Apps with 'Cybersecurity' feature Page 9 of 15

All apps in Apps with 'Cybersecurity' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Safe Me icon
     Like

    Safe Me is a free cybersecurity app that helps you improve the security of your or any other mobile you want to by providing you with a personalized score, giving a personalized recommendation, and monitoring your mobile for dark web exposure.

    • FreeProprietary
    • Android
    • iPhone
    • Software as a Service (SaaS)
    Safe Me screenshot 1
    Safe Me screenshot 2
    Safe Me screenshot 3
  2. Filebolt icon
     1 like

    FILEBOLT™ is a cross-platform file protection service that offers enterprise-grade protection with a single click, safeguarding digital property against hacking and keeping it inviolable even if the storage medium or service is breached.

    • FreemiumProprietary
    • Mac
    • Windows
    • Linux
    • Android
    • iPhone
    • Chrome OS
    • iPad
    Filebolt screenshot 1
    Filebolt screenshot 2
    44 alternatives
  3. The Website Safety Checker tool from EvenInsight.com is designed to help users detect scam websites and protect themselves from online fraud.

    • FreeProprietary
    • Online
    • Google Chrome
    Website Safety Checker screenshot 1
    5 alternatives
  4. Last April, I saw a bunch of money coming into my Stripe. I thought I had finally made it with my SaaS. What initially seemed like a surge in sales turned out to be a devastating card testing attack, with thousands of blocked and fraudulent transactions threatening to shut my...

    • PaidProprietary
    • Online
    Protect Unlimited Sites
    1 alternatives
  5. CheckRecipient is a next-generation email security technology to prevent highly sensitive information being sent to the wrong people.

    • PaidProprietary
    • Online
    CheckRecipient screenshot 1
  6. Java cryptographic library that supports Argon2, bcrypt, scrypt and PBKDF2 aimed to protect passwords in databases. Easy to use by design, highly customizable, secure and portable. All the implementations follow the standards and have been reviewed to perform better in the JVM.

    • FreeOpen Source
    • Windows
    • Linux
    • Android
  7. Expert Insights is a leading B2B cyber security research platform. We use our industry knowledge and customer feedback to rate their effectiveness and functionality.

    • FreeProprietary
    • Software as a Service (SaaS)
    Expert Insights screenshot 1
    6 alternatives
  8. Tina is a network security appliance that is developed for detection and prevention of contemporary cyber threats. Having aa hybrid design, Tina consists of various technologies; DPI, cyber intelligence, cloud technologies, honeypot and sandbox.

    • PaidProprietary
    • Software as a Service (SaaS)
  9. IBM Security® QRadar® SOAR, formerly Resilient®, is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency.

    • PaidProprietary
    • Self-Hosted
    • Software as a Service (SaaS)
    IBM QRadar SOAR screenshot 1
    2 alternatives
  10. VerifiedThreat is an AI-driven threat and vulnerability platform originally designed for governments and sovereign nations. It simulates state-sponsored red team attacks on critical infrastructure, national security assets, and enterprise systems for corporate clients.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    VerifiedThreat Alerting KPIs
  11. LogSentinel SIEM is a next-generation SIEM system offering simplicity and innovation. By leveraging the latest technologies like blockchain and AI, it helps companies of all sizes to reduce the time and cost of incident detection and investigation.

    • FreemiumProprietary
    • Software as a Service (SaaS)
    LogSentinel SIEM screenshot 1
    14 alternatives
  12. This tool helps you detect potential "man-in-the-middle" attacks by comparing the security fingerprints of your SSL certificate with the one seen from a trusted external network. If the fingerprints don't match, it suggests someone might be tampering with your internet traffic.

    • FreeProprietary
    • Android
    Catch the Man-in-the-Middle screenshot 1
    Catch the Man-in-the-Middle screenshot 2
    Catch the Man-in-the-Middle screenshot 3
  13. Human Layer Email and Messaging Security.

    • PaidProprietary
    • Self-Hosted
    • Microsoft Exchange Server
    • Software as a Service (SaaS)
    • Microsoft Office 365
    • Gmail
  14. Fraud detection and prevention using browser fingerprinting with 99.5% accuracy. Stops account sharing, payment processing fraud and gaming.

    • PaidOpen Source
    • Software as a Service (SaaS)
    Fingerprint.com screenshot 1
    14 alternatives
  15. Damballa icon
     Like

    Damballa solutions automatically identify and terminate cyber threat activity such as advanced malware, botnets and persistent threats across enterprise and communications service provider networks in real-time, without relying on signatures.

    2 alternatives
  16. AllSecureX helps CISOs and boards translate complex cyber threats into real-time financial impact insights. By combining AI, automation, and quantum-safe modeling, AllSecureX enables smarter, faster, and board-ready security decisions.

    • PaidProprietary
    • Online
    • Software as a Service (SaaS)
    AllSecureX Dashboard
    5 alternatives
  17. Capslock icon
     Like

    Capslock is a revolutionary new school where adults can kick-start their new career in cybersecurity, in just 4 months.

    • FreeProprietary
    • Online
    Capslock screenshot 1
  18. Smart Contract Auditor AI is an automated tool that analyzes Solidity smart contracts for vulnerabilities, unsafe patterns, and logic flaws before deployment. Users can paste or upload their contract to receive an instant security review, including detection of common risks such...

    • PaidProprietary
    • Online
    Smart Contract Auditor AI screenshot 1
  19. Prefactor icon
     Like

    Prefactor is the identity layer for AI agents. We help SaaS platforms authenticate and authorize AI agents securely using the Model Context Protocol (MCP), with scoped access, audit logs, and easy integration.

    • PaidProprietary
    • Software as a Service (SaaS)
    • Online
    2 alternatives
  20. Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security...

    • PaidProprietary
    • Software as a Service (SaaS)
    ThreatDefence XDR screenshot 1
    4 alternatives
  21. MicEnum icon
     Like

    MicEnum is a graphical tool that enumerates the Integrity Levels of the objects in the hard disks, helps to detect anomalies and allows to store and restore this information in an XML file.

    • FreeProprietary
    • Windows
  22. Identify AI-driven phishing threats instantly. Strengthen user defenses with real-time, in-workflow training, and stay ahead of evolving attacks.

    • FreemiumProprietary
    • Online
    • Software as a Service (SaaS)
    Homepage of the website