Alternatives to Keysight Threat Simulator

Compare Keysight Threat Simulator alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keysight Threat Simulator in 2026. Compare features, ratings, user reviews, pricing, and more from Keysight Threat Simulator competitors and alternatives in order to make an informed decision for your business.

  • 1
    Adaptive Security

    Adaptive Security

    Adaptive Security

    Adaptive Security is OpenAI’s investment for AI cyber threats. Founded in 2024, Adaptive raised $50M+ from investors like OpenAI and a16z, as well as executives at Google Cloud, Fidelity, Shopify, and more. Adaptive protects customers from deepfakes, vishing, smishing, and AI email phishing with its next-generation security awareness training and phishing simulations. Security teams prepare employees for advanced threats with highly customized training that is role-based, enriched with OSINT, and even features deepfakes of their own executives. Employees train on mobile or desktop and rate the content an incredible 4.9/5 on average. Customers measure the success of their training program with AI-powered phishing tests. Realistic deepfake, voice, SMS, and email tests track risk across every vector. Trusted by Figma, the Dallas Mavericks, BMC, and others, Adaptive boasts a world-class NPS of 94. Want to learn more? Take a self-guided tour at adaptivesecurity.com.
    Compare vs. Keysight Threat Simulator View Software
    Visit Website
  • 2
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 3
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 4
    CrowdStrike Falcon
    CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
  • 5
    Forcepoint Secure Web Gateway
    Proactively secure the web with advanced, real-time threat defenses—full content inspection and in-line security scanning help mitigate risk and protect against malware. The convenience of securing your global workforce with a single endpoint for Web Security, DLP, CASB, and NGFW with flexible connectivity and traffic redirection options. Deploy how, when and where you want. On-premises, hybrid and cloud deployment architectures so you can go to the cloud at your own pace. Behavioral analytics and inline capabilities secure your policies and data across the world. Consistent policies with robust access control for all your sites, cloud apps, and users both on and off the corporate network. Keep users safe from malicious threats, including zero-day threats. Protect against zero-day threats with real-time threat intelligence and remote browser isolation, and provide deep content inspection for encrypted and unencrypted traffic to detect evolving threats across the entire kill chain.
  • 6
    WhiteHaX

    WhiteHaX

    WhiteHaX

    WhiteHaX cyber readiness verification is trusted by some of the largest cyber insurance carriers with tens of thousands of licenses deployed, WhiteHaX is a cloud-hosted, automated, cyber-readiness verification (pen-testing) platform. The WhiteHaX cyber-insurance version provides a no-install, no-impact, quick (under 15-min) verification of a business' cyber-readiness by simulating several threat scenarios against the business' deployed security infrastructure, including network perimeter defenses and endpoint security & controls. A few examples of these simulated threat scenarios include firewall attacks, user-attacks from internet such as drive-by downloads, email phishing/spoofing/spamming, ransomware, data-exfiltration attempts and others. WhiteHaX Hunter is a purpose-built platform, specifically designed to remotely hunt for server-side indicators of compromises (SIoCs) on applications and other servers deployed on-premise or in the cloud.
  • 7
    Cymulate

    Cymulate

    Cymulate

    Continuous Security Validation Across the Full Kill Chain. Cymulate’s breach and attack simulation platform is used by security teams to determine their security gaps within seconds and remediate them. Cymulate’s full kill chain attack vectors simulations analyze all areas of your organization including for example web apps, email, phishing, and endpoints, so no threats slip through the cracks.
  • 8
    Mandiant Security Validation
    The general assumption is that breach and attack simulation provides a comprehensive view of an organization’s cyber security posture. It does not. Many traditional BAS vendors have begun to label themselves as security validation. Use the latest global threat and adversary intelligence to focus resources on specific and relevant threats facing your organization. Emulate authentic, active attack binaries and destructive attacks, including malware and ransomware. Conduct real attacks across the full attack lifecycle with deep and comprehensive integration with your entire security infrastructure. Cyber security effectiveness needs to be objectively measured on an ongoing basis, not only to ensure the systems and tools in place are reducing an organization’s exposure to risk, but also to support CISOs who are being asked to measurably improve and demonstrate the value of their security investments to key stakeholders.
  • 9
    Cyberstanc Swatbox
    Traditional malware sandboxing and simulation solutions may fall short of detecting emerging threats because they often rely on static analysis and pre-defined rules to detect malware. SWATBOX is an advanced malware simulation and sandboxing platform that utilizes simulated intelligence technology to detect and respond to emerging threats in real-time. It is designed to emulate a wide range of realistic attack scenarios, allowing organizations to assess the effectiveness of their existing security solutions and identify any potential vulnerabilities. SWATBOX utilizes a combination of dynamic analysis, behavioral analysis, and machine learning to detect and analyze malware samples in a controlled environment. It uses real-life malware from the wild, which involves creating a sandboxed environment that simulates a real-world target and seeding it with decoy data, to lure attackers into a controlled environment where they can be monitored and their behavior studied.
  • 10
    Sophos Phish Threat
    Phishing is big business. Attacks have shown record growth in recent years, and a solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics. Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. End users are the largest, most vulnerable target in most organizations. In real-world attacks, end users are relentlessly bombarded with spear-phishing and socially engineered schemes. Simulate hundreds of realistic and challenging phishing attacks in a just few clicks. At Sophos, our global SophosLabs analysts monitor millions of emails, URLs, files, and other data points each day for the latest threats.
  • 11
    Cyttack.ai

    Cyttack.ai

    MST Networks

    Cyttack.ai is an AI-driven cybersecurity platform designed to help organizations test and strengthen their defenses through realistic DDoS attack simulations. The platform enables security teams to safely emulate volumetric, protocol, and application-layer attacks in a controlled environment without impacting live operations. Cyttack.ai provides real-time monitoring, detailed analytics, and actionable reports that highlight vulnerabilities, infrastructure limits, and mitigation gaps. With customizable attack scenarios, businesses can validate network resilience, evaluate security controls, and improve incident readiness. The cloud-based solution requires no complex setup and supports continuous security assessment for enterprises, startups, and MSSPs. Cyttack.ai empowers organizations to proactively identify risks, optimize defense strategies, and ensure business continuity against evolving cyber threats.
  • 12
    Kroll FAST Attack Simulation
    Kroll’s FAST Attack Simulations combine our unrivaled incident forensics experience with leading security frameworks to bring customized simulations to your own environment. Kroll leverages decades of incident response and proactive testing expertise to customize a fast attack simulation to meet the needs and threats of your organization. With deep knowledge of industry, market and geographical factors that influence an organization’s threat landscape, we craft a series of attack simulations to prepare your systems and teams for likely threats. Combined with any specific requirements your organization may have, Kroll will layer industry standards (MITRE ATT&CK) and years of experience to help test your ability to detect and respond to indicators throughout the kill chain. Once designed, simulated attacks can and should be used consistently to test and retest configuration changes, benchmark response preparedness and gauge adherence to internal security standards.
  • 13
    Silent Armor

    Silent Armor

    Silent Breach

    Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.
  • 14
    OpenBAS

    OpenBAS

    Filigran

    OpenBAS is an open source breach and attack simulation (BAS) platform developed by Filigran, designed to help organizations plan, schedule, and conduct cyber adversary simulation campaigns and tests. It enables the creation of dynamic attack scenarios, ensuring accurate, timely, and effective responses during real-world incidents. With over 800 GitHub stars and more than 10 injectors, OpenBAS allows for customizable simulations tailored to various industry needs, evaluating both technical and human aspects of security posture. It integrates threat intelligence from OpenCTI, enabling dynamic customization based on the latest cyber threat insights, used techniques, and relevant adversary behaviors. OpenBAS facilitates team and technology evaluations regarding actual cyber threats and collaborative feedback on scenarios within the platform, enabling detailed analysis for a comprehensive review process.
  • 15
    Nemesis

    Nemesis

    Persistent Security

    Nemesis by Persistent Security Industries is an advanced Breach and Attack Simulation (BAS) platform that allows organizations to test their defenses against real-world cyber threats in a safe, controlled environment. It provides continuous validation of security controls by simulating attacks based on the MITRE ATT&CK framework, identifying gaps that traditional vulnerability scans or penetration tests often miss. With automated scheduling, detailed reporting, and a comprehensive threat library, Nemesis empowers security teams to uncover blind spots and streamline compliance efforts. The platform integrates seamlessly with existing security stacks, making it a practical addition to any cybersecurity program. Customers report reduced ransomware costs, improved incident response readiness, and significant time savings in generating board-level reports.
  • 16
    NetSPI Breach and Attack Simulation
    It takes one click to give an adversary everything they need to access your global environment. Our proven technology and expert teams will evaluate your detective controls to prepare you for real-world threats throughout the cyber kill chain. Only 20 percent of common attack behaviors are caught by EDR, SIEM, and MSSP out-of-the-box solutions. Contrary to what many BAS vendors and technology providers claim, 100% detection does not exist. So, how can we improve our security controls to better detect attacks across the kill chain? With breach and cyber attack simulation. We deliver a centralized detective control platform that gives organizations the ability to create and execute customized procedures utilizing purpose-built technology and professional human pentesters. Simulate real-world attack behaviors, not just IOC’s, and put your detective controls to the test in a way no other organization can.
  • 17
    Validato

    Validato

    Validato

    Validato allows IT and Security teams to test the effectiveness of security controls by simulating adversarial behaviors based on known threat scenarios. Validato provides unbiased data and finding on how effective security controls are at detecting and protecting against exploitation of MITRE ATT&CK Techniques. If you are looking to implement a Threat-Informed Defense approach to cyber defense, then Validato is an excellent choice for you.
  • 18
    Picus

    Picus

    Picus Security

    Picus Security, the leading security validation company, gives organizations a clear picture of their cyber risk based on business context. Picus transforms security practices by correlating, prioritizing, and validating exposures across siloed findings so teams can focus on critical gaps and high-impact fixes. With Picus, security teams can quickly take action with one-click mitigations to stop more threats with less effort. The Picus Security Validation Platform easily reaches across on-prem environments, hybrid clouds and endpoints coupled with Numi AI to provide exposure validation. The pioneer of Breach and Attack Simulation, Picus delivers award-winning threat-centric technology that allows teams to pinpoint fixes worth pursuing, offering a 95% recommendation in Gartner Peer Review.
  • 19
    RidgeBot

    RidgeBot

    Ridge Security

    Fully automated penetration testing that discovers and flags validated risks for remediation by SOC teams. RidgeBot® is a tireless software robot, it can run security validation tasks every month, every week or every day with a historical trending report provided. Provides a continuous peace of mind for our customers. Evaluate the effectiveness of your security policies by running emulation tests that follow mitre Attack framework. RidgeBot® botlet simulates the behavior of malicious software or downloads malware signatures to validate the security controls of the target endpoints. RidgeBot® botlet simulates the unauthorized movement of data from your server—for example, personal data, financial, confidential, software source codes, and more.
  • 20
    RevBits Endpoint Security
    Identify, Isolate and Remove Endpoint Threats in Real-Time As an intuitive, high-performance security software, RevBits Endpoint Security blocks the most sophisticated attacks. RevBits Endpoint Security is the only solution available that conducts a three-phase analysis of threats. The feature-rich and comprehensive RevBits Endpoint Detection and Response (EDR) module provide complete control and access to the breached system from anywhere. Ransomware and malware incidents are stories of failed endpoint security. RevBIts Endpoint Security delivers better protection of the endpoint and will deliver organizations a safer network by preventing malware from successful lateral movement in the environment.
  • 21
    CyberDefenders

    CyberDefenders

    CyberDefenders

    CyberDefenders is a blue team training platform designed for SOC analysts, threat hunters, security blue teams, and DFIR professionals to develop and validate real‑world cyber defense skills. It offers two comprehensive learning paths: the Certified CyberDefenders (CCD) course for performance‑based certification preparation and BlueYard’s interactive CyberRange labs for hands‑on practice. It provides a library of realistic, browser‑based blue team labs and exercises that require no setup or external infrastructure, updated weekly to reflect the latest CVEs and attack reports. Each module pairs practical training with structured, step‑by‑step guidance to bridge theory and practice, enabling learners to tackle threat detection, incident response, and forensic analysis tasks. Its performance‑driven exercises simulate real‑world scenarios, equipping users to master threat hunting, log analysis, malware investigation, and SOC operations.
  • 22
    Panda Adaptive Defense 360
    Unified Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities, with our unique Zero-Trust Application Service and Threat Hunting Service in one single solution, to effectively detect and classify 100% of processes running on all the endpoints within your organization. Cloud-delivered endpoint prevention, detection, containment and response technologies against advanced threat, zero-day malware, ransomware, phishing, in-memory exploits and malware-less attacks. It also provides IDS, firewall, device control, email protection, URL & content filtering capabilities. It automates the prevention, detection, containment and response to any advanced threat, zero day malware, ransomware, phishing, in-memory exploits, and fileless and malwareless attacks, inside and outside the corporate network.
  • 23
    Cyberbit

    Cyberbit

    Cyberbit

    Cyberbit is a cybersecurity skills and training platform designed to close the experience gap by providing realistic, hands-on training through its ActiveExperiences™. Unlike traditional theory-based training, Cyberbit immerses defenders in real-world attack scenarios on real networks using actual enterprise-grade tools. The platform aligns training exercises with the NICE Framework roles to build proficiency in SOC analysts, incident responders, and other cybersecurity professionals. Users gain baseline skills, scale their capabilities through practice, validate readiness in crisis simulations, and demonstrate compliance with no shortcuts. Cyberbit’s high-pressure, live-fire exercises prepare teams to respond quickly and confidently to cyber threats. Cyberbit enables organizations to build operational cyber readiness effectively.
  • 24
    RAV Endpoint Protection

    RAV Endpoint Protection

    Reason Cybersecurity

    RAV Endpoint Protection is a next-generation antivirus solution that leverages AI-powered Endpoint Detection and Response (EDR) technology to provide real-time protection against advanced cyber threats. Its lightweight engine requires fewer device resources compared to other antivirus programs, ensuring seamless operation without technical expertise. The platform offers comprehensive online protection and identity monitoring, safeguarding users from phishing, ransomware, adware, and more during web activities. It includes digital identity management features, such as personal data monitoring and dark web scanning, to alert users when their identity has been compromised. The dynamic ransomware defense and malware protection feature utilizes advanced heuristics to block and alert users to potentially unknown ransomware threats. Additionally, RAV Endpoint Protection emphasizes privacy with tools like webcam and microphone protection, minimizing potential entry points for attackers.
    Starting Price: $32.83 per month
  • 25
    Securd DNS Firewall
    Make sure the Internet is always safe and available, to all your worldwide users, with our global, anycast dns firewall and dns resolver featuring 10ms resolutions, real-time threat protection, and a zero-trust posture to reduce your attack surface at the edge. Anti-virus protection can't keep up with the pace of modern malware, ransomware, and phishing attacks. It takes a layered approach to defend your assets from these threats. Deploying DNS filtering reduces the risk of a successful cyber attack by blocking access to malicious domains, disrupting downloads from compromised sites, or preventing malware from exfiltrating your data. DNS firewalls also provide real-time and historical visibility into endpoint DNS queries and resolution, which is necessary to hunt down and remediate infected and compromised devices quickly. Securd DNS Firewall is powered by a worldwide anycast network.
  • 26
    CTI Academy

    CTI Academy

    CTI Academy

    CTI Academy’s learning platform delivers an immersive cyber threat intelligence education through an intuitive e‑learning environment featuring expert‑led courses, interactive course materials, virtual lab environments, and practical exercises that simulate real‑world scenarios in threat intelligence, malware analysis, and attack surface management. It offers self‑paced, hands‑on labs that eliminate the need for external infrastructure or portals, ensuring seamless access to performance‑driven modules designed to build expertise in analyzing threats, reverse‑engineering malware, and monitoring vulnerabilities. Complementing this, the Cyber Underground Forum provides members‑only access to an exclusive community of cybersecurity professionals and analysts, up‑to‑the‑minute threat intelligence feeds, global coverage of emerging attack patterns, instant alerts on critical vulnerabilities, and a comprehensive archive of intelligence data for collaborative research.
  • 27
    Datto SaaS Defense

    Datto SaaS Defense

    Datto, a Kaseya company

    With Datto SaaS Defense, MSPs can proactively defend against malware, business email compromise (BEC), and phishing attacks that target Microsoft Exchange, OneDrive, SharePoint, and Teams. Defend your clients from ransomware, malware, phishing attempts, and BEC with a data-independent Microsoft 365 security solution. Datto SaaS Defense is an advanced threat protection solution that detects zero-day threats at the first encounter instead of days later. Proactively protect your clients’ Microsoft 365 data in OneDrive, SharePoint, and Teams. Our comprehensive security solution helps you attract new clients and expand market share without increasing headcount or investing in security training. Traditional email security solutions depend on data from previously detected cyber threats and successful penetration tactics. This creates protection gaps for new, unknown threats to exploit. Datto SaaS Defense is different.
  • 28
    CyberSentriq

    CyberSentriq

    CyberSentriq

    CyberSentriq is the unified brand created through the merger of TitanHQ and Redstor delivers an integrated cybersecurity and data protection platform that offers four bundled levels of coverage, ranging from essential email protection to a full cybersecurity stack with cloud-backup, DNS-based web filtering, tamper-proof email archiving, phishing simulation, and user-training. It enables cloud-based backup and rapid, granular recovery across endpoints, servers and SaaS environments; leverages AI-driven threat detection and machine learning to identify, analyze and neutralize threats before they reach systems or data; provides advanced email and web security including layered protection against ransomware, malware and phishing; and supports security awareness with continuous user-training and phishing simulations plus secure email archiving and encryption to ensure compliance and confidentiality. Designed for managed-service providers and internal IT teams alike, the platform offers a mu
  • 29
    Skyhawk Security

    Skyhawk Security

    Skyhawk Security

    Skyhawk Security provides a cloud breach prevention platform that continuously monitors runtime behavior across public cloud environments, correlates threats into actionable attack storylines, and delivers verified alerts, automated responses, and remediation recommendations to stop breaches before they occur. Its AI-powered Continuous Proactive Protection uses an Autonomous Purple Team to simulate realistic attacks against a customer’s unique cloud infrastructure and adapt detection models to evolving configurations, reducing noise and false positives so security teams focus only on real threats in real time. It integrates Cloud Threat Detection and Response (CDR) with contextualized, scored alerts tuned to each environment, enabling rapid resolution and shorter mean time to respond (MTTR). It also includes foundational capabilities such as Cloud Security Posture Management (CSPM) and Cloud Infrastructure Entitlement Management (CIEM) to assess permissions.
  • 30
    Defendify

    Defendify

    Defendify

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning
  • 31
    Infection Monkey
    Unleash the Infection Monkey in your network and discover security flaws in no time. Get a visual map of your network as seen from the attacker's eyes with a breakdown of the machines the Monkey managed to breach. Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios - credential theft, compromised machines and other security flaws. The Infection Monkey assessment produces a detailed report with remediation tips specific to each machine breached in your network. Overview of immediate security threats and potential issues. A map of your network with a breakdown of breached machines. Per-machine mitigation e.g. segmentation, password configuration, etc.
  • 32
    OpenText Threat Intelligence
    OpenText Threat Intelligence (formerly BrightCloud) is a cybersecurity solution that leverages a vast global sensor network and machine learning to detect emerging threats in real-time. It provides actionable insights for identifying malware, phishing, ransomware, and other cyberattacks before they cause damage. The platform offers comprehensive coverage by assessing websites, files, and IP addresses using advanced reputation scoring. It reduces false positives through deep, contextual analysis from data collected across millions of endpoints worldwide. OpenText Threat Intelligence seamlessly integrates with existing security infrastructures via flexible APIs and SDKs. This enables organizations to enhance their defenses with predictive threat intelligence and continuous updates.
  • 33
    Xcitium

    Xcitium

    Xcitium

    Xcitium is the only unified zero-trust cybersecurity platform, bringing zero-trust posture all the way from endpoints to the cloud under a single pane of glass. With Xcitium, we protect with detection-less innovation: patented Kernel-level API virtualization. Xcitium reduces the amount of time a threat can maneuver or dwell in your environment, down to absolute zero. Attacks happen in minutes and seconds. However, the impact of an attack does not always occur instantly. It can take some dwell time for an intruder to get a foothold and to execute search and destroy or exfiltration missions. Xcitium intercepts and isolates the attack before any of its impact and intended damage can occur. Equip every endpoint, network, and workload with the latest threat intelligence against cyber threat signatures and payloads. Defense against new or zero-day cyber threats using powerful static, dynamic, and patented behavioral AI.
  • 34
    SCYTHE

    SCYTHE

    SCYTHE

    SCYTHE is an adversary emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. SCYTHE allows organizations to continuously assess their risk posture and exposure. SCYTHE moves beyond just assessing vulnerabilities. It facilitates the evolution from Common Vulnerabilities and Exposures (CVE) to Tactics, Techniques, and Procedures (TTPs). Organizations know they will be breached and should focus on assessing detective and alerting controls. Campaigns are mapped to the MITRE ATT&CK framework, the industry standard and common language between Cyber Threat Intelligence, Blue Teams, and Red Teams. Adversaries leverage multiple communication channels to communicate with compromised systems in your environment. SCYTHE allows you to test detective and preventive controls for various channels.
  • 35
    RangeForce

    RangeForce

    RangeForce

    Build cyber resilience through RangeForce hands-on training and team exercises. Train in emulated, realistic environments featuring real IT infrastructure, real security tools, and real threats. Cut cost over traditional cyber training programs and complex on-premise cyber ranges. Our solutions offer team-based training for a variety of experience levels. Choose from hundreds of interactive modules to understand critical security concepts and see the most important security tools in action. Prepare your team to defend against complicated threats with realistic threat exercises. Train in customizable, virtual environments that emulate your own security stack.
  • 36
    Elasticito

    Elasticito

    Elasticito Limited

    We alert organisations to Risks & Threats. Our approach integrates state-of-the-art automation with the seasoned expertise of our Cyber Specialists, offering you exceptional visibility & control over the evolving cyber threats your business faces. We deliver the intelligence needed to proactively defend against attacks & understand third-party exposures. Through ongoing analysis of your security infrastructure, we identify areas of strength, uncover weaknesses & prioritise critical fixes based on potential business damage. Achieve a clear understanding of your security posture, benchmark against competitors & ensure regulatory compliance. Our Crown Jewel Protection, Detection & Response Solutions, aligned with the MITRE ATT&CK Framework, secure your critical assets at every stage.
  • 37
    ThreatAdvice Cybersecurity Education
    ThreatAdvice Educate - Looking for an efficient and effective cybersecurity online training platform for your employees? ThreatAdvice Educate uses video-based micro-learning courses to arm your employees with the cybersecurity knowledge they need to protect your organization. Our comprehensive employee education platform includes phishing simulations, quizzes, gamification, policies and procedures, audit reporting, external scans and more. Did you know that over 90% of all enterprise cyber breaches occur because of an unsuspecting employee not being prepared in the basic steps of cybersecurity? Employees may be the biggest threat to your cybersecurity, but they can also be your most effective means of thwarting an attack. ThreatAdvice Educate provides cyber security training for employees that brings the necessary cybersecurity knowledge and skills to help you avoid a cyber-attack and protect valuable company data, and also provides regular phishing tests.
  • 38
    AhnLab MDS
    More recent and sophisticated cyber-attacks have targeted organizations by injecting malware or files into web applications and email. The attacks initiate the distribution of malware that passes undetected through conventional security solutions; hence, these are so-called Advanced Persistent Threats(APTs). However, the response to the ever-evolving malware-based threats has been via ordinary security methods like antivirus, firewall, and intrusion prevention products.
Because of this, many organizations remain vulnerable to Advanced Persistent Threats. It’s no secret that these attacks cost a company via lost intellectual property, stolen information assets, damage to equipment, and network downtime. AhnLab MDS (Malware Defense System) is a network sandbox based APT (Advanced Persistent Threat) protection solution that combines on-premise and cloud-based analytics to defeat advanced targeted threats anywhere across the organization.
  • 39
    SonicWall Capture Client
    SonicWall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including next-generation malware protection and application vulnerability intelligence. It leverages cloud sandbox file testing, comprehensive reporting, and enforcement for endpoint protection. Additionally, provide consistent assurance of client security, with easy-to-use and actionable intelligence and reporting. Examine files that are possibly waiting to activate in a cloud sandbox. Rely on dynamic white/blacklisting and cloud intelligence. Utilize advanced static analysis to identify threats during download. Exercise shared threat intelligence from SonicWall’s verdict database. View threat visualization maps to see where threats came from and went. Effortlessly understand your security posture. Catalog your applications and see which ones are vulnerable.
  • 40
    Illumio

    Illumio

    Illumio

    Stop ransomware. Isolate cyberattacks. Segment across any cloud, data center, or endpoint in minutes. Accelerate your Zero Trust journey and protect your organization with automated security enforcement, intelligent visibility, and unprecedented scale. Illumio Core stops attacks and ransomware from spreading with intelligent visibility and micro-segmentation. Get a map of workload communications, quickly build policy, and automate enforcement with micro-segmentation that is easy to deploy across any application, cloud, container, data center, and endpoint. Illumio Edge extends Zero Trust to the edge to contain malware and ransomware to a single laptop instead of thousands. Turn laptops into Zero Trust endpoints, contain an infection to a single machine, and give endpoint security tools like EDR more time to detect and responds to threats.
  • 41
    AttackIQ

    AttackIQ

    AttackIQ

    AttackIQ gives customers the most consistent, trusted, and safest way to test and validate security controls at scale and in production. While competitors test in sandboxes, AttackIQ tests in production across the entire kill chain, the same as real-world adversaries do. AttackIQ can make every system in your networks and clouds a test point for the platform. We do this at scale, in your production environment, building connections to your controls and visibility platforms to capture evidence. Scenarios test your controls, validating their presence and posture using the same behaviors the adversary employs so you can be confident your program works as you intended. The AttackIQ platform provides a variety of insights for technical operators and executives alike. No longer is your security program a “black box” or managed by wishful thinking, AttackIQ produces threat-informed knowledge in reports and dashboards on a continuous basis.
  • 42
    Bitdefender Sandbox Analyzer
    Sandbox Analyzer detects advanced zero-day threats prior to execution. Suspicious files are automatically uploaded to a secure on-prem or Bitdefender-hosted cloud sandbox for in-depth behavior analysis. Sandbox Analyzer, built by in-house machine learning and behavioral heuristic models, is a powerful forensic tool used in conjunction with Endpoint Detection and Response (EDR) to enhance an organization’s defenses against concealed sophisticated threats. It serves as a source of validation to provide enhanced visibility and focused investigation while optimizing effective threat containment. Suspicious files are analyzed in-depth by detonating payloads in Bitdefender's cloud platform, or in a secure customer virtual environment. Our sandbox technology observes malware behavior by simulating a ‘real target’ so that the malware will act as it would in the wild. Post analysis, appropriate actions are taken to effectively neutralize the threat.
  • 43
    Kaspersky Security for Internet Gateway
    Working with the World Wide Web is critical to the majority of today's businesses. Your corporate internet gateway doesn't just give access to internet resources for your employees - it also provides an entry point for cyberthreats out to target them through social engineering, and to attack your endpoints with sophisticated malware. Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides multi-layered gateway-level protection against the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Supports and assists regulatory compliance initiatives.
  • 44
    OpenText Core Endpoint Protection
    OpenText Core Endpoint Protection delivers next-generation, cloud-based security designed to stop ransomware, phishing, and zero-day attacks before they disrupt business operations. Using real-time machine learning and OpenText Threat Intelligence, it continuously identifies threats and blocks malicious behavior across all endpoints. The platform simplifies security management with pre-built policies, easy administration, and seamless integration with leading RMM tools. With cloud-based control, IT teams can monitor and protect devices from anywhere without requiring on-premises oversight. The solution minimizes downtime by preventing infections and enabling rapid isolation and investigation when suspicious activity occurs. For organizations seeking deeper visibility, it integrates seamlessly with OpenText Core EDR to provide advanced threat detection and workflow automation.
  • 45
    Bugsmirror MASST
    MASST (Mobile Application Security Suite & Tools) is a unified mobile app security platform designed to detect, protect, and monitor mobile applications across development and runtime. The suite’s Threat Detection layer includes modules such as CodeLock for static analysis across 50+ vulnerability vectors, RunLock for runtime testing and attack simulations, APILock for discovering and securing API endpoints, and ThreatLock for deep red-teaming assessments. The Threat Mitigation layer wraps your mobile apps with protections including Defender (RASP-based real-time shielding), Shield (anti-reverse-engineering and IP-theft protection), and Guard (secure local storage of keys, certificates, and sensitive data via white-box cryptography). The Threat Visibility layer offers the ThreatLens Dashboard for real-time monitoring, analytics, and actionable insights into attacks, anomalies, and app security posture.
  • 46
    Panda Endpoint Protection
    Our endpoint protection stops malware, ransomware, and threats that leverage unknown (zero-day) vulnerabilities using an easy-to-manage cloud-based console and a lightweight agent that doesn’t interfere with the performance of the endpoints. Endpoint protection against malware, ransomware, and the latest threats. Detailed, real-time security monitoring and reporting. Lightweight agent and easy-to-use cloud-based console. Extend security by adding patch management and encryption without a new deployment. This effective, Cloud-native security solution for desktops, laptops, and servers centrally manages the security of endpoints, both inside and outside the corporate network. Our Endpoint Protection (EPP) technologies prevent infections by utilizing our Collective Intelligence, the consolidated and incremental knowledge repository of all applications, binaries, and other files, both trusted and malicious.
  • 47
    Fidelis Elevate

    Fidelis Elevate

    Fidelis Security

    Fidelis Elevate is an active Open XDR (Extended Detection and Response) platform that fortifies cyber security by automating defense operations across diverse network architectures. It extends security controls from traditional networks to the cloud and endpoints, making it the powerhouse of a cyber-resilient environment. Fidelis Elevate uses threat intelligence, analytics, machine learning, threat hunting, and deception technologies to gain insights into threats impacting user's environment. This process enables security teams to continually tune their defenses and neutralize threats before they cause damage to business operations. Centralizes cybersecurity intelligence for IT, IoT (Internet of Things), data centers, and cloud systems into a unified view, with full visibility and control, ensuring that customers detect post-breach attacks.
  • 48
    AT&T Cybersecurity

    AT&T Cybersecurity

    AT&T Cybersecurity

    As one of the world’s largest Managed Security Services Providers (MSSP), AT&T Cybersecurity delivers the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations. Defend your endpoints from sophisticated and ever-present cyber threats, detect and respond autonomously at machine speed, and proactively hunt threats down before they start to act. Instant threat prevention, detection, and response to help protect your devices, users, and business. Automatically terminate malicious processes, disconnect and quarantine infected devices, and rollback events to keep endpoints in a constant clean state. Logic and analysis performed on the endpoint agent, not in the cloud, helping protect endpoints in real time, even when offline. Automatically group alerts into patented storylines that provide analysts with instant actionable context and fewer headaches.
  • 49
    Heimdal Threat Prevention
    Secure your hybrid workforce, either on-site or remote, with a trailblazing DNS security solution that combines cybercrime intelligence, Machine Learning and AI-based prevention in preventing future threats with stunning accuracy. 91% of online threats leverage DNS. Heimdal’s Threat Prevention identifies emergent and hidden cyber-threats, stops cyberattacks that go undetected by traditional Antivirus and closes off data-leaking venues. With zero interruptions and minimal endpoint footprint. 96% accuracy in predicting future threats through the use of applied neural networks modelling allows you to confidently own your company’s DNS governance setup and hinder all immediate and future cyber-threat scenarios. You stay ahead of the curve, with total confidence. Spot malicious URLs, processes, and backtrack the attacker’s origins with a code-autonomous endpoint DNS threat hunting solution. Empower your team with the perfect tools and gain complete visibility and control.
  • 50
    Jamf Protect

    Jamf Protect

    Jamf Protect

    Endpoint protection built exclusively for Mac. Prevent macOS malware, detect and remediate Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Built for Mac to protect Mac. Jamf Protect puts the spotlight on Apple, helping security and IT teams with Mac in organizations of all sizes. Scale your teams through tools that understand the Mac platform. Jamf Protect helps maintain Mac endpoint compliance, address anti-virus needs by preventing macOS malware, control Mac application within the organization, detect and remediate Mac-specific threats, all while maintaining minimal impact to the device and the end-user experience. Prevent With comprehensive insight into Mac-specific malware, Jamf Protect meets your anti-virus needs by preventing known malware from running on your devices and quarantining them for later analysis. Lock down unwanted software by letting Jamf Protect limit its execution. Detect. Defend against sophisticated attacks on your Mac
    Starting Price: $5 per user, per month