Recent Security Solutions

NIST Cybersecurity Framework

Gaithersburg, MD, US
Verified Business

Framework providing incident response playbooks and cybersecurity best practices.

Playbooks & Runbooks

HUNTER Platform

San Ramon, CA, US
Verified Business

Threat hunting platform with pre-built queries and hypotheses for proactive detection.

Threat Hunting Queries

Sigma HQ

Berlin, BE, DE
Verified Business

Generic signature format for SIEM systems enabling cross-platform detection rules.

SIGMA Rules

Yara-Rules Project

San Francisco, CA, US
Verified Business

Community-driven repository of YARA rules for malware detection and classification.

YARA Rules

Dragos

Hanover, MD, US
Verified Business

Industrial cybersecurity platform protecting critical infrastructure and OT environments.

Critical Infrastructure Intelligence

Stratfor

Austin, TX, US
Verified Business

Geopolitical intelligence platform analyzing cyber risks from political events.

Geopolitical Risk Analysis

FS-ISAC

Reston, VA, US
Verified Business

Financial Services Information Sharing and Analysis Center for sector-specific threats.

Industry-Specific Threats

BrandShield

Hackensack, NJ, US
Verified Business

Online brand protection platform detecting phishing, counterfeits, and brand abuse.

Brand Protection Intelligence

crt.sh

Jersey City, NJ, US
Verified Business

Certificate transparency log search engine for monitoring SSL certificate issuance.

Certificate Transparency Logs

VirusTotal

Mountain View, CA, US
Verified Business

Google-owned service analyzing files and URLs for malicious content detection.

File Hash Databases

Cisco Talos

San Jose, CA, US
Verified Business

Threat intelligence organization providing IP and domain reputation data.

IP/Domain Reputation Services

MITRE ATT&CK

Bedford, MA, US
Verified Business

Globally accessible knowledge base of adversary tactics and techniques.

Attack Technique Documentation

Browse by Tools

Antivirus/Anti-malware

Traditional and next-gen antivirus

1 item

Cloud Security Posture Management (CSPM)

Manage cloud security configurations

1 item

Data Loss Prevention (DLP)

Prevent data exfiltration

1 item

Firewalls & UTM

Next-generation firewalls and UTM solutions

10 items

Identity & Access Management (IAM)

Comprehensive IAM platforms

1 item

Network Security

Tools for securing network infrastructure

0 items

Security Information & Event Management (SIEM)

Centralized security event management

1 item

Web Application Firewalls (WAF)

Protect web applications

1 item

Cloud Workload Protection Platforms (CWPP)

Protect cloud workloads

1 item

Encryption Solutions

Data encryption at rest and in transit

1 item

Endpoint Detection & Response (EDR)

Advanced endpoint threat detection

1 item

Endpoint Security

Protection for endpoints and devices

0 items

Network Monitoring

Network traffic analysis and monitoring

10 items

Single Sign-On (SSO)

Unified authentication solutions

1 item

Static Application Security Testing (SAST)

Source code security analysis

1 item

Backup & Recovery

Secure backup and disaster recovery

1 item

Cloud Security

Security for cloud environments

0 items

Container Security

Secure containerized applications

1 item

Dynamic Application Security Testing (DAST)

Runtime security testing

1 item

Extended Detection & Response (XDR)

Unified detection across vectors

1 item

Intrusion Detection/Prevention (IDS/IPS)

Detect and prevent network intrusions

10 items

Multi-Factor Authentication (MFA)

Strong authentication solutions

1 item

Vulnerability Management

Identify and remediate vulnerabilities

1 item

Database Security

Protect database systems

1 item

Identity & Access

Identity and access management solutions

0 items

Identity Governance & Administration (IGA)

Identity lifecycle management

1 item

Interactive Application Security Testing (IAST)

Real-time application analysis

1 item

Mobile Device Management (MDM)

Secure and manage mobile devices

1 item

Network Access Control (NAC)

Control network access and compliance

10 items

Security Analytics

Advanced security data analysis

1 item

Serverless Security

Protect serverless functions

1 item

Data Protection

Tools for protecting sensitive data

0 items

Email Security

Secure email communications

1 item

Incident Response Platforms

Manage security incidents

1 item

Multi-Cloud Security

Unified multi-cloud protection

1 item

Privileged Access Management (PAM)

Secure privileged accounts

1 item

Runtime Application Self-Protection (RASP)

Runtime application protection

1 item

VPN Solutions

Secure remote access solutions

1 item

Security Operations

Tools for security operations centers

0 items

Application Security

Secure application development and runtime

0 items