Best Quixxi Alternatives in 2024

Find the top alternatives to Quixxi currently available. Compare ratings, reviews, pricing, and features of Quixxi alternatives in 2024. Slashdot lists the best Quixxi alternatives on the market that offer competing products that are similar to Quixxi. Sort through Quixxi alternatives below to make the best choice for your needs

  • 1
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 2
    AppSealing Reviews

    AppSealing

    INKA Entworks

    34 Ratings
    Top Pick See Software
    Learn More
    Compare Both
    AppSealing is an AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally.
  • 3
    GlitchSecure Reviews
    See Software
    Learn More
    Compare Both
    Hackers build Continuous Security Testing for SaaS Companies Continuous vulnerability assessments and pentests on demand will automatically assess your security posture. Hackers never stop testing and neither should your company. We use a hybrid strategy that combines expert hacker-built testing methodologies, a real time reporting dashboard, and continuous high-quality results. We improve the traditional pentesting cycle by continuously providing expert advice, verification of remediation, and automated security tests throughout the year. Our team of experts will work with you to scope and review all your applications, APIs and networks, ensuring that they are thoroughly tested throughout the year. Let us help you sleep better at night.
  • 4
    Vulcan Cyber Reviews

    Vulcan Cyber

    Vulcan Cyber

    $999 / month
    Vulcan Cyber is changing the way businesses reduce cyber risks through vulnerability remediation orchestration. We help IT security teams to go beyond remedial vulnerability management and help them drive vulnerability mitigation outcomes. Vulcan combines vulnerability and asset data with threat intelligence and customizable risk parameters, to provide risk-based vulnerability prioritization insight. We don't stop there. Vulcan remediation intelligence identifies the vulnerabilities that are important to your business and attaches the necessary fixes and remedies to mitigate them. Vulcan then orchestrates and measures the rest. This includes inputs into DevSecOps and patch management, configuration management and cloud security tools, teams, and functions. Vulcan Cyber has the unique ability to manage the entire vulnerability remediation process, from scan to fix.
  • 5
    Trend Micro Cloud One Reviews
    Trend Micro Cloud One, a security services platform for cloud builders, delivers the broadest and deepest cloud security offering in one solution, enabling you to secure your cloud infrastructure with clarity and simplicity. By considering your cloud projects and objectives holistically, Trend Micro Cloud One provides powerful security, while you leverage all of the benefits and efficiencies the cloud offers your business. Comprised of multiple services designed to meet specific cloud security needs, Trend Micro Cloud One gives you the flexibility to solve your challenges today, and the innovation to evolve with your cloud services in the future. You no longer have to find point products to meet the unique requirements of your infrastructure or work with the processes you’ve already implemented. With a comprehensive set of services, designed specifically for the cloud, Trend Micro Cloud One secures the different parts of your environment within one simple platform, seamlessly complementing and integrating with existing AWS, Microsoft® Azure™, VMware®, and Google Cloud™ toolsets.
  • 6
    SanerNow Reviews

    SanerNow

    SecPod Technologies

    $50/year/device
    4 Ratings
    SecPod SanerNow, the best unified endpoint security and management platform in the world, powers IT/Security Teams to automate cyber hygiene practices. It uses an intelligent agent-server architecture to ensure endpoint security and management. It provides accurate vulnerability management including scanning, detection, assessment and prioritization. SanerNow can be used on-premise or cloud. It integrates with patch management to automate patching across all major OSs, including Windows, MAC, Linux and a large number of 3rd-party software patches. What makes it different? It now offers other important features such as security compliance management and IT asset management. You can also access software deployment, device control, endpoint threat detection, and response. These tasks can be remotely performed and automated with SanerNow to protect your systems from the new wave of cyberattacks.
  • 7
    Finite State Reviews
    Finite State offers risk management solutions for the software supply chain, which includes comprehensive software composition analysis (SCA) and software bill of materials (SBOMs) for the connected world. Through its end-to-end SBOM solutions, Finite State empowers Product Security teams to comply with regulatory, customer, and security requirements. Its binary SCA is top-notch, providing visibility into third-party software and enabling Product Security teams to assess their risks in context and improve vulnerability detection. With visibility, scalability, and speed, Finite State integrates data from all security tools into a unified dashboard, providing maximum visibility for Product Security teams.
  • 8
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 9
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 10
    Qualys TruRisk Platform Reviews
    Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors.
  • 11
    DriveStrike Reviews

    DriveStrike

    DriveStrike

    $0.99 per month
    2 Ratings
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 12
    Appknox Reviews
    Get world-class mobile applications faster to the market without compromising security. We can build and deploy mobile apps for your organization at scale, and we will take care of your mobile app security. Appknox is the most highly rated security solution according to Gartner. We are thrilled when our client's app is protected against all vulnerabilities. Appknox is committed to helping businesses achieve their goals today and in the future. Static Application Security Testing (SAST). Appknox SAST has 36 test cases and can analyze your source code to detect nearly every vulnerability. Our tests cover security compliances such as OWASP Top 10, PCI DSS, HIPAA, and other commonly used security threats. Dynamic Application Security Testing, (DAST). Advanced vulnerabilities can be detected while your application is still running.
  • 13
    ImmuniWeb Reviews

    ImmuniWeb

    ImmuniWeb

    $499/month
    ImmuniWeb is a worldwide application security company. ImmuniWeb's headquarter is located in Geneva, Switzerland. Most of ImmuniWeb's customers come from banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring. ImmuniWeb also is a Key Player in the Application Penetration Testing market (according to MarketsandMarkets 2021 report). ImmuniWeb offers a contractual zero false-positives SLA with a money-back guarantee. ImmuniWeb’s AI technology is a recipient of numerous awards and recognitions, including Gartner Cool Vendor, IDC Innovator, and the winner of “SC Award Europe” in the “Best Usage of Machine Learning and AI” category. ImmuniWeb® Community Edition runs over 100,000 daily tests, being one of the largest application security communities. ImmuniWeb offers the following free tests: Website Security Test, SSL Security Test, Mobile App Security Test, Dark Web Exposure Test. ImmuniWeb SA is an ISO 27001 certified and CREST-accredited company.
  • 14
    AppScan Reviews
    HCL AppScan for Application Security Testing. To minimize attack exposure, adopt a scalable security test strategy that can identify and fix application vulnerabilities at every stage of the development process. HCL AppScan provides the best security testing tools available to protect your business and customers from attack. Rapidly identify, understand, and fix security vulnerabilities. App vulnerability detection and remediation is key to avoiding problems. Cloud-based application security testing suite for performing static, dynamic, and interactive testing on web and mobile. Multi-user, multiapp dynamic application security (DAST), large-scale, multiuser, multi-app security for applications (DAST), to identify, understand, and remediate vulnerabilities and attain regulatory compliance.
  • 15
    Data Theorem Reviews
    Your global, multi-cloud environment should be able to inventory your apps, APIs, shadow assets, and other resources. You can create custom policies for different asset types, automate attack tools, or assess vulnerabilities. Before production begins, fix security issues to ensure that cloud and application data are compliant. Rollback options allow for automatic remediation of security vulnerabilities to prevent data leakage. Great security can make problems disappear. Good security can quickly find problems. Data Theorem is committed to creating great products that automate some of the most difficult areas of modern application security. The Analyzer Engine is the heart of Data Theorem. Use the Data Theorem analyzer engine and proprietary attack tools to continuously hack into and exploit application weaknesses. Data Theorem created TrustKit, the best open-source SDK. It is used by thousands of developers. So customers can continue to secure their entire Appsec stack, our technology ecosystem continues to expand.
  • 16
    Ostorlab Reviews

    Ostorlab

    Ostorlab

    $365 per month
    Ostorlab helps you discover your organization's weaknesses. It goes beyond subdomains, crawling, public registries and analytics, to provide an overall view of your external posture. Gain valuable insights in a few clicks to strengthen security and protect yourself against potential threats. Ostorlab automates the security assessment process and identifies privacy concerns. Ostorlab empowers developers and security teams to quickly identify and fix vulnerabilities. Ostorlab's feature of continuous scanning allows you to enjoy hands-free security. Automated scans are triggered on new releases to save you time and ensure continuous protection. Ostorlab allows you to easily access intercepted traffic and source code. Save hours of manual tooling by grouping outputs and seeing what attackers see.
  • 17
    DerScanner Reviews
    DerScanner combines static (SAST), dynamics (DAST) as well as software composition analysis (SCA), all in one interface. It allows you to check your own code and open-source code with one solution. Compare the results of SAST with DAST. Verify the vulnerabilities detected and eliminate them first. Strengthen your code and fix vulnerabilities in your own code as well as third-party code. Perform an independent code analysis with developers-agnostic applications analysis. Detect vulnerabilities and features that are not documented in the code, at any stage of the application lifecycle. Secure legacy apps and control your in-house or external developers. Improve user experience and feedback by using a secure and smoothly-working application.
  • 18
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 19
    OpenText Fortify on Demand Reviews
    OpenText™, Fortify™, On Demand is a software security assurance service that includes essential tools, training and AppSec management. It allows you to easily create, augment and expand your program. It supports secure software development by providing continuous feedback directly to the developer at DevOps speeds and embedding scalable security testing into the development toolchain. Rapidly resolve issues during the software lifecycle using robust assessments performed by a team security experts. Use a solution which has been delivering SAST, DAST and SCA since 2015 to federal, state and local government, educational agencies and government contractors. Manage a few or thousands of applications with a solution which can be scaled to meet the needs of any organization, regardless its size. Cloud-based services offer the flexibility and accessibility you need without the need to install or maintain an on-premises infrastructure.
  • 20
    Intruder Reviews
    Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
  • 21
    VMware Workspace ONE Reviews
    VMware Workspace ONE is an intelligence-driven digital workspace platform that allows you to securely and securely distribute and manage any app from any device. Workspace ONE integrates access management, application management, and multi-platform endpoint administration into a single platform. It is available as a cloud-based service or as an on-premises deployment. Enterprises can maximize employee engagement and productivity through Workspace ONE. Employees have a personalized experience and day-one access to any app on any device. Integrate VMware Horizon Cloud and traditional VDI to transform published apps. This provides unparalleled simplicity, flexibility, speed, and scale at a lower price. The "multi-cloud" has a common control plane that allows you to design an architecture and cost model that meets your needs.
  • 22
    RiskSense Reviews
    You can quickly identify the right actions to take. Accelerate remediation activities at the most critical vulnerability exposure points on your attack surface, infrastructure and applications. Full-stack visibility into application risk exposure from development through production. To locate code vulnerabilities and prioritize remediation, unify all application scan data (SAST and DAST, OSS and Container). This is the easiest way to access authoritative vulnerability threat intelligence. Access research from industry-leading exploit writers and sources with the highest level of fidelity.
  • 23
    AppUse Reviews
    AppUse (Virtual Machine), is a VM (Virtual Machine), developed by AppSecLabs. It is a unique platform that allows mobile application security testing on Android and iOS apps. It also includes custom-made scripts and tools created by AppSecLabs. Features: Fully supported real device Simple and beautiful hacking wizards Proxy supports binary protocols Section on New Application Data Tree-view of the folder/file structure of the application Ability to extract files View files Ability to edit files Ability to extract databases Dashboard allows dynamic proxy management New application-reversing features Pro version of the Updated Reframeworker Status of Android device using dynamic indicator Advanced APK analyzers Android 5 compatibility Dynamic analysis Malware analysis Full support for multiple devices Broadcast sender and service binder Support for SAAS - Run AppUse from the cloud Emulator files can be easily tracked and controlled Performance improvements There are many other new features.
  • 24
    Infocyte Reviews
    Security teams can use the Infocyte Managed Response Platform to detect and respond to cyber threats and vulnerabilities within their network. This platform is available for physical, virtual and serverless assets. Our MDR platform offers asset and application discovery, automated threats hunting, and incident response capabilities on-demand. These proactive cyber security measures help organizations reduce attacker dwell time, reduce overall risk, maintain compliance, and streamline security operations.
  • 25
    Checkmarx Reviews
    The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource.
  • 26
    Trellix Reviews
    The Trellix Platform is a composable XDR platform that adapts to your business's challenges. The Trellix Platform learns to adapt for living protection. It provides native and open connections, expert support, and embedded support for your employees. Adaptive prevention is a method of protecting your organization from threats. It responds in machine-time to them. Trellix is trusted by 75M customers. Zero trust principles allow for maximum business agility and protect against back-door, side-door and front-door attacks. This allows for simplified policy management. Secure agile DevOps, visible deployment environments, and comprehensive protection for cloud-native apps. Our email and collaboration tool security protects you against high-volume attackers and exposure points. This automates for optimal productivity and allows for secure and agile teamwork.
  • 27
    Veracode Reviews
    Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA.
  • 28
    SecurityHQ Reviews
    SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs.
  • 29
    Digital Defense Reviews
    It doesn't mean following the latest trends blindly to provide best-in-class cybersecurity. It means a commitment to core technology, and meaningful innovation. You will see how our threat management and vulnerability solutions provide organizations like yours the security foundation they need to protect their most important assets. Even though some companies believe it is difficult to eliminate network vulnerabilities, it doesn't need to be. It is possible to create a powerful and effective cybersecurity program that is both affordable and easy-to-use. A solid security foundation is all you need. Digital Defense understands that cyber threats are a reality for every business. We have a reputation for developing innovative technology in threat and vulnerability management software. This has been achieved over 20 years.
  • 30
    Contrast Security Reviews
    Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development.
  • 31
    Outpost24 Reviews
    With continuous security testing across all networks, devices, containers, and applications, you can better understand your attack surface and reduce cyber exposure to an attacker. You won't get any help if you have only limited information. Even the most experienced security personnel can be overwhelmed by the sheer volume of alerts and vulnerabilities that they must deal with. Our tools are powered by threat intelligence and machine-learning and provide risk-based insight to help prioritize remediation and decrease time to patch. Our predictive risk-based vulnerability management tools make your network security proactive. This will help you reduce the time it takes to patch and more efficiently remediate. This industry-leading process continuously identifies application flaws and secures your SDLC for faster and safer software releases. Cloud workload analytics, CIS configuration assessment, and contain inspection for multi- and hybrid clouds will help you secure your cloud migration.
  • 32
    WhiteHat Dynamic Reviews
    WhiteHat™, Dynamic quickly and accurately detects vulnerabilities in websites and apps. It has the agility and scale you need to identify security risk across your entire application portfolio. SaaS delivery makes it easy to implement and allows you to scale quickly as your security testing requirements change. You can scan your production applications securely without the need to create a separate test environment. Continuous scanning detects code changes and adapts to them, so new functionality can be automatically tested. AI-enabled verification reduces false positives and minimizes vulnerability triage time. WhiteHat Dynamic is a DAST tool that does not slow down security and development teams with lengthy lists of findings that require lengthy triage to determine the true vulnerabilities. Instead, it combines AI with expert security analysis to provide your teams with the most accurate results in the shortest possible time.
  • 33
    Q-MAST Reviews
    SAST, IAST, and DAST, plus extensive proprietary engine that go beyond these methods to discover more CVEs, than any other application-security company. Built to test privileged applications that have more permissions, and therefore introduce greater risk. We are able to test apps deployed without having to circumvent built-in protections. Built on our mobile-first heritage Q-MAST allows pen-testers to thoroughly assess mobile applications for security and privacy issues, reducing manual testing efforts from weeks to minutes without compromising the results. While most device manufacturers do their best to make sure that pre-installed applications are secure, they cannot guarantee that their devices will be free of vulnerabilities or that the configurations and permissions setting will minimize security risks for end users. Learn how to protect your device.
  • 34
    Reblaze Reviews
    Reblaze is a cloud-native, fully managed security platform for websites and web applications. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, DC), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic.
  • 35
    Detectify Reviews

    Detectify

    Detectify

    $89 per month
    Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. ProdSec and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. Our scanners are built with security findings from 400+ ethical hackers. Their submissions go far beyond the CVE libraries, which are not sufficient to test modern application security.
  • 36
    Kryptowire Reviews
    Kryptowire offers a range of SaaS solutions that are focused on mobile applications. The Company provides assurance and anti-piracy tools as well as market security analytics and protection for mobile brands. Kryptowire serves commercial customers all over the world. Our automated tools can identify back-doors, regulatory and compliance failures, as well as vulnerabilities, whether they are there intentionally or not. Automated analysis of the security of every mobile application on every device for every employee in your company. Cloud-based and/or in-house appliance deployment. No user or enterprise data collection. Third-party libraries are fully tested. Kryptowire automatically validates and tests the security of mobile and IoT software and applications according to the highest industry and government software assurance standards.
  • 37
    Netacea Bot Management Reviews
    Netacea is a pioneering server-side detection and mitigation approach that helps us understand bot behavior better than anyone else. Our technology is easy to implement and supports many integrations. This provides comprehensive protection against malicious bots across your website, mobile app, and APIs without compromising your website infrastructure, reliance upon hardware, or disruptive code changes. Our team of experts and revolutionary machine-learning powered Intent Analytics™, engine help us quickly distinguish between bots and humans. This allows us to prioritize genuine users. Netacea works in close collaboration with your security functions, from implementation to providing accurate detection and equipping you with actionable threat information.
  • 38
    Microsoft Intune Reviews
    Modernize IT service delivery to your workplace. Microsoft Intune enables you to simplify modern workplace management and achieve digital transform with Microsoft Intune. Microsoft Intune creates the most productive Microsoft 365 environment that allows users to work on any device or app they choose while protecting their data. Securely manage iOS and macOS devices using a single management solution. Automate deployment, provisioning and policy management. App delivery and updates can be automated. A highly scalable, distributed cloud service architecture ensures you stay up-to-date. The intelligent cloud provides insights and baselines that will help you to set security policies and configure settings. Protect data by ensuring that you don't have to manage the devices of employees or partners who access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 39
    Quantum Armor Reviews

    Quantum Armor

    Silent Breach

    From $49/asset/month
    1 Rating
    Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
  • 40
    Famoco MDM Reviews

    Famoco MDM

    Famoco

    $1 per month/device
    Famoco offers an Enterprise Mobility Management (EMM), solution that includes a range secure, remotely managed Android devices. Famoco provides a complete line of dedicated devices that are based on an Android OS and connected to a Mobile Device Management Platform. It facilitates application deployments, secures data capture, and allows for mobile workforce management, mobile payments and urban mobility. Today Famoco has deployed over 250,000 devices in 35 countries in less than three years. It counts among its customers and partners prestigious companies like ONET, Phoenix Group and Keolis. Famoco, a multi-award winning company, has six offices around the world: Paris, Brussels and New Delhi.
  • 41
    Prey Reviews
    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you. TRACKING AND LOCATION • GPS, Wifi Triangulation, and GeoIP Tracking • Control Zones (Geofencing) • Global Device View • Location History DEVICE SECURITY • Remote Screen Lock • Message Alert • Anti-mute Alarm • Control Zone Actions DATA SECURITY • Remote Wipe • File Retrieval • Kill Switch • Factory Reset DEVICE MANAGEMENT • Scheduled Automations • Mass Actions • Enterprise Inventory • Custom Labels and Search • Fleet Status Dashboard • Custom Deployments
  • 42
    Fusion UEM Reviews
    VXL Software's Fusion UEM, a unified endpoint management system, allows for powerful device management for smartphones and tablets, desktops, laptops, and thin clients. This allows you to have more control over your devices and secure homeworking. Fusion UEM offers the industry's best device management portfolio. It supports Android (4.x upwards), iOS (7.0 upwards), mobile devices, Windows desktop / notebook PCs (XP/7/8/10 IoT & Windows7/10 Professional), VXL Windows Embedded, Linux thin clients, and Windows-based thin clients (from third parties). Fusion SecureDesktop provides unparalleled endpoint management power and remote and homeworking device control that is comparable to on-premises. Fusion SecureDesktop allows employees to access corporate applications and data securely from their home computers, allowing them to secure access virtualised corporate Windows desktops.
  • 43
    Relution Reviews

    Relution

    Relution

    $2 per month
    Manage iOS, Android, Windows 10/11 devices. You can secure your devices with configurations and restrictions. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Manage and inventory native and public Apple, Android, Windows and Windows mobile apps. Apps for mobile devices can be reviewed, approved, and published. Allow employees, partners, or other stakeholders to access enterprise apps via your corporate app store. You can manage your Apple iOS and Android tablets securely and deploy the appropriate apps in your school. Relution's Mobile Device and App Management is a benefit for all sizes of companies, authorities and teams. Relution is used by IT Retailers, Educational Institutions, and Resellers to provide this service to their customers. Relution is a leading IT application in the digital education sector. Relution has been the leading mobile device management solution that is privacy-compliant and cross platform for over ten years.
  • 44
    Backslash Security Reviews
    Ensure the security and integrity of your code. Identify externally accessible data flows and vulnerabilities to effectively mitigate risk. By identifying the real attack paths that lead to reachable code we allow you to fix only code and open source software that are in use and reachable. Avoid overloading development teams with irrelevant vulnerability. Prioritize risk-mitigation efforts more effectively to ensure a focused and efficient approach to security. Reduce the noise CSPM and CNAPP create by removing non-reachable packages. Analyze your software components and dependencies to identify any known vulnerabilities or outdated library that could pose a risk. Backslash analyses both direct and transitive package, ensuring coverage of 100%. It is more effective than existing tools that only focus on direct packages.
  • 45
    Lightspeed Mobile Device Management Reviews
    Lightspeed Mobile Device Management™ provides district IT leaders with a central, cloud-based solution that allows for infinitely scalable devices, applications, and policy controls. You can ensure safe and secure management for student learning resources. This includes real-time visibility and reporting that is essential for effective distance learning. Lightspeed MDM™, which allows remote configuration and deployment of apps by grade, school, and student, is intuitive and flexible. The Self-Service App Library allows teachers and students to access and install approved curriculum. This helps to reduce the IT team's workload. Lightspeed Systems®, a hierarchical platform for device management, gives district technology teams visibility and admin permissions based on tier. IT teams can remotely change, deploy, and revoke hundreds policies without having to touch any devices. This reduces downtime and costs.
  • 46
    Security Innovation Reviews
    Security Innovation solves software security issues from all angles. We make risk reduction a reality, whether it's through fix-driven assessments or innovative training to learn & never forget. The only cyber range that is software-focused in the industry. Cloud-based, no need to install anything. All you have to do is bring your attitude. To reduce real risk, go beyond the code! The industry's most comprehensive coverage for software developers, operators, and defense professionals, from novice to elite. We find vulnerabilities that others cannot. We also provide tech-specific assistance to help you fix them. Secure cloud operations, IT Infrastructure hardening and Secure DevOps. Software assurance, application risk rating, and other services. Security Innovation is a recognized authority in software security. They help organizations develop and deploy more secure software. Security Innovation specializes on software security. This is an area in which traditional "information security" or "business" consultants often struggle.
  • 47
    YesWeHack Reviews
    YesWeHack is a leading Bug Bounty and Vulnerability Management Platform whose clients include ZTE, Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces. Founded in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps and other digital assets. YesWeHack products include Bug Bounty, Vulnerability Disclosure Policy (VDP), Pentest Management and Attack Surface Management platforms.
  • 48
    Sparrow DAST Reviews
    Dynamic application security testing solution that delivers powerful analytics and high usability. Web application analysis using the most recent technologies, including HTML5 and Ajax. Event-based vulnerability attack repair. Automatically crawls subdirectories information based on a web application's URL. Security vulnerabilities can be detected from crawled URLs. Analysis of vulnerability in open source web libraries. Sparrow's analytic solutions allow for interaction with Sparrow to overcome limitations of traditional DAST technology. TrueScan (IAST module): Increase detection with IAST module. Web-based user interface removes the need to install and makes it easy to access via a web browser. Centralized sharing and management of analysis results. Browser event replay technology can be used to detect security flaws in web applications. Open source vulnerability analysis of the web library. Sparrow SAST, RASP and interaction can overcome limitations of dynamic analysis. TrueScan function allows you to IAST.
  • 49
    OWASP ZAP Reviews
    Zed Attack Proxy is a free and open-source penetration test tool that is being maintained under the wing of the Open Web Application Security Project. ZAP is flexible and extensible and was specifically designed for testing web applications. ZAP is a "man in the middle proxy" that acts as a firewall between the browser and the web app. It can intercept and inspect the messages between the browser and web applications, modify them if necessary, and then forward those packets to the destination. It can be used both as a standalone application and as a daemon process. ZAP offers functionality for all skill levels, from developers to security testers, to security specialists, to security testers who are new to security testing. ZAP supports all major OSes and Dockers, so you don't have to stick with one OS. You can access additional functionality from the ZAP Marketplace by downloading add-ons.
  • 50
    OpenText Fortify WebInspect Reviews
    Automated dynamic application security testing can help you find and fix web application vulnerabilities. Automated dynamic analysis of web applications and APIs can detect exploitable vulnerabilities. Support for the most recent web technologies and pre-configured policies to comply with major compliance regulations. High-powered scanning integrations allow API and single page application testing at scale. Automation and workflow integrations are key to meeting the DevOps needs. Monitoring trends and dynamic analysis are two of the ways to identify vulnerabilities. With custom scan policies and incremental support, you can achieve fast and focused results. AppSec programs should be built around solutions and not just products. Fortify's single taxonomy can be used for SAST (DAST), IAST, RASP, and DAST. WebInspect is the industry's most advanced dynamic web application testing tool, providing the coverage required to support both modern and legacy applications.