Apono
apono.io
Apono automates permission management, enabling organizations to streamline access control and enhance security through features like permission revocation and predefined policies.
Cerby
cerby.com
Cerby is an access management platform that streamlines identity management and enhances security for non-federated applications through passwordless authentication.
TaskUs
taskus.com
TaskUs provides digital outsourcing services to enhance customer experience and operational efficiency for businesses across various sectors.
Circle Security
circlesecurity.ai
Circle is a cybersecurity platform that prevents data breaches by decentralizing security and managing user data access without credentials.
DefensX
defensx.com
DefensX is a web browser security extension that protects passwords, identities, and files, while monitoring cyber threats and managing safe access to applications.
Lookout
lookout.com
Lookout is a cloud security platform that protects data from modern cyber threats, offering real-time visibility and defense against breaches.
Portnox
portnox.com
Portnox is a cloud-native network access control solution that secures user access across networks while supporting zero trust principles and enhancing endpoint security.
SuperTokens
supertokens.com
SuperTokens is an open-source user authentication solution that simplifies secure login processes for web and mobile applications.
Formal
joinformal.com
Formal provides a secure access platform for data and infrastructure, featuring a reverse proxy for various datastores to address security, compliance, and data management.
Opal Security
opal.dev
Opal Security is a data-focused identity management platform that provides oversight and control of on-premises, cloud, and SaaS environments.
Curity
curity.io
Curity is an IAM and API security app that facilitates user authentication and authorization for digital services, ensuring secure identity management and API protection.
ConductorOne
conductorone.com
ConductorOne secures workforce identities by automating access reviews, self-service requests, and managing user access rights within organizations.
Trustle
trustle.com
Trustle helps teams manage access to cloud systems like AWS, streamlining permission processes to enhance security and reduce operational challenges.
Lumos
lumos.com
Lumos automates app governance, access requests, and reviews, ensuring least privilege access while optimizing SaaS spending and improving compliance and security.
OPSWAT
opswat.com
OPSWAT is a cybersecurity app that protects critical infrastructure by detecting and remediating security threats, ensuring secure data transfer and device access.
Enclave
sidechannel.com
Enclave is a network segmentation platform that enhances security through access control, asset inventory, and encryption while maintaining operational continuity.
Menlo Security
menlosecurity.com
Menlo Security provides a cloud-based browser security solution that protects organizations from cyber threats while managing secure access to web applications.
Cato Networks
catonetworks.com
Cato Networks provides SASE solutions for secure network access and management, integrating SD-WAN, threat protection, and user monitoring for optimized digital experiences.
Delinea
delinea.com
Delinea secures identities through centralized authorization, managing access across various infrastructures to protect against identity-related threats.
Trend Vision One
trendmicro.com
Trend Vision One is a cybersecurity platform that integrates threat detection, risk management, and response across various IT environments to enhance security operations.
FortiSASE
fortinet.com
FortiSASE provides secure access to web and cloud applications for hybrid workforces, combining networking and security features in a unified platform.
Adaptive
adaptive.live
Adaptive is a data security platform for managing access, protecting sensitive data, auditing activities, and ensuring compliance across data sources.
Varonis
varonis.com
Varonis is a data security platform that protects sensitive information by monitoring activities, detecting threats, and managing access across various environments.
YeshID
yeshid.com
YeshID is an identity management tool that helps organizations manage user identities and applications efficiently, with features for onboarding, access requests, and compliance.
Zluri
zluri.com
Zluri is a platform for managing SaaS applications, automating access and compliance processes, and providing insights into software usage and security.
TrueFort
truefort.com
TrueFort is a cybersecurity app that provides visibility and control over applications and infrastructure, focusing on threat detection and security policy enforcement.
Zaperon
zaperon.com
Zaperon is an identity protection platform that secures users and systems against credential-based attacks using passwordless access and multifactor authentication.
IP Fabric
ipfabric.io
IP Fabric automates network discovery, documentation, and analysis to help organizations manage and optimize their enterprise networks efficiently.
COSGrid Networks
cosgrid.com
COSGrid Networks offers secure software-defined networking solutions to enhance connectivity and cybersecurity for businesses across various sectors.
SonicWall
sonicwall.com
SonicWall provides cybersecurity solutions including firewalls, email protection, and cloud security to safeguard organizations from cyber threats.
© 2025 WebCatalog, Inc.