Best Promon SHIELD Alternatives in 2024
Find the top alternatives to Promon SHIELD currently available. Compare ratings, reviews, pricing, and features of Promon SHIELD alternatives in 2024. Slashdot lists the best Promon SHIELD alternatives on the market that offer competing products that are similar to Promon SHIELD. Sort through Promon SHIELD alternatives below to make the best choice for your needs
-
1
AppSealing
INKA Entworks
44 RatingsAppSealing is an AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally. -
2
zDefend
ZIMPERIUM
Zimperium’s zDefend enables mobile apps to detect and protect themselves proactively against runtime threats and attacks. With this runtime protection capability, mobile apps can assess device risk posture in real-time and dynamically prevent access or disable high-risk functionality to minimize fraud and theft attempts on end-user devices proactively. The security policy and associated mitigations reside in-app allowing the actions can be taken even in the absence of any network connectivity, making the protections extremely difficult to circumvent. The ability to detect threats and attacks on-device across the install base provides Security Operations (SOC) teams with real-time threat telemetry. Detailed threat forensics help isolate and automate downstream mitigation activities across other enterprise. In-app security policies are set and managed centrally via the console but are communicated in real-time to the entire install base without needing to publish a new version. This practical and scalable approach allows Enterprises to react promptly to new threats and vulnerabilities discovered. Zimperium’s unique approach to runtime defense also protects against advanced on-device compromise and exploitation techniques. -
3
Trend Cloud One
Trend Micro
Cloud security made simple with the Trend Cloud One platform. Save time and gain visibility. Automated deployments and discovery lead to operational efficiency and accelerated, simplified compliance. Builder's choice. We offer a wide range of APIs and turn-key integrations that allow you to choose the cloud and platforms you want, and then deploy them the way you like. One tool with the breadth, depth and innovation needed to meet and manage cloud security needs now and in the future. Cloud-native security is able to deliver new functionality every week without affecting access or experience. It seamlessly complements and integrates existing AWS, Microsoft Azure™, VMware®, and Google Cloud™. Automate the discovery of public, virtual, and private cloud environments, while protecting the network layer. This allows for flexibility and simplicity when it comes to securing the cloud during the migration and expansion processes. -
4
Quixxi is a leading provider of mobile app security solutions that empowers enterprises and security professionals to secure their mobile applications. Our state-of-the-art AI-based app scanner enables quick assessment and recommendations by identifying potential vulnerabilities in mobile apps and providing actionable guidelines based on the Open Web Application Security Project Mobile Application Security Verification Standard (OWASP MASVS). Quixxi is proud to be the only provider of a patented and proprietary mobile app security solution. Our diversified range of security offerings includes Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Runtime Application Self-Protection (RASP), and continuous threat monitoring. Our SAAS-based self-service portal is specifically targeted towards large enterprise and government organizations that have a portfolio of applications that are vulnerable to evolving cyber threats, with a primary focus on the BFSI, Healthcare, and IT service provider industries.
-
5
Appdome
Appdome
$0Appdome is changing the way people create mobile apps. Appdome's industry defining no-code mobile solutions platform uses a patented, artificial-intelligence coding technology to power a self-serve, user-friendly service that anyone can use to build new security, authentication, access, enterprise mobility, mobile threat, analytics and more into any Android and iOS app instantly. Appdome offers over 25,000 combinations of mobile features and kits, vendors, standards SDKs, SDKs, APIs, and other services. Appdome is used by over 200+ top financial, healthcare, government and m-commerce companies to deliver richer, safer mobile experiences to millions. It also eliminates complex development and accelerates mobile app lifecycles. -
6
OneSpan Mobile App Shielding
OneSpan
Your mobile app can operate in unsafe environments without affecting the user experience. Your app can be protected against the latest mobile threats without slowing down deployment frequency or speed. Your app's resistance against intrusion, tampering and reverse-engineering is increased. To ensure compliance with regulations like PSD2, GDPR, etc., you should implement strong data protection controls. You can serve more customers, even on jailbroken or root devices, while reducing risk. Integrate your favorite CI/CD tools to automate app shielding. Financial institutions don't have visibility into the security statuses of their customers' smartphones. OneSpan's application shielding solution protects mobile banking apps from the inside. It allows the app's secure operation even in hostile environments such as jailbroken iOS or Android devices. -
7
Zimperium MAPS
Zimperium
Zimperium’s Mobile Application Protection Suite (MAPS) helps developers build safe and secure mobile apps resistant to attacks. It is the only unified solution that combines comprehensive app protection and pure on-device threat detection with centralized threat visibility. MAPS comprises four solutions, each of which addresses a specific need as shown below: zScan: A solution to scan your app binary for security, privacy, and regulatory risks that can be exploited by an attacker. zKeyBox: State-of-the-art white-box cryptography that protects your encryption keys and secrets, while obscuring cryptographic algorithms so an app’s execution logic is not visible to an attacker, even if the device is in their hands. zShield: Advanced protection for an app’s source code, intellectual property (IP), and data from potential attacks like reverse engineering and code tampering. zDefend: Our machine learning-based device attestation tool with runtime awareness through RASP delivers a vast amount of telemetry and analytics from the on-device ML solution to zConsole. zDefend protects against 0-day attacks and can be updated Over-The-Air without the need to rebuild and redistribute the app itself. -
8
DashO
PreEmptive
Over 20 years of professional obfuscation. We invest in threat research and protection so that you don't have too. And we continually update our protection to stay ahead. You don't need an army of consultants to protect your app. Your first protected build for Android or Java can be made in a matter of minutes in any build environment. Our customers love our support and give it the highest rating. DashO can help you protect an app that is already in use and is facing new risks, or a brand new app that you are just starting to release. As apps become more important to businesses and hackers become more sophisticated, security threats for app developers are increasing. Intellectual property theft is only the beginning. Apps can also be used to steal trade secrets, user data, and identify other attack vectors. -
9
Dotfuscator
PreEmptive
App development teams are facing increasing security threats as apps become more important to businesses and attackers become more sophisticated. Intellectual property theft is only one of many security threats. Apps can also be used to steal trade secrets, user data, and identify other attack vectors. These breaches can result in serious brand and reputation damage, as well as revenue loss. App protection is a good investment for risk management, according to highly skilled app developers. Basic renaming obfuscation doesn't suffice. PreEmptive Protection Dotfuscator.NET offers many layers of protection. These include multiple forms of obfuscation such as renaming, string encryption and control flow. Active runtime checks also include tampering, debugging, root and other security measures. We test all layers to ensure that they don't cause any problems as the runtime platform changes. -
10
LIAPP
Lockin
$39.99 one-time paymentProtect your app Today. LIAPP is the most powerful and simple mobile app security solution. With just one click, we'll take care of security so you can focus more on everything else. Liapp lets you focus on your business by providing simple protection. It also helps you succeed in a great mobile app with strong hacking defenses and user-friendly hacking reports. Easy Receive all protection functions with a single APP upload. This helps you avoid wasting development resources. Strong Protects your mobile service business with powerful app hacking protection and source code protection. Visible. This allows you to monitor the users who use your app, their hacking rates, and the types of hacking they use. Numerous professional organizations around the world have praised The World Trusts LIAPP LIAPP for its excellent hacking defense. Selected as a major Global Representative Vendor in the report -
11
Jscrambler
Jscrambler
Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our end-to-end solution does more than protect your data—it empowers your business. With Jscrambler, your teams are free to take full advantage of client-side JavaScript innovation, assured that your business benefits from blanket protection against current and emerging cyber threats, data leaks, misconfigurations, and IP theft. Jscrambler is the only solution that enables the definition and enforcement of a single, future-proof security policy for client-side protection. We also make it easy to comply with new standards and regulations; our dedicated PCI module is designed specifically to help businesses meet the stringent new PCI DSS v4.0 requirements. Trusted by digital leaders worldwide, Jscrambler lets you move fast and embrace a culture of fearless innovation, backed by the assurance that both your first- and third-party client-side JavaScript assets will remain secure and compliant. -
12
Digital.ai Application Protection
Digital.ai
Our protection capabilities protect apps from reverse engineering, tampering and API exploits. These attacks can threaten your business, customers and bottom line. To confuse and deter threat actors, obfuscates source code and inserts honeypots. If suspicious activity is detected, it triggers defensive measures, such as app shutdown, user Sandbox, or code self repair. Without affecting DevOps, injects critical app code protections into the CI/CD cycle following code development. Protects data embedded in app code and static keys, as well as dynamic keys. Protects sensitive data while it is in transit between an app and a server. All major cryptographic modes and algorithms are supported with FIPS 140-2 certification. -
13
ARMO
ARMO
ARMO provides total security to in-house data and workloads. Our patent-pending technology protects against security overhead and prevents breaches regardless of whether you are using cloud-native, hybrid, legacy, or legacy environments. ARMO protects each microservice individually. This is done by creating a cryptographic DNA-based workload identity and analyzing each application's unique signature to provide an individualized and secure identity for every workload instance. We maintain trusted security anchors in protected software memory to prevent hackers. Stealth coding-based technology blocks any attempts to reverse engineer the protection code. It ensures complete protection of secrets and encryption keys during use. Our keys are not exposed and cannot be stolen. -
14
QShield
Quarkslab
QShield compiler obfuscator allows you to obscure your source code and protect your valuable assets. Protect your applications from dynamic and static analysis. Software running in untrusted environments is susceptible to reverse-engineering. An application running on a device that is accessible to an attacker is vulnerable. There are many techniques that can be used to extract secrets and intellectual property. Software protection mechanisms are required to prevent unauthorized parties from getting access to, tampering or recovering the source code from the binary. This is to protect revenues and intellectual property. There are more than 30 obfuscation options. A file-based policy, or comments throughout the code, allows for granular control over the protection profile. Each compiled application has its own unique randomness seed that allows for build diversification. Integrity checks and detection debuggers, emulators and hooking frameworks. -
15
JSDefender
PreEmptive
Innovative JavaScript obfuscation techniques that include control-flow flattening, manipulation detection, and other in-app protection transformations. We wouldn't send our own code unprotected to a remote service managed by third parties, and we wouldn't expect you to. JSDefender supports all major JavaScript runtimes and bundlers, including Angular and Node, React and React Native, Webpack, and others. JavaScript apps are distributed in source form, unlike languages like Java and.NET, which are compiled to intermediate stack-based assembly instructions. Your code is visible to anyone who has access to the execution environment (such as a browser). Potential attackers can easily access the running code by using the browser's debugger, or other tools to analyze the code for vulnerabilities. -
16
KyberSecurity
KyberSecurity
KyberSecurity protects applications that are designed to work on the cloud, servers, or IoT. Automated security engines are embedded directly in your application. The code source is not modified and protection requires no prior security knowledge. Once the security engines are inserted into an application, protection is available wherever the application is deployed. KyberSecurity applications are self-defendable. The protection does not depend on external libraries, networking modules, or hardware. KyberSecurity protection consists of a range of multilayered cybersecurity technologies. Our security engines are interconnected, providing outstanding protection against sophisticated attacks. Securely embeds security controls directly in applications, enabling protection wherever the app is deployed. -
17
OneSpan Mobile Security Suite
OneSpan
Optimize your customers' mobile experience and protect their personal data. Reduce fraud by using state-of-the art authentication and mobile app security. Protect your institution, users, and apps from complex mobile threats that are resulting from an increasing number of data breaches. Optimize the user experience by providing transparent mobile app protection and the right level of security at the right moment. Advanced mobile app shielding technology, behavioral and biometric authentication, and the ability for step-up authentication when necessary, allow you to maintain trust without affecting the customer experience. You can deploy your app in untrusted environments with confidence. OneSpan mobile app shielding allows your app to proactively protect itself against the most advanced mobile threats by cybercriminals, scammers, and hackers. -
18
Falco
Falco
FreeFalco is an open-source standard for runtime protection for hosts, containers and cloud services. Get real-time visibility of unexpected behaviors, config modifications, intrusions and data theft. eBPF's power allows you to secure containerized applications at any scale. Protect your applications in real-time, no matter if they are running on bare metal or virtual machines. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions across your cloud in real-time, from AWS, GCP, Azure, Okta, Github, and beyond. Falco detects threats in containers, Kubernetes and cloud services. Falco detects unexpected behavior, configuration updates, and attacks in real-time. You can rely upon a standard that is widely supported and multi-vendor. -
19
RedShield
RedShield
RedShield has partnered up with AWS, the world's largest cloud provider, to create a next-generation architecture that provides unparalleled DDoS protection as part RedShield. It can seem impossible to keep up with cybercriminals in a world that has 50 vulnerabilities per day. RedShield employs a best-practice operational approach with cybersecurity experts, tools, AI-supported processes, and other support to help customers minimize their cybersecurity risk and maximize their resilience. The cybersecurity battle is complex and dynamic. Add to that, the shortage of security and development professionals and the high demand for them, it can quickly become a distraction from core business. RedShield's service solves people's problems at an average cost of approximately. RedShield's service is 10% cheaper than building and running your own web app security team. This provides a compelling return for mitigation investment. -
20
Verimatrix
Verimatrix
Verimatrix is a security platform that empowers the modern connected world. We provide digital content protection, as well as applications and devices security that is intuitive, user-friendly, and frictionless. Verimatrix is trusted by leading brands to protect everything, from premium movies and live streaming sports to sensitive financial and medical data to mission-critical mobile apps. We provide the trusted connections that our customers need to deliver engaging content and experiences to millions around the globe. Verimatrix assists partners in getting to market faster, scaling easily, protecting valuable revenue streams, and winning new business. Scale quickly, get to market faster, win new business, and protect valuable revenue streams. We do that. We protect your digital content, applications, and devices with intuitive, human-centered, and frictionless security. Verimatrix is the leader in protecting video content via IPTV, OTT and DVB. -
21
Find and fix security problems early with the most accurate results available in the industry. The OpenText™, Fortify™, Static Code Analyzer pinpoints security vulnerabilities, prioritizes issues that are most serious, and provides detailed instructions on how to fix these. A centralized software security manager helps developers resolve issues faster. Support for 1,657 vulnerabilities categories in 33+ languages and more than 1 million APIs. Fortify's integration platform allows you to embed security into the application development tools that you use. Audit Assistant allows you to control the speed and accuracy SAST scans by adjusting the depth and minimizing false-positives. Scale SAST scans dynamically up or down in order to meet the changing needs of the CI/CD pipe. Shift-left security is achieved in a single solution for cloud-native apps, from IaC through to serverless.
-
22
Operant
Operant AI
Operant AI protects modern applications at every layer, from infrastructure to APIs. Operant's full-stack visibility and runtime control are available within minutes of a single deployment. It blocks a wide range critical and common attacks, including data exfiltration and poisoning, zero-day vulns and lateral movement. It also blocks cryptomining and prompt injection. All without instrumentation, drift, or friction between Dev and Ops. Operant’s in-line protection of all data in use, across every interaction, from infrastructure to APIs, adds a new layer of security to your cloud native apps without any instrumentation, no application code changes, and zero integrations. -
23
ThreatCast
Guardsquare
Security teams and developers often don't have visibility into the most common attack vectors or vulnerable parts of their code after an Android or iOS app has been released. This can lead to a lack of visibility for security teams and developers until it's too late. ThreatCast allows DexGuard and iXGuard customers to monitor threats in real-time, adjust their security configurations, and protect apps from malicious users and suspicious activity. Easy-to-use dashboards and custom alerts can be used to detect threats as they occur. Analyze threat data in order to immediately respond to attacks and block suspicious users. Mobile security should be prioritized in the development process without compromising speed-to-market. -
24
Hdiv
Hdiv Security
Hdiv solutions allow you to provide holistic, all-in one solutions that protect applications from within and simplify implementation across a variety of environments. Hdiv eliminates the need to have security experts in teams and automates self-protection to significantly reduce operating costs. Hdiv protects applications right from the beginning. It works with applications during development to find the root causes of risk, and after they are put into production. Hdiv's lightweight, integrated approach doesn't require additional hardware and can be used with your default hardware. Hdiv scales with your application, removing the extra hardware cost associated with security solutions. Hdiv uses a runtime dataflow technique that reports the file and line number of security flaws in the source code to detect them before they can be exploited. -
25
K2 Security Platform
K2 Cyber Security
Protection for applications and container workloads. Real-time Zero Day Attack Prevention. K2 Security Platform is highly efficient in detecting sophisticated attacks against applications that are often not detected by endpoint security solutions like endpoint detection and reaction (EDR) or web application firewall (WAF). K2's non-invasive, easy-to-use agent is quick and easy to install. K2 Platform uses a deterministic technique called optimized control flow integrity (OCFI). The platform automatically creates a DNA mapping of each application at runtime. This is used to determine if the application is running correctly. This allows for extremely accurate attack detection, eliminating almost all false alarms. K2's Platform is available in cloud, on-premise, hybrid environments, and protects web applications as well as container workloads and Kubernetes. OWASP Top 10, and other sophisticated attack types coverage. -
26
StarForce ProActive
StarForce Technologies
This reliable solution to software licensing and protection is designed to protect software and games against illegal distribution, pirate use, commercial reproduction and private copying, reverse engineering, cracking, and commercial replication. It integrates Steam and DRM fully. Advanced software license management to manage software license breaches (expiration date, activations, etc.). Protection against running the applications under debuggers (the function works for both system and user levels). Protection against remote terminal sessions running the applications (protection against remote access). Protection against running applications on virtual machines (adjustable parameter). -
27
SEAP
XTN Cognitive Security
SEAP®, for Mobile is an SDK that is integrated into the customer’s app and does not require any special permission. SEAP®, for Web, is JavaScript-based and executed in the web browser environment. It does not require any agent installation. SEAP®, detects malware activity in both web and mobile apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. SEAP®, which detects and reports technological threats to the device, such as jailbreaking, rooting, reverse engineering, binary tampering and repacking. The dedicated RASP APIs can be used to activate countermeasures for some of these conditions. SEAP®, which relies on behavioral biometrics and device identity authentication, detects fraudulent activity that attempts to take control of user accounts. -
28
Data Theorem
Data Theorem
Your global, multi-cloud environment should be able to inventory your apps, APIs, shadow assets, and other resources. You can create custom policies for different asset types, automate attack tools, or assess vulnerabilities. Before production begins, fix security issues to ensure that cloud and application data are compliant. Rollback options allow for automatic remediation of security vulnerabilities to prevent data leakage. Great security can make problems disappear. Good security can quickly find problems. Data Theorem is committed to creating great products that automate some of the most difficult areas of modern application security. The Analyzer Engine is the heart of Data Theorem. Use the Data Theorem analyzer engine and proprietary attack tools to continuously hack into and exploit application weaknesses. Data Theorem created TrustKit, the best open-source SDK. It is used by thousands of developers. So customers can continue to secure their entire Appsec stack, our technology ecosystem continues to expand. -
29
EndCrypt
Procenne
EndCrypt provides security solutions that are embedded within an application, rather than the operating system or network. This makes it more resistant to attacks. It is a ready to use SDK that can be embedded within a mobile app to protect it from environmental threats. EndCrypt provides security solutions that are implemented within the application, rather than the operating system or network. This makes it more resistant to attacks. It is an SDK that can be embedded within mobile applications to protect it from environmental threats. EndCrypt offers a wide range of security capabilities that protect applications. It prevents reverse engineering techniques through code obfuscation, anti-repackaging technology, and code obfuscation. It actively detects malicious keylogging, screen readers and repackaged apps, debuggers, emulators, jailbroken and rooted devices. It prevents foreign code from running or shuts down an application to protect sensitive data against cybercriminals. -
30
Validian Protect
Validian
Validian's technology protects data in use, in memory and in databases, at rest and in transit, as well as against interception by untrusted OS systems. It works with all operating systems, platforms and devices. ValidianProtect is a unique, flexible, scaleable, and quickly integrated cyber security middleware. This breakthrough in cyber security is capable of seamlessly securing data in use, in storage, in databases, at rest and in transit. Validian Protect is unique because it uses dynamically rotating symmetrical keys to encrypt and decrypt data in memory, in database, in storage, and in transit. It also protects against untrusted operating system interception. Our peer-to-peer encryption encrypts decentralized data as it travels from point to point, while providing security transitions to secure data in use and secure data at rest. -
31
DexGuard
Guardsquare
Protection of Android SDKs and applications against hacking and reverse engineering. Android applications and SDKs can be easily decompiled using readily available tools. This allows for many forms of abuse, such as intellectual property theft, credential harvesting and cloning. DexGuard protects cross-platform and native Android apps as well as SDKs from hacking and reverse engineering. It protects the code of apps and allows them to defend themselves at runtime. DexGuard is an Android application and library protection tool. It can be used as a command-line program. It allows you to fully protect your SDK or application without having to modify or share the source code. DexGuard supports both native Android (Java and Kotlin), as well as cross-platform applications (Cordova (Ionic), React Native, Unity, and Cordova). The NDK addon can extend DexGuard's functionality to protect and process native libraries. -
32
Imperva RASP
Imperva
Imperva RASP detects attacks and blocks them from within the application. RASP uses the patented LangSec technique to treat data as code. This allows RASP to see all possible malicious payloads before the application finishes its processes. The result? The result? Fast, accurate protection with no signatures or learning mode. Imperva RASP is an integral component of Imperva's full-stack application security solution, which is market-leading and brings defense-in depth to a new level. -
33
Signal Sciences
Signal Sciences
1 RatingThe most popular hybrid and multi-cloud platform, which provides next-gen WAF and API Security, RASP Advanced Rate Limiting, Bot Security, RASP, Bot Protection, and DDoS designed to eliminate legacy WAF challenges. Legacy WAFs were not designed to support today's web applications that are distributed across cloud and hybrid environments. Our next-generation web application firewall (NGWAF), and runtime app self protection (RASP), increase security and reliability without sacrificing speed. All at the lowest total cost (TCO). -
34
Contrast Security
Contrast Security
$0Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development. -
35
WhiteHat Dynamic
Synopsys
WhiteHat™, Dynamic quickly and accurately detects vulnerabilities in websites and apps. It has the agility and scale you need to identify security risk across your entire application portfolio. SaaS delivery makes it easy to implement and allows you to scale quickly as your security testing requirements change. You can scan your production applications securely without the need to create a separate test environment. Continuous scanning detects code changes and adapts to them, so new functionality can be automatically tested. AI-enabled verification reduces false positives and minimizes vulnerability triage time. WhiteHat Dynamic is a DAST tool that does not slow down security and development teams with lengthy lists of findings that require lengthy triage to determine the true vulnerabilities. Instead, it combines AI with expert security analysis to provide your teams with the most accurate results in the shortest possible time. -
36
Sparrow RASP
Sparrow
Protect web applications from application-layer attacks in real time Protect web applications from malicious activity and attacks by monitoring web applications in real time. Protect your applications even during patching and releasing. All information regarding detected attacks can be managed in one place. Detected attacks on the web application's WAS protected operation will be recorded and treated like an issue. Establish log policies and vulnerability detection guidelines. If vulnerabilities or threats are discovered during tracing, you can block requests and record them. The vulnerability information that is discovered will be shared with the DAST checklist. Automatically convert rules to allow vulnerabilities identified using DAST and SAST to be used. -
37
Irdeto
Irdeto
We offer services and solutions to protect revenue, promote growth, and combat cybercrime in video gaming, video entertainment, and related industries such as transport, health, infrastructure, and other connected industries. Companies in many industries can rely on us to help them protect their revenue, create new offerings, and combat cybercrime. You can protect your assets, your operations, and innovate with confidence. Streaming service with confidence and maximising your premium ad inventory You can reduce your costs and eliminate the hassles associated with maintaining the infrastructure that supports broadcast and online content delivery. Protect your brand reputation, profitability, productivity, and business models. Irdeto Cloaked CA, the most widely used cardless conditional access system worldwide for broadcast and IPTV operators, is the most advanced. Protect your brand, investments, and content. Irdeto is the preferred security provider to create a safe world where people can connect with trust. -
38
Templarbit
Templarbit
$99 per monthData-driven security allows you to monitor and defend apps. Templarbit is changing the definition of runtime security by building it from scratch to be cloud-native and powered by data intelligence. This modern, data-driven approach makes it easier to secure Web Apps and APIs faster. Templarbit Sonar offers lightning fast security monitoring that provides insights into the availability, performance and security configuration of Web Apps, APIs and websites. It's a fast and beautiful way to establish continuous security monitoring for your apps. You can measure everything right out of the box, without needing to install any agents, packages, or libraries. Sonar covers many checks that every software company should have, including uptime, response times, and a deep scan to your security configuration. -
39
Waratek
Waratek
To improve agility and efficiency, integrate seamless security into the software development lifecycle. Security policies should be flexible, easily understood by humans, and not be affected by technical debt. Securely deploy applications across hybrid, cloud, and on-premise infrastructures. Automate systems' compliance with desired security behavior to minimize fire drills & delays. Your apps' security can be executed in real time with a less than 3% production impact. Agent-less solutions are a disadvantage for highly regulated organizations with strict security requirements. Waratek uses an agent to protect itself against unknown threats. This is unlike agent-less models. Easily upgrade apps and dependencies such as Log4j without any code changes, vendor patches or downtime. -
40
Reflectiz
Reflectiz
$5000/year Reflectiz solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues. The Reflectiz solution is executed remotely with no installation required -
41
The Dynatrace software intelligence platform. Transform faster with unmatched observability, automation, intelligence, and efficiency in one platform. You don't need a bunch of tools to automate your multicloud dynamic and align multiple teams. You can spark collaboration between biz and dev with the most purpose-built use cases in one location. Unify complex multiclouds with out-of the box support for all major platforms and technologies. Get a wider view of your environment. One that includes metrics and logs, and trace data, as well as a complete topological model with distributed traceing, code-level detail and entity relationships. It also includes user experience and behavioral information. To automate everything, from development and releases to cloud operations and business processes, integrate Dynatrace's API into your existing ecosystem.
-
42
Shield Antivirus
ShieldApps
$69.99 one-time paymentShield antivirus protects your desktop and laptop computer from the latest viruses, malware, trojans and spyware. Shield antivirus uses active protection mechanisms to protect you computer from all threats. It is set up to monitor, block and alert when a threat is detected. Shield Antivirus has an easy installation, extensive monitoring and alert capabilities as well as email security by blocking and quarantining threats found in incoming emails. Shield antivirus provides full protection against internet/browsing-related threats while using a fraction of CPU power due to its advanced algorithms and detection engine. Shield Antivirus scans a computer automatically for threats according to a schedule. It also includes additional tools and features like the secure file eraser and history cleaner. -
43
CDNetworks Bot Shield
CDNetworks
Cloud-based bot management and mitigation platform. CDNetworks Bot Shield platform integrates with CDNetworks to prevent bots from stealing your assets. This platform strengthens web security and creates a better user experience by eliminating bad bots, redirecting good bots in the way you want them, and more. Bot Shield provides real-time dashboards, reporting, analytics and alerts that provide insight into all web activity. This allows you to create the best security profile for your web applications, without sacrificing performance. You can strengthen security by identifying and eliminating bad bots. Validating legitimate end-user behavior helps to combat fraud and abuse of digital assets. Prioritizing authorized traffic will improve end-user experience. Real-time big data analysis detects and recognizes accesses from benign users, malicious bots, and normal users. Allow good Bots to access your computer. -
44
CCIS Church Management Software
CCIS Church Management Software
$29.99/month CCIS Shield™, the latest church management system, was developed by CCIS Church Management Software. CCIS Shield™, which is fully web-enabled, can be accessed from any location with an Internet connection. CCIS Shield can be accessed from any device. However, it is best to use a desktop/laptop or tablet as a mobile device. CCIS Shield™, a web-based membership financial management system, offers a simple and flexible solution that you can customize to meet your church's specific needs. The program is flexible enough to allow you to choose what's most important to you, but powerful enough so that you can increase the depth of your data at anytime. You can keep secure notes about individuals, chart family relationships, track giving and contributions with the most ease, and create attendance and activities records. You can run reports, retrieve data, and improve your understanding of your church. CCIS Shield Web Church Member Management can help you improve the administration of your church. -
45
VoodooShield
VoodooShield
$20 per yearAll cybersecurity products have a weak spot. They can only offer a single level of protection. This means that they can either be too aggressive or too relaxed at any given moment, leading to false positives and breaches. VoodooShield addresses this problem by dynamically adapting its security posture based on user behavior and activity. We are able offer a stronger and more secure lock than any other product. Our antimalware context engine is a highly developed and refined algorithm that analyzes every feature of every attack chain event to determine whether benign or malicious events can be allowed. VoodooShield is able to provide very robust ransomware, script and LOLBin protection, as well as fileless malware protection capabilities. -
46
Ericom Shield
Ericom Software
Ericom Software offers businesses Zero Trust Secure Access to corporate apps, on-premises and in the cloud, from any device or location. Ericom Shield, a clientless enterprise-grade security solution, is designed to meet the needs of IT professionals and security personnel. It also provides transparent Internet access for end users via Remote Browser Isolation. Ericom Shield is available for deployment across any organization, on any device, with any operating system or browser. It does not require the installation of any software or plug ins on endpoints. Before files can be downloaded, they are scanned and cleaned using a Content Disarm and Reconstruction process (CDR). -
47
Box Shield
Box
$130 per monthShield allows you to classify content in your own way, manually or automatically. We are excited to announce Shield's native capability that automatically classifies files based on your policies and identifies PII. By placing controls near your content, you can prevent leaks immediately and provide an easy-to-use end-user experience. You can quickly set up access policies to protect your data and allow people to do their mission-critical work. Shield uses machine learning to provide timely, accurate alerts about insider threats, account compromises, and malware attacks. You can quickly evaluate alerts in Shield and send them to existing tools for further analysis. Shield can be used with the best-of breed security tools that you already have. For a unified view, alerts that contain more information than ever can be integrated with your SIEM or CASB. -
48
IBM Cloud™, Data Shield allows users to run containerized apps in a secure environment on an IBM Cloud Kubernetes Service Host, providing data-in use protection. IBM Cloud Data Shield allows users to write code to allocate private regions in memory. These are called enclaves and are protected from higher privilege processes. It extends Intel Software Guard Extensions(SGX) language support from C++ and C++ to Python, Java™, and also provides preconverted SGX apps for MySQL and NGINX. These tools are powered by the Fortanix Runtime Encryption Platform and Intel SGX technology. They allow organizations with sensitive data to use cloud computing with greater confidence. IBM Cloud Data Shield allows organizations with sensitive data to use cloud computing. IBM Cloud Data Shield allows containerized applications to be run in secure enclaves using the IBM Cloud Kubernetes Service.
-
49
SoftwareShield
Yummy Interactive
SoftwareShield™, Professional Edition is our mid-level product. It combines advanced protection features with an intuitive interface and a powerful HTML/Javascript user interface ("nag screens") Professional Edition goes beyond licensing and provides the tools you need for maximizing your revenue through advanced marketing and up-sell techniques. SoftwareShield™, Professional Edition offers the features you need in order to maximize your revenue. These features include: - Fully customizable HTML/Javascript-based end-user interface ("nag") screens - Dynamic "nag” screens that update your end-users' experience without requiring a new build - Provide trial extensions per action (e.g. User watches a video, signs up for an account, etc. - Maintain contact with registered users via the dynamic end-user interface. - No-hassle e-Commerce integration via CheckPoint -
50
ForceShield
ForceShield
We are the dynamic application protector for Web, Mobile, IoT and IoT. ForceShield was founded in 2016 by a group security experts with the aim of changing the rules in cybersecurity. The founders believed that traditional signature-based security technology was failing in the face sophisticated automated attacks. Dynamic Transformation, a proprietary security technology that they developed, increased the complexity and cost of attackers while shifting security from reactive to proactive protection. ForceShield saw that the rapid rise of automated attacks against the Internet of Things was a security challenge that their engineering and technology expertise could address. ForceShield provides a network defense layer that protects Web/Mobile applications as well as IoT devices from bot attacks.