G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.
Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a
MalZilla is a useful program for use in exploring malicious pages. It allows you to choose your own user agent and referrer, and has the ability to use proxies. It shows you the full source of webpage
The odix Kiosk is a Linux-based hardened workstation dedicated to safely introducing files from removable media. The odix cybersecurity Kiosk has no hard disk and both the operating system and softwar
PhishFort offers comprehensive anti-phishing solutions designed to protect brands from online threats such as phishing attacks, impersonation, and brand abuse. Their services encompass real-time detec
Re-Sec solution provides a means preventing cyber threats from entering and spreading within the organization.
Cyberstanc Vortex is designed to enhance the existing frameworks, tools, and techniques for secure data transfer between secure networks. By utilizing Simulation Intelligence and Signature-less detect
Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh
DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office
Triage is Hatching’s new and revolutionary malware sandboxing solution. It leverages a unique architecture, developed with scaling in mind from the start. Triage can scale up to 500.000 analyses per d
Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap ana
malwareleaks.com - Cyber Threat Intelligence platform specializing in threat detection and user protection. The main objectives include: - Preventing cyber attacks Early detection and blocking of th
M&SET - The Malware & Social Engineering Toolkit empowers IT staff with advanced digital forensics capabilities to identify threats coming from the most prevalent attack vector today, phishing
QFlow is an advance malware detection and analysis platform to reduce the risk of infection during file transfers. QFlow offers comprehensive detection methods and the customization and automation of
Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively.
Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa