Apps with 'Cybersecurity' feature Page 10 of 15

All apps in Apps with 'Cybersecurity' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Phishly icon
     Like

    AI powered phishing detection for Gmail. One click to scan suspicious emails for fake domains, urgent language, and social engineering. Get instant risk scores with clear explanations.

    • FreeProprietary
    • Google Chrome
    • Online
    • Gmail
    extension while in email browser
    1 alternatives
  2. Passwd icon
     Like

    Passwd is your go-to team password manager for Google Workspace. Designed to seamlessly integrate with your everyday apps like Gmail and Google Calendar, Passwd eliminates security worries and organizational chaos.

    • Password Manager
    • FreemiumProprietary
    • Online
    • Android
    • Microsoft Edge
    • Google Chrome
    • Software as a Service (SaaS)
    • Google Workspace
    Passwd screenshot 1
    17 alternatives
  3. ScamBare icon
     Like

    ScamBare empowers you with the resources you need to detect and prevent scams, report and expose online fraud tactics, and stay safe against fraudulent activities.

    • FreeProprietary
    • Online
    • Software as a Service (SaaS)
    ScamBare screenshot 1
  4. HQ VPN icon
     Like

    Do you do client work from coffee shops? Check your bank balance from the airport? Get tired of being stalked by ad networks and trackers as you browse at home?

    HQ VPN screenshot 1
    31 alternatives
  5. SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. At SecureCircle, we believe frictionless data security drives business value for our customers.

    • PaidOpen Source
    • Software as a Service (SaaS)
  6. Reduce your reaction time to hackers thanks to Trapster's honeypot which quickly alerts you in case of intrusion on your company's network.

    • PaidOpen Source
    • Self-Hosted
    • Software as a Service (SaaS)
    5 alternatives
  7. S4E icon
     Like

    An AI-driven cybersecurity platform that automates vulnerability assessments, real-time threat detection, and reporting. It helps organizations and individuals effortlessly secure their digital assets through automated scans, continuous monitoring, and actionable insights...

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    S4E screenshot 1
  8. At Nikto Online Scanner, we are dedicated to providing a comprehensive solution for assessing the security of web servers. Our platform offers a powerful tool that conducts extensive tests to identify potential vulnerabilities, misconfigurations, and security risks associated...

    Nikto Online Scanner screenshot 1
    11 alternatives
  9. This Environment allows people to work on large array of android security related task’s ranging from Malware Analysis, Penetration Testing and Reverse Engineering.

    • FreeOpen Source
    • Linux
    • VirtualBox
    Android Tamer screenshot 1
    4 alternatives
  10. "Online DDoS Attack Simulation portal" is a web-based platform designed to simulate and test Distributed Denial of Service (DDoS) attacks on networks, websites, or online services. DDoS attacks are malicious attempts to overwhelm a target server or network with a...

    • FreemiumProprietary
    • Online
    DDoS Attack Online screenshot 1
    6 alternatives
  11. CyberUpgrade is an advanced ICT security and compliance platform transforming "paper security" into tangible business resilience.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
  12. Flawatch icon
     Like

    Flawatch is a Continuous Threat Exposure Management (CTEM) solution designed to help organizations automate and streamline security operations by providing dark web monitoring, cyber threat intelligence (CTI), attack surface management, and code leaks discovery.

    • PaidProprietary
    • Online
    Dashboard
  13. We are a security awareness training solution built exclusively for schools. Your new affordable K-12-friendly solution

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    Cybernutai screenshot 1
  14. It notifies instantly about unauthorized use of phone camera, microphone, the premium version offer also the data log by apps via internet, whitelists, block.

    • FreemiumProprietary
    • Android
  15. Anjuna icon
     Like

    Anjuna Confidential Computing software makes the public cloud the safest and most secure place to compute--completely isolating existing data and workloads from insiders, bad actors, and malicious code.

    • PaidProprietary
    • Linux
    • Online
    Anjuna screenshot 1
  16. Cutting-edge security meets convenience: Authenticator° is the ultimate iOS app designed to make your digital life safer and hassle-free. Now supporting Apple Watch, we safeguard your accounts across Twitter, Reddit, LinkedIn, Instagram, TikTok, Amazon, Facebook, Dropbox...

    • FreemiumProprietary
    • Mac
    • iPhone
    • iPad
    • Apple Watch
    An online account can be added in multiple ways.
    The app supports every online service that offers multi factor authentication feature.
    The app works on iPhone/iPad, Mac and Apple Watch. Data is synced in real-time between devices through iCloud.
  17. L7 Defense system is a virtual platform for mitigating sophisticated DDoS attacks automatically and efficiently in Real Time. Enhancing the self-learning intelligence of the immune system with dedicated ML components enables the system to easily mitigate unknown, under the...

    • PaidProprietary
    • Online
    L7 Defense screenshot 1
    1 alternatives
  18. Security Bulldog is reshaping the way enterprises handle cybersecurity vulnerabilities. By leveraging an AI-powered intelligence platform, it reduces both the cost and the time necessary for effective remediation, allowing teams to focus on strengthening their defenses rather...

    • PaidProprietary
    • Online
    The Security Bulldog screenshot 1
    1 alternatives
  19. Huntr is a free security tool for auditing compromised credentials. It aggregates data from HaveIBeenPwned, XposedOrNot, and LeakCheck.io into a single search, including a client-side password generator. Built by a student dev for the security community.

    • FreeProprietary
    • Online
    The dashboard
  20. Zyphe icon
     Like

    Zyphe's privacy-first identity verification solution makes user onboarding more secure and seamless, helping companies keep PII off their servers and stay ahead of privacy and security risks. We use the latest decentralization and Web3 technology for secure identity sharing...

    • PaidProprietary
    • Online
  21. Cyscale icon
     Like

    Cyscale is a cloud-native security solution that constantly monitors your cloud environment. Designed to identify potential risks and prioritize remediations, it becomes an invaluable tool for Security Teams, CISOs, and CTOs looking to bolster their security posture.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    Cyscale screenshot 1
  22. msX Guard icon
     Like

    msX Guard is a global, publicly accessible database of dangerous and unsafe domains, developed by Ixavence Bagart. It helps developers, browsers, and search engines detect and block phishing, malware, and scam websites before users interact with them.

    • FreeProprietary
    • Online
    msX Guard Website
    1 alternatives
  23. Train, test and track your security awareness in one comprehensive solution. High quality cyber training that impresses your users and meets board requirements. Integrated phishing simulation to test the efficacy of your awareness program.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    Phishing Template and Report
    9 alternatives