Apps tagged with 'threat-prevention'

All apps in Apps tagged with 'threat-prevention' category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Kaspersky Antivirus for Android is an antivirus solution to help protect phones and tablets – that can be even more vulnerable than your computer – as well as your private information from online dangers. The App Lock feature also protects personal data from prying eyes.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Android
    • Android Tablet
    • Samsung Galaxy Store
    • HUAWEI AppGallery
    Kaspersky Antivirus for Android screenshot 1
    Kaspersky Antivirus for Android screenshot 1
    Kaspersky Antivirus for Android screenshot 2
    +5
    Kaspersky Antivirus for Android screenshot 3
    35 alternatives
  2. Snusbase icon
     9 likes

    The industry leading database lookup. We pride ourselves in being faster than all of our competitors, wile maintaining a very large selection of private databases.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    Snusbase screenshot 1
    Snusbase screenshot 1
    Snusbase screenshot 2
    20 alternatives
  3. NethSecurity icon
     1 like

    All the functionalities of a modern Next-Gen firewall in few clicks: MultiWAN, Deep Packet Inspection, VPNs, Threat Protection.

    Cost / License

    • Free
    • Open Source

    Application type

    Platforms

    • Linux
    NethSecurity screenshot 1
    NethSecurity screenshot 1
    NethSecurity screenshot 2
    +4
    NethSecurity screenshot 3
    34 alternatives
  4. Hudson Rock icon
     2 likes

    With expertise developed at the cybercrime intelligence division at the prestigious 8200 cyber unit at the IDF, Hudson Rock’s powerful cybercrime threat intelligence feed provides invaluable data for infrastructure protection, end-user protection, and supply chain risk...

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    This is the overview page of the results for disney.com indicating the company has compromised employees & clients
    External attack surface on trendmicro.com
    Technology discovery feature, query any technology and discover companies using that technology
    +1
    Compromised employees of disney.com shown in Bayonet
    20 alternatives
  5. OSArmor icon
     6 likes

    Monitor and block suspicious processes behaviors to prevent infections by malware, ransomware, and other threats. This tool analyzes parent processes and prevents, for example, MS Word from running cmd or powershell utilities, it prevents ransomware from deleting shadow copies...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Windows
    OSArmor screenshot 1
    OSArmor screenshot 1
    OSArmor screenshot 2
    11 alternatives
  6. Cowrie icon
     1 like

    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Linux
    10 alternatives
  7. Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    Thinkst Canary screenshot 1
    10 alternatives
  8. Proofpoint icon
     1 like

    Proofpoint, Inc. (NASDAQ: PFPT) helps the largest and most successful companies in the world protect and govern their most sensitive data.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • iPhone
    4 alternatives
  9. Blumira icon
     8 likes

    Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    5 alternatives
  10. Ipregistry icon
     5 likes

    Ipregistry is an IP geolocation and threat data API. People use Ipregistry to personalize content, analyze traffic, enrich forms, target ads, enforce GDPR compliance, perform redirections, block countries but also prevent free trial abuse by detecting and blocking Proxy and Tor...

    Cost / License

    • Freemium
    • Open Source

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
    Ipregistry screenshot 1
    Ipregistry screenshot 1
    Ipregistry screenshot 2
    +2
    Ipregistry screenshot 3
    16 alternatives
  11. DNSSense icon
     1 like

    The main purpose of DNSSense is to provide advanced DNS security solutions that detect and block malicious network activities, such as malware, ransomware, and phishing, by analyzing and classifying DNS traffic in real-time.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    • Software as a Service (SaaS)
    DNSSense dashboard
    DNSSense screenshot 1
    DNSSense screenshot 2
    8 alternatives
  12. Sift Security enables SOC, Incident Response and Threat Hunting teams to get their jobs done faster and with less frustration. Sift Security uniquely leverages AI and Graph Analytics to prioritize threats, accelerate investigations, and take action.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
    Sift Security screenshot 1
    Sift Security screenshot 1
    Sift Security screenshot 2
    4 alternatives
  13. Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is a network security and protection solution for Microsoft Windows, described by Microsoft as "enables businesses by allowing...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Windows
    Forefront Threat Management Gateway  screenshot 1
    10 alternatives
  14. Rapid7 icon
     Like

    Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    26 alternatives
  15. VerifiedThreat is an AI-driven threat and vulnerability platform originally designed for governments and sovereign nations. It simulates state-sponsored red team attacks on critical infrastructure, national security assets, and enterprise systems for corporate clients.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    VerifiedThreat Alerting KPIs
  16. Complete, real-time change auditing, in-depth forensics and comprehensive reporting on all key configuration, user and administrator changes for your Windows environment and beyond.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    • Microsoft Exchange Server
    • Microsoft SQL Server
    • Microsoft Office 365
    • Microsoft Active Directory
  17. Castle icon
     1 like

    Simple developer-friendly APIs lets you send activity from web and mobile apps. Castle builds behavior models over what's normal for your site and each user account. When there is a potential account takeover, the customer is notified and can resolve the incident without...

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Castle screenshot 1
    Castle screenshot 1
    Castle screenshot 2
    18 alternatives
  18. IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false...

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    17 alternatives
  19. Kippo icon
     Like

    Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

    Cost / License

    • Free
    • Open Source

    Alerts

    • Discontinued

    Platforms

    • Linux
    6 alternatives
  20. Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats.

    Cost / License

    • Paid
    • Proprietary

    Application type

    Platforms

    • Online
    18 alternatives