Best IT Security Software for CyCognito

Find and compare the best IT Security software for CyCognito in 2024

Use the comparison tool below to compare the top IT Security software for CyCognito on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    809 Ratings
    See Software
    Learn More
    Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO.
  • 2
    IBM QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 3
    Lansweeper Reviews

    Lansweeper

    Lansweeper

    $495.00/year
    1 Rating
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 4
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 5
    Qualys VMDR Reviews
    The industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time.
  • 6
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 7
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 8
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 9
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 10
    Splunk Enterprise Reviews
    Splunk makes it easy to go from data to business results faster than ever before. Splunk Enterprise makes it easy to collect, analyze, and take action on the untapped value of big data generated by technology infrastructures, security systems, and business applications. This will give you the insight to drive operational performance, and business results. You can collect and index logs and machine data from any source. Combine your machine data with data stored in relational databases, data warehouses, Hadoop and NoSQL data storages. Multi-site clustering and automatic loads balancing scale can support hundreds of terabytes per day, optimize response time and ensure continuous availability. Splunk Enterprise can be customized easily using the Splunk platform. Developers can create custom Splunk apps or integrate Splunk data in other applications. Splunk, our community and partners can create apps that enhance and extend the power and capabilities of the Splunk platform.
  • 11
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 12
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 13
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.
  • 14
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 15
    Cisco Vulnerability Management Reviews
    You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
  • 16
    ServiceNow Security Operations Reviews
    Use SOAR (security orchestration automation and response) and risk-based vulnerability control to overcome threats and vulnerabilities. Say hello to a secure digital transformation. Smart workflows and context help you speed up incident response. MITRE ATT&CK can be used to investigate threats and close any gaps. Risk-based vulnerability management can be applied to your infrastructure and applications. Collaborative workspaces are a great way to manage IT risks and remediate them. With role-based dashboards, reporting and analytics, you can get an executive view of key metrics. Increase visibility into your security posture, team performance, and other key metrics. Security Operations groups key applications in scalable packages that can adapt to your changing needs. You can quickly identify and prioritize high-impact threats and assess your security status in real time. Collaboration workflows and repeatable processes in security, risk and IT allow you to respond faster.
  • 17
    Rapid7 InsightIDR Reviews
    The cloud architecture and intuitive interface of InsightIDR make it easy to centralize your data and analyze it across logs, network and endpoints. You can find results in hours, not months. Our threat intelligence network provides insights and user behavior analytics that are automatically applied to all your data. This helps you to detect and respond quickly to attacks. Hacking-related breaches involving hacking were responsible for 80% of all hacking-related breaches in 2017. These breaches involved stolen passwords and/or weak passwords. Your greatest asset and greatest threat are your users. InsightIDR uses machine-learning to analyze the behavior of your users and alerts you if there is any suspicious lateral movement or stolen credentials.
  • 18
    Brinqa Reviews
    Brinqa Cyber risk graph presents a complete and accurate picture about your IT and security ecosystem. All your stakeholders will receive timely notifications, intelligent tickets, and actionable insights. Solutions that adapt to your business will protect every attack surface. A strong, stable, and dynamic cybersecurity foundation will support and enable true digital transformation. Brinqa Risk Platform is available for free. Get instant access to unparalleled risk visibility and a better security posture. The Cyber Risk Graph shows the organization's infrastructure and apps in real-time. It also delineates interconnects between business services and assets. It is also the knowledge source for organizational cybersecurity risk.
  • 19
    Rapid7 InsightVM Reviews
    You can better understand the risks in your current environment and work with technical teams. InsightVM's shared view and common language can bring together traditionally siloed groups and help drive impact. You can take a proactive approach to security by tracking and establishing metrics that will help you track progress and create accountability. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment--including local, remote, cloud, containerized, and virtual infrastructure--but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM isn't a magic bullet. It provides the shared view and common language that are needed to bring together traditionally siloed groups and drive impact. It supports proactive vulnerability management through tracking and metrics that provide accountability for remediators, demonstrate the impact across teams, celebrate progress, and encourage celebrations.
  • 20
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 21
    OpenVAS Reviews

    OpenVAS

    Greenbone Networks

    OpenVAS is a fully-featured vulnerability scanner. It can perform unauthenticated and authenticated testing as well as various high-level and lower-level industrial protocols. Performance tuning is available for large-scale scans. There is also an internal programming language that can be used to implement any vulnerability test. The scanner retrieves the tests to detect vulnerabilities from a feed with a long history and daily update. OpenVAS was developed by Greenbone Networks and has been moving forward since 2006. The scanner is part of the commercial vulnerability management product Greenbone Enterprise Appliance. It forms the Greenbone Vulnerability Management along with other Open Source modules.
  • 22
    Metasploit Reviews
    Sharing knowledge is a great way to increase your power. Metasploit is a collaboration between Rapid7 and the open-source community. It helps security teams to do more than verify vulnerabilities, manage security assessments and improve security awareness. It empowers and arms security defenders to stay one step ahead of the game.
  • 23
    Splunk SOAR Reviews
    Splunk SOAR is a powerful platform which allows organizations to streamline and automate security operations. It integrates with a variety of security tools and systems to allow teams to automate repetitive processes, orchestrate workflows and respond to incidents quicker. Splunk SOAR allows security teams to create playbooks which automate incident response processes. This reduces the time it takes to detect, investigate and resolve security threats. The platform offers advanced analytics, real time threat intelligence, and collaborative tools to improve decision-making and overall security posture. Splunk SOAR automates routine tasks and allows for more efficient resource use, helping organizations respond to threats faster and with greater accuracy. This reduces risks and enhances cybersecurity resilience.
  • 24
    OWASP ZAP Reviews
    Zed Attack Proxy is a free and open-source penetration test tool that is being maintained under the wing of the Open Web Application Security Project. ZAP is flexible and extensible and was specifically designed for testing web applications. ZAP is a "man in the middle proxy" that acts as a firewall between the browser and the web app. It can intercept and inspect the messages between the browser and web applications, modify them if necessary, and then forward those packets to the destination. It can be used both as a standalone application and as a daemon process. ZAP offers functionality for all skill levels, from developers to security testers, to security specialists, to security testers who are new to security testing. ZAP supports all major OSes and Dockers, so you don't have to stick with one OS. You can access additional functionality from the ZAP Marketplace by downloading add-ons.
  • 25
    Kali Linux Reviews
    Kali Linux, an open-source Linux distribution that is Debian-based, is designed for information security tasks such as Penetration Testing and Security Research. Any Linux can be used to install pentesting tools. However, you must manually set up and configure the tools. Kali was designed to make it easier for professionals to just sit down and do the work. Kali is always at your fingertips, no matter where it is needed. All versions of Kali are available for mobile devices, such as ARM, Docker, ARM and Amazon Web Services. It's easy to create an optimized Kali version for your needs using metapackages. These metapackages are optimized for security professionals and have a well-documented ISO customization process. No matter if you're a veteran or a novice, we have all the information that you need.
  • Previous
  • You're on page 1
  • 2
  • Next