Apps with 'Cybersecurity' feature Page 6 of 18

All apps in Apps with 'Cybersecurity' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. GladPass icon
     1 like

    GladPass.com is a free web app that automatically creates unique, secure and random passwords based on Google's recommended combination of numbers, symbols and a mix of upper and lower case letters.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    GladPass screenshot 1
  2. WebTotem icon
     13 likes

    WebTotem is a SaaS which provides powerful tools for securing and monitoring your website in one place in easy and flexible way.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Online
    • Android
    • iPhone
    • Software as a Service (SaaS)
    WebTotem screenshot 1
    20 alternatives
  3. Prisma/DB icon
     1 like

    Aprismatic’s Prisma/DB is a secure data management and processing platform with a primary focus on data confidentiality. Exposing rich querying capabilities, precise encryption controls and high performance, it guarantees confidentiality of stored and processed data even if the...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    • Linux
    • MySQL Community Edition
    • Self-Hosted
    • Microsoft SQL Server
    • CockroachDB
    • PostgreSQL
    Prisma/DB screenshot 1
  4. CloudSploit icon
     2 likes

    CloudSploit provides continuous security monitoring, detailed reports, and risk detection for cloud infrastructure environments.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    CloudSploit screenshot 1
    CloudSploit screenshot 1
    CloudSploit screenshot 2
    +5
    CloudSploit screenshot 3
    2 alternatives
  5. Diode Collab icon
     2 likes

    Diode Drive offering a secure alternative to Slack, Google Drive, Discord, and various messaging apps (Signal, Telegram, etc.) for those looking to regain ownership of their personal or work related data/information.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
    • Android
    • iPhone
    • Android Tablet
    • iPad
    • Raspberry Pi
    Diode for team collaboration
    Desktop Zone example
    Desktop Zone example with team members
    +5
    Collab.diode.io website
    5 alternatives
  6. infosec-jobs.com aims to provide the most comprehensive job site related to all things Cyber Security. Our goal is to help hiring the best candidates and finding the most attractive positions in the InfoSec space.

    Cost / License

    • Free Personal
    • Proprietary

    Application type

    Platforms

    • Online
    infosec-jobs.com screenshot 1
    34 alternatives
  7. TransAuth icon
     1 like

    75% of network intrusions in 2013 involved a weak, lost or stolen credential. TransAuth wants to make it easier to prevent the damage and cost associated with data breaches due to compromised passwords . Automatic Multifactor Authentication is faster, easier and more comprehens.

    Cost / License

    • Free Personal
    • Proprietary

    Platforms

    • Windows
    TransAuth screenshot 1
  8. Threat Landscape is an automated threat intelligence platform built for security analysts and SOC teams who need high-confidence, actionable intelligence — without the manual triage.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    Graph
    Threat Landscape screenshot 1
    Threat Intelligence Dashboard
    +1
    Stix Graph Chart
    5 alternatives
  9. Myra Security is a cybersecurity provider specializing in protection for web applications and infrastructures. The company offers solutions such as DDoS protection, WAF, CDN, EU CAPTCHA, and Bot Management to help organizations ensure availability, performance, and compliance.

    Cost / License

    • Paid
    • Proprietary

    Application types

    Platforms

    • Online
    • Software as a Service (SaaS)
    Myra EU CAPTCHA Dashboard
    Myra App Dashboard
    Myra App Domain Overview
    +5
    Myra App Statistics
    17 alternatives
  10. BusinessLOG icon
     1 like

    Business LOG is an advanced log management and SIEM platform designed to help organizations centralize, monitor, and retain logs for security, auditing, and regulatory compliance. It supports the collection, storage, correlation, and analysis of logs from multiple sources...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Centralized SOC dashboard that highlights the most relevant security findings across the monitored environment. It helps teams quickly identify anomalies, authentication issues, infrastructure weaknesses, and operational risks from a single view.
    Prioritized security overview for technical teams and decision-makers

Automated detection of access anomalies and authentication issues

Infrastructure weakness identification with remediation focus
    Users and permissions management
Granular role-based access control for users, functions, dashboards, archives, and alarms. Administrators can assign precise permissions to support governance, segregation of duties, and secure multi-user operations.
    +43
    Access Log – Main view
A centralized access log view for Windows, Syslog, Microsoft 365, and mixed infrastructures. Advanced filters make it easier to investigate authentication events, remote access, password resets, and suspicious activity.
  11. Hackerize icon
     2 likes

    Hackerize is an essential security monitoring tool for websites, constantly protecting businesses from ever-evolving cyber threats.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    52 alternatives
  12. Defensia icon
     1 like

    Defensia is a lightweight security agent for Linux servers that detects and blocks real attacks in real time — without complex configuration.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Linux
    • Online
    • Software as a Service (SaaS)
    • Docker
    Dashboard
    WAF
    Events
    +3
    Bans
    4 alternatives
  13. Identify critical vulnerabilities at 10x speed without any configuration required with world's most intelligent web app & API security scanning platform, ZeroThreat.ai.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    ZeroThreat.ai screenshot 1
    ZeroThreat.ai screenshot 1
    ZeroThreat.ai screenshot 2
    +1
    ZeroThreat.ai screenshot 3
    1 alternatives
  14. Free AI-powered cybersecurity intelligence platform delivering daily threat briefings, weekly vulnerability reports with remediation steps, and a curated directory of 59 security tools.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    defend.network screenshot 1
    defend.network screenshot 1
    defend.network screenshot 2
    5 alternatives
  15. A zero-server, client-side PII sanitizer that redacts personal data from text before using AI tools like ChatGPT, working entirely offline.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    • Google Chrome
    • Software as a Service (SaaS)
    PrivacyScrubber screenshot 1
    PrivacyScrubber screenshot 1
    PrivacyScrubber screenshot 2
    +5
    PrivacyScrubber screenshot 3
    2 alternatives
  16. IPWho icon
     1 like

    REST-based IP Geolocation & IP Intelligence API with IPv4/IPv6 support, ASN lookup, proxy detection, and bulk enrichment.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    • Online
    Dashboard view & Live API response
    Pricing Details
    Network Response
    15 alternatives
  17. SOFiE icon
     1 like

    SOFiE is an application to exchange files of any size and type. Offer you a reliable solution with high security for receiving and sending files both inside a company and outside for communicating with other entities.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Self-Hosted
    Anonymous upload
    Admin dashboard
    Users inbox
    +4
    Package detail
    2 alternatives
  18. Whatoblock icon
     1 like

    Whatoblock is a real-time cybersecurity threat intelligence platform with global botnet tracking, scanner detection, interactive threat search, and a live threat map.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Whatoblock screenshot 1
    Whatoblock screenshot 1
    Whatoblock screenshot 2
    +3
    Whatoblock screenshot 3
    17 alternatives
  19. Ninja Cookie icon
     1 like

    Have you had enough of cookie banners? Forget about them! Ninja Cookie will take care of these and can say “no” to them for you!

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Alerts

    • Discontinued

    Platforms

    • Mac
    • Windows
    • Linux
    • Android
    • iPhone
    • Chrome OS
    • Android Tablet
    • iPad
    • Microsoft Edge
    • Google Chrome
    • Opera
    • Firefox
    Ninja Cookie screenshot 1
    Ninja Cookie screenshot 1
    Ninja Cookie screenshot 2
    10 alternatives
  20. Mails-Guard icon
     1 like

    Mails-Guard analyzes suspicious emails using AI to detect phishing attempts and malicious content, providing clear actionable recommendations without storing your data.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    Mails-Guard screenshot 1
    2 alternatives
  21. A free, cybersecurity-focused online tool that analyzes PCAP files and generates clear reports highlighting suspicious behaviors, security vulnerabilities, and other notable network events.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    Red Hand Analyzer screenshot 1
    4 alternatives
  22. OnlyU icon
     1 like

    OnlyU is a free, secure platform for sending self-destructing messages and passwords. No signup is required, and all messages are end-to-end encrypted by default. Once read, messages are permanently deleted.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    a look at the website
    20 alternatives
  23. A principal função do Local Monitor é a identificação de intrusos em seu computador. Trojans Backdoors serão facilmente identificados, pois monitorando suas conexões você saberá exatamente o que está acontecendo em sua maquina...

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Windows
    2 alternatives