligence for business operations. Splunk is a horizontal technology used for application management, security and compliance, as well as business and web analytics. Recently, Splunk has also begun developing machine learning and data solutions for BizOps.
Vanta
vanta.com
Thousands of fast-growing companies trust Vanta to help build, scale, manage and demonstrate their security and compliance programs and get ready for audits in weeks, not months. By offering the most in-demand security and privacy frameworks such as SOC 2, ISO 27001, HIPAA, and many more, Vanta helps companies obtain the reports they need to accelerate growth, build efficient compliance processes, mitigate risks to their business, and build trust with external stakeholders. Simply connect your existing tools to Vanta, follow the prescribed guidance to fix gaps, and then work with a Vanta-vetted auditor to complete audit.
Fastly
fastly.com
Fastly is an American cloud computing services provider. It describes its network as an edge cloud platform, which is designed to help developers extend their core cloud infrastructure to the edge of the network, closer to users. The Fastly edge cloud platform includes their content delivery network (CDN), image optimization, video and streaming, cloud security, and load balancing services. Fastly's cloud security services include denial-of-service attack protection, bot mitigation, and a web application firewall. Fastly web application firewall uses the Open Web Application Security Project ModSecurity Core Rule Set alongside its own ruleset. The Fastly platform is built on top of Varnish.
Sumo Logic
sumologic.com
Sumo Logic, Inc. is a cloud-based machine data analytics company focusing on security, operations and BI usecases. It provides log management and analytics services that leverage machine-generated big data to deliver real-time IT insights. Headquartered in Redwood City, California, Sumo Logic was founded in April 2010 by ArcSight veterans Kumar Saurabh and Christian Beedgen, and has received funding from Accel Partners, DFJ Growth, Greylock Partners, Institutional Venture Partners, Sequoia Capital, Sapphire Ventures, Sutter Hill Ventures, angel investor Shlomo Kramer, Battery Ventures, Tiger Global Management and Franklin Templeton. As of May 2019, the company has collected VC funding totaling $345 million.On September 17, 2020 Sumo Logic debuted on the NASDAQ stock exchange in its initial public offering as a public company.
Sophos Central
sophos.com
Defend your organization from cyberattacks with Sophos adaptive defenses and expertise at your service. Protect the future of your business with confidence.
Red Hat Hybrid Cloud Console
cloud.redhat.com
Red Hat® Cloud Services help teams focus on the work that’s most important to them—quick development, deployment, and evolution of applications—while trusted experts manage the infrastructure. Access cloud offerings in the Red Hat Hybrid Cloud Console—your key to modernizing your business, reducing costs, and building with more freedom.
Snyk
snyk.io
Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer security solutions enable modern applications to be built securely, empowering developers to own and build security for the whole application, from code & open source to containers & cloud infrastructure. Secure while you code in your IDE: find issues quickly using the scanner, fix issues easily with remediation advice, verify the updated code. Integrate your source code repositories to secure applications: integrate a repository to find issues, prioritize with context, fix & merge. Secure your containers as you build, throughout the SDLC: start fixing containers as soon as your write a Dockerfile, continuously monitor container images throughout their lifecycle, and prioritize with context. Secure build and deployment pipelines: Integrate natively with your CI/CD tool, configure your rules, find & fix issues in your application, and monitor your applications. Secure your apps quickly with Snyk’s vulnerability scanning and automated fixes - Try for Free!
ExtraHop
extrahop.com
ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance management uniquely delivers the instant visibility and unparalleled decryption capabilities organizations need to expose the cyber risks and performance issues that other tools can’t see. When organizations have full network transparency with ExtraHop, they can investigate smarter, stop threats faster, and keep operations running. RevealX deploys on premises or in the cloud. It addresses the following use cases: - Ransomware - Zero trust - Software supply chain attacks - Lateral movement and C2 communication - Security hygiene - Network and Application Performance Management - IDS - Forensics and more A few of our differentiators: Continuous and on-demand PCAP: Full packet processing is superior to NetFlow and yields higher quality detections. Strategic decryption across a variety of protocols, including SSL/TLS, MS-RPC, WinRM, and SMBv3, gives you better visibility into early-stage threats hiding in encrypted traffic as they attempt to move laterally across your network. Protocol coverage: RevealX decodes more than 70 network protocols. Cloud-scale machine learning: Rather than relying on limited
Sucuri
sucuri.net
Sucuri is a company started by Daniel B. Cid (founder of the OSSEC project) in 2010. We Clean and Protect Websites. Gain peace of mind by securing all your websites. We fix hacks and prevent future attacks. A cloud-based platform for every site.
Proofpoint
proofpoint.com
Proofpoint, Inc. is an American enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving.
Drata
drata.com
A top-ranking compliance automation platform. Drata can help you get started, scale GRC, and enhance your security and compliance program. Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company’s security controls, while streamlining workflows to ensure audit-readiness.
Mlytics
mlytics.com
We envision a more reliable, faster, and safer internet world with options and transparency. Mlytics leverages an intelligent Multi CDN solution to help boosting your website performance globally and prevent downtime. We developed a unique experience delivery platform that provides a single view to monitor, compare, access, acquire and manage multiple CDNs with just a few clicks. Users enjoy the best possible digital content experience as our fully automated, intelligent load balancing solution consistently steers traffic to the best-performing CDN.
Pentest Tools
pentest-tools.com
Pentest-Tools.com is a cloud-based toolkit for offensive security testing, focused on web applications and network penetration testing.
Harness
harness.io
Harness Continuous Delivery is a software delivery solution that automatically deploy, verify, and roll back artifacts without toil. Harness uses AI/ML to manage, verify, and roll back your deployments so you don't have to suffer through software deployments. Deliver software faster, with visibility and control Eliminate scripting and manual deployments with Argo CD-as-a-Service and powerful, easy-to-use pipelines. Empower your teams to deliver new features, faster – with AI/ML for automated canary and blue/green deployments, advanced verification, and intelligent rollback. Check all the boxes with enterprise-grade security, governance, and granular control powered by the Open Policy Agent. Now, you can easily leverage automated canary and blue-green deployments for faster, safer, and more efficient rollouts. We take care of the setup so you can enjoy the benefits. Additionally, you have the option to automatically rollback to a previous version when bad deployments are detected by applying machine learning to data and logs from observability solutions. No more staring at the console for hours.
Semgrep
semgrep.dev
Semgrep is a highly customizable application security platform built for security engineers and developers. Semgrep scans first and third-party code to find security issues unique to an organization, with an emphasis on surfacing actionable, low-noise, and developer friendly results at lightning speed. Semgrep's focus on confidence rating and reachability means that security teams can feel comfortable engaging developers directly in their workflows (e.g surfacing findings in PR comments), and Semgrep integrates seamlessly with CI and SCM tooling to automate these policies. With Semgrep, security teams can shift left and scale their programs with zero impact on developer velocity. With 3400+ out-of-the-box rules and the ability to easily create custom rules, Semgrep accelerates the time it takes to implement and scale a best-in-class AppSec program - all while adding value from Day 1.
Very Good Security
verygoodsecurity.com
Very Good Security (VGS) lets it operate on sensitive data without the cost or liability of securing the data. VGS also helps it achieve PCI, SOC2, and other compliance certifications. VGS is a sensitive data custodian that provides turnkey security with no changes to existing products or systems. It accelerates time to market and simplifies the use of sensitive data while eliminating the risk of breaches. After all, hackers cannot steal what isn't there. VGS is the world's leader in payment tokenization. It is trusted by Fortune 500 organizations, including merchants, fintechs, and banks, to store and enrich sensitive payment data across cards, bank accounts, and digital wallets. With over 4 billion tokens managed globally, VGS offers a solutions suite with a composable card management platform, PCI-compliant vault, and network value-added services like network tokens, account updater, and card attributes. Its solutions boost revenue with higher authorization rates, fraud reduction, and operational efficiencies while seamlessly integrating with existing tech stacks. It stores 70% of all US cards and solves critical payment acceptance challenges, including multi-PSP management, orchestration enablement, PCI compliance, and PII protection. VGS empowers clients with ownership, control, and insights into payment data, elevating growth and user experiences across industries.
© 2025 WebCatalog, Inc.