Workscope
workscope.com
Workscope automates the mapping and monitoring of spreadsheets in organizations, providing real-time insights into their impact on business processes and decision-making.
Riskify
riskify.net
Riskify provides non-financial risk reports to assess and monitor various risks in companies, aiding informed decision-making with reliable data.
Panorays
panorays.com
Panorays is a third-party risk management platform that helps businesses assess and mitigate cyber risks from vendors and partners through continuous monitoring and evaluation.
SecurityScorecard
securityscorecard.com
SecurityScorecard provides cybersecurity ratings and risk management tools to assess and improve an organization’s security posture and third-party vendor risks.
TaskUs
taskus.com
TaskUs provides digital outsourcing services to enhance customer experience and operational efficiency for businesses across various sectors.
Circle Security
circlesecurity.ai
Circle is a cybersecurity platform that prevents data breaches by decentralizing security and managing user data access without credentials.
Apomatix
apomatix.com
Apomatix is a cloud-based risk management software that simplifies risk assessments, automates reporting, and helps manage risk registers for charity professionals.
RealCISO
realciso.io
RealCISO is a cloud-based platform for managing cyber risk, offering tools for risk assessment, compliance management, and security governance to enhance cybersecurity practices.
Delinea
delinea.com
Delinea secures identities through centralized authorization, managing access across various infrastructures to protect against identity-related threats.
Telivy
telivy.com
Telivy is a cybersecurity app for MSPs that enhances risk management, offering comprehensive assessments and monitoring for security and compliance.
StandardFusion
standardfusion.com
StandardFusion is a cloud-based GRC application for managing governance, risk, and compliance efficiently across multiple frameworks and departments.
ThreatLocker
threatlocker.com
ThreatLocker is a Zero Trust endpoint protection platform that controls software interactions to enhance security, allowing only approved applications and managing network access.
6clicks
6clicks.com
6clicks is an AI-powered platform that helps organizations manage governance, risk, and compliance by assessing cybersecurity vulnerabilities and ensuring compliance.
Socurely
socurely.com
Socurely is an automated GRC solution for compliance with frameworks like SOC2, ISO 27001, GDPR, and HIPAA, simplifying security and privacy management.
TrueFort
truefort.com
TrueFort is a cybersecurity app that provides visibility and control over applications and infrastructure, focusing on threat detection and security policy enforcement.
Zaperon
zaperon.com
Zaperon is an identity protection platform that secures users and systems against credential-based attacks using passwordless access and multifactor authentication.
COSGrid Networks
cosgrid.com
COSGrid Networks offers secure software-defined networking solutions to enhance connectivity and cybersecurity for businesses across various sectors.
FireMon
firemon.com
FireMon provides real-time cloud security, compliance, and threat detection, managing firewall policies and cybersecurity assets across hybrid environments.
Adaptiv Networks
adaptiv-networks.com
Adaptiv Networks provides secure, scalable SD-WAN and cloud security solutions for businesses, enhancing network performance and management.
NetFoundry
netfoundry.io
NetFoundry app provides secure, Zero Trust networking solutions, enabling users to create application-specific networks for enhanced data protection and easier management.
Todyl
todyl.com
Todyl is a cloud-based cybersecurity platform that provides unified security solutions, including threat detection and response, for small and medium-sized businesses.
HighGround
highground.io
HighGround helps manage cybersecurity effectively with tools for scoring, compliance, and ROI analysis, enabling informed security investments.
ECOMPLY.io
ecomply.io
The ECOMPLY.io app supports users in data protection audits, managing processing activities, incident reporting, data subject requests, and risk management.
© 2025 WebCatalog, Inc.