App store for web apps
Find the right software and services.
Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.
Top Vulnerability Management Software - United States
Vulnerability Management Software refers to a suite of tools and platforms designed to identify, assess, prioritize, and remediate security vulnerabilities across an organization’s IT infrastructure. These solutions help organizations detect weaknesses in systems, applications, networks, and devices that could potentially be exploited by cyber attackers. The core function of vulnerability management software is to automate the discovery of vulnerabilities through regular scans and assessments. Once vulnerabilities are identified, these tools assess their severity and potential impact based on predefined risk factors, such as the criticality of the asset, exploitability, and the potential damage an attack could cause.
Submit New App
Hack The Box
hackthebox.com
A Massive Hacking Playground. Join a dynamically growing hacking community and take your cybersecurity skills to the next level through the most captivating, gamified, hands-on training experience!
Atera
atera.com
Atera’s AI-powered IT management platform enables enterprise IT teams and Managed Service Providers (MSPs) to achieve operational excellence across their organization, at any scale. Manage your entire IT operations—from remote monitoring and management (RMM), helpdesk, and ticketing to patching and automation—in a single intuitive dashboard. Streamline your operations, get real-time oversight of your IT, and boost everyday productivity across your organization. Customize your IT environment end-to-end with dozens of curated best-in-class solutions for security, backup and recovery, network monitoring, and more. Discover how AI can help you create unparalleled IT efficiency. Try Atera for free for 30 days or book a demo at: www.atera.com
GoTo
goto.com
An industry leader in online video conferencing for companies around the world, GoTo Meeting now comes as part of GoTo Connect, the all-in-one communications software built for SMBs. The Meeting solution, available to buy standalone, is trusted by millions of people every day for real time virtual communication and collaboration. Get a fast, easy and reliable professional online meeting solution that enables customers to meet face to face, connect with colleagues through in-meeting chat or conference calling, and screenshare their presentations, all with the click of a button. Nothing can match the momentum of your team or business when it’s fueled by an award-winning collaboration solution, the Meeting solution from GoTo Connect pairs productivity with flexibility to let employees work effectively anytime, anywhere on any device.
Cybrary
cybrary.it
Cybrary's structured, hands-on cybersecurity training empowers professionals to better protect their organizations.
Acronis
acronis.com
Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the entire environment. Key features of Acronis Cyber Protect include: · Cyberthreat protection: Using artificial intelligence (AI) and machine learning (ML), proactively secures data, applications and systems, from advanced cyberattacks, including ransomware and other forms of malware. · Rapid Recovery: Reduced dependency on central IT support empowers users to initiate one-click recovery of distributed endpoints, including bare-metal recovery of physical workloads. · Reduced TCO: Broad, multigenerational OS support, enables vendor consolidation while ensuring comprehensive protection. · Simplified management: Centralized management includes local autonomy and seamless integration with existing third-party tools to provide a unified view of backup and recovery operations along with broad, multigenerational OS support. · Data sovereignty: With the use of Acronis’ extensive network of global data centers, users can ensure compliance and master regional data sovereignty laws, offering peace of mind and regulatory compliance.
INE
ine.com
INE is the premier provider of online IT training and certifications, focused on providing world class instruction with hands-on labs. Focusing on Networking, Cyber Security and Cloud, our 100's of courses feature 1000's of in-browser labs, designed to immediately challenge you to prove your knowledge. Our certifications in Cyber Security and Cloud are industry recognized and grounded in scenario-based, real world challenges.
Synack
synack.com
The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategic penetration testing that provides full control and visibility, reveals patterns and deficiencies in your security program, enables organizations to improve overall security posture and provides executive-level reporting for the leadership and the board of directors. Synack’s Smart Security Testing Platform includes automation and augmented intelligence enhancements for greater attack surface coverage, continuous testing, and higher efficiency, delivering more insights into the challenges you face. The platform seamlessly orchestrates the optimal combination of human testing talent and smart scanning on a 24/7/365 basis—all under your control. As always, Synack not only deploys the elite Synack Red Team (SRT) to test your asset, but now simultaneously deploys SmartScan or integration with your company's scanner application tool. Synack’s SmartScan Product harnesses Hydra, our Platform’s proprietary scanner, to continuously discover suspected vulnerabilities for the SRT who then triage for only best-in-class results. On top of this, we provide an additional level of testing rigor through crowd-led penetration tests where the SRT researchers proactively hunt for vulnerabilities and complete compliance checklists. Using their own tools and techniques, they provide unparalleled human creativity and rigor. While leveraging the Synack platform to perform high-level, automated assessments of all apps and incentivizing the Synack Red Team to continuously and creatively stay engaged, Synack offers a unique coupling of our human intelligence and artificial intelligence, resulting in the most effective, efficient crowdsourced penetration test on the market. Also, now available on FedRAMP and the Azure Marketplace: Synack Platform delivers Penetration Testing as a Service (PTaaS)
HackNotice
hacknotice.com
Bring long-term behavioral changes through better cybersecurity awareness habits in your organization. Discover the HackNotice Difference.
Proofpoint
proofpoint.com
Proofpoint, Inc. is an American enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving.
JupiterOne
jupiterone.com
JupiterOne is a cyber asset analysis platform for cybersecurity designed to continuously collect, connect, and analyze asset data so security teams can see and secure their entire attack surface through a single platform.
(ISC)2
isc2.org
(ISC) is an international nonprofit membership association focused on inspiring a safe and secure cyber world. It offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Ethiack
ethiack.com
ETHIACK is an autonomous ethical hacking tool that helps organizations identify vulnerabilities in their digital infrastructure before they can be exploited. This tool combines Machine and Human Ethical Hacking techniques to provide both in-depth and broad security testing. One of the key features of ETHIACK is its External Attack Surface Management, which helps organizations gain a complete view of their entire digital exposure, including third-party services, APIs, and external tools. This allows them to identify weak points and manage their external attack surface effectively. The tool also offers Machine Ethical Hacking, which runs continuously with high accuracy in identifying vulnerabilities. Unlike traditional scanners that often produce false positives, ETHIACK's AI-powered hackers provide real-time reports with 99% accuracy. ETHIACK boasts an impressive track record, having identified over 20,000 vulnerabilities. Its team of world-class ethical hackers undergoes rigorous vetting and background checks to ensure the highest level of expertise and trustworthiness when testing critical systems. Organizations that use ETHIACK receive continuous evaluation and reports on vulnerabilities, along with detailed guides on exploitation and mitigation. This knowledge transfer helps them develop products with greater security and stay ahead of potential attacks. Overall, ETHIACK offers a comprehensive and proactive approach to ethical hacking, allowing businesses to better protect their digital assets and maintain a secure infrastructure.
Cisco
cisco.com
Cisco Spaces is a cloud platform that connects people & things with spaces to transform buildings into smart spaces. Using the power of Cisco devices as sensors (Catalyst, Meraki, Webex) and the Spaces ecosystem, the platform aims to make buildings safe, smart, sustainable, and seamless. Cisco Spaces harnesses the power of Cisco hardware and sensors (Catalyst, Meraki, Webex) making buildings safe, smart and sustainable with seamless people experiences.
CyberSmart
cybersmart.co.uk
Born out of a GCHQ accelerator in 2017, CyberSmart was created by a group of forward-thinking security experts, who noticed that many companies needed to secure themselves and achieve information security standards, but ultimately found the process too complicated or were limited by financial or human resources. CyberSmart’s vision for the world is one in which no person thinks twice about the privacy of their data online because every business, no matter how small, understands what it means to be cyber secure and access to the tools to protect itself. Through making security accessible, they have achieved tremendous growth and protect tens of thousands of users. CyberSmart offers same-day government-backed certification, including Cyber Essentials and IASME Governance / GDPR Readiness, remaining compliant throughout the year. Protect your business from cyber threats with our Cyber Essentials/Cyber Essentials Plus certifications & more.
HornetSecurity
hornetsecurity.com
365 Total Protection is the only solution on the market to cover all aspects of security, compliance and backup for Microsoft 365. Choose from various bundles to suit your business needs, and enjoy state-of-the-art email security that protects against spam, viruses, phishing and ransomware; plus email signatures and disclaimers. You can also benefit from Advanced Threat Protection (ATP) to defend your users against the most sophisticated email attacks, automated email continuity to prevent unexpected downtime and legally compliant email archiving to keep all emails safe and searchable. You can even opt for backup and recovery for endpoints and Microsoft 365 data in mailboxes, Teams, OneDrive and SharePoint. 365 Total Protection‘s tailored integration with Microsoft 365 simplifies your entire experience: from signup, to setup, to feature and user management. Its central console is a perfect blend of data privacy and ease of use, enabling you to do more and worry less.
Recorded Future
recordedfuture.com
Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,800 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.
Ivanti
ivanti.com
Ivanti breaks down barriers between IT and security so that #EverywhereWork can thrive. Ivanti has created the first purpose-built technology platform for CIOs and CISOs – giving IT and security teams comprehensive software solutions that scale with their organizations’ needs to enable, secure and elevate employees' experiences. The Ivanti platform is powered by Ivanti Neurons - a cloud-scale, intelligent hyper automation layer that enables proactive healing, user-friendly security across the organization, and provides an employee experience that delights users.
Heimdal
heimdalsecurity.com
Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.
Carbide
carbidesecure.com
Carbide is an information security and privacy management platform designed to help fast-growing companies develop and maintain a robust security posture. Leverage Carbide’s continuous cloud monitoring, in-platform security awareness training via Carbide Academy, and 100+ technical integrations to save time and resources as you collect evidence and meet security framework controls and requirements to pass security audits. Unlike “checkbox-style” compliance solutions, our is based on universal best practices to enable customers to create, implement, and prove their commitment to security, continuously, with Carbide’s supported security frameworks: SOC 2, ISO, 27001, NIST 800-53, NIST 800-171, FedRAMP, HIPAA and more. By making it easy to embed security and privacy into the DNA of your organization, Carbide can help sharpen your competitive edge and accelerate your company’s growth trajectory.
Tenacy
tenacy.io
Tenacy is the SaaS platform that simplifies cybersecurity management for all IT security teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. As a result, you can continuously measure your level of security, effectively monitor your operations, and unite all stakeholders around your cyber vision.
Defendify
defendify.com
Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an all-in-one, easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. With Defendify, organizations streamline cybersecurity assessments, testing, policies, training, detection, response & containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning See Defendify in action at www.defendify.com.
usecure
usecure.io
usecure enables businesses to measure their employee security posture against evolving cyber threats, reduce security incidents caused by human error and demonstrate compliance with core security standards To manage human cyber risk, usecure combines user-tailored security awareness training programs, custom phishing simulations, ongoing dark web monitoring, simplified policy management processes and ongoing human risk scoring.
Trustifi
trustifi.com
Trustifi is a cybersecurity firm featuring solutions delivered on a software-as-a-service platform. Trustifi leads the market with the easiest-to-use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained in its email, and Trustifi's key objective is keeping clients' data, reputations, and brands safe from all threats related to email. With Trustifi's Inbound Shield, Data Loss Prevention, Account Takeover Protection, and Email Encryption, clients are always one step ahead of attackers. www.trustifi.com
Bastion Technologies
bastion.tech
Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that secures your entire company. Bastion protects employees, emails, data and cloud apps from ever-evolving digital threats. By delivering a suite of security modules that meet budget, security, and peace-of-mind requirements, Bastion is how SMBs defend against phishing, ransomware attacks, data loss, and user negligence.
Apollo Secure
apollosecure.com
Apollo Secure is an automated cyber platform for startups and SMEs to protect their business and achieve security compliance. The platform delivers key security outcomes with minimal investment, including: - Security Policy Generator - Security Awareness Training - Automated Vulnerability Scanning - Security Controls Library - Compliance Management
SoSafe
sosafe-awareness.com
SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs. Powered by behavioral science and smart algorithms, SoSafe delivers engaging personalized learning experiences and smart attack simulations that turn employees into active assets against online threats. Comprehensive analytics measure ROI and tell organizations where vulnerabilities lie. Programs are easy to deploy and scale, fostering secure behavior in every employee.
KnowBe4
knowbe4.com
KnowBe4 Security Awareness Training for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach. Organizations leverage KnowBe4 to enable their employees to make smarter security decisions and create a human firewall as an effective last line of defense.
Hoxhunt
hoxhunt.com
Hoxhunt is a human risk management platform that combines AI and behavioral science to create and assign individualized learning paths that drive true behavior change and (measurably) lower human risk.
MetaCompliance
metacompliance.com
MetaCompliance is a security awareness training and compliance specialist dedicated to helping businesses keep their staff safe online, secure their digital assets, and protect their corporate reputation. The cloud-based solution offers a fully integrated suite of security awareness and compliance capabilities, including policy management, privacy, eLearning, simulated phishing, and risk management.
Pistachio
pistachioapp.com
New threats demand new solutions. Pistachio is a platform that works for you, keeping your organization safe in the modern world. Our tailored cybersecurity training ensures your team stays protected from evolving threats while gaining the confidence to navigate with freedom.
PhishingBox
phishingbox.com
PhishingBox is an online system for organizations to easily conduct simulated phishing attacks and educate their end users with cybersecurity awareness training. This helps identify vulnerabilities and mitigate risk. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives.
Goldphish
goldphish.com
Protect your organisation from cyber threats with Goldphish - the leading web-based security awareness training platform. We’ve trained over 1.7 million learners worldwide, helping them build strong cyber habits and reduce risks. Our fully integrated programme features essential learning modules, quizzes, measurement tools, and engaging multimedia content. Goldphish drives real behavioural change and keeps your business safe. Join the movement and empower your team with effective, comprehensive cybersecurity training.
CultureAI
culture.ai
CultureAI’s Human Risk Management Platform observes and tracks more employee security behaviours than any other platform, enabling organisations to seamlessly surface, manage, and remediate real-world risks before they escalate.By utilising APIs, phishing simulations, and browser extensions, CultureAI takes a real-time data-led approach and focuses on addressing your organisation’s most prevalent risks, as opposed to the results of attitudinal surveys and simulated phishing tests. HOW IT WORKS: - CultureAI seamlessly integrates with your modern tech stack, providing a comprehensive view of your organisation's most prominent human cyber risks in a single dashboard.- Gain insights into over 40 employee security behaviours across multiple collaboration tools, allowing you to identify and address risky behaviours including clicking on phishing emails, SaaS password reuse, and unauthorised software usage.- Pinpoint your riskiest employees and teams, empowering them to understand their own risk profile and receive targeted coaching.- Take immediate action to remediate observed risks through automated interventions and security nudges.
Nimblr
nimblrsecurity.com
Nimblr Security Awareness is an online training platform designed to strengthen end-users' security awareness. We combine interactive IT security training with simulated attacks, hands-on exercises and daily updated content, created by our expert content team. The easy setup, holistic learning model and daily updated courses are the reason why over 600,000 users have chosen Nimblr. Do you want to know more? Get in touch with us!
Haekka
haekka.com
Haekka is the new paradigm in security awareness built for modern work. Intelligently train your workforce with the right content at the right time — entirely from the tools they already use. The next generation of security, privacy, and compliance training focused on the human aspects of risk. Heakka continuously measures and reduces human risk by engaging employees with relevant, interactive content where, when, and how they work.
Arsen
arsen.co
Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting.
HacWare
hacware.com
HacWare is an automated cybersecurity learning platform that helps MSPs combat phishing attacks. Using AI-driven phishing simulations and measured vulnerability scoring HacWare builds up your team’s security response rate with fun and smart animated training videos and quizzes. Decrease your training costs by 40% with automated reminders, escalations and the ability to auto-enroll new users. Reduce your team’s phishing responses by 60% with our set-it and forget-it technology and quick, zero down-time integrations. We make it simple to develop your team into your first line of defense against cyberattacks.
OutThink
outthink.io
OutThink is a cloud platform (SaaS) that automates the delivery of targeted security awareness training based on employee needs and risk. In the process, we get to know every individual in the organisation. OutThink then presents the overall human risk picture, providing the foundation for risk decision making and treatment prioritisation. This is important because it gives defenders advance warning and the visibility required to manage the human factors, in order to reduce the risk of events such as a data breaches, ransomware, phishing and social engineering attacks.
Wizer
wizer-training.com
Through viral, one-minute videos and storytelling, engage your team with impactful security awareness training. Along with easy-to-understand short, animated training, our Wizer Stories are real-life scams dramatized for more memorable and relatable content. The Free version includes everything you need for essential security awareness, with topics like phishing, passwords, ransomware, social media, and more. It's not limited in time, and you get unlimited users. You also get users' progress tracking, reports, dashboard, and reminders. The Boost version gets you full access to the entire video library as well as suggested monthly videos, phishing simulation, gamification, custom training creation and much more. Centralize your policies for employees to review and utilize various compliance-specific training to help your business not only achieve compliance but become proactive with stronger online safety habits. SCORM and 508 Compliant, it's easy to integrate into your own learning management system!
Awaretrain
awaretrain.com
At Awaretrain, our mission is to help organisations build security-aware cultures in a fun, engaging way. Our intuitive plug-and-play security awareness platform reduces the risk of data breaches and incidents caused by employees. With engaging content, bite-sized security snacks, and interactive games, you can easily train your entire organisation and foster safe behaviour. Design training programmes and phishing simulations that perfectly fit your organisation’s needs, and effortlessly engage your colleagues in 9 native languages. Awaretrain empowers everyone to recognise risks quickly, keeping your organisation in control of the human aspect of information security. Join over 1,000 organisations and activate your human firewall today!
CloudBees
cloudbees.com
The Complete DevOps Platform. CloudBees empowers your software delivery teams to transform your business. CloudBees platform brings together development, operations, IT, security, and business teams to: Create fast with scalable repeatable workflows. Continuously improve customer experiences by progressively delivering features with speed and control. Command everything with higher-order visibility, management, and intelligence across tools, teams, pipelines, and process... all at enterprise scale
Edgio
edg.io
Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrated application and media solutions, provide a single platform for the delivery of high-performing, secure web properties, and streaming content. Through this fully integrated platform and end-to-end edge services, companies can deliver content quicker and more securely, boosting overall revenue and business value. All services run at the edge of our private, global network with 250 Tbps of bandwidth capacity. We process 5% of all web traffic and are rapidly growing. Edgio is trusted and relied on by TD Ameritrade, Plus500, Solvay Bank, Yahoo, Shoe Carnival, Canadian Hockey League, World Champion Fantasy, Mars Wrigley, Coach, and Kate Spade.
Shield
shieldcyber.io
Shield is a continuous exposure management platform built by penetration testers and developed for security service providers. In a simple, 3-step deployment, Shield instantly shows you how an attacker could breach and take over your specific network. And tells you exactly what you need to do to remove those exposures. Shield is different from existing vulnerability management solutions in that it correlates your external attack surface, internal networks, and identity services to deliver hyper-efficient remediation guidance based on the severity and impact to a specific network. This enables security service providers to stop wasting time on fixes that don't matter, and remove the highest impact risks first. In other words, Shield distinguishes the critical few risks from the trivial many. What more could you accomplish if you could direct 2% of your efforts to reduce 98% of risk?
Derive
deriverisk.com
For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigate risk, Derive is a a SaaS subscription-based platform that quantifies the potential financial impact of cyber threats using proprietary data on cyber loss magnitudes, frequencies, control costs, and control effectiveness delivering a high resolution characterization of what risks they face and how they could address them. Unlike competitors Derive translates abstract cybersecurity concerns into concrete, actionable insights with financial clarity.
Bitahoy
bitahoy.com
Augment your daily IT risk management processes with an AI-powered IT risk analyst that helps you prioritize, investigate and report risk-scenarios.
PlexTrac
plextrac.com
We designed the PlexTrac solution to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity.
Hackuity
hackuity.io
Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enriches them so security practitioners can, at last, create risk-driven remediation plans and align their priorities with their current and future exposure to threats. Fully customizable, the platform fits the client technical context and security requirements either in a full-Saas mode, On-premise or Hybrid installation mode. Hackuity proposes the right offer regarding the company's experience in vulnerability management and field of activity : - Risk-based vulnerability management - Continuous Monitoring - Augmented pentest - Hackuity for MSSP The company was founded in 2018 and is based in Lyon, France.
Hadrian
hadrian.io
Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive data sources, active scanning techniques, and machine learning models, Hadrian identifies digital assets and complex attack paths that security teams are unaware of. It incorporates how misconfigurations, exposed secrets, permissions, and vulnerabilities impact an organization’s security posture. Context-aware testing uses only relevant modules and secrets in attack paths. This combination of context and risk discovery allows Hadrian to prioritize the same targets attackers will exploit. All of this is presented in an online dashboard to help security teams focus on what matters and make their attack surface more secure.
CYRISMA
cyrisma.com
CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools. Designed for organizations that demand a clear and immediate return on investment, CYRISMA simplifies the process of identifying, assessing, and mitigating technical risks, all while eliminating high licensing costs, long deployment times, and burdensome technologies. Its data-centric approach to cybersecurity streamlines your cybersecurity efforts by focusing on what’s important while providing a simple, easy-to-use platform for identifying risks, strengthening weak configurations, and neutralizing risks through accountability. It is the simple choice for effective cybersecurity. All of the following capabilities are combined in a single SaaS platform: - Vulnerability Management - Sensitive Data Discovery - Secure Configuration Scanning - Compliance Tracking - Microsoft Copilot Readiness Assessment - Dark Web Monitoring - Risk Monetization - Risk Mitigation - Cyber Risk Assessment Reporting - Risk Scorecards
Resolver
resolver.com
See risk. Build resilience. Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Resolver’s Risk Intelligence Platform traces the extended impact of all types of risk—whether compliance or audit, incidents, or threats—and translates those effects into quantifiable business metrics. So, customers can communicate risk persuasively, framing it in terms of the business. And with this changed perspective, comes an entirely new role for risk to play. Finally, risk goes from being seen as a barrier, to becoming a strategic partner driving the business. Welcome to the new world of Risk Intelligence. Resolver's mission is to transform Risk management to Risk Intelligence. Its intuitive and integrated risk software for enterprise organizations offers solutions for corporate security, risk & compliance, and information security teams. Resolver empowers businesses to respond effectively to regulatory and market shifts, to discover insights from security and risk incidents, and to streamline risk operations throughout the organization. Resolver is a Kroll operated business. Kroll provides proprietary data, technology and insights to help customers stay ahead of complex demands related to risk, governance and growth. Kroll solutions deliver a powerful competitive advantage, enabling faster, smarter and more sustainable decisions. With 5,000 experts around the world, Kroll creates value and impact for both customers and communities.
Forescout
forescout.com
Forescout is a leading cybersecurity platform focused on managing cyber risk and mitigating threats across various environments. Key Features: * Risk and Exposure Management: Identify and prioritize cybersecurity risks, ensuring organizations can effectively mitigate potential threats. * Network Security: Implement proactive and reactive controls to assess and segment networks, enhancing overall security posture. * Threat Detection and Response: Detect, investigate, and respond to genuine threats and incidents in real-time. * Operational Technology Security: Reduce risks in operational technology (OT) and industrial control systems (ICS), ensuring safety and security in critical infrastructures.
Auditive
auditive.io
Auditive is a continuously monitored risk network that connects businesses and their customers on one single platform. Vendors can showcase their risk posture on the network and win deals 4x faster. Buyers can get 80% of their vendor reviews done in minutes and monitor continuously throughout the lifecycle of the relationship.
Trava Security
travasecurity.com
More than a GRC tool, we're your compliance experts. Simplifying processes, freeing your time and resources, fueling your business growth. Unlock the power of Vulnerability Management Software and vCISO Services to fortify your organization against cyber threats while safeguarding your digital assets. Our integrated solutions offer comprehensive support for compliance frameworks including SOC2, ISO 27001, GDPR, CCPA, FedRAMP, CMMC, and more, along with expert security program management. Achieve compliance effortlessly and bolster your security posture with our trusted services.
Actifile
actifile.com
Actifile helps organizations automate their Data Discovery, Monitoring and Protection needs, addressing external data threats (like ransomware), insider threats (like shadow IT) and assist in complying with Data Privacy regulations. Actifile’s approach to protecting data focuses on two main aspects: * Identify and quantify the risk: Identify, discover and track sensitive data, both in storage and in motion to/from applications (both company sanctioned and shadow IT). * Limit the liability associated with data theft: Protect data from theft using automatic encryption, reducing the liability and regulatory implications associated with a data theft incident (such as ransomware). Such an approach works seamlessly in today’s multi-cloud, multi SaaS application and fits those that are seeking to empower their employees while securing and protecting their most important assets - DATA! Actifile supports multiple use cases and frameworks and is successfully deployed worldwide, supporting a growing range of privacy regulations including HIPAA , GDPR and NIFRA, to CMMC and CCPA.
Stream Security
stream.security
Agentless, Real-time detection, immediate root cause, and all the context you need for rapid response.
Bleach Cyber
bleachcyber.com
Bleach Cyber, an advanced cybersecurity platform tailored for SMBs and Startups and their service providers , that not only enhances operational cybersecurity but also fosters trust with customers and helps CISOs fortify their enterprise supply chains. Specifically designed to secure a business without buying expensive enterprise grade tools, Bleach ensures a swift, user-friendly, and cost-effective approach to bolstering security and compliance for SMBs. The platform integrates with their existing tech stack, offering proactive recommendations or "security opportunities" to mitigate risks and align with compliance standards. With a comprehensive array of security applications, Bleach empowers businesses to address and rectify identified opportunities, then makes it easy for them to establish a foundation of trust with their customers by sharing this with CISOs, Procurement and Compliance departments. No more need for expensive, drawn out and inaccurate SOC2 audits. Allowing faster deal closures for innovative small businesses and enabling CISOs and enterprise organisations to work securely with the latest in cutting edge software and technology.
Jericho Security
jerichosecurity.com
Jericho Security uses AI to fight AI in the new frontier of cybersecurity. By simulating hyper-personalized attacks, Jericho trains employees to recognize and respond to new AI threats, resulting in increased testing efficiency, reduced costs, and fewer security incidents. Jericho trains employees to recognize and respond to new AI threats by simulating hyper-personalized attacks, resulting in increased testing efficiency, reduced costs, and fewer security incidents. Our approach to training involves: >Test: Replicate real-life phishing simulations with our AI-powered email generator > Monitor: Report on how your organization is performing in granular detail > Train: Leverage AI-powered training that drives behavioral change Jericho learns from its attack simulation and adapts to test your organization and continuously detect generative attacks. At Jericho Security, we believe that effective cybersecurity training must go beyond simply imparting knowledge—it must foster a culture of security awareness and preparedness. To achieve this, we've developed a unique approach that sets us apart from traditional training vendors: >Generative AI-Powered Content: Our advanced AI technology enables us to create customized, up-to-date training modules and phishing simulations that address the latest threats and industry trends. This ensures employees are always prepared for the most current cyber risks. >Customized Training Solutions: We recognize that every organization has unique needs and vulnerabilities. That's why we tailor our training content to address your organization's specific risks and requirements, ensuring maximum relevance and effectiveness. >Engaging Microlearning Format: Our training modules are designed in a short, digestible format that minimizes workflow disruptions and enhances retention of key concepts. >Dual reporting features: Generate reports in our Web-based app or your Learning Management System (LMS) to provide valuable data on employee participation, quiz scores, and more, enabling you to monitor the effectiveness of your training program. >Seamless Import Integration: Jericho's solutions integrate with your existing tools, including SCIM-enabled directories (Microsoft and Okta) and OAUTH-enabled API integration (Google Workspace). Integrations can also be customized to work with any directory. >Expert-created training: Certified Cybersecurity and Instructional Design experts develop engaging, up-to-date content that addresses emerging threats and best practices. >One-Click Phishing Reporting: Empower employees to report phishing attempts with just one click, allowing for rapid response and mitigation of potential threats. >Regulatory Compliance: Our training programs meet and exceed industry standards and guidelines, helping your organization maintain compliance and demonstrate due diligence in safeguarding sensitive data.
Guardey
guardey.com
Guardey offers security awareness training based on gamification. In a team where 95% of all data leaks are caused by human error, you need a platform that turns your employees into a human firewall. Here’s what separates Guardey from the pack: - Weekly challenges that take 3 minutes to complete and are actually engaging. - A leaderboard that shows users how they are performing compared to their colleagues. - A learning management system that enables admins to set up their own challenges. Customers with businesses of all sizes can use Guardey to improve the security awareness among their employees.
BeamSec
beamsec.com
BeamSec is a cybersecurity solutions provider dedicated to fostering resilience against the evolving landscape of email-based cyber threats. BeamSec Security Awareness solution enhances organizations’ defense against the ever-changing landscape of email-based cyber threats. The process begins with an initial assessment, collecting baseline data, and identifying areas for improvement. Testing the email systems against known threats helps to build an effective protection plan against potential phishing email types that employees may encounter. BeamSec then sends employees fake phishing emails that mimic actual threats and realistic scenarios. If an employee interacts with a simulated phishing email, they are provided with immediate feedback, guidance, and educational resources. Based on the simulations, BeamSec provides online training modules, educational materials, interactive lessons, quizzes, and videos covering topics like password security, social engineering, safe web browsing, and data protection. Employees can report real-life phishing emails via a single click routed to the security team for investigation.