Skip to main content
Main navigation
About
Partners
Communication Kit
Marketplace
Trainings
Use Cases
Financial
Transportation and Logistics
Healthcare
Events
News
Materials
Newsletters
Publications
Videos
Contact Us
Main navigation
About
Partners
Communication Kit
Marketplace
Trainings
Use Cases
Financial
Transportation and Logistics
Healthcare
Events
News
Materials
Newsletters
Publications
Videos
Contact Us
Home
Marketplace
Solutions
Solutions
Category
Govern
Cybersecurity Supply Chain Risk Management
Governance, Risks & Compliance (GRC) and Corporate Services
Risk Management strategy development & consulting
Security Certification
Organisational context
Supply Chain risk monitoring solutions & services
Risk Management Strategy
Business Impact Analysis
Identify
Asset Mangement
Application Code Security Services
Content Filtering & Monitoring
IT Service Management
Patch Management
Penetration Testing / Red Teaming
Software & Security Lifecycle Management
Static Application Security Testing (SAST)
Vulnerability Management (Analysis)
Improvement
Containment support
Post incident reviews & consulting
Risk Assessment
Risk Management solutions & services
Protect
Data security
Data Leakage Prevention
Digital Signature
Ecryption
Hardware Security Modules (HSM)
PKI / Digital Certificates
Human Risk Management
Cyber Ranges
Security Awareness Trainings
Identity Management, Authentication, & Access Control
Access Management
Authentication
Authorisation
Identity Management
Intrusion & Anomaly Prevention
Platform Security
Protective Technology
(NextGen) Firewalls
Anti Malware (also antivirus/-Spam / -Worm)
Backup / Storage Security
Cloud Security
DNS security
IoT Security
Mobile Security /Device management
PC / Mobile / End Point Security
Quantum security
Remote Access / (Mobile) VPN
Sandboxing
Unified Threat Management (UTM)
Wireless Security
Technology Infrastructure Resilience
Recover
Incident Recovery Communications
Communications coaching & consulting
Incident Recovery Plan Execution
Business Continuity / Recovery Planning
System Recovery / Data Cleansing
Respond
Incident Analysis
Digital Forensics
Fraud Investigation
Incident Management
Crisis Management
Incident Management
Incident Mitigation
Cyber Security Insurance
Data Recovery
DDoS protection
Incident Response Services (CSRIT aaS)
Takedown Services
Incident Response Planning and Communication
Crisis Communication
Detect
Adverse Event Analysis
Fraud Management
Intrusion Detection
Continous Monitoring
Cyber Threat Intelligence
Security Operations Centre (SOC)
SIEM / Event Correlation Solutions
Detection Processes
Honeypots / Cybertraps
Social Media and Brand Monitoring
Underground / Darkweb investigation
Deployment mode
Cloud, SaaS, web-based
Desktop Chromebook
Desktop Linux
Desktop Mac
Desktop Windows
Mobile Android
Mobile iOS
On-premise Linux
On-premise Windows
DevOps Cycle Phase
Build: Incorporating security testing during the build process to detect issues early
Code Development: Writing secure code, with built-in checks for vulnerabilities
Deploy: Deploying securely configured applications and infrastructure
Feedback and Compliance: Gathering feedback on security risks, compliance requirements, and addressing any incidents or vulnerabilities detected
Monitor: Continuous monitoring for security incidents, vulnerabilities, and compliance violations
Operate: Ongoing security monitoring, threat detection, and compliance checks in the production environment
Planning: Identifying security requirements alongside development and operational goals
Release: Ensuring security compliance and signing off on all checks before deployment
Testing: Automated security testing, including static and dynamic analysis, vulnerability scans, and penetration testing
Ideal organisation type
Academia
Associations, cooperatives, clusters
Freelancer/sole proprietor
Large Enterprise
Other
Public administration
Research Center
Small and Medium Enterprise
Market applications
Aerospace and Defense
Agriculture and Food Industry
Automotive
Construction and Real Estate
Consulting and Professional Services
Education
Energy and Utilities
Environmental Services
Finance and Banking
Healthcare
Hospitality and Tourism
Information Technology (IT)
Legal Services
Manufacturing
Media and Entertainment
Other
Pharmaceuticals and Biotechnology
Public Sector and Government
Retail and E-commerce
Telecommunications
Transportation and Logistics
Pricing model
Custom pricing
Free
Open source
Pay as you go
Perpetual license
Subscription (monthly/yearly)
Supported languages
Arabic
Bulgarian
Chinese
Croatian
Czech
Danish
Dutch
English
Estonian
Finnish
French
German
Greek
Hebrew
Hungarian
Irish
Italian
Latvian
Lithuanian
Maltese
Norwegian
Polish
Portuguese
Romanian
Russian
Slovak
Slovenian
Spanish
Swedish
Ukrainian
Target ECSF profile
Chief information security officer (CISO)
Cyber incident responder
Cyber legal, policy & compliance officer
Cyber threat intelligence specialist
Cybersecurity architect
Cybersecurity auditor
Cybersecurity educator
Cybersecurity implementer
Cybersecurity researcher
Cybersecurity risk manager
Digital forensics investigator
Penetration Tester
Which solution is the most suitable for your needs?
Compare solutions
CodeQL
Query-based code analysis for vulnerability detection.
Semgrep
Static analysis tool for finding security issues in code.
Goss
Lightweight YAML-based server configuration and compliance testing tool.
Social-Engineer Toolkit (SET)
Toolkit to simulate social-engineering attacks for testing.
Cyberwatching
EU project for cybersecurity monitoring and marketplaces.
King Phisher
Phishing campaign tool for enterprise testing.
GoPhish
Open-source phishing campaign toolkit for social engineering tests.
MITRE Caldera
Automated red teaming and adversary emulation framework.
TryHackMe
Online hands-on cybersecurity learning platform.
CADMUS
Cyber range / simulation platform for cybersecurity training.
Limon
Sandbox environment for dynamic malware analysis.
OSSEC
Host intrusion detection system for log analysis and integrity checking.
Pagination
« First
First page
‹‹
Previous page
1
2
3
4
5
6
››
Next page
Last »
Last page