2026 Best Software Awards are here!See the list
Search results for
Stacker
(633)
Star Rating
Categories
Categories(3)
Sellers(62)
Solutions(0)
Discussions(5)
Articles(184)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

New and Active Bots identifies and blocks the attacker infrastructure hosting and controlling malicious Bots like Crawlers and Spiders that target your exposed services. The rules are dynamically updated using leading intelligence sources that have been curated by

Not seeing what you're looking for?

Dive deeper into "Stacker" on G2 AI

Product Description

Cyber deception in on-prem solution that leverages honeypots to lure attackers away from production systems. By setting traps using our mines agent, it effectively misleads malicious actors, gathers intelligence, and protects critical assets from exploitation.

Product Description

RevBits Deception Technology is the only deception solution on the market with dual-layer virtualization and real honeypot servers. Deploy multiple honeypots with the click of a button and minimal resource consumption. Manual and automated implanted credentials lure attackers to honeypots, revealing the original breached system.

Product Description

Our famous CoreThreats is built by aggregating and analyzing over 800 quality threat intelligence feeds, applying human and machine intelligence, then rapidly updating the managed rules to block threats and attacker infrastructure. CoreThreats stops a broad range of attacks with very high accuracy.

Product Description

Movavi Academic is a program designed to help you create educational videos. Whether you’re a teacher, a student, or an educational administrator, Movavi Academic is for you. For students With Movavi Academic, you can create clips and presentations, and record screencasts for homework assignments. In screen recording mode, you can save online lessons to review later and record program activities to create instructions. Start with the basic features and move on to advanced tools, like Chr

Product Description

Monitor the cyber risks of your subsidiaries, vendors or supply chain from an attackers perspective. Invite the companies you care about most to the BreachRisk Platform to enable verification and penetration testing of discovered risks to eliminate false positives and get the highest-fidelity view of the cyber risks in your third-parties.

Product Description

Print UPS shipping labels. Create and print your own UPS shipping labels with savings up to 89%. No fees, no hassle.

Product Description

Email marketing with everything you need and nothing more.

Product Description

Easily create custom giveaways to collect emails, gain followers, and make your fans happy.

Product Description

SwiftSafe’s Penetration Testing service is designed to provide organizations with a deep, thorough, and practical evaluation of their overall cybersecurity posture, ensuring that vulnerabilities are identified before malicious actors have the chance to exploit them. In today’s rapidly evolving digital landscape, where cybercriminals are leveraging increasingly sophisticated attack techniques, penetration testing has become an essential layer of defense for businesses across industries. Unlike au

Product Description

Stackavenue launched DailyPloy, a one-stop solution to manage the resources and tasks collaboration. Today, We provide a solution that helps our clients to focus on your planning while DailyPloy organizes every team’s tasks for project success. DailyPloy is totally customizable as per your Industry, Department, and Requirements.

Product Description

VanishID systematically reduces the digital footprint of executives, board members, employees, and their families—limiting their visibility to threat actors. We control what attackers can find, removing the raw material they need to craft convincing attacks. VanishID is a turnkey managed service powered by agentic AI and OSINT experts.

Product Description

Non-Human Identity Discovery & Remediation platform

Product Description

Praetorian is an offensive cybersecurity company dedicated to preventing breaches before they occur. By emulating attackers, Praetorian uncovers material risks that could lead to compromise, enabling organizations to proactively address vulnerabilities before malicious actors exploit them. Their mission is to create a future without compromise by providing comprehensive security solutions tailored to each client's unique needs. Key Features and Functionality: - Chariot Platform: An AI-enabled

Product Description

OFFENSAI is an AI-powered cloud security testing solution that uses proprietary generative adversarial techniques and unpublished attack vectors to act like real attacker behavior, revealing exploitable kill chains with one-click remediation guidance. Continuous, safe simulations deliver actionable insights, reduce real risk, and produce compliance-ready reporting without disrupting production.

Product Description

Starter Stack AI: AI-Powered Internal Tools for Modern Asset Management deploys specialized AI agents that plug directly into your current workflows, eliminating the need for costly and time-consuming system overhauls. Starter Stack.ai Key's features • Automated Portfolio Analysis

Product Description

Recover deleted photos, contacts on Android, recover deleted whatsapp messages. RecoverGo-Android data recovery is an all-in-one data recovery software for Android users. With a few steps, you can easily recover deleted messages, contacts, pictures, videos, call logs, and audio on Android even if the device is broken. In the latest version of RecoverGo (Android), you can also retrieve deleted WhatsApp messages, photos, contacts, phone numbers, status, stickers, videos, audio, and files withou

Product Description

Auspex Observatory™ processes network and systems telemetry to provide real-time threat analysis and visualization. Internal and external attackers can be rapidly identified and mitigated. This tool uses behavioral and anomaly detection for finding aberrant activities on your network. We are not using signature based detection. Our analytics can start generating risk assessments within 30 minutes.

Product Description

Patara is a blockchain-based password and account manager ensuring the protection of passwords, crypto wallets, and sensitive data. Thanks to user-based smart contracts, there is no such thing as leakage of all data. Unlike Web2 solutions, Patara offers a decentralized solution. Each user has its own smart contract. This makes it impossible for attackers to find the data and its owner.

Product Description

TAFA Shield managed security services are powered by BlackBerry® cybersecurity technology, which provides an AI-driven, automated, prevention-first approach to endpoint protection. The BlackBerry® technology delivers the detection and prevention capabilities needed to stay ahead of attackers, keeping your business secure. ​It is an accurate, efficient, and effective solution for preventing advanced persistent threats and malware from executing on an organization's endpoints.