Detectify automates the knowledge of the best ethical hackers in the world to secure websites against 1500+ known vulnerabilities beyond OWASP Top 10.
Cost / License
- Paid
- Proprietary
Platforms
- Online
- Software as a Service (SaaS)



Detectify automates the knowledge of the best ethical hackers in the world to secure websites against 1500+ known vulnerabilities beyond OWASP Top 10.



We facilitate quick discovery and reporting of vulnerabilities in websites and network infrastructures, providing a set of powerful and tightly integrated pentesting tools that enable you to perform easier, faster, and more effective pentests.




Intruder is a security monitoring platform for internet-facing systems.
Intruder provides an easy to use security solution which continually scans your digital assets, highlighting vulnerabilities and outlining remediation advice in simple terms.
Qualys, Inc., is the most widely-deployed information security and compliance cloud solution in the world with over 7,700 customers including a majority of the Forbes Global 100 and a majority of the Fortune 100.
All-in-One cloud-based, simple, powerful and gorgeous website security tools built for everyone. It helps you clean your websites from malware automatically like a security expert and protect websites in a one click simple. For a juicy burger price!.




modusCloud is a complete cloud email security solution that delivers Protection from Spam, Phishing, Advanced and Evolving Threats, Email Continuity, Encryption, Archiving...and email security peace of mind.

The Safeweb Engine is a cyber security platform that physically isolates cyber risks and malware using disposable desktops and browsers, developed in collaboration with the National Nuclear Security Administration.
For security conscious IT leaders looking to leverage the cloud, CloudLock is the cloud data protection company that secures Google Docs while gaining the collaboration and cost savings benefits of the cloud.
By making sense of terabytes of current and historical data without any predefined rules or heuristics, Fortscale is a cyber analyst's tool box that includes both.

Cloudbric is a cloud-based web security service by Penta Security Systems, offering an award-winning WAF, DDoS protection, and free SSL as a full-service package. Utilizing a logic analysis detection engine, it has one of the lowest false positives.




Simple developer-friendly APIs lets you send activity from web and mobile apps. Castle builds behavior models over what's normal for your site and each user account. When there is a potential account takeover, the customer is notified and can resolve the incident without...



IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false...
A comprehensive Security Information & Event Management (SIEM) solution that enables cost-effective compliance and provides advanced security analytics to identify threats and manage risk, so you can protect your business.




Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats.
Security Intelligence Platform for monitoring security Events, Identity and Access data to detect Insider Threats and Advanced targeted attacks.
McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.
Citrix CloudPlatform, powered by Apache CloudStack, is the industry’s only future-proofed, application-centric cloud solution proven to reliably and efficiently orchestrate both traditional enterprise and cloud-native application workloads – including vGPU-based 3D graphics...
Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.
Identify, prioritize, and remediate risks & vulnerabilities in your network and web applications through Adaptive Expert Intelligence, Prioritized Threat Prediction, and Frictionless Remediation.



