App store for web apps

Find the right software and services.

WebCatalog Desktop

Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.

Top Cloud Security Software - United States

Cloud Security Software refers to a range of tools and solutions designed to protect cloud-based environments, applications, and data from cyber threats, unauthorized access, and other security risks. As businesses continue to migrate critical operations and data to the cloud, ensuring the security of cloud infrastructure becomes paramount. Cloud security software offers advanced features for managing access control, encryption, threat detection, and compliance to safeguard sensitive information stored and processed in cloud environments. These tools provide comprehensive protection for both public and private cloud platforms, addressing unique vulnerabilities inherent in cloud computing. Whether for securing cloud storage, applications, or infrastructure-as-a-service (IaaS) offerings, cloud security software helps organizations manage risk and ensure compliance with industry regulations (such as GDPR, HIPAA, and PCI DSS).

Submit New App


ConnectWise Manage

ConnectWise Manage

connectwise.com

Made for companies that sell, service, and support technology, ConnectWise PSA (formerly ConnectWise Manage) is the leading business management platform worldwide. Technology Solution Providers (TSPs) rely on ConnectWise PSA to achieve greater accountability, operational efficiency, and profitability. Leveraging the cloud, ConnectWise PSA facilitates business-process automation, help desk management and customer service, sales, marketing, project management, and business analytics that dramatically streamline a company's operations. ConnectWise PSA is the centralized hub that gives TSPs an end-to-end view and total control over their business. ConnectWise PSA also gives its users access to a powerful network of ideas, experts, and solutions. A veteran in the technology services industry, ConnectWise PSA has been the premier business management platform for technology companies for more than 15 years.

Duo Admin

Duo Admin

duosecurity.com

Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identity protection and endpoint visibility. Duo verifies users' identities with strong passwordless authentication and industry-leading Multi-Factor Authentication (MFA). Paired with deep insights into your users’ devices, Duo gives you the policies and control to limit access based on endpoint or user risk.

Wiz

Wiz

wiz.io

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empowering development teams to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) drives visibility, risk prioritization, and business agility and is #1 based on customer reviews. Wiz's CNAPP consolidates and correlates risks across multiple cloud security solutions in a truly integrated platform, including CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, Container security, AI SPM, Code security, and CDR into a single platform. Hundreds of organizations worldwide, including 40 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman & Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.

Postman Web

Postman Web

postman.com

Postman makes API development easy. Our platform offers the tools to simplify each step of the API building process and streamlines collaboration so you can create better APIs faster.

ConnectWise Home

ConnectWise Home

connectwise.com

Made for companies that sell, service, and support technology, ConnectWise PSA (formerly ConnectWise Manage) is the leading business management platform worldwide. Technology Solution Providers (TSPs) rely on ConnectWise PSA to achieve greater accountability, operational efficiency, and profitability. Leveraging the cloud, ConnectWise PSA facilitates business-process automation, help desk management and customer service, sales, marketing, project management, and business analytics that dramatically streamline a company's operations. ConnectWise PSA is the centralized hub that gives TSPs an end-to-end view and total control over their business. ConnectWise PSA also gives its users access to a powerful network of ideas, experts, and solutions. A veteran in the technology services industry, ConnectWise PSA has been the premier business management platform for technology companies for more than 15 years.

Elastic Cloud

Elastic Cloud

elastic.co

Enterprise search, observability, and security for the cloud. Quickly and easily find information, gain insights, and protect your technology investment whether you run on Amazon Web Services, Microsoft Azure, or Google Cloud.

Tresorit

Tresorit

tresorit.com

Tresorit is an end-to-end encrypted, zero-knowledge content collaboration platform that enables security-conscious companies to manage, sync, sign, and share their files safely. Unlike other public cloud vendors, Tresorit has no access to users’ files, which ensures maximum confidentiality. - Uncompromised security: Your files are protected from the moment you upload them to the cloud until they reach the intended recipient. It is technically impossible for anyone else to gain unauthorized access to your files. - Seamless and secure teamwork: Whether it’s personal data for HR documents, legal contracts, financial plans, or top-secret R&D prototypes – Tresorit provides a digital workspace where your highly sensitive documents remain safe. - Powerful control and monitoring options: Manage and oversee all users and their information and activities. Tresorit offers powerful control features so you can be sure that the right employees access the right files. -Tresorit is the ideal complementary solution for any business operating in a highly regulated industry where compliance with strict standards is a must. Tresorit can be deployed alongside Microsoft's solutions to support GDPR, CCPA, HIPAA, TISAX, FINRA, or ITAR compliance. Our client-side end-to-end encryption technology guarantees that your most sensitive documents always remain protected.

ExtraHop

ExtraHop

extrahop.com

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance management uniquely delivers the instant visibility and unparalleled decryption capabilities organizations need to expose the cyber risks and performance issues that other tools can’t see. When organizations have full network transparency with ExtraHop, they can investigate smarter, stop threats faster, and keep operations running. RevealX deploys on premises or in the cloud. It addresses the following use cases: - Ransomware - Zero trust - Software supply chain attacks - Lateral movement and C2 communication - Security hygiene - Network and Application Performance Management - IDS - Forensics and more A few of our differentiators: Continuous and on-demand PCAP: Full packet processing is superior to NetFlow and yields higher quality detections. Strategic decryption across a variety of protocols, including SSL/TLS, MS-RPC, WinRM, and SMBv3, gives you better visibility into early-stage threats hiding in encrypted traffic as they attempt to move laterally across your network. Protocol coverage: RevealX decodes more than 70 network protocols. Cloud-scale machine learning: Rather than relying on limited

Sprinto

Sprinto

sprinto.com

#1 Rated security compliance automation platform Move fast without breaking things Ambitious cloud companies all over the world trust Sprinto to power their security compliance programs and sprint through security audits without breaking their stride. Integration-first Automation-enabled Audit-aligned Over 1 Million compliance checks evaluated every month Security compliances don’t have to be hard The broad nature...

Red Hat

Red Hat

redhat.com

Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, hybrid cloud, edge, and Kubernetes technologies.

Citrix Cloud

Citrix Cloud

citrix.com

Citrix is a leading provider of secure, scalable IT solutions that empower organizations to optimize their digital workspaces. The Citrix platform offers a range of services, including app and desktop virtualization, endpoint management, and secure access solutions, designed to enhance productivity and streamline IT management. With a focus on supporting hybrid workforces, Citrix enables businesses to deliver critical applications and data securely on any device, while simplifying device management and enhancing user experience. The platform also emphasizes security through zero trust access and observability, helping organizations protect sensitive information and ensure compliance. Citrix serves various industries, including healthcare, financial services, government, and education, providing tailored solutions to meet specific business needs. Through innovation and collaboration, Citrix continues to drive advancements in cloud-based and on-premises IT environments.

N-Able Passportal

N-Able Passportal

passportalmsp.com

N-able Passportal offers professional Password Management and Documentation Management for managed services and IT solutions providers.

Proofpoint

Proofpoint

proofpoint.com

Proofpoint, Inc. is an American enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving.

Axis Security

Axis Security

axissecurity.com

Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or location. The platform artfully integrates ZTNA, SWG, CASB and Digital Experience monitoring into a single cloud-delivered platform, with one easy to use pane of glass to manage it all. With +350 cloud edges running across Amazon Web Services Global Accelerator, Google Cloud Platform, and Oracle networks, the Atmos platform helps security, networking, and IT leaders enable employees, partners, and customers to securely access business data - without the pitfalls of network-centric solutions or application limitations that every other zero trust service faces. Atmos sits inline, supporting all ports and protocols while inspecting all traffic. With agent and agentless support, Atmos brokers an orchestra of surgical, one-to-one, least-privileged connections based on identity and policy, and performs vital end user experience monitoring to track connections (hop-by-hop) and empower IT to pinpoint issues. Experience work in harmony with Atmos by Axis.

JupiterOne

JupiterOne

jupiterone.com

JupiterOne is a cyber asset analysis platform for cybersecurity designed to continuously collect, connect, and analyze asset data so security teams can see and secure their entire attack surface through a single platform.

Very Good Security

Very Good Security

verygoodsecurity.com

Very Good Security (VGS) lets it operate on sensitive data without the cost or liability of securing the data. VGS also helps it achieve PCI, SOC2, and other compliance certifications. VGS is a sensitive data custodian that provides turnkey security with no changes to existing products or systems. It accelerates time to market and simplifies the use of sensitive data while eliminating the risk of breaches. After all, hackers cannot steal what isn't there. VGS is the world's leader in payment tokenization. It is trusted by Fortune 500 organizations, including merchants, fintechs, and banks, to store and enrich sensitive payment data across cards, bank accounts, and digital wallets. With over 4 billion tokens managed globally, VGS offers a solutions suite with a composable card management platform, PCI-compliant vault, and network value-added services like network tokens, account updater, and card attributes. Its solutions boost revenue with higher authorization rates, fraud reduction, and operational efficiencies while seamlessly integrating with existing tech stacks. It stores 70% of all US cards and solves critical payment acceptance challenges, including multi-PSP management, orchestration enablement, PCI compliance, and PII protection. VGS empowers clients with ownership, control, and insights into payment data, elevating growth and user experiences across industries.

Drata

Drata

drata.com

A top-ranking compliance automation platform. Drata can help you get started, scale GRC, and enhance your security and compliance program. Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company’s security controls, while streamlining workflows to ensure audit-readiness.

Virtru

Virtru

virtru.com

Virtru makes military-grade encryption remarkably easy. From the world's biggest banks to the smallest healthcare practices, Virtru helps organizations of all sizes take control of their data with flexible, end-to-end encryption for your everyday business apps. Built on the open-standard Trusted Data Format, Virtru software is easy to use and integrates seamlessly with Google Workspace/Gmail and Microsoft 365/Outlook, Google Drive, and enterprise apps like Salesforce, Confluence, and Zendesk. Granular access controls, self-hosted key management options, DLP, and audit help our customers meet even the strictest privacy and compliance requirements, including ITAR, CMMC 2.0, CJIS, HIPAA, and GLBA/FTC Safeguards. Encrypt sensitive information with a single click, without leaving your existing workflows, because Virtru integrates directly within the apps you already use every day.

Splunk

Splunk

splunk.com

Splunk Inc. is an American technology company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a Web-style interface.The Splunk Enterprise and Enterprise Cloud solutions capture, index and correlate real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.Splunk makes machine data accessible across an organization by identifying data patterns, providing metrics, diagnosing problems and providing intelligence for business operations. Splunk is a horizontal technology used for application management, security and compliance, as well as business and web analytics. Recently, Splunk has also begun developing machine learning and data solutions for BizOps.

Sumo Logic

Sumo Logic

sumologic.com

Sumo Logic, Inc. is a cloud-based machine data analytics company focusing on security, operations and BI usecases. It provides log management and analytics services that leverage machine-generated big data to deliver real-time IT insights. Headquartered in Redwood City, California, Sumo Logic was founded in April 2010 by ArcSight veterans Kumar Saurabh and Christian Beedgen, and has received funding from Accel Partners, DFJ Growth, Greylock Partners, Institutional Venture Partners, Sequoia Capital, Sapphire Ventures, Sutter Hill Ventures, angel investor Shlomo Kramer, Battery Ventures, Tiger Global Management and Franklin Templeton. As of May 2019, the company has collected VC funding totaling $345 million.On September 17, 2020 Sumo Logic debuted on the NASDAQ stock exchange in its initial public offering as a public company.

Bitdefender GravityZone

Bitdefender GravityZone

bitdefender.com

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and xchange mail servers. GravityZone is one product with a unified management console available in the cloud, hosted by Bitdefender, or as one virtual appliance to be installed on company's premises, and it provides a single point for deploying, enforcing and managing security policies for any number of endpoints and of any type, in any location. GravityZone delivers multiple layers of security for endpoints and for Microsoft Exchange mail servers: antimalware with behavioral monitoring, zero day threat protection, application control and sandboxing, firewall, device control, content control, anti-phishing and antispam.

Sophos Central

Sophos Central

sophos.com

Defend your organization from cyberattacks with Sophos adaptive defenses and expertise at your service. Protect the future of your business with confidence.

BMC

BMC

bmc.com

BMC helps customers run and reinvent their businesses with open, scalable, and modular solutions to complex IT problems. BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.

Snyk

Snyk

snyk.io

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer security solutions enable modern applications to be built securely, empowering developers to own and build security for the whole application, from code & open source to containers & cloud infrastructure. Secure while you code in your IDE: find issues quickly using the scanner, fix issues easily with remediation advice, verify the updated code. Integrate your source code repositories to secure applications: integrate a repository to find issues, prioritize with context, fix & merge. Secure your containers as you build, throughout the SDLC: start fixing containers as soon as your write a Dockerfile, continuously monitor container images throughout their lifecycle, and prioritize with context. Secure build and deployment pipelines: Integrate natively with your CI/CD tool, configure your rules, find & fix issues in your application, and monitor your applications. Secure your apps quickly with Snyk’s vulnerability scanning and automated fixes - Try for Free!

Akamai

Akamai

akamai.com

Akamai is a leading content delivery network (CDN) and cloud service provider that focuses on optimizing online experiences for users and businesses. Key Features: * Content Delivery: Akamai accelerates the delivery of web content and applications, ensuring fast and reliable access for users globally. * Security Solutions: The platform offers robust security features, including DDoS protection and web application firewalls, to safeguard against online threats. * Edge Computing: Akamai leverages edge computing to process data closer to users, improving performance and reducing latency. * Scalability: Businesses can easily scale their online operations with Akamai’s flexible solutions tailored to different needs.

Vanta

Vanta

vanta.com

Thousands of fast-growing companies trust Vanta to help build, scale, manage and demonstrate their security and compliance programs and get ready for audits in weeks, not months. By offering the most in-demand security and privacy frameworks such as SOC 2, ISO 27001, HIPAA, and many more, Vanta helps companies obtain the reports they need to accelerate growth, build efficient compliance processes, mitigate risks to their business, and build trust with external stakeholders. Simply connect your existing tools to Vanta, follow the prescribed guidance to fix gaps, and then work with a Vanta-vetted auditor to complete audit.

SafeBase

SafeBase

safebase.io

SafeBase is the leading Trust Center Platform designed for friction-free security reviews. With an enterprise-grade Trust Center, SafeBase automates the security review process and transforms how companies communicate their security and trust posture. If you want to see how fast-growing companies like LinkedIn, Asana, and Jamf take back the time their teams spend on security questionnaires, create better buying experiences, and position security as the revenue-driver it is, schedule a demo at safebase.io.

Dig

Dig

dig.security

Data security at the speed of cloud. Real-time visibility, control, and protection of data assets across any cloud with data security posture management (DSPM). Dig allows you to protect all the data that matters without giving up cloud agility and speed.

Rewind

Rewind

rewind.com

Since 2015, Rewind has been working to help businesses protect their SaaS and cloud data. Over 25,000 organizations trust Rewind’s top-reviewed apps and support to ensure their software-as-a-service products run uninterrupted. The Rewind platform enables companies to backup, restore, and copy the critical data that drives their business. Supported platforms include GitHub, Jira, Confluence, Bitbucket, Shopify, Shopify Plus, Trello, BigCommerce, Jira Service Management, QuickBooks Online, Klaviyo, Mailchimp, Miro, and Azure DevOps.

Guardz

Guardz

guardz.com

Guardz is a leading unified cybersecurity solution designed for managed service providers (MSPs), empowering them to protect their clients from evolving digital threats by leveraging AI and a multilayered approach to combat phishing, ransomware attacks, data loss, and user risks. Our technology streamlines cybersecurity by automating the detection and response process across user data, devices, emails, and cloud directories, all in a single pane of glass. At Guardz, we are committed to your peace of mind and business continuity. Integrating top-tier cybersecurity technology with deep insurance expertise ensures your security measures are consistently monitored, managed, and optimized.

Twingate

Twingate

twingate.com

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT/infrastructure teams, and end users easier, it replaces outdated business VPNs which were not built to handle a world in which

Fastly

Fastly

fastly.com

Fastly is an American cloud computing services provider. It describes its network as an edge cloud platform, which is designed to help developers extend their core cloud infrastructure to the edge of the network, closer to users. The Fastly edge cloud platform includes their content delivery network (CDN), image optimization, video and streaming, cloud security, and load balancing services. Fastly's cloud security services include denial-of-service attack protection, bot mitigation, and a web application firewall. Fastly web application firewall uses the Open Web Application Security Project ModSecurity Core Rule Set alongside its own ruleset. The Fastly platform is built on top of Varnish.

Boman.ai

Boman.ai

boman.ai

Boman.ai is a plug-n-play DevSecOps product, that can bring continuous application security to the DevOps pipeline. It brings SAST(Static Application Security Testing), DAST(Dynamic Application Security Testing), SCA(Software Composition Analysis), and Secret Scanner to the CICD pipeline. It is powered by ML to remove false positives and noise Can integrate with existing application security tools It offers a vulnerability management system and complete visibility of application security under a single platform. Can create compliance reports Can integrate with Jira and Developer workflows. The scans happen at the customer's CICD, Boman.ai doesn't upload any customer code anywhere.

Netskope

Netskope

netskope.com

Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Nudge Security

Nudge Security

nudgesecurity.com

Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nudge Security helps busy security and IT teams work more efficiently with automated playbooks that accelerate SOC 2 access reviews, employee offboarding, and SSO onboarding. When an application in your SaaS supply chain experiences a breach, Nudge Security alerts you to the risk and helps you intervene to protect potentially-affected accounts.

Druva

Druva

druva.com

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10 million guarantee. Druva’s innovative approach to backup and recovery has transformed how data is secured, protected and utilized by thousands of enterprises. The Druva Data Resiliency Cloud eliminates the need for costly hardware, software, and services through a simple, and agile cloud-native architecture that delivers unmatched security, availability and scale.

Webscale

Webscale

webscale.com

Overview Webscale is the Cloud Platform for Modern Commerce, offering security, scalability, performance and automation for global brands. The Webscale SaaS platform leverages automation and DevOps protocols to simplify the deployment, management and maintenance of infrastructure in multi-cloud environments, including Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Webscale powers thousands of B2C, B2B, and B2E ecommerce storefronts in twelve countries and eight of the Fortune 1000 businesses and has offices in Santa Clara, CA, Boulder, CO, San Antonio, TX, Bangalore, India and London, UK.

Cloudaware

Cloudaware

cloudaware.com

Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, Monitoring, BI Analytics and Backup. Cloudaware is designed for enterprises that deploy workloads across multiple cloud providers and on-premises. The platform integrates with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and 50+ other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.

DoControl

DoControl

docontrol.io

DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.

Imperva

Imperva

imperva.com

Imperva Incapsula delivers an enterprise-grade Web Application Firewall to safeguard your site from the latest threats, an intelligent and instantly effective 360-degree anti-DDoS solutions (layers 3-4 and 7), a global CDN to speed up your website's load speed and minimize bandwidth usage and an array of performance monitoring and analytic services to provide insights about your website's security and performance.

Escape

Escape

escape.tech

Find and fix GraphQL security flaws at scale within your DevSecOps process. Leverage the new generation DAST & ASM for early, real-time Business Logic vulnerability detection and remediation in GraphQL, enhancing security from development to deployment.

Intruder

Intruder

intruder.io

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation advice on a continuous basis, by customizing the output of multiple industry-leading scanners using the expert advice of our in-house security team.

Orca Security

Orca Security

orca.security

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google Cloud, Kubernetes, Alibaba Cloud, and Oracle Cloud. Orca offers the industry’s most comprehensive cloud security solution in a single platform — eliminating the need to deploy and maintain multiple point solutions. Orca is agentless-first, and connects to your environment in minutes using Orca’s patented SideScanning™ technology that provides deep and wide visibility into your cloud environment, without requiring agents. In addition, Orca can integrate with third-party agents for runtime visibility and protection for critical workloads. Orca is at the forefront of leveraging Generative AI for simplified investigations and accelerated remediation – reducing required skill levels and saving cloud security, DevOps, and development teams time and effort, while significantly improving security outcomes. As a Cloud Native Application Protection Platform (CNAPP), Orca consolidates many point solutions in one platform, including: CSPM, CWPP, CIEM, Vulnerability Management, Container and Kubernetes Security, DSPM, API Security, CDR, Multi-cloud Compliance, Shift Left Security, and AI-SPM.

Traceable

Traceable

traceable.ai

Traceable is the industry’s leading API Security company that helps organizations protect their digital systems and assets in a cloud-first world where everything is interconnected. Traceable is the only intelligent and context-aware platform that powers complete API security. Security Posture Management: Traceable helps organizations dramatically improve their security posture with a real time, risk ranked catalog of all APIs in their ecosystem, conformance analysis, identification of shadow and orphaned APIs, and visibility of sensitive data flows. RunTime Threat Protection: Traceable observes user level transactions and applies mature machine learning algorithms to discover anomalous transactions, alert the security team, and block attacks at the user level. Threat management and analytics: Traceable helps organizations analyze attacks and incidents with its API data lake, which provides rich historical data of nominal and malicious traffic. API Security Testing throughout the SDLC: Traceable connects the security lifecycle together with the DevOps lifecycle providing automated API Security tests to be run within the CI pipeline. Digital Fraud Prevention: Traceable brings together its broad and deep data collection over time and cutting edge machine learning to identify fraud across all API transactions

Akto

Akto

akto.io

Akto is a trusted platform for application security and product security teams to build an enterprise-grade API security program throughout their DevSecOps pipeline. Our industry-leading suite of — API discovery, API security posture management, sensitive data exposure, and API security testing solutions enables organizations to gain visibility in their API security posture. 1,000+ Application Security teams globally trust Akto for their API security needs. Akto use cases: 1. API Discovery 2. API Security Testing in CI/CD 3. API Security Posture Management 4. Authentication and Authorization Testing 5. Sensitive data Exposure 6. Shift left in DevSecOps

Beagle Security

Beagle Security

beaglesecurity.com

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you can integrate automated penetration testing into your CI/CD pipeline to identify security issues earlier in your development lifecycle and ship safer web applications. Major features: - Checks your web apps & APIs for 3000+ test cases to find security loopholes - OWASP & SANS standards - Recommendations to address security issues - Security test complex web apps with login - Compliance reports (GDPR, HIPAA & PCI DSS) - Test scheduling - DevSecOps integrations - API integration - Team access - Integrations with popular tools like Slack, Jira, Asana, Trello & 100+ other tools

Aikido Security

Aikido Security

aikido.dev

Aikido Security is a developer-centric software security platform, providing advanced code scanning and cloud vulnerability assessments. Our platform prioritizes real threats, reduces false-positives and makes Common Vulnerabilities and Exposures (CVEs) easily understandable. With Aikido, ensuring the security of your product is made simple, allowing you to focus on what you do best: writing code.

Cycode

Cycode

cycode.com

Cycode is the only end-to-end software supply chain (SSC) security solution to provide visibility, security, and integrity across all phases of the SDLC. Cycode integrates with all of your software delivery pipeline tools and infrastructure providers to enable complete visibility and hardened security posture through consistent governance and security policies. Cycode further reduces the risk of breaches with a series of scanning engines that look for issues like hardcoded secrets, IAC misconfigurations, code leaks and more. Cycode’s patented knowledge graph tracks code integrity, user activity, and events across the SDLC to find anomalies and prevent code tampering.

OX Security

OX Security

ox.security

Security should be an integral part of the software development process, not an afterthought. Founded by Neatsun Ziv and Lion Arzi, two former Check Point executives, OX is the first and only Active Application Security Posture Management (ASPM) Platform, consolidating disparate application security tools (ASPM+AST and SSC) into a single console. By merging best practices from risk management and cybersecurity with a user-centric approach tailored for developers, it offers complete security, prioritization, and automated remediation of security issues throughout the development cycle, enabling organizations to release secure products quickly.

Xygeni

Xygeni

xygeni.io

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni to protect your operations and empower your team to build and deliver with integrity and security.

Apiiro

Apiiro

apiiro.com

Apiiro is the leader in application security posture management (ASPM), unifying risk visibility, prioritization, and remediation with deep code analysis and runtime context. Get complete application and risk visibility: Apiiro takes a deep, code-based approach to ASPM. Its Cloud Application Security Platform analyzes source code and pulls in runtime context to build a continuous, graph-based inventory of application and software supply chain components. Prioritize with code-to-runtime context: With its proprietary Risk Graph™️, Apiiro contextualizes security alerts from third-party tools and native security solutions based on the likelihood and impact of risk to uniquely minimize alert backlogs and triage time by 95%. Fix faster and prevent risks that matter: By tying risks to code owners, providing LLM-enriched remediation guidance, and embedding risk-based guardrails directly into developer tools and workflows, Apiiro improves remediation times (MTTR) by up to 85%. Apiiro's native security solutions include API security testing in code, secrets detection and validation, software bill of materials (SBOM) generation, sensitive data exposure prevention, software composition analysis (SCA), and CI/CD and SCM security.

ArmorCode

ArmorCode

armorcode.com

ArmorCode is an AppSecOps platform unifying ASPM, Unified Vulnerability Management, DevSecOps orchestration, and compliance. It integrates with your security tooling to ingest, de-duplicate, and correlate findings to give teams a holistic view of their risk landscape, and speeds remediation through risk prioritization and workflow automation.

CloudWize

CloudWize

cloudwize.io

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud regulations with over 1K rules running continuously, scans your cloud vulnerabilities, and remediates them automatically. With our unique investigation graph engine, you can detect and fix cloud issues in minutes instead of days and weeks. This holistic solution offers a blackbox web app penetration test, evolved IAM (identity access management), IaC (infrastructure as code) risk scanning, Data Security Posture Management, and more. Why deal with many tools when you can have everything in one place? CNAPP + WAAP + KSPM – CSPM + CWPP + CIEM + CASB + DSPM + CNSP = CloudWize (CSCoE)

Wing Security

Wing Security

wing.security

Wing empowers organizations to harness the full potential of SaaS while ensuring a robust security posture. Our SSPM solution offers unparalleled visibility, control, and compliance capabilities, strengthening any organization's defense against modern SaaS-related threats. With Wing’s automated security capabilities, CISOs, security teams, and IT professionals save weeks of work previously spent on manual and error-prone processes. Trusted by hundreds of global companies, Wing provides actionable security insights derived from our industry-leading SaaS application database, covering over 280,000 SaaS vendors. This results in the safest and most efficient way to leverage SaaS Wing Security was founded by the former CISO and Head of Cyber Defense for the Israeli Defense Forces with the vision of giving users automated, self-service tools they need for SaaS application security.

Havoc Shield

Havoc Shield

havocshield.com

All-in-one cybersecurity solution for financial services. Built to satisfy GLBA, FTC Safeguards, IRS Tax Preparer, New York DFS and other financial industry security requirements. Havoc Shield quickly removes the fear and risk of a lacking cybersecurity program by providing an industry-compliant plan, expert guidance, and professional security tools in an all-in one-platform.

Hyperproof

Hyperproof

hyperproof.app

Compliance Operations Platform. Built to Scale. Gain the visibility, efficiency, and consistency you and your team need to stay on top of all your security assurance and compliance work. Automated compliance management software to help you efficiently grow from one security framework to many, including SOC 2, ISO 27001, NIST, and PCI.

Lacework

Lacework

lacework.com

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run. Lacework empowers customers to prioritize risks, find known and unknown threats faster, achieve continuous cloud compliance, and develop secure code without slowing down, all from one unified platform. Since our founding in 2017, Lacework has been refining a single cloud-native platform to ingest and comprehend as much data as possible to provide the best security possible — by both agent-based or agentless means. Our unified platform then uses this data to accomplish common cloud use cases: posture management, workload protection, vulnerability management, compliance, container security, and more. Customers depend on Lacework to drive revenue, bring products to market faster and safer, and consolidate point security solutions into a single platform. Our platform, on average, replaces 2 to 5 point tools. Customers average a 100:1 reduction in alert noise thanks to our patented anomaly detection technology. And Lacework users have experienced 80% faster investigations with our context-rich alerts.

Qualys

Qualys

qualys.com

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable steps to reduce risk. It also gives cybersecurity and IT teams a shared platform to collaborate, and the power to quickly align and automate no-code workflows to respond to threats with automated remediation and integrations with ITSM solutions such as ServiceNow.

Cypago

Cypago

cypago.com

The revolutionary Cypago Cyber GRC Automation (CGA) Platform combines the strength of SaaS architecture and advanced Correlation Engines, GenAI, and NLP based automation with an intuitive user experience, delivering complete coverage across all security frameworks and IT environments. The platform enables organizations to increase security and GRC maturity through simplified cross-functional workflows, reduced manual efforts, and lower costs–all while reinforcing trust with their customers and stakeholders.

© 2025 WebCatalog, Inc.