Browse Products & Solutions
- A.I. Detection and Response
- A.I. Security
- Access Management
- Active Directory Security (AD)
- Antivirus
- API Security
- Application Security (AppSec)
- Application Detection and Response (ADR)
- Assessment
- Asset Discovery & Management
- Attack Surface Management (ASM)
- Audit
- Awareness Training
- AWS Marketplace
- Backup
- Backup as a Service (BaaS)
- Bot Security
- Brand Protection
- Breach and Attack Simulation (BAS)
- CISO as a Service
- Code Security
- Collaboration Security
- Cloud Access Security Broker (CASB)
- Cloud Security
- Cloud VPN
- Continuous Controls Monitoring (CCM)
- Compliance
- Continuous Threat Exposure Management (CTEM)
- Consulting Services
- Cyber Asset Attack Surface Management (CAASM)
- Cyber Risk Quantification (CRQ)
- Cyber Security Insurance
- Dark Web Monitoring
- Data Access Governance (DAG)
- Data Discovery and Classification (DDC)
- Data Governance Solutions
- Data Privacy Management
- Data Protection
- Data Security Posture Management (DSPM)
- DDoS Protection
- Deception Technology
- Digital Executive Protection
- Disaster Recovery as a Service (DRaaS)
- Email Security
- Encryption
- Endpoint Detection and Response (EDR)
- Endpoint Security
- Extended Detection and Response (XDR)
- Governance, Risk and Compliance (GRC)
- Identity Management
- Identity and Access Management (IAM)
- Incident Response (IR)
- Insider Risk Detection and Management
- IoT Security
- Managed Detection and Response (MDR)
- Managed Threat Hunting
- Managed Security Services Provider (MSSP)
- Microsegmentation
- Microsoft Office 365 Security
- Mobile Security
- Network Detection and Response (NDR)
- Network Security
- Operational Technology Security (OT Security)
- Password Management
- Passwordless Authentication
- Penetration Testing (PenTest)
- Phishing Security
- Preference and Consent Management Solutions
- Privacy Management Solutions
- Privileged Access Management (PAM)
- Ransomware Protection
- Risk Management Tools
- SaaS Security (Software as a Service)
- SaaS Security Compliance
- Secure Access Service Edge (SASE)
- Secure Web Gateway (SWG)
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation and Response (SOAR)
- Security Operations & Threat Intelligence
- Security Ratings Platform
- SOC as a Service
- Social Media Security
- STEALTH MODE Cyber Security Software Vendors
- Third Party Risk Management - TPRM
- Threat Intelligence
- Training
- Vulnerability Management
- Web Application Firewall (WAF)
- Web Browser Security
- Zero Trust Network Access (ZTNA)
- Zero Trust Security Service Edge (Zero Trust SSE)
API Security is the process of protecting APIs from threats and attacks. APIs are the new normal for connecting to SaaS applications and they enable access to sensitive software functions and data and are a primary target for attackers. API security is a key component to modernizing your cyber security posture.
Synack
PenTest - Penetration Testing and Bug Bounty ServicesSynack is a security testing platform that delivers intelligent cyber attack evaluations continuously through AI-enabled processes.
Cloudflare
Cloud SecurityCloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable
Check Point
Cyber Security PlatformCheck Point is a well known leader of software and hardware products for cyber security including next-generation cloud security solutions for network security, endpoint security, mobile security, data security, secure web gateway (SWG), remote access ZTNA, email security and Microsoft Office 365 email and extended Microsoft application security. When looking for a single-platform for to bundle in many cyber security products, consider Check Point as a valuable cybersecurity platform option.
Noname Security
API SecurityNoname Security is taking a complete, proactive approach to API Security.
Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and API Security Testing.
Noname Security is backed by leading venture capital firms, including Lightspeed, Georgian, The Syndicate Group (TSG), Forgepoint, Next47, Insight Partners, and Cyberstarts, and has raised $220M, achieving "unicorn" status only one year out of stealth.
Noname Security is privately held, remote-first with headquarters in Silicon Valley, and offices in Tel Aviv and Amsterdam.
Salt Security
API SecuritySalt Security is an API Security SaaS provider. They offer an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.
Powered by Salt Security's AI-based Big Data engine and Holistic Detection architecture, only Salt Security:
--Discovers all your APIs and the sensitive data they expose
--Pinpoints and stops attackers during reconnaissance
--Eliminates API vulnerabilities to strengthen your security posture
Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security.
In our Series D round, we raised $140M at a valuation of $1.4 billion. Led by CapitalG, Alphabet's independent growth fund, the round included participation from all existing investors, including Sequoia Capital, Y Combinator, Tenaya Capital, S Capital VC, Advent International, Alkeon Capital, and DFJ Growth.
42Crunch
API Security42Crunch provides continuous API security. Their unique developer-first API security platform enables developers build and automate security into their API development pipeline and gives security teams full visibility and control of security policy enforcement throughout the API lifecycle. 42Crunch enables a seamless DevSecOps' experience that reduces governance costs and accelerates the rollout of secure APIs.
Neosec
Neosec - API SecurityNeosec is an API Security Solution helping your business protect your APIs from business abuse and data theft.
Imperva
Imperva - Application, Data and Network Security SolutionsImperva - Application, Data and Network Security Solutions
Imperva is a cyber security leader that helps organizations protect their data and all paths to it. Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer, and from vulnerable, legacy environments to cloud-first organizations. Imperva protects customers around the world trust Imperva to protect their applications, data, and websites from cyber attacks.
SlashNext
Multi-Channel Security for API Security, Cloud Email, Mobile, Secure Web Browser and Web Messaging AppsSlashNext was founded in 2015 during a significant rise in phishing, morphing payloads, and a very strong belief that phishing would grow from email into a multi-channel problem and become the number one cyber threat to organizations. There was a recognition that something needed to change.
Atif Mushtaq, the visionary founder behind SlashNext and one of the main architects of FireEye’s core malware sandbox technology, recognized phishing detection, like malware, needed to move from signature-based reputation techniques to behavioral analysis. What was needed was a faster, more automated, and accurate approach to phishing detection. With that knowledge, SlashNext built an Artificial Intelligence (AI) phishing detection engine with virtual browsers and behavioral analysis using computer vision, natural language processing, and several machine-learning classifiers to detect and stop well-crafted multi-payload phishing attacks delivered multiple communication channels, including legitimate infrastructure.
Today, as humans have moved completely to the cloud, using apps, browsers and mobile devices to communicate with work, family, and friends, SlashNext is uniquely positioned to stop multi-channel phishing and human hacking
Fastly
Web Application Firewall - WAF, API Protection, Cloud Web Application Security, DDoS Mitigation, Runtime Application Self-Protection - RASP, Edge Cloud Platform, Edge Development PlatformWith Fastly's edge cloud platform, you can build more powerful websites and applications. Every day, Fastly helps companies like Reddit, Pinterest, Stripe, Neiman Marcus, The New York Times, Epic Games, and GitHub accomplish their website and application goals.
Kiteworks
Email Security, CMMC Certified Email Security, Secure File Transfer, Secure Web Forms, Secure API, DoD Security, DoD Contractor CMMC Security, Secure Content CommunicationKiteworks mission is to empower organizations to manage risk effectively when sending, sharing, receiving, and storing sensitive content. The Kiteworks platform is designed to deliver content governance, compliance, and protection to our customers. Platforms unify, track, control, and secure sensitive content within, into, and out of organizations, enhancing risk management and ensuring regulatory compliance.
Vercara
DDoS Mitigation and Protection Services, DNS Service Provider, Cloud/IT Security, DNS Services, DDoS Attack Protection, Network and Application Security, Authoritative DNS, UltraPlatform and Recursive DNSWith Vercara's purpose-built, global cloud security platform, businesses can safeguard their online presence from any attack, regardless of where it comes from. In order to protect revenue and reputation, organizations must employ security solutions that are flexible enough to adapt to their unique needs, easily scalable, and able to evolve as their businesses do. By protecting networks and applications against threats and downtime, Vercara ensures that businesses and their customers have exceptional interactions all the time. Best known for their DDoS Attack Protection, DNS Security and WAF security platform and their company started as a security division of Neustar, Inc.
Traceable
API SecurityIn an API-driven, cloud-first world, Traceable is the industry's leading API security company. API discovery and posture management, API security testing, attack detection and protection, all powered by Traceable, the only intelligent and context-aware API security solution. Using Traceable, organizations can minimize risk and maximize API value for their customers. A CYBER BUYER Advisor can show you how API security can benefit your business.