Vulnerability Management & Tools
-
Rapid 7
Rapid7 solutions help companies identify the risks they are exposed to and define a remediation plan focused on the real level of severity.
rapid7.com -
Invicti
Invicti solutions provide the most accurate and efficient DAST solution for devops/devsecops teams to discover and protect all the applications that run their organizations.
invicti.com -
Blood Hound by Specter Ops
An Attack Path Management solution that continuously maps and quantifies identity attack paths in Active Directory and Azure.
bloodhoundenterprise.io
Security Awareness
-
Knowbe4
It is the reference leader for its offer of Security Awareness services and aims to improve the most important line of defense of the corporate context: its employees.
knowbe4.com -
INE Learning
A training platform that puts real-world infrastructure first. Learn from experienced instructors and demonstrate your knowledge in networking, cybersecurity, cloud, and data science.
ine.com -
Secure Code Warrior
A platform that guides developers to security by teaching them the skills needed to defend their organization through a secure code.
securecodewarrior.com -
SKILLA
Comprehensive e-learning for business team training. Strategic approach, active learning and gamification. Possibility of selection of different earning paths and multilingual complete paths.
skilla.com
EDR and Managed Services
-
Spear Tip
Speartip is a cyber counterintelligence company that protects customers from cyber threats through both proactive and responsive services. It helps organizations identify cyber risk and vulnerabilities and provides comprehensive, continuous, end-to-end protection.
speartip.com -
CrowdStrike
Protect your business from the most advanced threats with the most advanced technology on the market.
crowdstrike.com
Threat Intelligence
-
SpyCloud
Constantly monitor the presence of sensitive information on the web and the dark web, to take action before it can be used against your organization.
spycloud.com -
IntelligenceX
Protect your business from the latest threats with the most advanced technology on the market
intelx.io
Identity Management
-
Fudo Security
Fudo Security products allow you to monitor user activity with access to critical resources, help companies manage password policy, and warn of suspicious behavior.
fudosecurity.com -
Yubico
Yubico’s security key series combines hardware-based authentication, public key encryption, and FIDO2/ WebAuthn and FIDO U2F protocols to eliminate account acquisitions.
yubico.com