2026 Best Software Awards are here!See the list
Search results for
Stacker
(673)
Star Rating
Categories
Categories(3)
Sellers(62)
Solutions(0)
Discussions(5)
Articles(184)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

Averlon is an AI-powered cloud security platform designed to help organizations proactively identify, prioritize, and remediate security risks within their cloud environments. By leveraging advanced artificial intelligence, Averlon streamlines the detection of vulnerabilities, misconfigurations, and potential attack vectors, enabling security teams to focus on the most critical threats and respond swiftly. This approach not only enhances the overall security posture but also reduces the complexi

Not seeing what you're looking for?

Dive deeper into "Stacker" on G2 AI

Product Description

White Knight Labs is a premier cybersecurity consultancy specializing in offensive security engagements. They offer a comprehensive suite of services designed to identify, exploit, and remediate vulnerabilities across various digital environments. Their expertise spans network, web, mobile, and cloud penetration testing, as well as advanced adversarial simulations and compliance advisory services. By emulating real-world attack scenarios, White Knight Labs empowers organizations to fortify their

Product Description

Docker Host and Container Security Hardened by DeepCyber is a comprehensive security solution designed to fortify Docker environments by implementing advanced hardening techniques. This product enhances the security posture of both Docker hosts and containers, ensuring robust protection against potential threats and vulnerabilities. Key Features and Functionality: - Base Image Hardening: The solution secures foundational layers of container images by minimizing included components and configur

Product Description

DNS Twister is an anti-phishing domain name search engine and DNS monitoring service designed to protect businesses from domain-based threats such as phishing, typosquatting, and intellectual property infringement. By generating and monitoring domain permutations similar to your own, DNS Twister helps identify and alert you to potentially malicious activities that could compromise your brand and customer trust. Key Features and Functionality: - Domain Permutation Generation: Automatically crea

Product Description

Cymon™ Cyber Intelligence Services by Eshnav is a comprehensive, human-driven cyber threat intelligence solution designed to proactively monitor and protect organizations from emerging cyber threats. By embedding real-time surveillance within underground cyber ecosystems, Cymon™ intercepts stolen credentials, monitors Dark Web activities, identifies lookalike domains, and detects credential leaks before they escalate. This service combines proprietary intelligence methods with expert analysis to

Product Description

Halcyon.ai offers a comprehensive anti-ransomware platform designed to protect organizations from the growing threat of ransomware attacks. By integrating advanced artificial intelligence and machine learning models trained specifically on ransomware behaviors, Halcyon.ai provides proactive defense mechanisms that detect, prevent, and mitigate ransomware threats across all stages of an attack. This ensures business continuity and minimizes the impact of potential breaches. Key Features and Func

Product Description

NVIS AI is a next-generation Software Defined Perimeter solution designed to create secure, invisible networks within minutes. By eliminating the public attack surface, NVIS AI ensures that external threats cannot detect or exploit network resources, embodying the principle that "hackers can't hack what they can't see." Key Features and Functionality: - Zero Trust Network Access : Implements a Zero Trust architecture, ensuring that only authenticated and authorized users can access network re

Product Description

WitFoo Precinct 6.0 Diagnostic SIEM is a comprehensive Security Information and Event Management solution designed to enhance organizational security operations. By integrating advanced analytics, big data processing, and automation, Precinct provides near real-time intelligence on security threats and attacks. It ingests and analyzes data from various sources, including syslog, NetFlow, agents, APIs, and CloudWatch, enabling organizations to detect and address security deficiencies proactively.

Product Description

Outflank Security Tooling is a comprehensive suite of advanced offensive security tools designed by seasoned red team professionals to emulate real-world cyber threats. This toolkit enables security teams to conduct sophisticated adversary simulations, penetration tests, and red teaming exercises, effectively assessing and enhancing an organization's resilience against cyberattacks. By covering every phase of the attack chain—from initial access to data exfiltration—OST provides the necessary re

Product Description

OpenText Core DNS Protection is a cloud-native security solution designed to monitor and filter all Domain Name System (DNS) requests, effectively blocking threats before they can infiltrate your network or devices. By intercepting DNS queries from browsers, applications, and background processes, it prevents access to malicious domains, mitigates DNS leaks in real-time, and ensures that encrypted DNS traffic is resolved exclusively by trusted sources. Key Features and Functionality: - C

Product Description

Netwrix Privilege Secure is an advanced Privileged Access Management (PAM) solution designed to enhance organizational security by eliminating standing privileges and implementing just-in-time access controls. By dynamically creating temporary privileges only when needed and removing them immediately after use, it significantly reduces the attack surface and mitigates risks associated with persistent administrative accounts. Key Features and Functionality: - Zero Standing Privilege: Eliminates

Product Description

XBOW is an AI-powered penetration testing platform that delivers human-level security assessments at machine speed. By deploying hundreds of autonomous AI agents, XBOW systematically discovers, validates, and exploits vulnerabilities without human intervention, enabling organizations to scale their offensive security efforts efficiently. Key Features and Functionality: - Autonomous AI Agents: Specialized AI agents collaborate to identify and exploit vulnerabilities, mimicking the tactics of hu

Product Description

Trillium Information Security Systems , established in 2005, is a leading global provider of comprehensive cybersecurity solutions and services. With nearly two decades of experience, TISS has built a reputation for delivering cutting-edge, robust, and scalable cybersecurity services to clients worldwide. Their team comprises over 100 cybersecurity specialists holding more than 400 certifications, ensuring a deep and constantly evolving knowledge base. TISS's commitment to excellence is reflecte

Product Description

Web of Science Author Connect™ is a comprehensive marketing and email database service designed to help organizations target and engage with over 4 million of the world's most influential researchers and published authors. Leveraging data from the Web of Science Core Collection™, which spans more than 250 disciplines across sciences, social sciences, and arts & humanities, this service enables users to build customized email contact lists tailored to their specific campaign goals. Whether ai

Product Description

Bishop Fox's Cosmos Attack Surface Management (CASM is a comprehensive, fully managed service designed to provide organizations with continuous visibility and control over their external digital assets. By combining advanced technology with expert-driven testing, CASM proactively identifies and mitigates vulnerabilities, ensuring that security teams can address critical exposures before they are exploited by adversaries. Key Features and Functionality: - Comprehensive Asset Discovery: Utilizes

Product Description

VIWSEC Tecnologia is a Brazilian cybersecurity firm with over 20 years of experience in information security, risk management, fraud prevention, and offensive security. The company specializes in developing strategic information security plans that comply with regulations such as ISO, PCI-DSS, SOX, and LGPD. VIWSEC offers a comprehensive suite of services, including business continuity management, application security, security diagnostics (penetration testing, 24/7 NOC/SOC monitoring, cybersecu

Product Description

Offensive Security Manager (OSM) is an AI-powered cybersecurity platform that transforms reactive defense into proactive risk management. Designed as a Virtual AI Security Team, OSM works 24/7 to detect, predict, and prevent cyber threats long before they strike—bringing the analytical power of a hundred top-tier security experts into a single intelligent system. At its core, OSM is built around Continuous Threat Exposure Management (CTEM), Gartner’s strategic framework for modern cybersecurity

Product Description

Echelon Risk + Cyber is a cybersecurity professional services firm built on the belief that security and privacy are basic human rights. Protecting them requires more than tools or checklists. It requires focus, expertise, and a deep understanding of how risk impacts real businesses. Cybersecurity, privacy, and technology risk continue to evolve and create meaningful disruption across industries. Echelon was built to address those challenges head-on. We partner with organizations that want hones

Product Description

At SwiftSafe, we believe the most powerful security system in the world isn’t only made of firewalls, encryption, and advanced AI—it’s made of people. Technology can stop malware, phishing emails, and ransomware attacks to an extent, but it takes only one click on a malicious link or one weak password for a breach to happen. Statistics consistently show that human error accounts for the majority of cybersecurity breaches, making security awareness the most critical defense in today’s digital-fir