Apps tagged with 'detect-threats'

All apps in Apps tagged with 'detect-threats' category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Whatoblock icon
     1 like

    Whatoblock is a real-time cybersecurity threat intelligence platform with global botnet tracking, scanner detection, interactive threat search, and a live threat map.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Whatoblock screenshot 1
    Whatoblock screenshot 1
    Whatoblock screenshot 2
    +3
    Whatoblock screenshot 3
  2. Blumira icon
     8 likes

    Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    5 alternatives
  3. StartEd icon
     Like

    StartEd is a utility that helps you to manage the Windows startup procedure. It recognizes obsolete or memory-hogging startup programs, and lets you safely disable them to increase your computer's performance.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    StartEd screenshot 1
    StartEd screenshot 1
    StartEd screenshot 2
  4. Rapid7 icon
     Like

    Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    26 alternatives
  5. SureLog icon
     Like

    ANET SureLog SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    SureLog screenshot 1
    SureLog screenshot 1
    SureLog screenshot 2
    +5
    SureLog screenshot 3
    17 alternatives
  6. IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    17 alternatives
  7. Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    18 alternatives
  8. Continuously identify vulnerabilities and simulate attack scenarios across your digital assets so you're always a step ahead.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Asterisk.so screenshot 1
    9 alternatives
  9. Exabeam icon
     1 like

    Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online