images/2020/04/Fortscale.png}}

Fortscale

By making sense of terabytes of current and historical data without any predefined rules or…

22 Alternatives To Fortscale

Acunetix

Audit your website security and web applications for SQL injection, Cross site scripting and other…
images/2020/04/AlienVault-USM.png}}

AlienVault USM

Discover a better way to detect and respond to threats with products and services by AlienVault.

BitSight

BitSight is transforming how companies manage information security risk with objective, verifiable and actionable Security Ratings.

CloudSOC DNS Analytics

CloudSOC DNS Analytics application provides intrusion detection and alerting within environments by analyzing DNS query log data from the servers and workstations.

CodeRoad

A way to view code based on dependencies analysis.

Datadvantage

Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies.

Dependabot

Automated dependency updates for your Ruby, Python, JavaScript, PHP, .NET, Go, Elixir, Rust, Java and Elm.
images/2020/04/Exabeam.png}}

Exabeam

User Behavior Analytics
images/2020/04/FireEye-Threat-Analytics-Platform.png}}

FireEye Threat Analytics Platform

Quickly detect and respond to threats discovered via event and data stream threat analytics.

Forcepoint Web Security Suite

Internet Security
images/2020/04/HackerOne.png}}

HackerOne

HackerOne provides a platform designed to streamline vulnerability coordination and bug bounty program by enlisting hackers.

IBM QRadar

IBM QRadar is a network security intelligence and analytics that can detect cybersecurity attacks and network breaches & take action before any considerable damage is done.
images/2020/04/McAfee-ESM.png}}

McAfee ESM

McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.
images/2020/04/Qualys-Cloud-Platform.png}}

Qualys Cloud Platform

The revolutionary architecture that gives you a continuous, always-on assessment of your global security and compliance posture, with 2-second visibility across all your IT assets, wherever they reside.
images/2020/04/Scrutinizer.png}}

Scrutinizer

Powerful tools for measuring and improving code quality for open- and closed-source development projects.
images/2020/04/Securonix.png}}

Securonix

Security Intelligence Platform for monitoring security Events, Identity and Access data to detect…

Source Insight

Source Insight is a programming editor & code browser with built-in live analysis for C/C++, C#, Java, and more; helping you understand large projects.
images/2020/04/TINA-Security.png}}

TINA Security

Tina is a network security appliance that is developed for detection and prevention of contemporary cyber threats. Having aa hybrid design, Tina consists of various technologies; DPI, cyber intelligence, cloud technologies, honeypot and sandbox.
images/2020/04/Unified-VRM-by-NopSec.png}}

Unified VRM by NopSec

Identify, prioritize, and remediate risks & vulnerabilities in your network and web…