Alternatives to Everbridge Visual Command Center
Compare Everbridge Visual Command Center alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Everbridge Visual Command Center in 2025. Compare features, ratings, user reviews, pricing, and more from Everbridge Visual Command Center competitors and alternatives in order to make an informed decision for your business.
-
1
Resolver
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence. -
2
Safetica
Safetica
Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adaptive security, Safetica provides comprehensive visibility and control over your data. ✔️ Discover what to protect: Precisely locate personally identifiable information, intellectual property, financials, and more wherever it is used across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Understand and mitigate risky behavior with automatic detection of suspicious file access, email communication and web browsing. Get the alerts you need to proactively uncover risk and prevent data breaches. ✔️ Keep your data safe: Intercept unauthorized exposure of sensitive personal data, trade secrets and intellectual property. ✔️ Work smarter: Help teams work, with in-moment data handling cues as they access and share sensitive information. -
3
Riskonnect Active Risk Manager (ARM)
Riskonnect
Riskonnect Active Risk Manager is a comprehensive risk management software designed to provide a holistic view of risks at project, program, and enterprise levels. It helps organizations visualize and analyze risk relationships, prioritize mitigation efforts, and prevent small issues from escalating into major disruptions. The platform aggregates risk data from frontline projects to identify trends and emerging threats, enabling more informed decision-making. Users benefit from features like bowtie cause-and-effect analysis, dashboards, heat maps, and schedule & cost impact assessments. Active Risk Manager streamlines risk collaboration, optimizes contingency resource allocation, and automates risk lifecycle management with easy-to-use interfaces and API integrations. It supports industry standards and frameworks such as ISO 31000, COSO, and PMBOK, with flexible deployment options including secure cloud and on-premises configurations. -
4
Regroup Mass Notification
Regroup Mass Notification
Regroup Mass Notification is an award-winning mass notification system (MNS) for emergency alerts, daily communications and business-critical messaging. Its robust cloud-based platform connects people in business, education, government and more with one-click messaging to mobile, email, websites, signage, social media and landlines. We provide a trusted, reliable platform that is easy to use and flexible — through a wide range of integrations. Regroup can keep people and organizations safe as part of an emergency response plan, and ensures continuity during critical events like severe weather, active shooter situations, fire and more.Starting Price: $500/month -
5
Vulcan Cyber
Vulcan Cyber
At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.Starting Price: $999 / month -
6
CrowdStrike Falcon
CrowdStrike
CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity. -
7
Dataminr
Dataminr
Dataminr’s AI platform detects high-impact events and potential risks as they unfold, sending real-time alerts to your global teams. Know critical information first, respond with confidence, and manage crises more effectively across your enterprise. Dataminr Pulse gives you the earliest indications of high-impact events—plus rich visual context and tools that help you collaborate and act faster—so you can better protect your people, your brand and your physical and digital assets. Dataminr Pulse streamlines your team’s collaboration, response protocols and critical information flows—enabling real-time command and control as physical and cyber risks emerge and high-impact events unfold. -
8
TopoONE
Crisis24
Constant awareness and fast response times are critical for an effective Security Operations Center (SOC). Book a demo to see how TopoONE by Crisis24 can give you 360-degree visibility of your exposures, compress your response times, and enhance your team’s productivity. TopoONE by Crisis24 is a SOC critical event management platform used by security and supply chain teams to manage risk to people, assets, and sites. Using powerful visualization, workflow, communication, automation, and analytics, TopoONE defines the future of security operations. TopoONE by Crisis24 stands ready to support your organization at upcoming large-scale events. Seamlessly merge threat intelligence, weather information, physical security systems, and your people and asset data to create a common operating picture that is right for you and your team. Manage and automate the actions associated with responding to security alerts and incidents so you can replace slow, manual, and repetitive tasks. -
9
Echosec
Flashpoint
Anchored by Echosec, Flashpoint’s geospatial Open-Source Intelligence (OSINT) product, the Physical Security Intelligence (PSI) solution offers an extensive range of global open-source data fused with geospatial enrichments, integrated AI, and expert finished intelligence, so practitioners can understand critical events, protect executives, and safeguard physical assets. Accelerate investigations and enhance situational awareness with open-source data, intelligence expertise, analytical tools, and AI enrichments. Effortlessly filter out social media noise to extract meaningful information quickly, monitor the topics and locations that matter to your organization, and alert the right team members when relevant posts are detected. -
10
Flashpoint
Flashpoint
Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, blogs, paste sites, technical data, card shops, and vulnerabilities, in a single, finished intelligence experience. Our platform scales Flashpoint’s internal team of specialized, multilingual intelligence analysts’ ability to quickly provide responses to customers. Access finished intelligence and primary source data across illicit online communities used by Flashpoint experts to create those reports. Broaden the scope of intelligence beyond traditional threat detection, and gain scalable, contextual, rich results that help teams make better decisions and protect their ability to operate across the enterprise. Whether you are an intel expert or new to assessing risk, our platform delivers relevant intelligence that empowers you to make more informed decisions and mitigate risk in any part of your organization. -
11
Social Links
Social Links
We bring together data from 500+ open sources covering social media, messengers, blockchains, and the dark web, to visualize and analyze a holistic picture for streamlining investigations. Conduct investigations across 500+ open sources with the help of 1700+ search methods. Extract user profiles, numbers, messages, groups, and more. View transactions, addresses, senders, recipients, and more. Access an expansive set of original search methods. Gain full access to darknet marketplaces, forums, and more. Delve into an extensive set of corporate sources. A suite of data extraction and analysis methods across social media, blockchains, messengers, and the dark web is connected directly to your in-house platform via our API. An enterprise-grade on-premise OSINT platform with customization options, private data storage, and our widest range of search methods. Companies from S&P500 and law enforcement agencies from 80+ countries rely on Social Links' solutions. -
12
LifeRaft Navigator
Navigator
Consolidate, assess, and investigate intelligence in a single platform. Collect and alert on data relevant to your security operations from social media, deep web, and darknet sources 24/7. Our unified intelligence platform automates collection and filtering, and provides a suite of investigative tools to explore and validate threats. Uncover critical information that impacts the security of your assets and operations. Navigator monitors the internet 24/7 with custom search criteria to detect high-risk threats to your people, assets, and operations from diversified sources. Finding the needle in the haystack is a growing challenge for security operations teams. Navigator provides advanced filtering tools to capture the breadth of the online threat landscape. Uncover, explore, and use a variety of sources to validate intelligence related to threat actors, events, and special interest projects or security issues. -
13
Seerist
Seerist
Seerist sifts through the noise of global chatter, forecasts potential threats, and offers insights enabling rapid, reliable decision-making when it matters most. Explore how Seerist delivers value to hundreds of intelligence and security users by enabling them to forecast and discover potential threats and event trends, monitor unfolding events, confirm the validity of those events, and then gather expert insight on what they mean for your organization. Seerist makes it easy for you and your teams to keep an eye on the locations that matter most to you. From country or city watch dashboards to customized alerting to managing your assets in a single map view, Seerist has you covered. Seerist ensures you have confidence in the data you need to make decisions for your organization. With access to curated sources and verified events, our users instantly access pertinent, precise, and up-to-date data. -
14
DigitalStakeout Scout
DigitalStakeout
DigitalStakeout Scout enables your cybersecurity and corporate security team to stand up an open-source intelligence capability on-demand. Solve brand threat intelligence, protective intelligence & executive protection, vulnerability and cyber threat intelligence, and digital risk protection challenges with a cloud-delivered security intelligence platform hosted and fully managed by DigitalStakeout. DigitalStakeout Scout provides the data collection capabilities and analytics technology required to spot and disrupt your organization’s threats, vulnerabilities, and exposures. Using a simple web-based UI, you’ll have an on-demand security intelligence tool that enables your analysts to filter out noise, reduce alert fatigue, accelerate investigations, and make smarter intelligence-led security decisions. DigitalStakeout Scout platform, analysts are 80% more productive, and customers, on average, cut the total cost of ownership of a security intelligence capability by 40%. -
15
Haystax
Haystax Technology
Our platform analytically monitors threats and prioritizes risk — enabling leaders and operators to act with confidence when it matters most. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses. The result is our on-premises or cloud-based Haystax Analytics Platform for early threat detection, situational awareness and information sharing. Read on to learn more! -
16
AlertMedia
AlertMedia
AlertMedia is the fastest-growing emergency communications company in the world, disrupting the industry with a more user-centric solution. The company offers a modern and intuitive emergency communication software with fully integrated threat warnings and employee safety monitoring. Our mission is to enable organizations of any size to improve safety and business outcomes during critical events through rapid identification of threats and fast, reliable communication to impacted audiences, anywhere in the world. Our communication software is central to an organization’s emergency preparedness plan for any emergency or business-critical event such as severe weather, fire, active shooters, office closures, IT outages, or urgent shift scheduling, as well as lone worker or business traveler safety. -
17
Factal
Factal
In a world of information pollution and AI noise, Factal's trusted verification enables organizations to make quick proactive decisions when faced with crisis and uncertainty. Get a head start with the fastest verified alerts of critical events. Quickly discover high-risk events on a global scale from a wide array of social media sources. Powered by a hybrid of advanced AI and experienced journalists, Factal detects early signals, filters out the noise and verifies the facts in real time. Shield your company, people and brands from emerging threats. Keep your jet-setting global travelers safe in real time. Join the largest chat network of security pros in the world. See precisely where your company is at risk right now. Get the global safety app that everyone is raving about. Gain a proactive edge with risk analytics and insights. Factal was founded on a public service mission to protect people from imminent harm and help those in immediate need. -
18
BlackCloak
BlackCloak
BlackCloak provides digital executive protection for company leaders, board members, and high-access employees, addressing the vulnerabilities in their personal digital lives that can pose significant risks to both individuals and organizations. Cybercriminals increasingly target executives' personal devices, home networks, and online accounts, seeking access to finances, confidential information, and proprietary data. Traditional enterprise security measures often do not extend into personal environments, leaving a critical gap. BlackCloak bridges this gap by offering comprehensive cybersecurity and digital privacy protection that safeguards executives and their families from targeted cyberattacks, digital fraud, identity theft, reputation damage, and other disruptions. Their services include securing personal devices, hardening home networks against threats, minimizing digital footprints to reduce risks such as cyberstalking and extortion, and preventing malware.Starting Price: Free -
19
Pendulum
Pendulum
Intuitive experience to search for a narrative in human terms and stories, as well as leverage context and your team’s knowledge to better enable our proprietary machine learning models. Our Narrative Engine links your input to billions of pieces of content to filter and bring together the ones that match the subtleties of what you are looking for into Narratives you can analyze and track. Flexible workflow to fine-tune which creators of content and narrative amplifiers you are interested in. Select and fine-tune from a rich library, learn how naturally creators cluster or start with a set you follow and find others like them using our Community Machine Learning models. Easily track and analyze your Pendulum intelligence, going from top-level summaries to individual pieces of content to quickly spot trends and potential drivers of risk. Easily export charts and data to produce high-quality intelligence reports. -
20
Ontic
Ontic
Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence. -
21
MetricStream
MetricStream
Reduce losses and risk events with forward-looking risk visibility. Enable a modern and integrated risk management approach with real-time aggregated risk intelligence and their impact on business objectives and investments. Protect brand reputation, lower the cost of compliance, and build regulators and board’s trust. Stay on top of evolving regulatory requirements, proactively manage compliance risks, policies, cases, and controls assessments. Drive risk-aware decisions and accelerate business performance by aligning audits to strategic imperatives, business objectives and risks. Provide timely insights on risks and strengthen collaboration across various functions. Reduce exposure to third-party risks, make superior sourcing decisions. Prevent third-party risk incidents with continuous third-party risk, compliance and performance monitoring. Simplify and streamline entire third-party risk management lifecycle. -
22
Endera
Endera
Endera offers a secure, user-friendly SaaS platform for continuous evaluation of workforce risk, moving beyond traditional point-in-time background checks to provide real-time monitoring of employees, contractors, supply chain partners, and counterparties. This proactive approach enables organizations to promptly identify and address potential risks, such as criminal records or financial distress, thereby enhancing overall security and compliance. The platform delivers actionable, tailored alerts based on specific criteria, allowing for efficient risk management without the need for extensive IT integration. By automating the evaluation process, Endera reduces the administrative burden associated with periodic re-screening, offering a cost-effective solution that ensures workforce trust and safety. This continuous monitoring not only aids in maintaining compliance with industry regulations but also supports proactive risk mitigation, empowering organizations to make informed decisions. -
23
resilienceOS
Restrata
resilienceOS is your single, comprehensive, secure source to manage your workforce location and safety, within an operations control centre, working remotely or when on the move. The platform delivers this using a blend of core features and optional services. Built from the ground up, resilienceOS is an end-to-end platform with a growing ecosystem that adapts to the way you want to operate, providing a better way to protect your people, assets and organization. Founded in 2006, Restrata is a British owned group with offices around the globe, born of the need to address safety and security solutions from a consultative perspective. Restrata was created with the mission to build client resilience and optimize operations through effective management of safety and security risks. -
24
D3 Smart SOAR
D3 Security
D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency. Smart SOAR's Event Pipeline normalizes, de-dupes, enriches and correlates events to remove false positives, giving your team more time to spend on real threats. When a real threat is identified, Smart SOAR brings together alerts and rich contextual data to create high-fidelity incidents that provide analysts with the complete picture of an attack. Clients have seen up to a 90% decrease in mean time to detect (MTTD) and mean time to respond (MTTR), focusing on proactive measures to prevent attacks. -
25
SIRV
SIRV
Threat, incident and event reports for security teams. People responsible for safety and security have a job to do: Monitor, learn & mitigate threats to their organisation. SIRV's award winning artificial intelligence solution visualises threats to your organisation. Monitor situational risk and learn about activism, crime and adjacent threats. Prepare, handle and recover from major incidents. Integration with the SIRV report platform allows field reports to be integrated into your threat picture. Features include: Incident reports Audit reports Proof of presence Asset tracking Tasks In app messaging Bespoke dashboard meet your needs.Starting Price: $10,000 per install -
26
Based on threat intelligence, big data mining and analysis, machine learning, visualization and other technologies, Wangsu situational awareness realizes the “visible, manageable, and controllable” network security situation, helping regulatory agencies, governments, enterprises and institutions improve discovery, identification, understanding, analysis, the ability to respond to potential threats, and help companies understand the operating status of online businesses in real time, and achieve a closed-loop business linkage of monitoring, early warning and emergency response. Supported by massive and continuous user access trajectory data, it effectively integrates and analyzes all threat intelligence, security incidents, etc., assesses the security of intrusion threats from a macro perspective, and helps companies effectively respond to unexpected new attacks. Real-time grasp of the latest security situation of the entire network and customer business.
-
27
Rapid7 Command Platform
Rapid7
The Command Platform provides attack surface visibility designed to accelerate operations and create a more comprehensive security picture you can trust. Focus on real risks with more complete visibility of your attack surface. The Command Platform allows you to pinpoint security gaps and anticipate imminent threats. Detect and respond to real security incidents across your entire network. With relevant context, recommendations and automation, expertly respond every time. Backed by a more comprehensive attack surface view, the Command Platform unifies endpoint-to-cloud exposure management and detection and response, enabling your team to confidently anticipate threats and detect and respond to cyber attacks. A continuous 360° attack surface view teams can trust to detect and prioritize security issues from endpoint to cloud. Attack surface visibility with proactive exposure mitigation and remediation prioritization across your hybrid environment. -
28
NESCOUT Cyber Threat Horizon
NESCOUT
NETSCOUT Cyber Threat Horizon is a real-time threat intelligence platform designed to provide visibility into the global cyber threat landscape, including DDoS attack activity. Leveraging data from NETSCOUT's ATLAS (Active Threat Level Analysis System), it offers insights into traffic anomalies, attack trends, and malicious activities observed across the internet. The platform empowers organizations to detect potential threats early by providing interactive visualizations, historical data analysis, and geolocation-based attack mapping. With its ability to track emerging threats and DDoS events as they unfold, NETSCOUT Cyber Threat Horizon is an invaluable tool for network administrators and security professionals seeking to enhance situational awareness and preemptively address risks. -
29
Trellix ATLAS
Trellix
Giving customers a unique insight into malicious files, domains, and IP detections seen worldwide. Advanced Threat Landscape Analysis System (ATLAS) data is aggregated from various Trellix data sources to provide the latest global emerging threats with enriched data such as industry sector and geolocation. ATLAS correlates these threats with campaign data containing research from Trellix’s Advanced Research Center (ARC) and Threat Intelligence Group (TIG), as well as open source data, to provide a dedicated view for campaigns consisting of events, dates, threat actors, IOCs, and more. Enables customers with unique global insight into the malicious threat detections seen worldwide by Trellix. Geospatially enabled situational awareness. Utilizes the Trellix telemetry data collected worldwide. Highlights current and emerging threats by highlighting those of particular interest by type, industry sector, geolocation, most seen, etc. -
30
DisasterAWARE Enterprise
DisasterAWARE Enterprise
DisasterAWARE Enterprise’s (DAE) Data as a Service (DaaS) includes the most comprehensive set of information available to track global hazards and understand their human impact. This document will briefly introduce each of the main content categories and examples for how to request information from the associated services. Use the power of our authoritative data to enable your applications with the world’s most accurate, real-time global risk and impact intelligence. With a simple API, you can add resilience capabilities to applications that address your organization’s unique needs and use cases. DisasterAWARE Enterprise is the most powerful disaster risk intelligence platform that is designed to be easy to onboard and use. No matter your level of experience, you will get immediate value day one. -
31
ThreatModeler
ThreatModeler
ThreatModeler™ enterprise threat modeling platform is an automated solution that simplifies efforts associated with developing secure applications. We fill a critical and growing need among today's information security professionals: to build threat models of their organizations' data, software, hardware, and infrastructure at the scale of the IT ecosystem and at the speed of innovation. ThreatModeler™ empowers enterprise IT organizations to map their unique secure requirements and policies directly into their enterprise cyber ecosystem – providing real-time situational awareness about their threat portfolio and risk conditions. CISOs and other InfoSec executives gain a comprehensive understanding of their entire attack surface, defense-in-depth strategy, and compensating controls, so they can strategically allocate resources and scale their output. -
32
RiskIQ
RiskIQ
RiskIQ is the leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand and customers. RiskIQ is the world’s only platform with patented Internet Intelligence Graph technology, security intelligence—unified. RiskIQ draws from a 10-year history of mapping the internet to fuel applied intelligence that detects and responds to cyberattacks, anywhere on earth. The most complete security intelligence to protect your attack surface. -
33
CyberStrong
CyberSaint Security
CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner -
34
Deepwatch
Deepwatch
Advanced managed detection and response to secure the distributed enterprise. Expert guided security operations for early detection and automated response to mitigate risk across the enterprise. Preemptively detect malicious activity and respond to active threats before the endpoint is compromised. Efficiently discover and remediate critical threats and vulnerabilities across the enterprise. Extensive experience across our team has led us to an important realization too often overlooked: each organization has unique aspects and requirements for its cyber solutions. No team is exactly the same and your threats aren’t either. We developed the Squad Delivery Model to foster collaborative, high touch, tailored services that meet your specific needs and requirements. -
35
What you don’t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business. Identify high-value, business-sensitive information assets that are at risk from internal and external threats. Provide an end-to-end view of business metadata associated with crown jewel data. Convey meaning and value to executives with a business-consumable data risk control center. Enable conversations with IT, security, and the line of business to improve processes and mitigate risks.
-
36
Cyware
Cyware
Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally. Cyware offers a full-stack of innovative cyber fusion solutions for all-source strategic, tactical, technical and operational threat intelligence sharing & threat response automation. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. Cyware solutions are pushing the boundaries of current security paradigms by utilizing advances in Machine Learning, Artificial Intelligence, Security Automation & Orchestration technologies to empower enterprises in adapting to the evolving threat landscape. -
37
Kroll Compliance
Kroll
Third parties, customers, and partners present legal, reputational, and compliance risks to your organization. The Kroll Compliance Portal arms you with the capabilities to control those risks at scale. Relative risk can dictate the need for a closer look. Emailing back and forth with analysts and downloading and saving files can slow you down, create a gap in the audit trail, and leave you vulnerable to information security risks. Take the due diligence process out of emails and file folders and bring order with the Kroll Compliance Portal. Many compliance programs become time and resource intensive because of manual processes or inflexible software. Put an end to that with the Kroll Compliance Portal’s Workflow Automation. Your business demands efficient third party onboarding. You need an accurate risk assessment. The Kroll Compliance Portal Questionnaire accelerates the onboarding process through automation, tracking and scoring in line with your risk model. -
38
NewEvol
Sattrix Software Solutions
NewEvol is the technologically advanced product suite that uses data science for advanced analytics to identify abnormalities in the data itself. Supported by visualization, rule-based alerting, automation, and responses, NewEvol becomes a more compiling proposition for any small to large enterprise. Machine Learning (ML) and security intelligence feed makes NewEvol a more robust system to cater to challenging business demands. NewEvol Data Lake is super easy to deploy and manage. You don’t require a team of expert data administrators. As your company’s data need grows, it automatically scales and reallocates resources accordingly. NewEvol Data Lake has extensive data ingestion to perform enrichment across multiple sources. It helps you ingest data from multiple formats such as delimited, JSON, XML, PCAP, Syslog, etc. It offers enrichment with the help of a best-of-breed contextually aware event analytics model. -
39
Radware Threat Intelligence
Radware
Radware’s Threat Intelligence Subscriptions complement application and network security with constant updates of possible risks and vulnerabilities. By crowdsourcing, correlating and validating real-life attack data from multiple sources, Radware’s Threat Intelligence Subscriptions immunize your Attack Mitigation System. It provides real-time intelligence for preemptive protection and enables multi-layered protection against known and unknown vectors and actors as well as ongoing and emergency filters. Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information. The systems transmit a variety of anonymized and sampled network and application attacks to our Threat Research Center and are shared with the community via this threat map. -
40
ThreatSync
WatchGuard
From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor. -
41
BCMsoft
KMIR Consultants
Your entreprise faces potential threats like natural disasters, cybercriminality, etc Whatever the event, don’t put your business at risk. Make sure that your Business Continuity Plan is ready and efficient with. Synchronized with company directories and applications. Web-base Business Continuity application. Mature & complete Saas or Site license main independent modules. Risk Management Business Continuity Internal Control. Build and maintain your BCP. Follows the 4 steps PDCA wheel. Easy integration of existing BCP. Compliant with ISO 22301 BCP standard. Relies on security and crisis standards like MEHARI, EBIOS, COSO, Basel, SOX, etc. Risk Management module. Identify major company risks Assess risks in line with Basel III recommendations. Manage inherent and residual risks. Mitigate risks and manage action plan. Monitor KRI. Business Continuity Module. Assess the major company processes. Assess the major company assets. Design the BIA Design test scenario. -
42
SD Elements
Security Compass
Security Compass, a pioneer in application security, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. Its flagship product, SD Elements, helps organizations accelerate software time to market and reduce cyber risks by taking an automated, developer-centric approach to threat modeling, secure development, and compliance. Security Compass is the trusted solution provider to leading financial and technology organizations, the U.S. Department of Defense, government agencies, and renowned global brands across multiple industries. -
43
CloudSEK
CloudSEK
The leading AI-powered Digital Risk Monitoring platform that detects 3rd party data leaks instantly. XVigil first gathers millions of data units from online sources. This raw data is filtered for noise, false positives, and anomalies, using a powerful AI engine. After which it is indexed, parsed, checked against the historical data lake, and mapped to clients’ assets. Duplicates and familiar threats are discarded, and the remaining relevant threats are rated based on severity, and sent to customers as alerts. Monitors your internet exposed infrastructure, curates a list of all asset-inventory and then periodically monitors misconfigurations, and potential data leakages. XVigil spans the internet to actively detect external threats as regards your organization, classify them based on their severity, and provide real-time alerts. Backed by 5 years of extensive research and development, CloudSEK’s ‘XVigil’ is a SaaS-based easy-to-use platform. -
44
The Strider platform is a comprehensive solution that enables organizations to identify, manage, and mitigate personnel and third-party risk outside the cyber domain. Using Strider, you are able to better protect your team and innovation, while constructing a partner ecosystem built on mutual trust. The Strider Platform leverages proprietary datasets to deliver a comprehensive view of your organization’s exposure to real-world nation-state actors, enabling you to combat insider threat and supply chain risk. Features include search, data visualizations, maps, timelines and case tracking, delivered through an intuitive dashboard that enables you to explore, and extract meaning from Strider-delivered data. Our platform can be deployed without the need to touch your network or data. Strider Gray Matter provides cutting-edge, finished intelligence and research that enables you to stay ahead of nation-state competitors.
-
45
Interos
Interos
As disruptions increase, organizations need to modernize assessment and monitoring. What are you doing to prepare? Map and model supply chains deeper and farther, view and know everything, everywhere, about your business relationships, in seconds. Using an arsenal of natural-language AI models, trained on supply-chain data, we’ve built the most highly connected, multi-dimensional network of B2B relationships in existence. We continuously monitor global events providing real-time indicators of supply chain vulnerability and distress, across your business ecosystem, all the way down to the Nth tier. Build resilience into the extended supply chain. Proactively manage cyber threats, ensure regulatory compliance, and source confidently with one solution. Identify connections to restricted and prohibited countries, assess legal and regulatory compliance, and identify financial, cyber, governance, geographic, and operational risk down to any single supplier, anywhere. -
46
Zignal
Zignal Labs
Zignal’s sensor network scans billions of data points every day, detecting both physical and narrative threats in real time and providing organizations with the context they need to make mission-critical decisions. Customizable automated alerting, precisely tailored to operational priorities and based on detailed criteria such as narrative peaks, key issues, and volume thresholds, ensure that threat awareness always occurs left of bang. Zignal’s bi-directional REST API allows organizations the choice of running either as a fully self-contained system or in a ‘headless systems mode’ capable of tipping and cueing seamlessly with current deployments. Zignal affords end-users full functionality while maintaining workflows for their operational watch floor. -
47
Manitou
Bold Group
When life safety is on the line, your operators don't have time to deal with complicated software. This is why Manitou was designed to be intuitive and comprehensive. Manitou is a flexible and expandable alarm monitoring software with a user interface built for operator simplicity. The custom dashboards can be tailored to each operators' needs, enhanced action patterns take them step by step through the alarm handling process, and the video control center gives them faster access to critical video in one streamlined package. With the nearly-unlimited integrations Manitou offers, your company can provide exceptional services to your customers. Manitou's innovative technology and robust features help your operators and business become more efficient and increase RMR. -
48
NexVision
NexVision Lab
NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.Starting Price: Free -
49
Risk Radar
Pro-Concepts
Educate Risk Radar® Enterprise users on the capabilities and functions contained in the application. Provide implementation strategies to promote pro-active risk management within a program, division or enterprise. Demonstrate how the application’s real time reporting capability brings greater visibility into business risks and opportunities. Provide a framework for understanding the approach to identify, analyze, manage and mitigate risks. Promote risk training for all stakeholders consisting of individuals, management teams, suppliers, developers, integrators, and customers – all supporting the business goals and objectives. Apply the Association Function to promote greater enterprise risk awareness. Discuss how risk data is collected, analyzed, mitigated and reported. Describe how to minimize cultural resistance to formal Risk Management. Promote a continuous risk management program. -
50
Risk Register+
I2E Consulting
Risk Register is a SharePoint-based App. It enhances risk management process across the organization by visualizing the project risks at a glance. Risk Register+ is a structured and systematic approach to managing organizational risks. It uses an intuitive graphical interface to capture risk interactions, enabling the identification and understanding of how emerging risks impact business performance. Whether you're looking to improve capital efficiency, comply with regulatory requirements or guard against market volatility, Risk Register+ offers clear visibility and accurate understanding of Risk Status, Category, Risk Response and Risk Strategy for managing organizational risks better. At i2e, we provide Enterprise Risk Management (ERM) solutions to clients across a broad range of industries including insurance companies, financial institutions, energy companies, utilities, healthcare, and public sector organizations.Starting Price: $24.99 one-time payment