Results for: dictionary attack

Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
View more categories (11) for "dictionary attack"

58 Products for "dictionary attack" with 2 filters applied:

  • 1
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can...
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 2
    SpamTitan

    SpamTitan

    TitanHQ

    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection...
    Leader badge
    Starting Price: $2.14/user/month
    View Software
    Visit Website
  • 3
    CDN Cheap

    CDN Cheap

    NovoFlare

    As a leading provider of content delivery network (CDN) services, we pride ourselves on our reliability and security. Our offshore network is designed with the latest technology to protect against DDOS attacks and features advanced auto-monitoring tools to ensure maximum uptime. Additionally, we understand the importance of convenience for our customers, which is why we offer the option to make payments using cryptocurrency. We also recognize the need for a global presence in today's digital...
    Starting Price: $2 per month
  • 4
    NMIS

    NMIS

    FirstWave

    ... hundred thousand organizations worldwide – making it one of the most widely used open-source Network Management Systems in the world today. FirstWave enables partners, including some of the world’s largest telcos and managed service providers (MSPs), to protect their customers from cyber-attacks, while rapidly growing cybersecurity services revenues at scale. FirstWave provides a comprehensive end-to-end solution for network discovery, management, and cybersecurity for its partners globally.
    Starting Price: $0
  • 5
    ProHoster

    ProHoster

    ProHoster

    ... builder, SSL certificate, and domain. For projects, where regular hosting is not enough, and you need a larger amount of resources and functionality. Virtualization such as KVM and OVZ is available. An excellent solution for non-standard projects with increased requirements for power and full root access. Professional DDoS protection against any type of attack. Immediate response and display of the threats. Huge channel handling capacity.
    Leader badge
    Starting Price: $2.50 per month
  • 6
    Haltdos

    Haltdos

    Haltdos

    Haltdos promises an intelligent WAF & DDoS mitigation service with multi-layered security to online businesses requiring zero management. It is a self-learning solution that continuously learns and adapts network/website traffic and provides real-time and historical insights with stunning visualization. It also provides attack alerts and notifications, attack signatures, customer misbehavior, and audit trail.
  • 7
    REVE Antivirus

    REVE Antivirus

    REVE Antivirus

    REVE Endpoint security provides robust network security solution for precise malware detection through device and application control. Facilitates remote installation, updating and scanning of all individual endpoint PCs. REVE EPS provides a flexible licensing solution due to which no. of protected endpoints can be scaled up as per the requirements anytime with zero license management efforts. Provides advanced security for all your endpoints, which are the Launchpad of malware attacks. Machine...
    Starting Price: $19 per year
  • 8
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing...
    Starting Price: $2000 per month
  • 9
    Polymorphing

    Polymorphing

    Polyverse

    Polyverse is a leading provider of zero-trust software cybersecurity solutions. Its Polymorphing technology protects against the most sophisticated attacks, even on unpatched and legacy systems. Used by governments and security-conscious organizations worldwide, Polyverse protects against memory exploits, script injections, supply-chain attacks and the like anywhere Linux runs, from devices to the cloud. CNBC has named Polyverse as one of the world’s top 100 startups. For more information...
  • 10
    Axonius

    Axonius

    Axonius

    .... Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 11
    Armis

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset...
  • 12
    Trunc

    Trunc

    Trunc

    All your logs. One place. Troubleshoot errors, detect attacks, audit your users and solve compliance requirements with Trunc. Keep all your logs, easily accessible, with full-text logging search. Logs are automatically categorized, correlated and stored. Alerts and active response included.
    Starting Price: $10 per month
  • 13
    Arcserve UDP
    Ransomware has become a big business for cybercriminals. You do not want to be their “customer.” Your organization risks losing not only money but also irreplaceable data, time, and brand reputation. You need to protect your company’s business systems and data from attacks or loss, along with the increased resiliency that can only come from simplifying processes across all storage platforms, whether local, virtual, or cloud. What you don’t need is more products to manage. Arcserve UDP...
  • 14
    Appranix

    Appranix

    Appranix

    Appranix empowers enterprises to achieve cloud application resilience against any cloud application downtime. Average ransomware attack costs 4.54M USD and takes about 26 days to recover. 14% of cloud application downtime occurs due to misconfigurations. Appranix's unique approach delivers unprecedented resilience for distributed and dynamic cloud workloads. Our patented continuous cloud infrastructure backup, cloud-native data backup and replication along with automated recovery...
    Starting Price: $25/unit/month
  • 15
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand...
  • 16
    CloudLinux

    CloudLinux

    CloudLinux

    Stable servers reduce churn and allow you to increase density, and therefore magnify your profit. The CloudLinux OS stability features prevent resource spikes and make your servers rock-solid stable, even in the most stressful situations. CloudLinux OS protects your servers from attacks by virtualizing users’ file systems and prevent sensitive information disclosure. Our kernel-level technology prevents all known symbolic link attacks, which further enhances the security level of the servers...
    Starting Price: $7 per server per month
  • 17
    Phylum

    Phylum

    Phylum

    Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum’s database of open-source software supply chain risks is the most comprehensive and scalable offering available, and can be deployed...
  • 18
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 19
    BitCalm

    BitCalm

    BitCalm

    Painless Linux server files & DB backup. Support for AWS, DigitalOcean, Linode, Rackspace VPS and others. Automatic daily incremental backups to Amazon S3. We transfer all information between your server and BitCalm service through secure channel (TLS with 2048 bit key). In the same way we send all your backed up data to the Amazon S3 storage. This way we protect you from the so-called "Man in the middle" attack. We use Amazon S3 to store all your server backups. It’s a highly reliable storage...
    Starting Price: $20 per month
  • 20
    FalconStor

    FalconStor

    FalconStor Software

    FalconStor is a trusted data protection innovator with over an Exabyte of data under management, enabling the world’s most demanding enterprises to modernize their data backup and archival operations across data centers and public clouds. The company delivers increased data security and provides the fast recovery from ransomware attack while driving down costs by up to 90 percent. FalconStor is trusted by 1,000 customers and a network of partners around the world.
  • 21
    BackBox Linux
    ..., thanks to its own software repositories that are constantly updated to the latest stable version of the most popular and best known ethical hacking tools. BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
  • 22
    SUSE Linux Enterprise Desktop
    ..., email client, collaboration tools – all required to enable employees’ productivity. Security features, such as application security system, integrated VPN and antivirus tools, deliver bullet-proof security and protection against virus and malware attacks. Comes with enterprise-grade support and maintenance services from SUSE. Provides users a high degree of customization to meet their business requirements.
  • 23
    osquery

    osquery

    osquery

    osquery is an operating system instrumentation framework for Windows, OS X (macOS), and Linux. The tools make low-level operating system analytics and monitoring both performant and intuitive. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process. Our build infrastructure ensures that newly introduced code is benchmarked...
    Starting Price: Free
  • 24
    eLxr

    eLxr

    eLxr

    ... requirements, using preempt-rt kernel configurations to prioritize low-latency responses, ensuring that tasks are executed within precise time boundaries. Achieve better determinism and predictability compared to a standard Linux kernel. eLxr relies on a smaller footprint for better performance, optimized workloads, and smaller attack surface for resource usage efficiency. It provides all required features and attributes, considering best usage of system resources.
    Starting Price: Free
  • 25
    Fasoo Content Backup and Recovery
    Fasoo Content Backup and Recovery (FC-BR) is a robust backup and restore solution hosted in AWS by our team of experts, specifically designed to combat ransomware attacks. As an Enterprise Backup and Recovery (EBR) solution, FC-BR ensures that documents are automatically backed up in real time as users create and save them. This allows users and administrators to quickly recover the desired versions of documents with just one click. Utilizing advanced Data Loss Prevention (DLP) technology, FC...
  • 26
    Lokinet

    Lokinet

    Lokinet

    Lokinet is a decentralized onion router that enables anonymous internet access by leveraging the Oxen service node network as relays, providing market-based Sybil attack resistance through the Oxen blockchain. It supports web browsing, onion-routed real-time voice communications, and other applications without requiring specialized software or custom patches. Unlike Tor, Lokinet operates on the network layer, allowing it to onion-route any IP-based protocol, including TCP, UDP, and ICMP...
    Starting Price: Free
  • 27
    Tetragon

    Tetragon

    Tetragon

    ..., surpassing traditional observability. It offers pre-defined policy libraries for rapid deployment and operational insight, reducing setup time and complexity at scale. Tetragon blocks malicious activities at the kernel level, closing the window for exploitation without succumbing to TOCTOU attack vectors. Synchronous monitoring, filtering, and enforcement are performed entirely within the kernel using eBPF.
    Starting Price: Free
  • 28
    UFS Explorer

    UFS Explorer

    SysDev Laboratories

    UFS Explorer is a powerful data recovery software designed for both professionals and average users to recover lost data from nearly any storage device. It supports a wide range of storage types including PCs, USB drives, NAS devices, RAID systems, and virtual machines. The software can restore files lost due to deletion, hardware failure, file system corruption, formatting, virus attacks, and software malfunctions. It supports multiple file systems across Windows, macOS, and Linux, and offers...
    Starting Price: €59.95/lifetime/1 user
  • 29
    BDRSuite

    BDRSuite

    Vembu Technologies

    .... BDRSuite is designed to help businesses keep their data secure and ensure it is easily recoverable in the event of data loss or ransomware attacks. With BDRSuite, businesses can achieve reliable data protection and ensure business continuity – all at an affordable price.
    Starting Price: $1.20/month
  • 30
    FortiClient

    FortiClient

    Fortinet

    .... Identify & remediate vulnerable or compromised hosts across your attack surface. As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.
  • Previous
  • You're on page 1
  • 2
  • Next