Highly rated software

Singapore Show local products
67 results
UserWay creates digital accessibility solutions that include WCAG scans, audits, and automated website and PDF remediation tools. Learn more about UserWay
UserWay creates digital accessibility solutions that improve ADA compliance without refactoring your website's existing code. Among its full suite of solutions is the AI-Powered UserWay Accessibility Widget, which exceeds WCAG 2.1 AA requirements and has been installed on more than 1 million websites. From Fortune 1,000 enterprises to SMBs, UserWay simplifies digital accessibility for organizations of all sizes. Its services include site scans, audits, website remediation and PDF remediation. Learn more about UserWay

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets. Learn more about Holm Security VMP
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Learn more about Holm Security VMP

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense is an advanced endpoint management and security solution that monitors, detects, and resolves security threats for organizations of all sizes. It delivers comprehensive vulnerability detection and monitoring, patch management, and security remediation of your entire IT landscape with task sequencing, intelligent automation, and a Zero Trust approach. Learn more about Syxsense

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Orca Security is the industry-leading agentless Cloud Security Platform for AWS, Azure, Google Cloud and Kubernetes that identifies, prioritizes, and remediates risks. Orca saves your time by connecting to your environment in minutes with patent-pending Sidescanning technology to provide complete coverage across vulnerabilities, malware, misconfigurations, lateral movement risks, weak and leaked passwords, and overly-permissive identities. Learn more about Orca Security

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Learn more about Acunetix

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report. Learn more about AppTrana

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Learn more about Qualys Cloud Platform

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Invicti Enterprise, formerly Netsparker, is a comprehensive automated web vulnerability scanning solution.
Invicti, formerly Netsparker, is an automated vulnerability scanning security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence. Learn more about Invicti

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The first Click&Play Cyber Security platform. CyLock finds out if your systems are hacker safe in one click!
CyLock Anti-Hacker is a software designed to defend your systems from hacker attacks, identifying weaknesses on your systems and websites, providing information to address vulnerabilities (those used by cyber criminal to access to your computers). Learn more about CyLock Anti-Hacker

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Our Active Directory Audit Tool is free and runs on Windows Server 2008 & later. The audit results are provided in a clickable report.
FREE tool that scans your Active Directory, and detects security-related weaknesses, specifically related to password policies. Collect and display interactive reports containing user and password policy information. This includes checking user account passwords against a list of vulnerable passwords obtained from leaks and ones observed in real attacks. The audit can also help you identify which accounts may be violating your security policy by using the same password across multiple accounts. Learn more about Specops Password Auditor

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. Learn more about KACE

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Learn more about USM Anywhere

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Probely is a DAST scanner designed to empower Security and DevOps teams working together to reduce the security risk of web apps & APIs
Probely is the premier cloud-based automated application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. With over 30 000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them. Learn more about Probely

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret Learn more about Cyber Chief

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The Unified Data Platform combines complete IT visibility as well as data enrichment and transformation in one central solution.
IT landscapes are subject to constant change, making it increasingly difficult for companies to maintain transparency. The multitude of hardware and software applications as well as geographically distributed branches ensure that a holistic overview of the IT landscape (internal, hosted and cloud) can‘t be guaranteed. The Unified Data Platform powered by RayVentory collects all relevant data for you and prepares them in a meaningful and targeted way: The central point for all data. Learn more about RayVentory

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
If you want to assess your online assets' vulnerabilities, Security for Everyone is the tool for you whether you are a tech expert or a digital asset owner who does not have any coding experience. You can have: 1-Automated vulnerability assessment, 2- API integration, 3- Manual scanning options. Whichever opiton you choose, your vulnerabilities will be shown with video and pdf outputs. You can either send them to an expert or use them yourself to make your fixing process easier. Learn more about Security for Everyone

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats. Learn more about ArcSight

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
HackerOne is the industry standard for hacker-powered security.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Singapore Local product
Vulnerability Scanning and Management platform that empowers developers to create secure applications by providing continuous security.
GuardRails provides the perfect customizable Vulnerability Scanning and Management security solution for organizations, that need a flexible approach to their internal process. With thousands of possible coding vulnerabilities, you can stay ahead of threats and weaknesses in your organizations software by tracking which ones matter the most and need the most prior attention! Learn more about GuardRails

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture design to runtime.
CloudWize enables maximum cloud security and compliance from architecture design to runtime. Get 360° protection for your cloud in minutes from onboarding. This agentless, drag-and-drop, no-code solution saves you resources by detecting and fixing cloud issues in minutes. You can now investigate your cloud like a pro. See how security and compliance impact business cost, performance, and operations. And you get many more security features. Learn more about CloudWize

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework. CODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment. Learn more about CODA Footprint

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The platform provides real-time visibility for all stakeholders, including insights regarding risk, patch & SLA, and compliance.
Strobes Security is leading the way to disrupt the vulnerability management space. Our flagship product VM365 consolidates & de-duplicates assets and vulnerabilities from various sources, seamlessly integrating with other key tools of cybersecurity & IT infrastructure. VM365 prioritizes vulnerabilities based on temporal threat exposure and predicts the impact of vulnerabilities to expedite remediation implementation. Learn more about Strobes VM365

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Learn more about Red Sentry

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems. It saves you time by proactively scanning for new threats as well as offering a unique threat prioritisation solution. Our vulnerability scanner uses the same underlying engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity. Intruder also integrates with AWS, Google Cloud Platform and Microsoft Azure cloud providers. Learn more about Intruder

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Hybrid approach to vulnerability scanning with accurate security assessment results.
Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Learn more about Detectify

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
SecOps Solution is a full-stack cybersecurity assessment platform.
SecOps Solution is a full-stack cybersecurity assessment platform. It identifies the top 1% security risks that could have the maximum impact on the organisation, thereby saving millions of dollars and hundreds of hours of engineering effort in patchwork and remediation. It is an AI-powered agent-less platform for Vulnerability Management and remediating misconfigurations in applications and the cloud. SecOps configures and starts protecting your assets - within seconds not days. Learn more about SecOps Solution

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Manage Open Source supply chain threats intelligently with Bytesafe's cloud-native security platform.
Bytesafe allows enterprises to increase their software supply chain security posture with automated best practices - and a unified workflow for security and developer teams. The Dependency Firewall enables enterprises to enforce open source usage policies and avoid threats by effectively blocking open source vulnerabilities and non-compliant licenses. Learn more about Bytesafe

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Allows companies to monitor and fix vulnerabilities within their network.
Allows companies to monitor and fix vulnerabilities within their network. Learn more about Nexpose

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trava's vulnerability assessment tool scans external/internal environments; provides insights to build better defenses against hackers.
Trava's vulnerability assessment tool scans external and internal environments and provides insights for building better defenses against hackers. External Scans: Weaknesses in your systems that could help avoid a potential incident. Pressing security issues. Changes like services or server setup and whether they present any new threats to the organization. Internal Scans: Known vulnerabilities that could compromise your network Verification that all issues are patched properly and up to date Learn more about Trava

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Offensity the Nr. 1 fully automated cloud-based vulnerability scanner than enables businesses to manage threat detection & security.
Offensity the Nr. 1 fully automated cloud-based vulnerability scanner that enables all businesses to manage network security, threat detection and reporting in just 1-click. It continuously checks the enterprise customers'​ externally accessible IT systems for vulnerabilities, evaluates their risks and provides actionable recommendations on how to eliminate those. With our professional offensity red we created a tool which combines vulnerability assessment & pentest in one tool. Learn more about Offensity

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Software-based security segmentation that turns every host into a sensor to detect unauthorized traffic and enforce security policies.
Illumio reduces risk and increases cyber resiliency for modern organizations by providing visibility and protection of critical applications and data. As the only proven segmentation platform that is purpose-built for the Zero Trust security model, Illumio allows organizations to see their risk, isolate breaches, and better protect their data. The world’s leading organizations across the industries rely on Illumio's Zero Trust segmentation. Learn more about Illumio

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Simplify the management of your vulnerabilities Monitor all of your vulnerabilities, from their detection to their correction.
Cyberwatch Vulnerability Manager provides you with a global and continuous overview of your vulnerabilities Cyberwatch makes an inventory of your technologies, detects the vulnerabilities of your servers, workstations, network equipment, containers, and reviews them based on your business requirements. Cyberwatch allows you to gain visibility and prioritize risks, to build a simple and motivating action plan for your team, and to deploy the adapted security fixes for your vulnerabilities. Learn more about Cyberwatch Vulnerability Manager

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
SaaS and on-premise enterprise software solution for smarter and easier DevSecOps & ITSM operations.
Versio.io is a SaaS and on-premise enterprise software platform for smarter and easier DevSecOps & ITSM operations. The following solutions are provided by Versio.io: - Asset and Configuration Inventory (CMDB) - Change Management - Product release and patch management - IT vulnerabilities detection - IT governance - Enterprise architecture analysis & management Versio.io is used in data centers, (multi-) cloud environments and for SaaS applications. Learn more about Versio.io

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Singapore Local product
Vulkyrie

Vulkyrie

(0) Singapore Local product
Easy-to-use SaaS network, website and code vulnerability scanner for small and medium enterprises
Vulkyrie believes that basic vulnerability discovery should be free. Importantly, solutions should be easy-to-use for small and medium enterprises who may not have the resources and expertise of large companies. Our Free Plan offers a cloud-based solution for unlimited network and website vulnerability scanning. With our Pro Plan, you get a static code analyzer for scanning your software code. Learn more about Vulkyrie

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale.
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale. Learn more about ShiftLeft CORE

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more.
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more. Learn more about Reconwithme

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The industry’s ONLY Vulnerability Scanner for enterprise storage & backup systems, helping to secure these systems to protect your data
StorageGuard is the industry’s ONLY Vulnerability Scanner for enterprise storage & backup systems. StorageGuard fills a major gap. While other vulnerability scanners do a good job of detecting vulnerabilities across networks, OS, apps, and web, they offer NO COVERAGE for storage & backups. And this is the gap we fill. For the first time, get complete visibility of vulnerabilities and security misconfigurations in your enterprise storage & backup systems. Learn more about StorageGuard

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Astra’s cloud-based hacker-style Pentest covers all aspects of pentesting for web apps, mobile apps, APIs, and cloud infrastructure.
Astra Pentest is comprehensive platform featuring an automated vulnerability scanner, manual pentest capabilities, and an all-purpose vulnerability management dashboard that helps you streamline every step of the pentest process - from detection and prioritization of vulnerabilities to collaborative remediation. Astra integrates with GitLab, GitHub, Bitbucket, Slack & Jira to superpower your tech stack. You can use the integrations to automate continuous scanning and accelerate the remediation. Learn more about Astra Pentest

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Attack surface management solution that automatically scans services, IPS, domains, networks and more for ransomware and other attacks.
Attack surface management solution that automatically scans services, IPS, domains, networks, and more for ransomware and other attacks. Learn more about Randori

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trend Micro Cloud One: automated, flexible, all-in-one security on AWS. Try it yourself with a free, 30-day trial.
1 platform. 7 security services. Trend Micro Cloud One has cloud builders on AWS covered with security services for all your needs—from file storage security to open source security, and everything in between. Turn-key integrations into your CI/CD pipelines, customizable APIs, and automated deployment, enable you to go further. Try it yourself with a free, 30-day trial. Learn more about Trend Micro Cloud One

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning.
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning. Learn more about OpenVAS

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities.
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities and enhance the security and compliance of applications across AWS. With Amazon Inspector, IT administrators and security professionals can quickly discover vulnerabilities, prioritize patch remediation, meet compliance requirements, and identify zero-day vulnerabilities as soon as they appear. Learn more about Amazon Inspector

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Uleska helps security and dev teams manage application security at scale by automating and orchestrating their preferred security tools
Uleska helps security and development teams manage application security at scale by automating and orchestrating their preferred security tools within CI/CD. With Uleska, teams can confidently start an AppSec program using open-source, commercial, and custom tools and then quickly change, add or scale tools as the technology and business needs evolve. Uleska also brings speed and scale when integrating into development tools, and reporting of metrics and risk. Learn more about Uleska

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database.
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database. Learn more about Vulners

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system.
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system. Arcules doesn't lock you into ripping and replacing your existing cameras. We support over 6,000+ devices so you can keep what you have, or mix in the right new ones for your needs - saving you up-front costs and offering the flexibility of choosing what works best for you. The platform also auto updates to improve your security so you don’t have to worry about things shutting down. Learn more about Arcules

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities.
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities. It combines IT asset discovery and inventory, identification and management both internal and external threats. Vulnerability Management gives you visibility into shadow IT and maps your full attack surface and responds to critical vulnerabilities associated with cyber threats. Adversaries don’t need many vulnerabilities – one is enough. Learn more about WithSecure Elements Vulnerability Management

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API