Search results for
Stacker
(694)
Star Rating
Categories
Categories(4)
Sellers(58)
Solutions(0)
Discussions(5)
Articles(184)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

TAFA Shield managed security services are powered by BlackBerry® cybersecurity technology, which provides an AI-driven, automated, prevention-first approach to endpoint protection. The BlackBerry® technology delivers the detection and prevention capabilities needed to stay ahead of attackers, keeping your business secure. ​It is an accurate, efficient, and effective solution for preventing advanced persistent threats and malware from executing on an organization's endpoints.

Not seeing what you're looking for?

Dive deeper into "Stacker" on G2 AI

Product Description

Guardpot is a Honeypot Management Platform used in cybersecurity management. It allows users to manage different types of honeypots from a central platform, collect and monitor attack attempts. The collected data can be used for automatically blocking attacker IP addresses and for IoC (Indicators of Compromise) data. With GuardPot, you can provide a proactive layer in your security defenses. Deception Master!

Product Description

An AI powered, all-in-one solution for managing your digital risks. Gain deep insights about cyber attackers, achieve comprehensive visibility of your entire attack surface, and go beyond the limitations of legacy digital risk protection platforms. CyberXTron empowers you to detect, prioritize, and mitigate threats and risks at their earliest stages, reducing the window of exposure and strengthening your security posture.

Product Description

We utilize our expert offensive services to discover weaknesses, simulate real-world attacks and build better defenses for our clients. Our assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications. We use the same tools and techniques as attackers to identify and exploit vulnerabilities. We don't just tell you that you're vulnerable, we show you.

Product Description

Voice Cypher is a simple, hardware-free solution that protects all your employees voice and messaging communications through a single encryption app. Its like a fortified door for sensitive conversations—blocking unauthorized access from would-be attackers and technologies. Youll have peace of mind knowing your employees communications are protected. Theyll get an easy, seamless user experience across their mobile devices, PCs and tablets.

Product Description

BlastWave's BlastShield is a comprehensive zero-trust network access solution designed to protect critical infrastructure by proactively blocking cyber threats before they can infiltrate operational technology networks. By implementing a software-defined perimeter , BlastShield ensures that only authorized users can access essential systems, effectively concealing network assets from potential attackers. Key Features and Functionality: - Network Cloaking: BlastShield renders critical OT devic

Product Description

HYAS uses authoritative knowledge of attacker infrastructure and unrivaled domain-based intelligence to augment your existing security solutions, proactively protect your organization, and mitigate threats in real time. Our combination of infrastructure expertise and communication pattern analysis gives you an instant and reliable source of truth to mitigate threats in real time. HYAS Protect operates as a cloud-based Protective DNS solution or through API integration with your existing security

Product Description

Aves Deception Platform is a SaaS-based cybersecurity detection and response product aimed at midmarket and enterprise companies. It leverages a powerful deception methodology to provide detection capability. Unlike traditional detection solutions which are based on data analysis, log crunching and other heavy-load mechanisms, the Aves Deception Platform enables deploying 'precision sensors' which consider the attacker's point of view when executing a cyber attack, and intelligently deploys dec

Product Description

The Astra API Security Platform helps businesses discover, scan, and secure every API across their environment, whether undocumented, zombie, and shadow APIs. It continuously scans APIs for vulnerabilities, detects evolving attack patterns with AI, and eliminates blind spots that attackers often exploit. With developer-friendly reports and seamless CI/CD integrations, Astra makes it simple for teams to fix issues quickly and scale security without slowing down development.

Product Description

VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the same data attackers do, proactively monitoring the dark web, receiving threat intelligence feeds of know data breaches and systematically reducing user‑centric risk. VeriClouds provides the safest approach to eliminate the biggest cause of massive data breaches - the weak and/or stolen passwords.

Product Description

ThreatSTOP WAFXtender New and Active HTTP Threats Managed Rules for AWS WAF protects against a variety of inbound HTTP threat types, including IPs known to initiate different types of SSH attacks, Brute forcers, Crackers, Shellshock, attacks on Apache servers, and more. Environments with exposed services should especially consider using these managed rules. Multiple HTTP threat intelligence feeds are aggregated and analyzed to provide continuously updated protection.

Product Description

Netwrix PingCastle helps organizations uncover and remediate weaknesses in their Active Directory and Entra ID environments before attackers can exploit them. It scans for misconfigurations, hidden vulnerabilities, and excessive privileges, and maps findings to MITRE ATT&CK™ and ANSSI frameworks for clear prioritization. With weekly assessments, step-by-step remediation guidance, and actionable security scores, PingCastle enables IT teams to continuously monitor and strengthen their identity

Product Description

HyperCloud is an integrated platform designed to simplify the deployment and management of on-premises or private cloud environments. By adopting a highly opinionated approach, it streamlines the entire stack—from hardware provisioning to tenancy management—ensuring a seamless, self-assembling, self-managing, and self-healing cloud infrastructure. Key Features and Functionality: - Multi-Tenancy: Supports strict tenant separation with granular access controls, user and group ACLs, and configur

Product Description

Lovage helps local businesses turn happy customers into 5-star growth. Our tap-to-review NFC cards, countertop stands, and QR stickers make it effortless for a guest to leave a Google review in seconds––no app download, no hunting for links. Pair that hardware with our free Lovage mobile app and you get a simple, always-on system for earning more reviews, ranking higher on Google, and getting more calls, bookings, and foot traffic. We set up everything for you: custom-branded cards, your direct

Product Description

AI Icon Generator is an innovative, AI-powered tool designed to simplify the creation of unique and customizable icons for various applications. Launched in 2024, it offers a free, user-friendly platform that enables individuals to craft personalized icons effortlessly, regardless of their design skills or experience. By leveraging advanced artificial intelligence technologies, AI Icon Generator automates the design process, allowing users to generate icons quickly and efficiently. Key Feature

Product Description

Graylog API Security is the first API security solution that is purpose-built to provide security teams with full observability into runtime API activity inside the perimeter. As attackers find innovative ways to pose as valid users to gain unfettered access to critical production APIs, you can no longer rely on perimeter defense alone. Your security teams can now use Graylog API Security to strengthen your post-perimeter API security posture and manage your growing API attack surface.

Product Description

Buildable is an AI-powered task engine for SaaS developers. Paste an idea, and Buildable instantly: 1. Generates a phased, dependency-aware backlog 2. Scaffolds a private GitHub repo with CI and tests 3. Streams JSON tasks through the Model-Controller-Prompt (MCP) protocol so any GPT-4, Claude, or local assistant can code, run tests, and move Kanban cards to Done. Stack-agnostic, project-scoped API keys, and a live board keep solo builders and small teams shipping features—not rewriting prom

Product Description

Stackbox WMS is an enterprise-grade, agile, AI-powered, Cloud-based Fulfilment Operating System (FOS) purpose-built to achieve high-throughput across distribution centres. It automates and optimizes every warehouse operation — from inbound receiving to outbound dispatch — with intelligent optimization and dynamic orchestration that goes far beyond rule-based execution. Its Native iOS (Intralogistics Orchestration System) seamlessly manages multiple automation agents — ASRS, AMR, AGV, conveyors

Product Description

NexGuards is an AI-powered human-layer security platform designed to protect organizations from modern social engineering attacks. The platform simulates highly personalized phishing, smishing, and vishing attacks using OSINT and generative AI, enabling companies to identify real vulnerabilities in employee behavior. Unlike traditional security awareness training, NexGuards delivers instant, tailored microlearning at the moment of failure, driving measurable behavioral change and improving emp

Product Description

Get high-accuracy, developer-friendly automatic license plate recognition (ALPR) or automatic number plate recognition (ANPR) software! The core of our ALPR, ANPR system is based on state of the art deep neural networks architectures. Our machine-learning software: • Works on dark, low-res, blurry images and tough angles, all vehicle types, etc. See our full ALPR results. • Decodes license plate, vehicle type (e.g. SUV, van, pickup truck), vehicle make model (e.g. Honda Accord),