Apps tagged with 'threat-detection'

All apps in Apps tagged with 'threat-detection' category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Graylog icon
     43 likes

    Graylog is a powerful Security Information and Event Management (SIEM) solution offering a robust log analytics platform that simplifies the collection, search, analysis, and alerting of all types of machine-generated data.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Self-Hosted
    • Online
    • Software as a Service (SaaS)
    Graylog screenshot 1
    Graylog screenshot 1
    Graylog screenshot 2
    +3
    Graylog screenshot 3
  2. urlscan.io icon
     12 likes

    urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Google Chrome
    • Mozilla Firefox
    Front page
    Scanning
    Results in detail
    +1
    DOM tree
    73 alternatives
  3. Snusbase icon
     9 likes

    The industry leading database lookup. We pride ourselves in being faster than all of our competitors, wile maintaining a very large selection of private databases.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    Snusbase screenshot 1
    Snusbase screenshot 1
    Snusbase screenshot 2
    20 alternatives
  4. DeHashed icon
     22 likes

    DeHashed is the largest & fastest data breach search engine. You can search for IP address, email, username, name, phone, VIN, address, and more! We have true wild card, dork usage, and we offer a real search engine experience! It's also free!.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    DeHashed screenshot 1
    25 alternatives
  5. Hudson Rock icon
     2 likes

    With expertise developed at the cybercrime intelligence division at the prestigious 8200 cyber unit at the IDF, Hudson Rock’s powerful cybercrime threat intelligence feed provides invaluable data for infrastructure protection, end-user protection, and supply chain risk...

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    This is the overview page of the results for disney.com indicating the company has compromised employees & clients
    External attack surface on trendmicro.com
    Technology discovery feature, query any technology and discover companies using that technology
    +1
    Compromised employees of disney.com shown in Bayonet
    20 alternatives
  6. Cowrie icon
     1 like

    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Linux
    10 alternatives
  7. LeakRadar.io icon
     1 like

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    LeakRadar.io screenshot 1
    9 alternatives
  8. PivotGG icon
     Like

    AI-powered pivot workflows and detection queries for incident response - paste an IOC, get guided pivot workflows, AI-generated Splunk/KQL searches, detection opportunities, and exportable investigation reports.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    PivotGG screenshot 1
    5 alternatives
  9. Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    Thinkst Canary screenshot 1
    10 alternatives
  10. SECDO icon
     2 likes

    SECDO enables security teams to investigate and respond to incidents faster than ever. Automatically investigate and validate every single alert. Respond quickly and precisely.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    5 alternatives
  11. Whatoblock icon
     1 like

    Whatoblock is a real-time cybersecurity threat intelligence platform with global botnet tracking, scanner detection, interactive threat search, and a live threat map.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Whatoblock screenshot 1
    Whatoblock screenshot 1
    Whatoblock screenshot 2
    +3
    Whatoblock screenshot 3
  12. Mails-Guard icon
     1 like

    Mails-Guard analyzes suspicious emails using AI to detect phishing attempts and malicious content, providing clear actionable recommendations without storing your data.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    Mails-Guard screenshot 1
    2 alternatives
  13. Blumira icon
     8 likes

    Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    5 alternatives
  14. Gravwell icon
     4 likes

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Linux
    • Online
    • Self-Hosted
    • Software as a Service (SaaS)
    Gravwell screenshot 1
    Gravwell screenshot 1
    Gravwell screenshot 2
    +1
    Gravwell screenshot 3
    18 alternatives
  15. Ipregistry icon
     5 likes

    Ipregistry is an IP geolocation and threat data API. People use Ipregistry to personalize content, analyze traffic, enrich forms, target ads, enforce GDPR compliance, perform redirections, block countries but also prevent free trial abuse by detecting and blocking Proxy and Tor...

    Cost / License

    • Freemium
    • Open Source

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
    Ipregistry screenshot 1
    Ipregistry screenshot 1
    Ipregistry screenshot 2
    +2
    Ipregistry screenshot 3
    16 alternatives
  16. DNSSense icon
     1 like

    The main purpose of DNSSense is to provide advanced DNS security solutions that detect and block malicious network activities, such as malware, ransomware, and phishing, by analyzing and classifying DNS traffic in real-time.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    • Software as a Service (SaaS)
    DNSSense dashboard
    DNSSense screenshot 1
    DNSSense screenshot 2
    8 alternatives
  17. SanerNow icon
     Like

    SanerNow platform and tools provide a paradigm shift in endpoint security and management. SanerNow simplifies endpoint security, increases IT and security effectiveness, and reduces IT management cost.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Mac
    • Windows
    • Linux
    • Chrome OS
    • Software as a Service (SaaS)
  18. Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    ThreatDefence XDR screenshot 1
    ThreatDefence XDR screenshot 1
    ThreatDefence XDR screenshot 2
    +3
    ThreatDefence XDR screenshot 3
    4 alternatives
  19. Tachyon bridges the gap between IT operations, security and compliance teams to fixing urgent issues that impact their business. Business leaders gain confidence that their IT systems are working optimally with real time query and response abilities.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    1 alternatives
  20. S4E icon
     Like

    An AI-driven cybersecurity platform that automates vulnerability assessments, real-time threat detection, and reporting. It helps organizations and individuals effortlessly secure their digital assets through automated scans, continuous monitoring, and actionable insights...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    S4E screenshot 1
    S4E screenshot 1
    S4E screenshot 2
    +4
    S4E screenshot 3
  21. SureLog icon
     Like

    ANET SureLog SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    SureLog screenshot 1
    SureLog screenshot 1
    SureLog screenshot 2
    +5
    SureLog screenshot 3
    17 alternatives
  22. IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    17 alternatives