Risk-Based Authentication Software
Apache Sentry
Apache Sentry™ is a robust role-based authorization system designed for Hadoop clusters, enabling fine-grained control over data and metadata access....
BeyondCorp Enterprise
BeyondCorp Enterprise enhances Chrome Enterprise Core by providing advanced security measures to safeguard sensitive data. It prevents unauthorized data exfiltration...
BMC Helix Remediate
BMC Helix Remediate accelerates security vulnerability management, achieving remediation 14 times faster through advanced analytics and automation. It imports data...
PingOne Protect
PingOne Protect is a risk-based authentication solution designed to thwart account takeover and identity fraud. By analyzing a range of...
Pure Signal Orbit
Pure Signal Orbit offers advanced risk-based vulnerability management through its external attack surface management platform. It autonomously discovers and maps...
NuDetect
NuDetect leverages unique behavioral and device insights to deliver precise risk scores, enhancing decision-making and minimizing fraud. Monitoring users from...
Syxsense
Streamlining IT and security operations, this automated endpoint and vulnerability management software enhances organizational efficiency. With real-time alerts, risk-based prioritization,...
GateKeeper Client
GateKeeper Client offers an innovative proximity-based authentication solution that automatically logs users in and locks their computers based on their...
8iSoft YODA
8iSoft YODA transforms vulnerability management with its AI-driven platform, enabling swift identification and remediation of threats. By enhancing visibility into...
Covail
Covail's Vulnerability Management Solution (VMS) empowers IT security teams to effectively assess application and network vulnerabilities. By providing continuous tracking...
Holm Security
Holm Security's Next-Gen Vulnerability Management Platform empowers organizations to proactively defend against cyber threats by integrating risk-based vulnerability management with...
Ionic Machina
Ionic Machina revolutionizes data security by tackling the complexities of managing sensitive data across diverse environments. It provides dynamic, context-aware...
SpecTrust
Offering a robust defense against identity abuse and fraud, this cloud-native solution enables companies to detect and verify risky users...
Risk Dynamyx
Risk Dynamyx offers a cutting-edge dynamic dashboard that empowers users to manage security risks in real-time. By integrating local and...
Birdseye
Risk-based vulnerability management software streamlines cyber risk assessments by allowing organizations to identify vulnerabilities, prioritize controls, and set tailored targets....
Humanize Salience
The Salience platform revolutionizes cybersecurity with its Extended Attack Surface Management (xASM) and Risk Quantification capabilities. It empowers organizations to...
Seconize DeRisk Center
The Seconize DeRisk Center empowers organizations to streamline their vulnerability management through risk-based prioritization and automated remediation. Leveraging advanced AI/ML...
Strobes RBVM
The Strobes RBVM tool empowers organizations to efficiently manage security risks by integrating seamlessly with various tools such as vulnerability...
Modirum
Transforming industries through innovative deep technology, Modirum accelerates the growth of FinTech and cybersecurity solutions that protect millions worldwide. With...
UnifyID
UnifyID’s authentication platform revolutionizes user experience by eliminating passwords and one-time passcodes. Utilizing advanced machine learning, it combines behavioral biometrics...
SecurityHive Vulnerability Management
Vulnerability Management identifies and monitors network weak spots aligned with company policies. It provides actionable insights to address vulnerabilities without...
Zighra
Zighra offers an autonomous security platform that integrates behavioral AI with multi-sensor fusion to provide real-time threat detection across cyber...