Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (3)
Starting Price
  • (1)
  • (1)
  • (1)
  • (4)
Deployment
  • (3)
  • (2)
  • (33)
Customer Types
  • (3)
  • (3)
  • (32)
  • (33)
  • (31)
Pricing Model
  • (14)
  • (5)
  • (2)
  • (11)
  • (30)
Integrated With
  • (4)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 21 - 34 of 34 Products
AppOmni logo
Time to Secure Your SaaS Data 5 Based on 4 Ratings
Visit Website + Add to Compare

What is AppOmni and how does it work?

Organizations today rely heavily on SaaS applications and the data they contain. The security of this data is paramount, and AppOmni provides the necessary processes and tools to ensure it remains secure and compliant. We offer security expertise and insights, as well as continuous monitoring, for a broad range of SaaS applications. Our Developer Platform also allows us to extend our in-depth coverage to any SaaS app, whether it's from a vendor or custom-built in-house. With AppOmni, organizations can rest assured that their SaaS environment is secure and compliant at all times.

Read more

AppOmni Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
JupiterOne logo
Focus on what matters 5 Based on 5 Ratings
Visit Website + Add to Compare

What is JupiterOne and how does it work?

Secure attack surface with continuous asset discovery and attack path analysis. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources. As cloud expands, so does threat landscape. To stay secure, need to understand all of cyber assets. Context into cyber assets becomes the foundation for cloud security posture, asset management, incident response, SecOps, compliance, vulnerability management, and more.

Read more

JupiterOne Pricing

  • Free Trial Not Available
Visit Website
ClearDATA Comply logo
Protecting Lifecycle of Application Made Simple Write a Review
Visit Website + Add to Compare

What is ClearDATA Comply and how does it work?

ClearDATA Comply is a platform for your cloud environment used to configure a safe and compliant way. The software offers IT elements such as virus scans, intrusion detection, logging, back-up, and encryption for the protection of customers' data. Monitor compliance status through the Dashboard and generate reports in PDF file format.

Read more

ClearDATA Comply Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

91% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

DataGuard logo
Build trust and operationalise compliance Write a Review
Visit Website + Add to Compare

What is DataGuard and how does it work?

Having the right processes and procedures in place can help stay compliant and demonstrate commitment to protecting customer data. This includes setting up user-friendly systems that allow customers to access and control their data, and developing a privacy policy that's easy to understand. User should also consider bringing in an expert to guide through the process. They can provide advice on best practices and how to ensure compliant with all relevant regulations. With the right help, can stay ahead of the curve and gain the trust of your customers.Compliance might seem intimidating, but it doesn't have to be. By taking the right steps early on, can ensure business can grow without legal and regulatory issues becoming a barrier. With the right help and a commitment to protecting customer data, can reap the rewards of a compliant business.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 98%
  • Reviews 60%
  • Momentum 69%
  • Popularity 72%

DataGuard Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Xage logo
Zero Trust Security for the Real World Write a Review
Visit Website + Add to Compare

What is Xage and how does it work?

Xage secures, manages, and transforms OT, IT, and cloud operations with zero-trust access and data security. It provides operation-wide single sign-on (SSO) and multi-factor authentication (MFA) for all systems, ensuring security even during network compromises. Remote access is simplified through a web interface, allowing technicians and apps to gain immediate, controlled access while reducing exposure to hazardous environments. Xage enforces zero-trust access control across all assets—IT, OT, and cloud—while maintaining agility and usability. With granular protection and least privilege principles, Xage stops attacks at every stage. The lightweight platform is deployable anywhere, enabling enterprises to implement zero-trust security in just days. Xage helps organizations streamline security, enforce universal access policies, and boost productivity without compromising safety. Whether managing access, preventing attacks, or enhancing operational efficiency, Xage empowers enterprises to move fast while reducing cyber risks..

Read more

Xage Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
SecretHub logo
Secret management portal for engineers Write a Review
Visit Website + Add to Compare

What is SecretHub and how does it work?

SecretHub is a unified secret management solution for engineers and their entire team. The software allows engineers to upgrade security throughout the stack by replacing secrets in plaintext with reference tags. Engineers can use system CLI for encrypting and storing secrets. Organizations can configure access control and monitor audit logs for further data protection. In case an employee leaves, or any other incident takes place, others within the team can update secrets in any one place and push them out as per business needs. Admins can even revoke access rights. SecretHub is an end-to-end encrypted portal, offering complete control to the engineers and their teams. Only authorized members get to decrypt the secrets. With the globally distributed solution, uptime SLAs and custom hosting facilities, enterprises get to start with their production process within a day. SecretHub helps teams upgrade their digital hygiene, corporates can eliminate data leaks by securing digital keys within their data centers.

Read more

SecretHub Pricing

  • Free Trial Not Available
  • Starts at $89.00. Offers Free-forever and Custom plan.
Visit Website
FireEye Data Center Security logo
Protecting the data center from cyber attacks 4.6 Based on 12 Ratings
Visit Website + Add to Compare

What is FireEye Data Center Security and how does it work?

FireEye cybersecurity products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature-reliant defenses. Shield data centers from advanced persistent threats (APTs) and sophisticated malware found in content stores, web and application servers, and common file shares. Protect your key assets and prevent attacks with products and services that work together and share threat intelligence.

Read more
Visit Website
AppViewX ADC+ logo
Simplify Multi-Cloud Application Delivery 4.5 Based on 19 Ratings
Visit Website + Add to Compare

What is AppViewX ADC+ and how does it work?

AppViewX ADC+ provides GUI-based, API-driven, out-of-the-box solutions that simplify and speed up ADC lifecycle automation. Enable users to create custom automation workflows using a simple, drag and drop interface and task library. Allow app teams to provision and automate ADC services, enable/disable objects for blue-green deployments, etc. with a single click from RBAC-powered dashboards and persona-based service catalogs. Automate ADC lifecycle end-to-end with AppViewX’s native workflow automation, or bring your own automation.

Read more

AppViewX ADC+ Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website
GitGuardian logo
A Monitoring Platform Built To Uncover Sensitive Company Information And Address Data Leak Issues Write a Review
Visit Website + Add to Compare

What is GitGuardian and how does it work?

GitGuardian is a private solution built to monitor and detect credential data leaks. It monitors official repositories listed under the GitHub organization and also the developer’s personal or public repositories. The platform covers 200+ API providers, private keys, database connection strings, certificates, usernames, and passwords. It comes with sophisticated pattern matching techniques that help to detect credentials that cannot be strictly defined with distinctive patterns. Developers are alerted alongside security teams and the meantime to detect is just a few seconds. It’s integrated with SIEM, ticketing systems, chats, and ITSM. It collaborates with developers and collects developer feedback directly in the dashboard to better investigate and prioritize issues. Users can monitor their internal repositories either public or private. The internal repositories monitoring feature includes integrations with GitHub and GitLab natively. Users can use the platform’s API to integrate into git hooks or in the CI as well. It comes with the ability to define custom detectors to identify specific internal tokens or hostnames.

Read more

GitGuardian Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

ConsentGrid logo
A Tool to Manage Privacy Regulations Write a Review
Visit Website + Add to Compare

What is ConsentGrid and how does it work?

ConsentGrid software is an API platform used by companies to automate privacy operations and legal requirements such as CCPA and GDPR, and gain trust by empowering their customers. Users decide their data, and respect their choices. The software offers an audit-trail of personal data use to govern Data Flow between systems. Use API calls to integrate with third party services like identity validation, or automate backend processing. Deliver responses using email or a secure privacy dashboard that you can integrate with your authentication system. Small, Medium and Large companies make use of the software.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 98%
  • Reviews 60%
  • Momentum 62%
  • Popularity 62%

ConsentGrid Pricing

  • Free Trial Available
  • Starts at $80.00.
Visit Website
Very Good Security logo
A Simple Data Security and Compliance Solution Write a Review
Visit Website + Add to Compare

What is Very Good Security and how does it work?

Very Good Security software is a SaaS solution used for managing the liability of data by eliminating the risk of data. The software offers PCI-DSS, SOC2, HIPAA, EI3PA and more to assist audits and internal compliance initiatives. It is secure and can integrate with 3rd party applications like multiple payment gateways, data providers, or other endpoints. Developers, Small, Medium and Large companies make use of the software.

Read more

Very Good Security Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website
Symantec Data Center Security logo
Complete server protection, monitoring, and workload micro-segmentation 4.5 Based on 12 Ratings
Visit Website + Add to Compare

What is Symantec Data Center Security and how does it work?

Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products.

Read more
Visit Website
Oneleet logo
Simplifying SOC 2 Compliance for a Secure Future Write a Review
Visit Website + Add to Compare

What is Oneleet and how does it work?

Oneleet is an all-in-one cybersecurity platform that is transforming how businesses achieve SOC 2 compliance. By unifying essential tools within a single interface, Oneleet simplifies the compliance process, enabling companies to focus on their core mission of delivering value to customers. Their innovative approach helps organizations implement effective security controls and validate them through detailed SOC 2 reports. With Oneleet, businesses can seamlessly achieve robust cybersecurity, ensuring their protection while avoiding the typical complexities of compliance. This commitment to streamlining cybersecurity highlights Oneleet's dedication to enhancing business operations and creating a secure, reliable environment.

Read more

Oneleet Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
ServerProtect for Linux logo
Stops malware from spreading through Linux Servers Write a Review
Visit Website + Add to Compare

What is ServerProtect for Linux and how does it work?

Trend Micro ServerProtectâ„¢ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation.

Read more
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed