---
description: Page 6 - Discover the best Cybersecurity Software for your organisation. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 6 - Best Cybersecurity Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software) > [Page 6](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6)

# Cybersecurity Software

Canonical: https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software

Page: 6 / 20\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=5)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=7)

-----

## Products

1. [Blumira](https://www.softwareadvice.co.uk/software/210259/blumira) — 4.9/5 (14 reviews) — Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size...
2. [Alert Logic MDR](https://www.softwareadvice.co.uk/software/180949/alert-logic) — 4.5/5 (14 reviews) — Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for var...
3. [Libraesva Email Archiver](https://www.softwareadvice.co.uk/software/371700/libraesva-email-archiver) — 4.9/5 (14 reviews) — Libraesva Email Archiver is an email archiving solution that helps organizations with email governance, risk manageme...
4. [ConnectWise Cybersecurity Management](https://www.softwareadvice.co.uk/software/185512/connectwise-fortify) — 4.5/5 (13 reviews) — What is ConnectWise Cybersecurity Management? ConnectWise Cybersecurity Management software and support solutions hel...
5. [BlueCat](https://www.softwareadvice.co.uk/software/112464/BlueCat) — 4.5/5 (13 reviews) — BlueCat provides core services and solutions that help our customers, and their teams, deliver change-ready networks....
6. [Tehama](https://www.softwareadvice.co.uk/software/246987/tehama) — 4.4/5 (13 reviews) — Tehama is a digital workplace software that helps businesses manage employees, products, finances, sales, expenses, a...
7. [Probely](https://www.softwareadvice.co.uk/software/179350/probe-ly) — 4.8/5 (13 reviews) — Probely is a cloud-based web vulnerability scanning solution for security teams and developers. It is suitable for co...
8. [Security for Everyone](https://www.softwareadvice.co.uk/software/324314/security-for-everyone) — 4.5/5 (13 reviews) — Your users and visitors depend on you to keep their information safe. If you want to be sure your digital assets are ...
9. [CybeReady](https://www.softwareadvice.co.uk/software/333684/cybeready) — 4.5/5 (13 reviews) — CybeReady is a cloud-based cybersecurity awareness training solution, designed to help organizations of all sizes acr...
10. [IncMan SOAR](https://www.softwareadvice.co.uk/software/215776/incman-soar) — 4.8/5 (13 reviews) — IncMan SOAR is a cloud-based and on-premise solution, designed to helps MSSPs and organizations across finance, energ...
11. [Hexiosec ASM](https://www.softwareadvice.co.uk/software/430679/hexiosec-asm) — 4.8/5 (13 reviews) — Every asset your business has connected to the internet is a potential entry point for attackers. As more systems mov...
12. [NetExplorer Workspace](https://www.softwareadvice.co.uk/software/195301/netexplorer) — 4.8/5 (13 reviews) — Designed to ensure the security of your data, the NetExplorer solution facilitates file sharing. Simple for the user,...
13. [6clicks](https://www.softwareadvice.co.uk/software/365050/6clicks) — 4.8/5 (13 reviews) — 6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub \&am...
14. [Cyber Security Suite](https://www.softwareadvice.co.uk/software/121969/cyberoo) — 4.9/5 (12 reviews) — CYBEROO's MDR (Managed Detection \&amp; Response) service, combines Artificial Intelligence, Machine Learning and the ...
15. [HackerOne](https://www.softwareadvice.co.uk/software/363397/hackerone) — 4.6/5 (12 reviews) — HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial s...
16. [SharePass](https://www.softwareadvice.co.uk/software/319320/sharepass) — 5.0/5 (12 reviews) — SharePass is an online solution for sharing secrets and confidential information using a web application, browser ext...
17. [Tricent](https://www.softwareadvice.co.uk/software/352814/tricent-compliance-tool-tct) — 4.9/5 (12 reviews) — Tricent is the \#1 file-sharing governance SaaS platform that helps organizations make their file-sharing more secure ...
18. [Risk Ledger](https://www.softwareadvice.co.uk/software/255844/risk-ledger) — 4.8/5 (12 reviews) — Risk Ledger is a network of connected organisations, working together to improve security and reduce risk in the supp...
19. [Specops uReset](https://www.softwareadvice.co.uk/software/355804/specops-ureset) — 4.6/5 (12 reviews) — Specops uReset is a self-service password reset solution that enables users to reset their password using an authenti...
20. [Beyond Identity](https://www.softwareadvice.co.uk/software/217882/beyond-identity) — 4.8/5 (12 reviews) — Beyond Identity is fundamentally changing the way workforces and customers log in. We eliminate passwords and all phi...
21. [FileWall](https://www.softwareadvice.co.uk/software/251263/filewall) — 5.0/5 (12 reviews) — FileWall is a security solution for Microsoft 365 that provides ultimate protection against file-based cyber-attacks ...
22. [AwareGO](https://www.softwareadvice.co.uk/software/316584/awarego) — 4.5/5 (11 reviews) — AwareGO is a human risk assessment solution that helps businesses identify, measure and remedy the human risk factor ...
23. [Kymatio](https://www.softwareadvice.co.uk/software/202135/kymatio) — 4.8/5 (11 reviews) — Kymatio is a cyber risk management software that helps businesses manage cyber awareness requirements and training se...
24. [Astra Pentest](https://www.softwareadvice.co.uk/software/362981/astra-pentest) — 4.8/5 (11 reviews) — Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management. Our com...
25. [LogPoint](https://www.softwareadvice.co.uk/software/207274/logpoint) — 4.9/5 (11 reviews) — LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats ...

-----

Page: 6 / 20\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=5)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=7)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 6 - Discover the best Cybersecurity Software for your organisation. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6","about":{"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"Page 6","position":3,"item":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 6 - Best Cybersecurity Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Blumira","position":1,"description":"Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. \n\nBlumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others. Try Blumira for free at blumira.com/trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f785f6b-2d00-4843-af80-9503cad7d2b7.jpeg","url":"https://www.softwareadvice.co.uk/software/210259/blumira","@type":"ListItem"},{"name":"Alert Logic MDR","position":2,"description":"Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for various environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform and hybrid environment.\n\n\nAlert Logic Log Manager is an automated solution that collects, aggregates and searches log data from web applications, servers and network assets. Key features include threat detection, forensics data management, compliance management, log monitoring, log analysis, log reports, log reviews and security alerts.\n\n\nAlert Logic Log Manager automatically deploys collectors in the cloud and hybrid infrastructure. Along with it, the solution integrates log data from various sources such as applications, workloads and network assets. It tracks user activities and suspicious behaviors across all the environments. In case of any threats, system analysts analyze the threats and alert users with the help of daily and monthly reports.\n\n\nAlert Logic provides its services on a monthly subscription basis and provides support via phone, email, knowledge base, training and community forums.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d4e18fd4-916d-420e-b10d-affe08d1bfc5.png","url":"https://www.softwareadvice.co.uk/software/180949/alert-logic","@type":"ListItem"},{"name":"Libraesva Email Archiver","position":3,"description":"Libraesva Email Archiver is an email archiving solution that helps organizations with email governance, risk management, and compliance. It provides rapid e-Discovery through instant full-text search of archived emails.\n\nThe software is designed for organizations across industries that need to archive emails for regulatory compliance, litigation readiness, or storage management. It is ideal for heavily regulated sectors like financial services and healthcare. Other target markets include legal firms, government agencies, and any business storing large volumes of email data.\n\nKey features of Libraesva Email Archiver include seamless integration with Office 365, Exchange, and other popular email platforms. It offers robust search to quickly find emails. The software provides multiple storage options including on-premise, private cloud, public cloud, and object storage. Security is addressed through certified time-stamping and email encryption. Libraesva Email Archiver enables organizations to meet email archiving, compliance and eDiscovery needs with a powerful yet easy-to-use solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/158312c0-7339-4042-bfae-b8fbac9729a2.png","url":"https://www.softwareadvice.co.uk/software/371700/libraesva-email-archiver","@type":"ListItem"},{"name":"ConnectWise Cybersecurity Management","position":4,"description":"What is ConnectWise Cybersecurity Management?\n\nConnectWise Cybersecurity Management software and support solutions help MSPs protect their clients’ critical business assets. From 24/7 threat detection monitoring, incident response, and security risk assessment tools, ConnectWise Cybersecurity Management solutions remove the complexity associated with building an MSP-powered cybersecurity stack and lower the costs of 24/7 monitoring support staff.\n\nBest For:\nWhether starting from scratch or expanding services to an existing cybersecurity practice, ConnectWise solutions are purpose-built for MSPs/TSPs seeking to launch quickly and deliver outstanding client security outcomes and value.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/190d44dd-b0a6-4c52-b63a-b23654531dc6.png","url":"https://www.softwareadvice.co.uk/software/185512/connectwise-fortify","@type":"ListItem"},{"name":"BlueCat","position":5,"description":"BlueCat provides core services and solutions that help our customers, and their teams, deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support network modernization initiatives such as cloud adoption, SD-WAN, SASE and automation of key network provisioning and administration tasks. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI (DNS-DHCP-IPAM) management, network security, multi-cloud management, network observability, performance management and health. The company is headquartered in Toronto and New York and has additional offices in Germany, Iceland, Japan, Singapore, Serbia, and the United Kingdom. Learn more at bluecat.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ea0fc425-c3c2-465c-999b-ec0f382594c7.jpeg","url":"https://www.softwareadvice.co.uk/software/112464/BlueCat","@type":"ListItem"},{"name":"Tehama","position":6,"description":"Tehama is a digital workplace software that helps businesses manage employees, products, finances, sales, expenses, and more on a unified interface. The platform enables teams to handle employee schedules, payroll, inventory, sales, and customer service. \n\nAdministrators can forecast future demands based on current sales and inventory levels. Additionally, Tehama allows operators to create and assign orders to different employees and track stock levels in real-time on a centralized dashboard.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d4e8c1d-d763-4a3c-a47c-404698dbb5c1.png","url":"https://www.softwareadvice.co.uk/software/246987/tehama","@type":"ListItem"},{"name":"Probely","position":7,"description":"Probely is a cloud-based web vulnerability scanning solution for security teams and developers. It is suitable for companies that build digital services. The solution scans web applications and manages the lifecycle of detected vulnerabilities.\n\n\nProbely provides custom instructions and code snippets to developers for threat monitoring and resolution. Users can scan security headers, cookie flags and transport layer security. Targets can be edited or archived. In addition, two URLs can be added in a single target separately for testing and production environments. APIs available on a different hostname can be added and scanned as a host.\n\n\nThe solution offers modules for identifying web applications and running specific scans for targeted apps. Probely can also be integrated with tools for automatic security testing. Slack and Jira integrations are available as well.\n\n\nThe solution is available on a monthly subscription basis and support is provided via live chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad6e9f2a-6c9e-4237-aae7-740c9f3cc7b9.png","url":"https://www.softwareadvice.co.uk/software/179350/probe-ly","@type":"ListItem"},{"name":"Security for Everyone","position":8,"description":"Your users and visitors depend on you to keep their information safe. If you want to be sure your digital assets are secure, Security for Everyone is the tool for you.\n\nWith S4E, you will have:\n1- Manual Vulnerability Scanning\n2- Automated Vulnerability Scanning\n3- Vulnerability Scanning API\n4- Cybersecurity Awareness Questionnaires & Quizzes\n\nAdditionally, you can check your assets' security regularly with our penetration testing services:\n- Web Application Penetration Testing\n- Mobile Application Penetration Testing\n- IoT Penetration Testing\n- Network Penetration Testing\nAll our pentesting services are performed by an experienced cybersecurity team.\n\nBehind S4E, there is a team of highly trained cybersecurity experts who combine their collective 35+ years of experience into making cybersecurity manageable, understandable, and affordable.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bfd7dd23-5b2b-49cf-aa0c-458bd16135f7.jpeg","url":"https://www.softwareadvice.co.uk/software/324314/security-for-everyone","@type":"ListItem"},{"name":"CybeReady","position":9,"description":"CybeReady is a cloud-based cybersecurity awareness training solution, designed to help organizations of all sizes across finance, manufacturing, and pharmaceutical sectors build and assign training sessions to employees.  \n\nCybeReady delivers security teams with a weekly progress report along with summarized campaign reports. The machine learning-powered platform allows supervisors to evaluate employee's performance, modify training intervals based on their learning curve and engage participants via just-in-time learning. Its automated engine suggests and assigns suitable sets of phishing simulations across departments in different local languages. Additionally, the solution also offers onboarding letters to new hires, informing them of their automatic enrolment to programs. \n\nCybeReady offers integration with third-party platforms Azure Active Directory and Google Workspace. Pricing is available on request and support is extended via documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6adae94d-fb8c-487d-81a5-64f69adeb0b4.png","url":"https://www.softwareadvice.co.uk/software/333684/cybeready","@type":"ListItem"},{"name":"IncMan SOAR","position":10,"description":"IncMan SOAR is a cloud-based and on-premise solution, designed to helps MSSPs and organizations across finance, energy, healthcare or retail industries manage, measure, and orchestrate various security tasks such as threat hunting, investigation, containment and incident qualification. \n\nThe platform lets IT professionals determine the risk levels of incoming threat alerts, triage alerts to identify actual attacks and design incident response workflows. Service providers can detect issues, facilitate communication with clients and respond to potential incidents in a centralized platform. The solution can be used by investigators to \nstore case reports, allocate duties, prepare notes and more. \n\nIncMan SOAR offers integration with several third-party applications such as Alleantia, AbuseIPDB, MySQL, BMC Remedy, Okta, Cisco, PhishTank, SentinelOne and more. Pricing is available on request and support is offered via online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5be25d3d-ecb4-45be-a6fa-a7419e38f29c.png","url":"https://www.softwareadvice.co.uk/software/215776/incman-soar","@type":"ListItem"},{"name":"Hexiosec ASM","position":11,"description":"Every asset your business has connected to the internet is a potential entry point for attackers. As more systems move to the cloud, even a small business's online estate can quickly become unmanageable. \n\nHexiosec ASM is a cloud-based solution that allows users to visualise how their online infrastructure is connected to the internet. With just a single domain or IP address, it can discover your internet-connected assets and any associated risks threatening your business. All presented in a way that is easy to understand, even for non-technical users. \n\nUse the data gathered from your scans to understand how your IT team or managed service provider addresses your business's issues. Or utilise the third-party scanning functionality to understand the risks posed to you through your supply chain or with potential new vendors. \n\nDownloadable summary reports mean you can take this information out of the app, making it perfect for meetings or presentations where concise, impactful information is helpful to keep stakeholders informed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/75c26ea0-cf22-4867-99ac-212f6e958aba.jpeg","url":"https://www.softwareadvice.co.uk/software/430679/hexiosec-asm","@type":"ListItem"},{"name":"NetExplorer Workspace","position":12,"description":"Designed to ensure the security of your data, the NetExplorer solution facilitates file sharing. Simple for the user, complete for the administrator, exchange files with no size limit, and in complete confidentiality. NetExplorer works to facilitate internal and external collaboration. Document creation and co-editing features increase productivity, eliminate distance, and reduce costs.\nNo need for multiple tools that do different things, all the functionalities needed for your business workflows are integrated into NetExplorer. Features include electronic signature, validation and revision of documents, comments, etc.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0a26c2cd-0e62-414b-88c7-907521bcd313.png","url":"https://www.softwareadvice.co.uk/software/195301/netexplorer","@type":"ListItem"},{"name":"6clicks","position":13,"description":"6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC. This intelligent approach, including a transparent licensing model with unlimited access to frameworks and functionality, empowers cyber leaders and professionals to build resilient and trusted cyber risk and compliance programs.\n\nUse 6clicks for:\n- Security compliance: Centralize and streamline multi-framework compliance from inception to audit.\nIT risk management: Intelligently manage your risk profile to make better decisions while keeping your company safe.\n\n- Vendor management: Confidently engage vendors in line with their criticality and rapidly identify and treat vendor non-compliance.\n- Incident management: Capture, respond and learn from incidents and breaches while ensuring minimal disruption to business operations.\n- Covering the most in-demand frameworks, such as ISO 27001, NIST CSF, UK Cyber Essentials, DORA, and more, \n\n6clicks enables organizations to transform their approach to cyber risk and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a29effa3-97c2-411e-8c5a-1208e2516901.png","url":"https://www.softwareadvice.co.uk/software/365050/6clicks","@type":"ListItem"},{"name":"Cyber Security Suite","position":14,"description":"CYBEROO's MDR (Managed Detection & Response) service,\ncombines Artificial Intelligence, Machine Learning and the analysis of over 50 cyber security specialists. To protect you from the most advanced cyber threats. 24 hours a day. 365 days a year.\nManaged Detection and Response (MDR) is a proactive and advanced approach to monitor, detect, analyze and respond to malicious network activity or any other cybersecurity breach, fully managed by a security provider.\n\nCyber ​​Security Suite MDR consists of two modules: Cyber ​​Security Intelligence and Cypeer.\n\nCyber ​​Security Intelligence - Threat Intelligence\nCSI is a Threat Intelligence service that provides valuable information that can impact on corporate IT security and that contributes to the awareness of technological and fraudulent risks and threats coming from the online world. By browsing the Deep and Dark Web, in fact, with the Threat Intelligence service it is possible to determine the cyber incident before other signals make it evident.\n\nCypeer - Next Gen Intelligent Detection Platform\nThe managed service is based on Cypeer, an intelligent Detection platform that collects and correlates all information and logs from existing security applications in your IT ecosystem. The comprehensive Managed Detection & Response service includes more than just breach notification: it leverages 24/7 monitoring, visibility and response technologies.\n\nOur service is designed to bridge the IT security skills gap within an organization. Tackle the most advanced threats that an internal IT team cannot fully address and at a lower cost than the company would have to spend to build its own specialized security team.\n\nWhat does I-SOC mean?\nAll the services of the CSI and Cypeer components are supported by the presence of an I-SOC (Intelligence - Security Operation Center) team, made up of cyber security specialists. A team of about 50 cyber security specialists located between Italy and foreign offices, to facilitate the analysis of data and information reported in different languages. The specialization covers three levels of skills and verticalizations: Ethical hackers, Incident Response Team and specialists of various technologies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4736e20e-0515-4ee1-8098-f4008478644f.png","url":"https://www.softwareadvice.co.uk/software/121969/cyberoo","@type":"ListItem"},{"name":"HackerOne","position":15,"description":"HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. HackerOne is designed to help users receive and monitor vulnerabilities through secure channels, conduct continuous vulnerability testing for specific features or in-house apps, and implement security assessments to ensure products meet security compliance requirements for secure product launches. HackerOne also provides advisory and triage services that help teams launch and scale security programs, validate vulnerabilities, and develop remediation plans.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/048fef9b-484d-42b7-9d56-60f5d0a5e097.png","url":"https://www.softwareadvice.co.uk/software/363397/hackerone","@type":"ListItem"},{"name":"SharePass","position":16,"description":"SharePass is an online solution for sharing secrets and confidential information using a web application, browser extension, or mobile app.\n\nSharePass will deliver a one-time encrypted link from the sender to the receiver; it expires once that link is opened, leaving no digital footprint.\n\nWhen it comes to data privacy, SharePass or any of its employees cannot see the passwords. The passwords can be seen only by the exchanging parties.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/58630d5b-af31-4d8e-b151-a9f8d9068290.png","url":"https://www.softwareadvice.co.uk/software/319320/sharepass","@type":"ListItem"},{"name":"Tricent","position":17,"description":"Tricent is the #1 file-sharing governance SaaS platform that helps organizations make their file-sharing more secure and compliant without sacrificing collaboration. \n\nTricent enables more secure and compliant file sharing within Microsoft 365 (OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly.\n\nTricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files.\n\nTricent enables administrators to:\n\n🚀 Effortless Onboarding in less than 30 Minutes: Tricent gets you up and running swiftly so you can focus on what matters most.\n\n🔍 Unparalleled Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives—no more guesswork, just crystal-clear visibility.\n\n⭕️ Bulk Remediation Made Simple: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. Say hello to streamlined compliance without the headache.\n\n😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance.\n\n💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control.\n\n🔮 Stay Ahead with Abnormality Detection: Our machine learning feature keeps you informed, detecting anomalies before they escalate *Only Google Workspace.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a6f37c53-e3b9-4ba9-a79e-5283984ed8d6.png","url":"https://www.softwareadvice.co.uk/software/352814/tricent-compliance-tool-tct","@type":"ListItem"},{"name":"Risk Ledger","position":18,"description":"Risk Ledger is a network of connected organisations, working together to improve security and reduce risk in the supply chain. It provides help and support to suppliers to put controls in place that keeps their organisation safe and secure. It gives clients a real-time view into the controls in place at their suppliers. \n\nA supplier maintains one source of truth for all of their security and risk controls. They can share this with as many customers as they like, either within the Risk Ledger network, or outside of it. The most successful suppliers on the Risk Ledger network are those that provide a link to their Risk Ledger profile to all new prospective clients, even before they've requested due diligence information. This shows their customers that they are serious about protecting their organisation and their clients. \n\nRisk Ledger is free for suppliers. Clients connect to their suppliers, much like a LinkedIn connection. They can view the control information and evidence being maintained by the suppliers. Clients can set their own policies to overlay onto the supplier profiles, highlighting risk areas that are important to them or to specific supplier categories that they define. Clients can engage with their suppliers' security and risk teams, directly discussing controls or best practices, or sending formal remediation requests. Once the client is happy with the level of risk, they can send the supplier for approval. \n\nWith Risk Ledger, one organisation has one profile that can connect to both suppliers and clients. This unique model enables a map of the global supply chain to be built. \n\nUsers can see where an organisation fits into the global supply chain. They can identify concentration risks or other critical dependencies with 4th or 5th parties and can see where an incident further down the supply chain may affect an organisation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cdf6c56f-4aa1-4927-818f-0a462df580a9.png","url":"https://www.softwareadvice.co.uk/software/255844/risk-ledger","@type":"ListItem"},{"name":"Specops uReset","position":19,"description":"Specops uReset is a self-service password reset solution that enables users to reset their password using an authentication engine. It also updates locally cached credentials, even when users are off VPN. The platform allows organizations to greatly reduce expensive password reset calls to the IT service desk. In addition, we enable users to securely reset their Active Directory passwords themselves with an easy interactive experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/31a9fa6a-c815-4cc2-bc8c-9390a75da79a.png","url":"https://www.softwareadvice.co.uk/software/355804/specops-ureset","@type":"ListItem"},{"name":"Beyond Identity","position":20,"description":"Beyond Identity is fundamentally changing the way workforces and customers log in. We eliminate passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/56967939-58e7-47ab-ac64-426ea92fdcde.png","url":"https://www.softwareadvice.co.uk/software/217882/beyond-identity","@type":"ListItem"},{"name":"FileWall","position":21,"description":"FileWall is a security solution for Microsoft 365 that provides ultimate protection against file-based cyber-attacks for business applications like Exchange Online, SharePoint, Teams and OneDrive. It leverages Deep File Analysis (DFA) containing proprietary TrueCDR algorithms to eliminate embedded malware in files, including nested files, archives and password-protected documents, that legacy solutions fail to detect. \n\nFileWall complements Microsoft security products like Exchange Online Protection (EOP) and Microsoft Defender, providing real-time protection against any unknown threat hidden in files from both external and internal sources.  \n\nFileWall integrates with Microsoft 365 and provides protection against the growing threat of file-based attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6fc70b2f-3666-4ca2-b9ba-cd83cc143c02.png","url":"https://www.softwareadvice.co.uk/software/251263/filewall","@type":"ListItem"},{"name":"AwareGO","position":22,"description":"AwareGO is a human risk assessment solution that helps businesses identify, measure and remedy the human risk factor when it comes to cybersecurity.\n\n\nIt enables professionals to measure top human attack vectors including -\n- Phishing\n- Passwords \n- Sensitive data handling\n- Physical security\n- Flexible working\n- Devices handling\n\nUsers can get actionable insights and identify vulnerabilities to create an informed cybersecurity strategy.\nFeatures include -\n- Identify vulnerable departments, roles and teams \n- Get granular insights into specific threat areas and employee behaviors \n- Save time and train employees on the weakest threat areas instead of all threat areas\n- Measure the effectiveness of training, technology, and policies","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39c43f04-6597-4ddb-96a1-088657dae8ab.png","url":"https://www.softwareadvice.co.uk/software/316584/awarego","@type":"ListItem"},{"name":"Kymatio","position":23,"description":"Kymatio is a cyber risk management software that helps businesses manage cyber awareness requirements and training sessions and execute personalized awareness itineraries. With Kymatio's platform, users are better equipped to meet compliance standards and gain insight into employees’ cyber knowledge levels.\n\nOrganizations can conduct employee awareness training, manage cyber security programs and improve overall security posture. The platform offers a variety of features to create, implement, and track multiple cyber awareness programs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/69594a1c-26b8-44a2-8901-69456fb5e612.png","url":"https://www.softwareadvice.co.uk/software/202135/kymatio","@type":"ListItem"},{"name":"Astra Pentest","position":24,"description":"Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management. Our comprehensive cybersecurity solutions blend automation and manual expertise to run 15,000+ tests and compliance checks, ensuring complete safety regardless of the threat or attack location.\n\nWith a 360° view of an organization’s security posture, proactive, continuously delivered insights, real-time reporting, and AI-first defensive strategies, we aim to help CTOs shift left at scale through continuous pentests. The offensive scanner engine, seamless tech stack integrations, and expert support help make pentesting simple, effective, and hassle-free for 1000+ businesses worldwide.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2d2e4f85-ddef-4533-87d5-af3eba481207.png","url":"https://www.softwareadvice.co.uk/software/362981/astra-pentest","@type":"ListItem"},{"name":"LogPoint","position":25,"description":"LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats with real-time application of correlation rules.\n\nLogPoint enables organizations to identify advanced threats and minimize investigation time with UEBA. It comes with a reporting module, which provides all the actionable intelligence required to facilitate decision-making processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d54b5f6-d3bd-47bd-be68-46324819507a.png","url":"https://www.softwareadvice.co.uk/software/207274/logpoint","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4643/cybersecurity/software?page=6#itemlist","numberOfItems":25}
</script>
