2026 Best Software Awards are here!See the list
Search results for
Stacker
(673)
Star Rating
Categories
Categories(3)
Sellers(62)
Solutions(0)
Discussions(5)
Articles(184)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

We utilize our expert offensive services to discover weaknesses, simulate real-world attacks and build better defenses for our clients. Our assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications. We use the same tools and techniques as attackers to identify and exploit vulnerabilities. We don't just tell you that you're vulnerable, we show you.

Not seeing what you're looking for?

Dive deeper into "Stacker" on G2 AI

Product Description

Easily create custom giveaways to collect emails, gain followers, and make your fans happy.

Product Description

Print UPS shipping labels. Create and print your own UPS shipping labels with savings up to 89%. No fees, no hassle.

Product Description

Email marketing with everything you need and nothing more.

Product Description

Hula is an innovative mobile application that empowers users to transform their selfies into engaging, shareable content with ease. By leveraging advanced artificial intelligence, Hula enables the creation of viral-ready videos, diverse visual styles, and personalized messenger packs—all with a single tap. This user-friendly platform is designed to make content creation accessible and enjoyable for everyone, regardless of technical expertise. Key Features and Functionality: - One-Tap Transform

Product Description

SVGCollections.com is a comprehensive platform offering an extensive library of high-quality SVG files tailored for crafting enthusiasts and professional designers. With thousands of free and premium designs, users can find the perfect SVGs for projects involving Cricut, Silhouette, and other cutting machines. The platform caters to a wide range of creative needs, from home décor and personalized gifts to custom apparel and stickers. Key Features and Functionality: - Vast Design Library: Acces

Product Description

HYAS uses authoritative knowledge of attacker infrastructure and unrivaled domain-based intelligence to augment your existing security solutions, proactively protect your organization, and mitigate threats in real time. Our combination of infrastructure expertise and communication pattern analysis gives you an instant and reliable source of truth to mitigate threats in real time. HYAS Protect operates as a cloud-based Protective DNS solution or through API integration with your existing security

Product Description

Aves Deception Platform is a SaaS-based cybersecurity detection and response product aimed at midmarket and enterprise companies. It leverages a powerful deception methodology to provide detection capability. Unlike traditional detection solutions which are based on data analysis, log crunching and other heavy-load mechanisms, the Aves Deception Platform enables deploying 'precision sensors' which consider the attacker's point of view when executing a cyber attack, and intelligently deploys dec

Product Description

The Astra API Security Platform helps businesses discover, scan, and secure every API across their environment, whether undocumented, zombie, and shadow APIs. It continuously scans APIs for vulnerabilities, detects evolving attack patterns with AI, and eliminates blind spots that attackers often exploit. With developer-friendly reports and seamless CI/CD integrations, Astra makes it simple for teams to fix issues quickly and scale security without slowing down development.

Product Description

VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the same data attackers do, proactively monitoring the dark web, receiving threat intelligence feeds of know data breaches and systematically reducing user‑centric risk. VeriClouds provides the safest approach to eliminate the biggest cause of massive data breaches - the weak and/or stolen passwords.

Product Description

ThreatSTOP WAFXtender New and Active HTTP Threats Managed Rules for AWS WAF protects against a variety of inbound HTTP threat types, including IPs known to initiate different types of SSH attacks, Brute forcers, Crackers, Shellshock, attacks on Apache servers, and more. Environments with exposed services should especially consider using these managed rules. Multiple HTTP threat intelligence feeds are aggregated and analyzed to provide continuously updated protection.

Product Description

Mate Security empowers SOC teams with Wisdom-led Performance. Mate’s AI agents run investigations with the business context others miss. It learns the organization’s tools, policies, and operations within hours and leverages this knowledge to investigate every alert, shortening investigations that once took 45 minutes to 45 seconds and eliminating alert fatigue. Mate transforms the SOC into a smarter, faster, continuously improving defense system that outpaces attackers.

Product Description

Phishing Simulation : Provides the user with access to a variety of phishing simulation campaign types that evaluate the employees against all phishing tactics such as e-mail with page or attachemnt, USB, QRCode, HID, and SMS. Adversary Emulation : Provides a frequently updated library of phishing attacks used by the most common and dangerous attackers to assess the detection capabilities of your email gateway. it contains 350+ safe-to-use samples used by Qbot, Emotet, FIN7, TrickBot, and more.

Product Description

Netwrix PingCastle helps organizations uncover and remediate weaknesses in their Active Directory and Entra ID environments before attackers can exploit them. It scans for misconfigurations, hidden vulnerabilities, and excessive privileges, and maps findings to MITRE ATT&CK™ and ANSSI frameworks for clear prioritization. With weekly assessments, step-by-step remediation guidance, and actionable security scores, PingCastle enables IT teams to continuously monitor and strengthen their identity

Product Description

BlastWave's BlastShield is a comprehensive zero-trust network access solution designed to protect critical infrastructure by proactively blocking cyber threats before they can infiltrate operational technology networks. By implementing a software-defined perimeter , BlastShield ensures that only authorized users can access essential systems, effectively concealing network assets from potential attackers. Key Features and Functionality: - Network Cloaking: BlastShield renders critical OT devic

Product Description

Non-Human Identity Discovery & Remediation platform

Product Description

Graylog API Security is the first API security solution that is purpose-built to provide security teams with full observability into runtime API activity inside the perimeter. As attackers find innovative ways to pose as valid users to gain unfettered access to critical production APIs, you can no longer rely on perimeter defense alone. Your security teams can now use Graylog API Security to strengthen your post-perimeter API security posture and manage your growing API attack surface.

Product Description

Buildable is an AI-powered task engine for SaaS developers. Paste an idea, and Buildable instantly: 1. Generates a phased, dependency-aware backlog 2. Scaffolds a private GitHub repo with CI and tests 3. Streams JSON tasks through the Model-Controller-Prompt (MCP) protocol so any GPT-4, Claude, or local assistant can code, run tests, and move Kanban cards to Done. Stack-agnostic, project-scoped API keys, and a live board keep solo builders and small teams shipping features—not rewriting prom

Product Description

HyperCloud is an integrated platform designed to simplify the deployment and management of on-premises or private cloud environments. By adopting a highly opinionated approach, it streamlines the entire stack—from hardware provisioning to tenancy management—ensuring a seamless, self-assembling, self-managing, and self-healing cloud infrastructure. Key Features and Functionality: - Multi-Tenancy: Supports strict tenant separation with granular access controls, user and group ACLs, and configur

Product Description

Lovage helps local businesses turn happy customers into 5-star growth. Our tap-to-review NFC cards, countertop stands, and QR stickers make it effortless for a guest to leave a Google review in seconds––no app download, no hunting for links. Pair that hardware with our free Lovage mobile app and you get a simple, always-on system for earning more reviews, ranking higher on Google, and getting more calls, bookings, and foot traffic. We set up everything for you: custom-branded cards, your direct