Skip to main content
Main navigation
About
Partners
Communication Kit
Marketplace
Trainings
Use Cases
Financial
Transportation and Logistics
Healthcare
Events
News
Materials
Newsletters
Publications
Videos
Contact Us
Main navigation
About
Partners
Communication Kit
Marketplace
Trainings
Use Cases
Financial
Transportation and Logistics
Healthcare
Events
News
Materials
Newsletters
Publications
Videos
Contact Us
Home
Marketplace
Solutions
Solutions
Category
Govern
Cybersecurity Supply Chain Risk Management
Governance, Risks & Compliance (GRC) and Corporate Services
Risk Management strategy development & consulting
Security Certification
Organisational context
Supply Chain risk monitoring solutions & services
Risk Management Strategy
Business Impact Analysis
Identify
Asset Mangement
Application Code Security Services
Content Filtering & Monitoring
IT Service Management
Patch Management
Penetration Testing / Red Teaming
Software & Security Lifecycle Management
Static Application Security Testing (SAST)
Vulnerability Management (Analysis)
Improvement
Containment support
Post incident reviews & consulting
Risk Assessment
Risk Management solutions & services
Protect
Data security
Data Leakage Prevention
Digital Signature
Ecryption
Hardware Security Modules (HSM)
PKI / Digital Certificates
Human Risk Management
Cyber Ranges
Security Awareness Trainings
Identity Management, Authentication, & Access Control
Access Management
Authentication
Authorisation
Identity Management
Intrusion & Anomaly Prevention
Platform Security
Protective Technology
(NextGen) Firewalls
Anti Malware (also antivirus/-Spam / -Worm)
Backup / Storage Security
Cloud Security
DNS security
IoT Security
Mobile Security /Device management
PC / Mobile / End Point Security
Quantum security
Remote Access / (Mobile) VPN
Sandboxing
Unified Threat Management (UTM)
Wireless Security
Technology Infrastructure Resilience
Recover
Incident Recovery Communications
Communications coaching & consulting
Incident Recovery Plan Execution
Business Continuity / Recovery Planning
System Recovery / Data Cleansing
Respond
Incident Analysis
Digital Forensics
Fraud Investigation
Incident Management
Crisis Management
Incident Management
Incident Mitigation
Cyber Security Insurance
Data Recovery
DDoS protection
Incident Response Services (CSRIT aaS)
Takedown Services
Incident Response Planning and Communication
Crisis Communication
Detect
Adverse Event Analysis
Fraud Management
Intrusion Detection
Continous Monitoring
Cyber Threat Intelligence
Security Operations Centre (SOC)
SIEM / Event Correlation Solutions
Detection Processes
Honeypots / Cybertraps
Social Media and Brand Monitoring
Underground / Darkweb investigation
Deployment mode
Cloud, SaaS, web-based
Desktop Chromebook
Desktop Linux
Desktop Mac
Desktop Windows
Mobile Android
Mobile iOS
On-premise Linux
On-premise Windows
DevOps Cycle Phase
Build: Incorporating security testing during the build process to detect issues early
Code Development: Writing secure code, with built-in checks for vulnerabilities
Deploy: Deploying securely configured applications and infrastructure
Feedback and Compliance: Gathering feedback on security risks, compliance requirements, and addressing any incidents or vulnerabilities detected
Monitor: Continuous monitoring for security incidents, vulnerabilities, and compliance violations
Operate: Ongoing security monitoring, threat detection, and compliance checks in the production environment
Planning: Identifying security requirements alongside development and operational goals
Release: Ensuring security compliance and signing off on all checks before deployment
Testing: Automated security testing, including static and dynamic analysis, vulnerability scans, and penetration testing
Ideal organisation type
Academia
Associations, cooperatives, clusters
Freelancer/sole proprietor
Large Enterprise
Other
Public administration
Research Center
Small and Medium Enterprise
Market applications
Aerospace and Defense
Agriculture and Food Industry
Automotive
Construction and Real Estate
Consulting and Professional Services
Education
Energy and Utilities
Environmental Services
Finance and Banking
Healthcare
Hospitality and Tourism
Information Technology (IT)
Legal Services
Manufacturing
Media and Entertainment
Other
Pharmaceuticals and Biotechnology
Public Sector and Government
Retail and E-commerce
Telecommunications
Transportation and Logistics
Pricing model
Custom pricing
Free
Open source
Pay as you go
Perpetual license
Subscription (monthly/yearly)
Supported languages
Arabic
Bulgarian
Chinese
Croatian
Czech
Danish
Dutch
English
Estonian
Finnish
French
German
Greek
Hebrew
Hungarian
Irish
Italian
Latvian
Lithuanian
Maltese
Norwegian
Polish
Portuguese
Romanian
Russian
Slovak
Slovenian
Spanish
Swedish
Ukrainian
Target ECSF profile
Chief information security officer (CISO)
Cyber incident responder
Cyber legal, policy & compliance officer
Cyber threat intelligence specialist
Cybersecurity architect
Cybersecurity auditor
Cybersecurity educator
Cybersecurity implementer
Cybersecurity researcher
Cybersecurity risk manager
Digital forensics investigator
Penetration Tester
Which solution is the most suitable for your needs?
Compare solutions
Mitigata Marketplace
Digital platform for cybersecurity products and services.
CyberSecPro
Cybersecurity and privacy marketplace for SMEs (example).
PUZZLE
Cybersecurity marketplace / H2020 project example.
Sophos Central
Commercial cloud-based cybersecurity management platform.
GEIGER Marketplace
Marketplace of cybersecurity solutions for small businesses.
CUSTODES
H2020 project platform for cybersecurity research and testing.
OWASP for Git repositories
OWASP-oriented scanning and guidance for Git repos.
Graudit
Grep-based static analysis for multiple languages.
Flawfinder
Tool to find risky C/C++ functions and insecure code.
FindSecBugs
Security analyzer for Java (FindBugs plugin).
Brakeman
Static analysis scanner for Ruby on Rails applications.
Bandit
Python static analyzer for security issues.
Pagination
1
2
3
4
5
6
››
Next page
Last »
Last page