Page 2 - Top Resolver Alternatives

BugBase

BugBase

bugbase.ai

BugBase is a Continuous Vulnerability Assessment Platform that conducts comprehensive security operations such as bug bounty programs and next-gen pentesting (VAPT) to assist startups and enterprises in effectively identifying, managing and mitigating vulnerabilities.

Hive

Hive

thehive.ai

Hive is the leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations. The company empowers developers with a portfolio of best-in-class, pre-trained AI models, serving billions of customer API requests every month. Hive also offers turnkey software powered by proprietary AI models and datasets, unlocking breakthrough applications for critical business needs with deep learning and generative AI. Collectively, Hive's technology is transforming approaches to platform integrity / content moderation (including AI-generated content detection), brand protection, sponsorship measurement, context-based ad targeting, and more. Hive has raised over $120M from leading investors, including General Catalyst, 8VC, Tomales Bay Capital, and Glynn Capital. In April 2021, Hive announced a $50M Series D at a $2B valuation. The San Francisco-based company has 200+ full-time employees globally, in addition to a distributed workforce of more than 5 million global contributors that supports data labeling operations.

Aqua Security

Aqua Security

aquasec.com

Aqua Security stops cloud native attacks across the application lifecycle and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. As the pioneer in cloud native security, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry's most integrated Cloud Native Application Protection Platform (CNAPP), protecting the application lifecycle from code to cloud and back. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries.

Coram AI

Coram AI

coram.ai

Coram AI is a modern video security solution that helps you create a safer and more efficient workplace. Coram makes every step of using a video security camera lightning-fast. The app allows instant access to all your security cameras.

WorkWave

WorkWave

workwave.com

WorkWave delivers innovative software and fintech solutions to the millions of hardworking service professionals that keep the world safe, clean and beautiful. Partnering with over 8,000 customers worldwide, the leading lawn care, pest control, commercial cleaning and security guarding companies rely on its end-to-end SaaS solutions to run and grow their businesses - everything from customer acquisition to mobile communications to billing and invoicing, and beyond. Backed by decades of experience, passionate teams, and strong commitment to its customers, WorkWave’s vision is to empower the world’s mobile service workers to build a brighter future.

Dataminr

Dataminr

dataminr.com

Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Dataminr's leading AI platform detects the earliest signals of high-impact events and emerging risks from vast amounts of publicly available information. Dataminr's real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.

Very Good Security

Very Good Security

verygoodsecurity.com

Very Good Security (VGS) lets it operate on sensitive data without the cost or liability of securing the data. VGS also helps it achieve PCI, SOC2, and other compliance certifications. VGS is a sensitive data custodian that provides turnkey security with no changes to existing products or systems. It accelerates time to market and simplifies the use of sensitive data while eliminating the risk of breaches. After all, hackers cannot steal what isn't there. VGS is the world's leader in payment tokenization. It is trusted by Fortune 500 organizations, including merchants, fintechs, and banks, to store and enrich sensitive payment data across cards, bank accounts, and digital wallets. With over 4 billion tokens managed globally, VGS offers a solutions suite with a composable card management platform, PCI-compliant vault, and network value-added services like network tokens, account updater, and card attributes. Its solutions boost revenue with higher authorization rates, fraud reduction, and operational efficiencies while seamlessly integrating with existing tech stacks. It stores 70% of all US cards and solves critical payment acceptance challenges, including multi-PSP management, orchestration enablement, PCI compliance, and PII protection. VGS empowers clients with ownership, control, and insights into payment data, elevating growth and user experiences across industries.

Flashpoint

Flashpoint

flashpoint.io

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ignite, security experts can connect the dots across data and intelligence to coordinate a better-informed, more effective response– with a holistic view of risk in one place. Achieve More with One Platform Easily obtain the information you need and seamlessly work across multiple teams to move information forward and remediate risk faster. Dependable Intelligence For Everyone With visibility into the deep and dark web, OSINT/surface web, vulnerabilities, breach data, or geospatial intelligence, our finished intelligence reports and raw collections are right at your fingertips so you can spend your time on what matters most. Close the Gap Between Data, Intelligence, and Action Quickly assess your data and intelligence outcomes across all products, streamline workflows, adapt and take decisive action to stay ahead of the changing threat landscape.

Inspectiv

Inspectiv

inspectiv.com

Inspectiv's Pentesting and fully-managed Bug Bounty as a Service helps security teams discover impactful vulnerabilities before they're exploited without the complexity, cost, and hassle of traditional bug bounty and manual testing. The Inspectiv platform allows you to review prioritized vulnerability findings, filter out the noise, get the signal that matters to you, and seamlessly orchestrate your actions. Learn more at inspectiv.com.

Spot AI

Spot AI

spot.ai

Spot AI brings Video AI to the physical world, helping organizations see, understand, and improve their workspaces. Built on 1B+ hours of video data and trusted by 1,000+ leading businesses, we deliver measurable ROI in safety, operations, and security across manufacturing floors, retail stores, schools, hospitals, and beyond. Our mission: Turn every camera into a source of business value—helping organizations build safer, smarter, and more efficient spaces.

Ambient.ai

Ambient.ai

ambient.ai

Ambient.ai is a computer vision intelligence company transforming enterprise security operations to prevent security incidents before they happen. The Ambient.ai platform applies AI and computer vision intelligence to existing sensor and camera infrastructure to deliver continuous physical security monitoring and automate the immediate dispatch of human resources. Ambient.ai is the first platform that goes beyond basic motion detection and image recognition to achieve near-human perception with automated situational context. With physical security incidents on the rise and physical security organizations left under-resourced, Ambient.ai’s computer intelligence platform comes at a time of critical need, which is why the company has raised over $50 million from venture capital investors led by a16z. Today, large enterprises, schools and organizations – including many of the largest US tech companies and other Fortune 500 companies – use Ambient.ai to secure property, people, and assets from the most harrowing physical security threats. The company was founded in 2017 by experts in artificial intelligence from Stanford who previously built iconic products at Apple, Google, Microsoft and Dropbox. We are backed by Andreessen Horowitz (a16z), SV Angel, Y Combinator, and visionary angels like Jyoti Bansal, Mark Leslie and Elad Gil.

Lasso Moderation

Lasso Moderation

lassomoderation.com

Protect your brand and safeguard your user experience with Lasso's AI-powered content moderation platform built for Trust & Safety teams. Lasso provides AI content moderation tooling out of the box. Efficiently moderate your content with the help of AI, custom moderation rules and an easy-to-use dashboard. We provide solutions for chat, comment, communities, reviews and other user-generated content. Easily integrate within hours, not weeks.

Shield

Shield

shieldcyber.io

Shield is a continuous exposure management platform built by penetration testers and developed for security service providers. In a simple, 3-step deployment, Shield instantly shows you how an attacker could breach and take over your specific network. And tells you exactly what you need to do to remove those exposures. Shield is different from existing vulnerability management solutions in that it correlates your external attack surface, internal networks, and identity services to deliver hyper-efficient remediation guidance based on the severity and impact to a specific network. This enables security service providers to stop wasting time on fixes that don't matter, and remove the highest impact risks first. In other words, Shield distinguishes the critical few risks from the trivial many. What more could you accomplish if you could direct 2% of your efforts to reduce 98% of risk?

Derive

Derive

deriverisk.com

For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigate risk, Derive is a a SaaS subscription-based platform that quantifies the potential financial impact of cyber threats using proprietary data on cyber loss magnitudes, frequencies, control costs, and control effectiveness delivering a high resolution characterization of what risks they face and how they could address them. Unlike competitors Derive translates abstract cybersecurity concerns into concrete, actionable insights with financial clarity.

Hackuity

Hackuity

hackuity.io

Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enriches them so security practitioners can, at last, create risk-driven remediation plans and align their priorities with their current and future exposure to threats. Fully customizable, the platform fits the client technical context and security requirements either in a full-Saas mode, On-premise or Hybrid installation mode. Hackuity proposes the right offer regarding the company's experience in vulnerability management and field of activity : - Risk-based vulnerability management - Continuous Monitoring - Augmented pentest - Hackuity for MSSP The company was founded in 2018 and is based in Lyon, France.

Hadrian

Hadrian

hadrian.io

Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive data sources, active scanning techniques, and machine learning models, Hadrian identifies digital assets and complex attack paths that security teams are unaware of. It incorporates how misconfigurations, exposed secrets, permissions, and vulnerabilities impact an organization’s security posture. Context-aware testing uses only relevant modules and secrets in attack paths. This combination of context and risk discovery allows Hadrian to prioritize the same targets attackers will exploit. All of this is presented in an online dashboard to help security teams focus on what matters and make their attack surface more secure.

ActiveFence

ActiveFence

activefence.com

ActiveFence is a Trust and Safety provider for online platforms, protecting platforms and their users from malicious behavior and content. Trust and Safety teams of all sizes rely on ActiveFence to keep their users safe from the widest spectrum of online harms, unwanted content, and malicious behavior, including child safety and exploitation, disinformation, hate speech, terror, nudity, fraud, and more. We offer a full stack of capabilities with our deep intelligence research, AI-driven harmful content detection, and online content moderation platform. Protecting over three billion users globally everyday in over 100 languages, ActiveFence lets people interact and thrive online.

Forescout

Forescout

forescout.com

Forescout is a leading cybersecurity platform focused on managing cyber risk and mitigating threats across various environments. Key Features: * Risk and Exposure Management: Identify and prioritize cybersecurity risks, ensuring organizations can effectively mitigate potential threats. * Network Security: Implement proactive and reactive controls to assess and segment networks, enhancing overall security posture. * Threat Detection and Response: Detect, investigate, and respond to genuine threats and incidents in real-time. * Operational Technology Security: Reduce risks in operational technology (OT) and industrial control systems (ICS), ensuring safety and security in critical infrastructures.

Recorded Future

Recorded Future

recordedfuture.com

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,800 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.

Bleach Cyber

Bleach Cyber

bleachcyber.com

Bleach Cyber, an advanced cybersecurity platform tailored for SMBs and Startups and their service providers , that not only enhances operational cybersecurity but also fosters trust with customers and helps CISOs fortify their enterprise supply chains. Specifically designed to secure a business without buying expensive enterprise grade tools, Bleach ensures a swift, user-friendly, and cost-effective approach to bolstering security and compliance for SMBs. The platform integrates with their existing tech stack, offering proactive recommendations or "security opportunities" to mitigate risks and align with compliance standards. With a comprehensive array of security applications, Bleach empowers businesses to address and rectify identified opportunities, then makes it easy for them to establish a foundation of trust with their customers by sharing this with CISOs, Procurement and Compliance departments. No more need for expensive, drawn out and inaccurate SOC2 audits. Allowing faster deal closures for innovative small businesses and enabling CISOs and enterprise organisations to work securely with the latest in cutting edge software and technology.

Avigilon

Avigilon

avigilon.com

Avigilon was acquired by Motorola Solutions in 2018 and is now part of its ecosystem of safety and security technologies. Avigilon's security suite provides a comprehensive portfolio of end-to-end video security products and services that is part of Motorola Solutions’ technology ecosystem. It provides flexible, modular layers of security, through fixed video, advanced analytics and smart access control systems with deployment options for both cloud and on-premise security. About Motorola Solutions: Motorola Solutions is solving for safer. We build and connect technologies to help protect people, property and places. Our solutions enable the collaboration between public safety agencies and enterprises that’s critical for a proactive approach to safety and security.

Craft

Craft

craft.co

Craft is a machine-learning powered data and analytics platform building the "Source of Truth" on companies, and mapping the global economy. We organize data from thousands of sources to provide comprehensive, up-to-date sector and company profiles, ranging from early-stage to the largest companies in the world.

Hummingbird

Hummingbird

hummingbird.co

Hummingbird is a compliance and risk platform helping financial institutions streamline financial crime investigations and program operations. The platform acts as a single source of truth, bringing together customer data, case management, investigations, and regulatory reporting into a single solution. Cases in Hummingbird can be worked from any starting point (everything from transaction monitoring and fraud alerts to flagged KYC and KYB checks). Hummingbird provides an extensive suite of investigative tooling, including data visualizations, detailed customer profiles, integrated requests for information (RFIs), and more. Compliance teams also benefit from improved oversight and controls with customizable workflows, detailed analytics, and comprehensive audit trails. In addition to driving greater efficiency for compliance teams, Hummingbird also distinguishes itself by offering a uniquely flexible and scalable solution. Whether it’s switching transaction monitoring providers, integrating additional third-party data, or filing regulatory reports in new jurisdictions, you can easily create a perfectly tailored solution with Hummingbird.

Workscope

Workscope

workscope.com

Workscope believe that knowledge encoded on the desktop carries value and risk which organisations must understand the significance of. Workscope provides an automated platform that enables organisations to map, monitor and improve the spreadsheet and end-user computing environment. Powered by edge-computing, Workscope provides a real-time contextual view of the entire spreadsheet environment, which enables you to understand how these assets are supporting critical business processes and key decision making. Whether you need to demonstrate operational resilience to the regulators, or you need to understand the time, cost & materiality associated with manual spreadsheet processes - Workscope can answer these questions without any manual intervention or change to existing business processes.

Riskify

Riskify

riskify.net

Access detailed non-financial risk reports to identify, monitor, and understand capital markets, operational, reputational, cybersecurity, employees, compliance, and ESG risks. in any company. Empower your decision-making with Riskify reliable data.

Panorays

Panorays

panorays.com

Panorays is a leading provider of third-party cyber risk management solutions, helping businesses optimize their defenses for each unique third-party relationship. Trusted by the most complex supply chains in the world, Panorays provides businesses the tools to stay ahead of any emerging third-party threats and provides actionable remediations.

Tenacy

Tenacy

tenacy.io

Tenacy is the SaaS platform that simplifies cybersecurity management for all IT security teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. As a result, you can continuously measure your level of security, effectively monitor your operations, and unite all stakeholders around your cyber vision.

Bitahoy

Bitahoy

bitahoy.com

Augment your daily IT risk management processes with an AI-powered IT risk analyst that helps you prioritize, investigate and report risk-scenarios.

PlexTrac

PlexTrac

plextrac.com

We designed the PlexTrac solution to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity.

Besedo

Besedo

besedo.com

Besedo empowers online marketplaces to grow with trust by enabling their users to engage fearlessly with one another. Since 2002, Besedo has partnered with online marketplaces of all sizes, across the globe to help them create user trust, better quality content and better user experience in the digital world. In order to achieve this, Besedo uses a combination of AI moderation, automated filters and human moderation. Besedo also provides their partners with insights related to both users and content, allowing them to adapt and evolve their product faster and stay competitive.

© 2025 WebCatalog, Inc.