Alternatives to Tenable Enclave Security

Compare Tenable Enclave Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Tenable Enclave Security in 2026. Compare features, ratings, user reviews, pricing, and more from Tenable Enclave Security competitors and alternatives in order to make an informed decision for your business.

  • 1
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
    Compare vs. Tenable Enclave Security View Software
    Visit Website
  • 2
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
  • 3
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 4
    Cyberint Argos Platform
    Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats coming from beyond the traditional security perimeters. Manage exposure, prioritize threats, and reduce cyber risk with Argos, Cyberint’s Impactful Intelligence platform. Protect your organization from an array of external cyber risks with a single comprehensive solution. Continuously uncover known and unknown vulnerabilities and weaknesses. From exposed web Interfaces and cloud Storage exposure to email security issues and open ports, Argos’ autonomous discovery maps out your external exposures and prioritize for impactful remediation. Cyberint serves leading brands worldwide including Fortune 500 companies across industries such as finance, retail, ecommerce, gaming, media, and more.
  • 5
    Tenable One
    Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 6
    Tenable Vulnerability Management
    The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk. Expose and close your cyber weaknesses with the world’s #1 vulnerability management solution. Gain the full visibility you need to reveal the impactful vulnerabilities across your IT environment. Quickly spot priority exposures with a high likelihood of attack and business impact. Take rapid, decisive action to close critical exposures and execute remediations. Find hidden vulnerabilities with continuous, always-on asset discovery and assessment of known and unknown assets in your environment, even highly dynamic cloud or remote workforce assets. Search, contextualize, and respond to vulnerabilities based on the industry’s richest sources of data and intelligence provided by Tenable Research. Identify which vulnerabilities to fix first with automated prioritization that combines vulnerability data, threat intelligence, and data science.
    Starting Price: $4,399.05 per year
  • 7
    Tenable Security Center
    Reduce risk across your IT infrastructure. The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk. Take full advantage of active scanning, agents, passive monitoring, external attack surface management, and CMDB integrations to gain the visibility you need to reveal impactful vulnerabilities across your environment. Use the industry’s most extensive CVE coverage to quickly and confidently spot priority exposures with a high likelihood of attack and business impact. Take rapid, decisive action with Tenable Predictive Prioritization technology, with vulnerability data, threat intelligence, and data science, to close critical exposures and execute remediations. Customized to meet your needs, the Tenable Security Center suite of products gives you the visibility and context you need to understand your risk and fix vulnerabilities quickly.
  • 8
    Tenable Lumin
    Quickly and accurately assess your risk with Tenable Lumin. Then compare your health and remediation performance to other Tenable customers in your Salesforce industry and the larger population. Tenable Lumin correlates raw vulnerability data with asset business criticality and threat-context data to support faster, more targeted analysis workflows than traditional vulnerability management tools. Advanced risk-based cyber risk analysis and scoring weighs vulnerabilities, threat data, and asset criticality along with remediation and assessment maturity. Provides clear guidance on where to focus remediation efforts. Gain insights through a single, comprehensive view of your entire attack surface (including traditional IT, public and private clouds, web applications and containers, IoT, and OT). See how your organization’s cyber risk is changing over time. Manage risk based on quantifiable metrics aligned to the business.
  • 9
    Emerge Cyber Security
    Emerge delivers a fully automated cybersecurity solution that protect your business from cyber attacks. Automatically discover cyber security weaknesses across your networks and applications using safe exploitation techniques with zero disruption. Continuously validate your security posture and accurately prioritise remediation efforts, ensuring critical threats are managed. Identify and secure your most vulnerable critical assets, eliminate emergency patching, control access to data and prevent credential abuse. We’re here to help businesses adopt new and highly effective ways of tackling cyber security challenges with our fully automated solutions that fulfil all your cyber needs. Identify where you are most vulnerable, prioritise remediation and assess how your security has improved, or not, over time. Track remediation progress, spot vulnerability trends and instantly see which areas of your environment are most at risk.
  • 10
    Tenable Identity Exposure
    Unleash a new level of end-to-end protection from identity-based attacks. Collapse enterprise silos and unify identities across Active Directory and Entra ID. Evaluate your identities using risk scoring to locate the riskiest ones that require attention. Use step-by-step prioritization to rapidly close security gaps with the highest likelihood of identity-based exploits. Identities are the new perimeter, compromised identities are at the center of nearly every successful cyberattack. By exposing and closing the security gaps where identity-based exploits thrive, Tenable Identity Exposure strengthens your security posture and confidently prevents attacks before they occur. Tenable Identity Exposure continuously validates your Active Directory and Entra ID environments for weaknesses, misconfiguration, and activity that can lead to damaging attacks. Integrating deep identity context into the Tenable One exposure management platform can further help you see risky toxic combinations.
  • 11
    Tenable Attack Surface Management
    Get comprehensive visibility into your internet-connected assets, services, and applications to better assess and manage risk. Tenable Attack Surface Management continuously maps the entire internet to give you comprehensive visibility into your internet-facing assets, even those you don’t know about. Discover and assess your external attack surface to gain a more complete picture of where you may be exposed. Feed this rich context into Tenable One for unprecedented visibility so you can eliminate risk, wherever it resides. Find more with Tenable Attack Surface Management to access an attack surface map of more than 5 billion assets to discover domains related to assets in your inventory. Get more done with notifications on changes in your attack surface for continuous monitoring. Get full business context by leveraging more than 200 fields of metadata to help you make more informed decisions about previously unknown internet-connected assets.
  • 12
    Infocyte

    Infocyte

    Infocyte

    The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations.
  • 13
    Autobahn Security

    Autobahn Security

    Autobahn Security GmbH

    Start your cyber fitness and cyber health journey today. Autobahn Security combines six key cyber risk management requirements into a comprehensive vulnerability management program. Autobahn Security is trusted worldwide by companies of all sizes, industries, and locations. Autobahn Security is a vulnerability remediation solution that was developed by Security Research Labs' internationally recognized ethical hackers and security specialists. Autobahn Security is a more efficient way to assess vulnerabilities than traditional methods. It detects forgotten assets, automates the process, and protects your business from potential threats. Autobahn Security closes these gaps by fully automated asset discovery, vulnerability scanning, and comprehensive benchmarking based upon deep scans of more than four thousand companies.
    Starting Price: $99 one-time payment
  • 14
    Security Score
    OPSWAT Security Score helps you identify weaknesses in your computer security system and fix security issues that leave you vulnerable to cyber-attacks. 1. Download our free OPSWAT Security Score app and click on it to run. No installation is required! 2. Get Your Security Score and Identify Risks 3. Fix Your Security Issues
  • 15
    Tenable Web App Scanning
    Unified web app and API scanning that’s simple, scalable, and automated. Whether it’s the top 10 risks from OWASP, vulnerable web app components, or APIs, Tenable Web App Scanning gives you comprehensive dynamic application security testing (DAST). Web application security from the largest vulnerability research team in the industry. Deliver immediate value with fast web application scans to discover common security hygiene issues that run in two minutes or less. Set up a new web app scan in a few seconds by leveraging the same vulnerability management workflows you are already familiar with. Configure weekly or monthly automated testing of all of your applications. Create fully customizable dashboards and widget visualizations to integrate IT, cloud, and web application vulnerability data into a single, unified view. Tenable Web App Scanning is available as a cloud-based solution and is now on-premises seamlessly integrated into Tenable Security Center.
  • 16
    CyberArk Machine Identity Security
    CyberArk Machine Identity Security provides comprehensive protection for all machine identities, including secrets, certificates, workload identities, and SSH keys. The platform offers centralized visibility and scalable automation to secure these non-human identities throughout their lifecycle. Designed to help organizations reduce risk and maintain resilience, CyberArk ensures secure machine identity management across on-premises, cloud, and hybrid environments.
  • 17
    AWS Nitro Enclaves
    AWS Nitro Enclaves enables customers to create isolated compute environments to further protect and securely process highly sensitive data such as personally identifiable information (PII), healthcare, financial, and intellectual property data within their Amazon EC2 instances. Nitro Enclaves uses the same Nitro Hypervisor technology that provides CPU and memory isolation for EC2 instances. Nitro Enclaves helps customers reduce the attack surface area for their most sensitive data processing applications. Enclaves offer an isolated, hardened, and highly constrained environment to host security-critical applications. Nitro Enclaves includes cryptographic attestation for your software, so that you can be sure that only authorized code is running, as well as integration with the AWS Key Management Service so that only your enclaves can access sensitive material.
  • 18
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 19
    CYRISMA

    CYRISMA

    CYRISMA

    CYRISMA is an all-in-one cyber risk management platform that enables you to discover, understand, mitigate, and manage risk in a holistic and cost-effective manner. Identify and mitigate network and endpoint vulnerabilities, discover and secure sensitive data across cloud and on-prem environments, strengthen OS configuration settings, track compliance, and generate cyber risk assessment reports in a few easy steps. Platform capabilities include (everything included in the price): -- Vulnerability and Patch Management -- Secure OS Configuration Scanning -- Sensitive data discovery; data protection (both on-prem cloud including Microsoft Office 365 and Google Workspace) -- Dark web monitoring -- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials) -- Active Directory Monitoring (both on-prem and Azure) -- Cyber risk quantification in multiple currencies -- Cyber risk assessment and reporting
  • 20
    Tenable AI Exposure
    Tenable AI Exposure is an agentless, enterprise-grade solution embedded within the Tenable One exposure management platform that provides visibility, context, and control over how teams use generative AI tools like ChatGPT Enterprise and Microsoft Copilot. It enables organizations to monitor user interactions with AI platforms, including who is using them, what data is involved, and how workflows are executed, while detecting and remediating risks such as misconfigurations, unsafe integrations, and exposure of sensitive information (like PII, PCI, or proprietary enterprise data). It also defends against prompt injections, jailbreak attempts, policy violations, and other advanced threats by enforcing security guardrails without disrupting operations. Supported across major AI platforms and deployed in minutes with no downtime, Tenable AI Exposure helps organizations govern AI usage as a core part of their cyber risk strategy.
  • 21
    DynaRisk Breach Defence
    As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence. Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business. Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems. Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit. Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.
  • 22
    Frontline Vulnerability Manager
    Frontline Vulnerability Manager is more than a just a network vulnerability scanner or vulnerability assessment. It's a proactive, risk-based vulnerability and threat management solution that is a vital part of any cyber risk management program. Its robust features set it apart from other VM solutions, providing vital security information in a centralized, easily understood format so you can protect your business-critical assets efficiently and effectively. More than ever, cyber attackers are looking for vulnerabilities they can exploit in a company’s network. So having a vulnerability management solution in place is critical. A vulnerability management program is far more than just a vulnerability assessment, vulnerability scanner, or patch management. The best vulnerability management solutions use an ongoing process that regularly identifies, evaluates, reports and prioritizes vulnerabilities in network systems and software.
  • 23
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 24
    Prevasio

    Prevasio

    AlgoSec

    Prevasio is an AI-driven cloud security platform that offers comprehensive visibility, automatic threat detection, and robust protection for cloud applications. It automatically discovers and maps cloud infrastructure, identifying resources and revealing how they power applications, providing unparalleled visibility and actionable insights. Prevasio's agentless Cloud-Native Application Protection Platform (CNAPP) spans the entire CI/CD pipeline to runtime, ensuring streamlined and efficient security management. It prioritizes risks based on their impact on business applications and severity, helping organizations focus on critical vulnerabilities. The platform also simplifies cloud compliance by continuously monitoring cloud assets, ensuring adherence to industry standards and regulations. Prevasio's Infrastructure-as-Code (IaC) scanning detects vulnerabilities early in the development cycle, securing cloud infrastructure before it's built.
  • 25
    Elasticito

    Elasticito

    Elasticito Limited

    We alert organisations to Risks & Threats. Our approach integrates state-of-the-art automation with the seasoned expertise of our Cyber Specialists, offering you exceptional visibility & control over the evolving cyber threats your business faces. We deliver the intelligence needed to proactively defend against attacks & understand third-party exposures. Through ongoing analysis of your security infrastructure, we identify areas of strength, uncover weaknesses & prioritise critical fixes based on potential business damage. Achieve a clear understanding of your security posture, benchmark against competitors & ensure regulatory compliance. Our Crown Jewel Protection, Detection & Response Solutions, aligned with the MITRE ATT&CK Framework, secure your critical assets at every stage.
  • 26
    Rocket z/Assure VAP

    Rocket z/Assure VAP

    Rocket Software

    Rocket z/Assure Vulnerability Analysis Program (VAP) is a specialized mainframe security solution that scans and analyzes vulnerabilities in IBM z/OS operating system code to help organizations identify, assess, track, and mitigate security risks that could expose critical data. Unlike traditional vulnerability tools that focus on application layers, z/Assure VAP conducts thorough and precise binary code scanning at the OS level to detect zero-day and integrity-based vulnerabilities without relying on signature files, using an Interactive Application Security Testing (IAST)-style approach to pinpoint real weaknesses and guide developers to the exact code requiring remediation. It generates detailed vulnerability disclosure reports that provide actionable insights and clear paths to fix issues, enabling teams to prioritize risk, strengthen defenses, and make mainframe vulnerability management a repeatable part of IT security and compliance programs.
  • 27
    ANOZR WAY

    ANOZR WAY

    ANOZR WAY

    Discover executives & employees vulnerabilities before attackers. Assess and mitigate human-related cyber risks proactively with an all-in-one platform integrating users empowerment. Despite IT & security team efforts, sensitive people information is exposed from social media to darkweb: all data useful for attackers to target and impact people and their organization. ANOZR WAY technology performs attacker-like reconnaissance phase to detect exposed-compromised data, and identify people most at risk. Then, our proactive solutions guide security team and users to mitigate these human-related risks.
  • 28
    RiskProfiler

    RiskProfiler

    RiskProfiler

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber risk ratings, Recon RiskProfiler for External Attack Surface Management (EASM) capabilities, Cloud RiskProfiler for Cloud Attack Surface Management (CASM) that identifies actually exposed cloud resources and prioritizes risks, and Brand RiskProfiler for brand protection. Recon RiskProfiler is an advanced EASM and CASM solution with robust integrations across major cloud providers like AWS, Azure, and Google Cloud. It delivers comprehensive visibility into external cloud resources, enabling efficient identification, assessment, and management of vulnerabilities and risks. Vendor RiskProfiler is a comprehensive Cyber Risk and Vendor Risk Management solution that delivers company cyber risk ratings while enabling efficient sending, receiving, and validation of third-party vendor security.
  • 29
    Sophos Cloud Native Security
    Complete multi-cloud security coverage across environments, workloads, and identities. Boost efficiency with a single integrated cloud security platform. Sophos Cloud Native Security unifies security tools across workloads, cloud environments, and entitlements management. Integrated with SIEM, collaboration, workflow, and DevOps tools to increase agility across an organization. Your cloud environments need to be tough, hard to compromise and quick to recover. Our comprehensive and intuitive security and remediation tools can be managed by your security teams, or via Managed Services to fast-track your cyber resilience to best meet the security incidents of today. Leverage our extended detection and response (XDR) tools to identify and stop malware, exploits, misconfigurations, and anomalous behaviors. Hunt for threats, prioritize detections, and automatically connect security events to optimize investigation and response.
  • 30
    HivePro Uni5
    The Uni5 platform elevates traditional vulnerability management to holistic threat exposure management by identifying your enterprises' likely cyber threats, fortifying your weakest controls, and eliminating the vulnerabilities that matter most to reduce your enterprise risks. Minimizing your threat exposure and outmaneuvering cybercriminals requires enterprises to know their terrain, and the attacker’s perspective well. HiveUni5 platform provides wide asset visibility, actionable threat, and vulnerability intelligence, security controls testing, patch management, and in-platform, cross-functional collaboration. Close the loop on risk management with auto-generated strategic, operational, and tactical reports. HivePro Uni5 supports over 27 well-known asset management, ITSM, vulnerability scanners, and patch management tools out of the box, allowing organizations to utilize their existing investments.
  • 31
    Hakware Archangel
    Hakware Archangel is an Artificial Intelligence based vulnerability scanner and pentesting tool. Archangel scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities with advanced Artificial intelligence continuously testing your environment. Why use Archangel? -Identify vulnerabilities before cyber criminals do -Our vulnerability scanning mitigates the risks of a data breach, which will come with a range of costs, including remediation, the loss of customers as a result of reputational damage and fines -Vulnerability scanning is not explicitly required by the GDPR (General Data Protection Regulation) or POPI (Protection Of Personal Information Act), but the -Regulation does require organisations that process personal data to ensure that they have implemented appropriate technical and organisational security measures – which includes identifying vulnerabilities -The international standard for information security, ISO 27001
  • 32
    NeuVector
    NeuVector covers the entire CI/CD pipeline with complete vulnerability management and attack blocking in production with our patented container firewall. NeuVector has you covered with PCI-ready container security. Meet requirements with less time and less work. NeuVector protects your data and IP in public and private cloud environments. Continuously scan throughout the container lifecycle. Remove security roadblocks. Bake in security policies at the start. Comprehensive vulnerability management to establish your risk profile and the only patented container firewall for immediate protection from zero days, known, and unknown threats. Essential for PCI and other mandates, NeuVector creates a virtual wall to keep personal and private information securely isolated on your network. NeuVector is the only kubernetes-native container security platform that delivers complete container security.
  • 33
    Ivanti Neurons for RBVM
    Ivanti Neurons for RBVM is a risk-based vulnerability management platform designed to help organizations prioritize and remediate cybersecurity risks efficiently. It continuously correlates vulnerability data, threat intelligence, and business asset criticality to provide a contextualized view of risk. The platform automates remediation workflows, including SLA management and real-time alerts, to accelerate vulnerability closure. Role-based access controls and customizable dashboards foster collaboration across security teams from SOC to C-suite. Ivanti’s proprietary Vulnerability Risk Rating (VRR) prioritizes vulnerabilities based on real-world threat context rather than severity alone. This enables security teams to focus on the most critical risks and reduce exposure to ransomware and other cyber threats.
  • 34
    Qualys VMDR
    The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
  • 35
    BitSight

    BitSight

    Bitsight

    Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface. Bitsight proactively uncovers security gaps across infrastructure, cloud environments, digital identities, and third- and fourth-party ecosystems. From security operations and governance teams to executive boardrooms, Bitsight provides the unified intelligence backbone required to confidently manage cyber risk and address exposures before they impact performance.
  • 36
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 37
    Upwind

    Upwind

    Upwind Security

    Run faster and more securely with Upwind’s next-generation cloud security platform. Combine the power of CSPM and vulnerability scanning with runtime detection & response — enabling your security team to prioritize and respond to your most critical risks. Upwind is the next-generation cloud security platform that helps you simplify and solve cloud security’s biggest challenges. Leverage real-time data to understand real risks and prioritize what should be fixed first. Empower Dev, Sec & Ops with dynamic, real-time data to increase efficiency and accelerate time to response. Stay ahead of emerging threats & stop cloud-based attacks with Upwind's dynamic, behavior-based CDR.
  • 38
    SISA RA

    SISA RA

    SISA Information Security

    Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines.
  • 39
    BigCyberGroup

    BigCyberGroup

    BigCyberGroup

    In today's online-centric work environment, protecting cybersecurity is becoming critical, especially for BigCyberGroup. We see more and more businesses being exposed to online threats that can damage or destroy their digital assets and data. With more than 90% of breaches being caused by human error, we are developing innovative solutions that are proving to be effective in mitigating these risks. BigCyberGroup does everything possible to keep your online space secure. We offer protection against DDoS attacks on web resources. In addition, we help you distinguish between malware and viruses so that you are prepared for any potential threats online.
  • 40
    ARX

    ARX

    ARX

    Get peace of mind today and improve your organization's cyber security, and supply chain management through the ARX Alliance. The new standard in cyber security & supply chain resilience. Our mission is to help your organization mitigate cyber security risk, strengthen your supply chain, and navigate a complex regulatory environment with ease. ARX Alliance is a community of organizations, working together collectively to improve their cyber security and become better protected. We make this process simpler than ever before for our members. Use our proprietary cyber security pathway to implement industry best practices within your organization. Monitor and manage supply chain risk in real-time with live risk scores. Create customized sets of compliance questions, and share these with partners. Run internal and external scans to ensure your company infrastructure is watertight. Consolidate and link standards, policies, assets, and assessments in one secure place.
  • 41
    Sonatype Container
    Sonatype Container provides comprehensive protection for containerized applications and Kubernetes deployments, ensuring that they remain secure throughout the software lifecycle. With real-time monitoring and continuous scanning, the platform helps detect vulnerabilities early during development, preventing security risks before they reach production. It uses advanced behavioral analysis to enforce security policies automatically, reducing manual work. Sonatype Container also supports integrations with cloud platforms and orchestration tools, allowing businesses to secure containers seamlessly across various environments, from build to runtime.
  • 42
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 43
    Ceeyu

    Ceeyu

    Ceeyu

    Ceeyu identifies IT and network vulnerabilities for your company and your supply chain (Third Party Risk Management or TPRM) by combining automated digital footprint mapping, attack surface scanning and cybersecurity risk analysis, with online questionnaire-based risk assessments. Uncover your external attack surface and proactively detect and manage cyber security risks. A growing number of security incidents start from digital assets of your company - traditional network devices and servers, but also cloud services or organizational intelligence - that can be found on the Internet. Hackers make use of these elements in your digital footprint to penetrate your company’s network making firewalls and anti-virus systems less effective. Identify cyber security risks in your supply chain. A growing number of cyber-attacks and GDPR incidents can be traced back to third parties with whom you share data or are digitally interconnected.
  • 44
    GAT

    GAT

    GAT InfoSec

    Information security solutions to manage threats in technologies, people and processes. Manage your Security Program and reduce the risk of attacks, ransomware, data leaks and third-party risks. Integrated solutions to help create and maintain an SGSI (Information Security Management System) with prioritization and focus on the business context. Automatically identify vulnerabilities in cloud environments and reduce the risk of ransomware, data leaks, intrusions and cyber attacks. Mapping of the exhibition surface itself and that of third parties. Risk score and vision of leaks, risks and vulnerabilities in applications, networks and infrastructure. Collaborative processes, reports and dashboards that deliver data with clarity, creating and facilitating the sharing of information across all sectors of the company.
  • 45
    Helios Data

    Helios Data

    Helios Data

    Helios Data’s unique algorithmic process governance approach, secure enclave technology secured by digital contracts governed and surveilled by algorithmic “fingerprints”, ensures data can be analyzed and processed safely and productively. Companies with personal or sensitive data assets, and their analytical partners, can restart and grow their data-driven analytical and monetization activities securely and economically. Eliminate data sharing and usage risk. Minimize data sharing and monetization costs. Maximize the value of enterprise personal and other sensitive data assets. Reenergize business models and revenue opportunities muted by data protection and privacy concerns. Digital contract governance technology adds precision and real-time enforcement to otherwise passive legal contracts or data processing agreements. “Confidential compute” secure enclave technology guarantees data-in-use protection: no data can ever be leaked, lost, exposed, misused, or misdirected.
  • 46
    ConnectSecure

    ConnectSecure

    ConnectSecure

    ConnectSecure is an all-in-one SaaS vulnerability and compliance management platform built for managed-service providers to secure client environments, manage risk, and scale security services profitably. It performs continuous vulnerability assessments and asset discovery across networks, servers, endpoints, cloud services, web apps, and external infrastructure; it includes both agent-based or “probe/lightweight” scanning and external attack-surface scanning. It identifies open ports, misconfigurations, out-of-date software, exposed systems, cloud-environment risks, and web-application vulnerabilities, surfacing over 230,000 known CVEs, daily updated from public vulnerability databases. ConnectSecure also automates patching for many applications, offers compliance-management tools aligned with major frameworks (e.g., GDPR, HIPAA, PCI DSS, CIS, NIST, ISO), and delivers continuous monitoring of cloud, on-premises, and hybrid environments.
  • 47
    Beezz

    Beezz

    United States

    Beezz secures the operator’s data pipe, allowing creation and management of closed network environments. Beezz is the first security solution built specifically to protect against the new and growing vulnerabilities of the IOT universe. Utilizing proprietary technology and advanced algorithms, the Beezz solution does what no one has succeeded in doing so far, simplify and unify the complex and inefficient IOT security process. Beezz was founded in 2013 by a team of cyber security experts, with over 60 years of combined experience managing cyber security and intelligence for the Israeli military. The founding team was responsible for building the army’s closed garden environment, protecting the military’s most sensitive information from international hackers. Recognizing the growing cyber security threat, they joined forces with leading executives from tier-1 operators, working over the past 4 years to develop a revolutionary IOT security solution.
  • 48
    CybSafe

    CybSafe

    CybSafe

    CybSafe is security awareness and data analytics software that helps you reduce avoidable security incidents by measuring and improving your people’s security behaviors. It’s an app that helps people make better security decisions and provides real-time assistance in ever-changing personal and work environments. This is behavioral security. Experts in psychology, cyber security and cybercrime focus on research and analysis to provide insights and best practices for changing behavior. SebDB contains insights on every security behavior known to reduce human cyber risk. It powers CybSafe’s proprietary data-led model of human cyber risk behavior. Data, metrics and reporting let security professionals predict areas of vulnerability and make smarter security decisions.
  • 49
    Sysdig Secure
    Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
  • 50
    Minimus

    Minimus

    Minimus

    Minimus images radically reduce the amount of vulnerabilities that impact your cloud environment. Minimus is founded by the Twistlock team that pioneered container security and authored NIST SP 800-190. Minimus builds images from scratch, directly from upstream project sources, with only the minimal software needed to run the app, dramatically reducing their attack surface. Minimus images are OCI compliant and you deploy by changing a single line in deployment files. Minimus eliminates time consuming and low value remediation work for devs, is easy for ops to deploy and manage using their existing tools, and provides security with remarkably clear risk reduction and nearly instant time to value. Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing them from existing. Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs.