Results for: dictionary attack

Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
View more categories (11) for "dictionary attack"

289 Products for "dictionary attack" with 1 filter applied:

  • 1
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally...
    Starting Price: From $49/asset/month
  • 2
    Auth0

    Auth0

    Okta

    .... Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 3
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your...
    View Software
    Visit Website
  • 4
    A10 Defend Threat Control
    A10 Defend Threat Control, a SaaS component of the A10 Defend suite, offers a real-time DDoS attack map and proactive, detailed list of DDoS weapons. Unlike other tools available today that provide convenience at the cost of false positives and false negatives, A10 Defend Threat Control provides hands-on insights into attackers, victims, analytics, vectors, trends, and other characteristics, helping organizations establish a more robust security posture by delivering actionable insights...
  • 5
    Guardz

    Guardz

    Guardz

    ... detection across environments, turning signals into actionable insights. With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve.
  • 6
    RAFT

    RAFT

    Compassites Software Solutions

    RAFT is based on scriptless test automation which uses a dictionary of reusable generic keywords for test automation of web, mobile & APIs. It insulates scripting tasks from test case mapper sheet and can be used by product and development teams without any test automation knowledge. It uses an intuitive dictionary of reusable keywords that can be used for different projects. It can run API test automation using REST Assured and HTTP client libraries. It can run accessibility audits (A11y...
  • 7
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can...
    Starting Price: $795.00/one-time
  • 8
    SpamTitan

    SpamTitan

    TitanHQ

    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection...
    Leader badge
    Starting Price: $2.14/user/month
  • 9
    FireCompass

    FireCompass

    FireCompass

    FireCompass runs continuously and indexes the deep, dark and surface web using elaborate recon techniques as threat actors. The platform then automatically discovers an organization's dynamic digital attack surface, including unknown exposed databases, cloud buckets, code leaks, exposed credentials, risky cloud assets, and open ports & more. FireCompass provides the ability to launch safe-attacks on your most critical applications and assets. Once you approve the scope on which the attacks need...
  • 10
    EasyDMARC

    EasyDMARC

    EasyDMARC

    EasyDMARC is a B2B SaaS solution that makes email authentication simple for small, medium, and enterprise businesses. In short, we secure domain and email infrastructure, protecting you and your business from phishing (email spoofing) attacks and increasing email deliverability. EasyDMARC’s deliverability tool, EasySender, covers all the aspects of email deliverability. The variety of features on the platform cover email list verification, mailbox warmup, and inbox placement. With Easy...
  • 11
    ER/Studio Enterprise Team Edition

    ER/Studio Enterprise Team Edition

    IDERA, an Idera, Inc. company

    ER/Studio Enterprise Team Edition helps data modelers and architects to design and share data models and metadata across the enterprise. Unlike its competition, it provides a complete solution for enterprise architecture and data governance, extensive model change management, unique incorporation of true enterprise data dictionaries, unique linking of constructs across models, integrated visual data lineage import, and integrated data and business process modeling.
  • 12
    CyberSense

    CyberSense

    INDEX ENGINES

    .... At the heart of CyberSense is a full-content-analytics engine that inspects inside files and databases for even the most sophisticated attacks. No other solution can compare and provide the confidence that data has integrity. Machine learning is then utilized with 99.5% accuracy to determine if the data corruption is due to malware. If an attack is suspected, CyberSense will deliver an alert, and provide post-attack diagnostics to determine when the attack occurred.
  • 13
    DNSdumpster.com

    DNSdumpster.com

    DNSdumpster.com

    DNSdumpster.com is a free domain research tool that can discover hosts related to a domain. Finding visible hosts from the attacker's perspective is an important part of the security assessment process. The ability to quickly identify the attack surface is essential whether you are penetration testing or chasing bug bounties. Network defenders benefit from passive reconnaissance in a number of ways, with analysis informing information security strategy. Understanding network-based OSINT helps...
    Starting Price: Free
  • 14
    CrowdStrike Falcon Exposure Management
    CrowdStrike Falcon Exposure Management is an attack surface management platform delivering autonomous, 24/7 discovery of exposed assets across all environments and the supply chain. Leading enterprises worldwide use CrowdStrike Falcon Exposure Management to gain unparalleled visibility of their internet-facing assets and actionable security insights for eliminating shadow IT risks. CrowdStrike Falcon Exposure Management's proprietary technology maps the world's internet exposed assets in real...
  • 15
    Nazar

    Nazar

    Nazar

    ..., tracing and investigating logs and querying data dictionaries every time is not where the race is won. Nazar uses the resources already available in the DBMS for monitoring and does not need to rely on agents. NAZAR automates anomaly detection and root-cause analysis, reducing mean time to resolution (MTTR) and detecting issues to avoid incidents for peak application and business performance.
  • 16
    GxMaps

    GxMaps

    GalaxE.Solutions

    ... migration, modernization and roadmap building. Map updates linked to change management. Synonym dictionary for sys-related ontologies (requires Gx hands-on SMEs, 12+ years experience) Pattern match (for boundaries and changes). Reduces dependence on tribal knowledge; client FTEs. Elevates role of service provider staff to scientists, decision-makers, advisors and, very often, stewards of key business info, provider of best practices and factory environments.
  • 17
    FastPass SSPR

    FastPass SSPR

    FastPassCorp

    FastPass enhances user protection against identity theft. The combination of FastPass SSPR and FastPass IVM, integrated into FastPass Suite, boosts productivity for end-users and help desk support, simultaneously safeguarding against social engineering attacks on the service desk. Preventing password theft from the help desk necessitates a secure IT workflow. FastPass IVM, available as a cloud or on-premises offering and certified by ServiceNow and others, enables dynamic and contextual...
    Starting Price: $0.20/user/month
  • 18
    CDN Cheap

    CDN Cheap

    NovoFlare

    As a leading provider of content delivery network (CDN) services, we pride ourselves on our reliability and security. Our offshore network is designed with the latest technology to protect against DDOS attacks and features advanced auto-monitoring tools to ensure maximum uptime. Additionally, we understand the importance of convenience for our customers, which is why we offer the option to make payments using cryptocurrency. We also recognize the need for a global presence in today's digital...
    Starting Price: $2 per month
  • 19
    RapidSpike

    RapidSpike

    RapidSpike

    RapidSpike interacts with digital platforms exactly as customers do, monitoring real and synthetic customer interactions from the outside in to provide clear insight on how to monitor, improve and protect their digital experience. With RapidSpike Magecart Attack Detection you can detect client-side security breaches, Magecart attacks, website skimming, form-jacking, and supply chain attacks. Protect your customer’s data, prevent massive fines and avoid damage to your business’ reputation.
  • 20
    ARGUS

    ARGUS

    Argus Cyber Security

    Connected vehicles now outpace the growth in both mobile phones and tablets. While connectivity can increase road safety and improve the transit experience, the more vehicles become connected, the more vulnerable they are to cyber attacks. No longer the realm of science fiction, recent events have shown that cyber threats transcend vehicle make and model to include all cars and commercial vehicles equipped with embedded or aftermarket connectivity. Given the potential for physical harm...
  • 21
    Oxibox

    Oxibox

    Oxileo

    Oxibox guarantees your backups integrity and your business continuity in the event of a cyber attack. User-friendly and rapidly deployable, our solutions fit all sizes of companies' needs for immediate and complete protection of their IT systems. Plugs into your existing data protection infrastructure to ensure your existing backups are secure and immutable. Oxibox Data Protection protects backups during their whole lifecycle with our patented data silo protection isolation. Deploy a fully...
  • 22
    ProDMARC

    ProDMARC

    PROGIST

    Attackers use spoofed emails to phish your customer’s & employee’s credentials. Hackers send forged invoices through mails to your partners & suppliers. Attackers send malicious mails containing malware like Ransomware. Attackers sell illegal goods like weapons or drugs using mail by spoofing trusted brands. DMARC is an email validation protocol built on 2 globally accepted authentication protocols namely SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). SPF is an email...
    Starting Price: $100 per year
  • 23
    Attaxion

    Attaxion

    Attaxion

    The Attaxion EASM Platform is designed to provide businesses with full visibility over their external attack surfaces. It offers features like asset discovery, risk prioritization, and continuous monitoring to detect security vulnerabilities and potential threats in real-time. By using advanced analytics, the platform helps organizations address risks across shadow IT assets and internet-facing systems. Attaxion emphasizes scalability, accuracy, and ease of integration into existing security...
    Starting Price: $129 per month
  • 24
    AttackFlow

    AttackFlow

    AttackFlow

    Enterprise Edition is a web application with repository integrations and many more enterprise features contributing to application security. Extensions are IDE extensions with real-time document scan on development. AttackFlow provides no-need to compile, just-in-time, flow-sensitive and precise static source code scanning solutions which find security vulnerabilities in your code. Attackflow Enterprise Edition is a web application that is located as on-premise in companies to secure...
  • 25
    ScanMail

    ScanMail

    Trend Micro

    More than 90 percent of targeted attacks begin with a spear phishing email, which means your mail server security is more important than ever. Unfortunately, most mail server security solutions, including the limited set of built-in protections in Microsoft® Exchange™ 2013 and 2016, rely on pattern file updates, which only detect traditional malware. They don’t include specific protections to detect malicious URLs or document exploits commonly used in targeted attacks or advanced persistent...
  • 26
    TrustedSite

    TrustedSite

    TrustedSite

    TrustedSite Security is a complete solution for external security testing and monitoring. In a single, easy-to-use platform, TrustedSite brings together the essential tools your organization needs to reduce the likelihood of a breach, from attack surface discovery to vulnerability scanning to manual penetration testing. TrustedSite’s proprietary risk scoring algorithm highlights weak points on your perimeter and provides insights on what remediations to prioritize. With comprehensive...
    Starting Price: $30 per target
  • 27
    NMIS

    NMIS

    FirstWave

    ... hundred thousand organizations worldwide – making it one of the most widely used open-source Network Management Systems in the world today. FirstWave enables partners, including some of the world’s largest telcos and managed service providers (MSPs), to protect their customers from cyber-attacks, while rapidly growing cybersecurity services revenues at scale. FirstWave provides a comprehensive end-to-end solution for network discovery, management, and cybersecurity for its partners globally.
    Starting Price: $0
  • 28
    ProHoster

    ProHoster

    ProHoster

    ... builder, SSL certificate, and domain. For projects, where regular hosting is not enough, and you need a larger amount of resources and functionality. Virtualization such as KVM and OVZ is available. An excellent solution for non-standard projects with increased requirements for power and full root access. Professional DDoS protection against any type of attack. Immediate response and display of the threats. Huge channel handling capacity.
    Leader badge
    Starting Price: $2.50 per month
  • 29
    Trend Vision One

    Trend Vision One

    Trend Micro

    Stopping adversaries faster and taking control of your cyber risks starts with a single platform. Manage security holistically with comprehensive prevention, detection, and response capabilities powered by AI, leading threat research and intelligence. Trend Vision One supports diverse hybrid IT environments, automates and orchestrates workflows, and delivers expert cybersecurity services, so you can simplify and converge your security operations. The growing attack surface is challenging. Trend...
  • 30
    Haltdos

    Haltdos

    Haltdos

    Haltdos promises an intelligent WAF & DDoS mitigation service with multi-layered security to online businesses requiring zero management. It is a self-learning solution that continuously learns and adapts network/website traffic and provides real-time and historical insights with stunning visualization. It also provides attack alerts and notifications, attack signatures, customer misbehavior, and audit trail.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next