Browse Products & Solutions
- A.I. Detection and Response
- A.I. Security
- Access Management
- Active Directory Security (AD)
- Antivirus
- API Security
- Application Security (AppSec)
- Application Security Posture Management (ASPM)
- Application Detection and Response (ADR)
- Assessment
- Asset Discovery & Management
- Attack Surface Management (ASM)
- Audit
- Awareness Training
- AWS Marketplace
- Backup
- Backup as a Service (BaaS)
- Bot Security
- Brand Protection
- Breach and Attack Simulation (BAS)
- CISO as a Service
- Code Security
- Collaboration Security
- Cloud Access Security Broker (CASB)
- Cloud Security
- Cloud VPN
- Continuous Controls Monitoring (CCM)
- Compliance
- Continuous Threat Exposure Management (CTEM)
- Consulting Services
- Cyber Asset Attack Surface Management (CAASM)
- Cyber Risk Quantification (CRQ)
- Cyber Security Insurance
- Dark Web Monitoring
- Data Access Governance (DAG)
- Data Discovery and Classification (DDC)
- Data Governance Solutions
- Data Privacy Management
- Data Protection
- Data Security Posture Management (DSPM)
- DDoS Protection
- Deception Technology
- Digital Executive Protection
- Disaster Recovery as a Service (DRaaS)
- Email Security
- Encryption
- Endpoint Detection and Response (EDR)
- Endpoint Security
- Extended Detection and Response (XDR)
- Governance, Risk and Compliance (GRC)
- Identity Management
- Identity and Access Management (IAM)
- Incident Response (IR)
- Insider Risk Detection and Management
- IoT Security
- Managed Detection and Response (MDR)
- Managed Threat Hunting
- Managed Security Services Provider (MSSP)
- Microsegmentation
- Microsoft Office 365 Security
- Mobile Security
- Network Detection and Response (NDR)
- Network Security
- Operational Technology Security (OT Security)
- Password Management
- Passwordless Authentication
- Penetration Testing (PenTest)
- Phishing Security
- Preference and Consent Management Solutions
- Privacy Management Solutions
- Privileged Access Management (PAM)
- Ransomware Protection
- Risk Management Tools
- SaaS Security (Software as a Service)
- SaaS Security Compliance
- Secure Access Service Edge (SASE)
- Secure Web Gateway (SWG)
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation and Response (SOAR)
- Security Operations & Threat Intelligence
- Security Ratings Platform
- SOC as a Service
- Social Media Security
- STEALTH MODE Cyber Security Software Vendors
- Third Party Risk Management - TPRM
- Threat Intelligence
- Training
- Vulnerability Management
- Web Application Firewall (WAF)
- Web Browser Security
- Zero Trust Network Access (ZTNA)
- Zero Trust Security Service Edge (Zero Trust SSE)
Research shows that 80% of employees spend most of their day using a web browser.
Web Browser Security Problems:
- Browser Exploits
- Complexity
- Credential Theft
- Lack of Control
- Malicious Websites
- Web Based Attacks
Use Cases:
- 3rd Party Contractors
- BYOD Workforce
- Privileged User Account Management
- SaaS and Web Apps
- Safe Browsing Solutions
- Virtual Desktop Infrastructure
- Zero Trust
Surf Security
The First Zero Trust BrowserSURF provides users with freedom of work, letting them interact with applications, data, and each other securely. It addresses the critical business asset neglected by security experts for years: The browser. The browser is the access frontier for everything: users, data, corporate assets, applications, development activities - and cyber criminals, too.
SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance. Through this centralized platform, SURF insists on identity-first access to all SaaS and corporate assets to guarantee a secured and frictionless user experience. SURF enhances security, performance, and productivity for end-users and applications – faster than ever before.
Perception Point
Email Security, Web Browser Security and Cyber Security Awareness Software VendorPerception Point touts itself as a Prevention-as-a-Service company, built to enable digital transformation. They are best known for email security, web browser security and cyber security awareness training software.
Seraphic Security
Enterprise Browser Security on Any BrowserWith the rapid changes in the IT landscape as well as a tremendous shift in the modern workforce, we saw increased attack surfaces across all business leaving them more vulnerable than ever to a wide variety of risks. This led us to create a security solution at the browser level that would secure every user while not requiring the organizations, or the user, to make any changes or absorb any degradation to the user experience thus enabling organizations to focus on what they do best, innovate
We started writing code in 2020. We deployed our first customer in 2021, proving to them and us that this radically different approach to enterprise web security was technically feasible. Seraphic secures the browser from the inside. Any browser! any version! And this enables your employees to keep their browsers unchanged! Zero change management for your security team. Seraphic also provides full security and governance to all sessions across all web applications public and organizational (including SaaS and internal web apps). With Seraphic, there is no need to tradeoff between your level of security and productivity and complexity. Seraphic can secure any browser, on any device, for any user, anywhere.
Island
Security that's naturally built into the browser itselfIsland, the Enterprise Browser - the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Island is redefining the future of work for some of the largest, most respected enterprises in the world.
SlashNext
Multi-Channel Security for API Security, Cloud Email, Mobile, Secure Web Browser and Web Messaging AppsSlashNext was founded in 2015 during a significant rise in phishing, morphing payloads, and a very strong belief that phishing would grow from email into a multi-channel problem and become the number one cyber threat to organizations. There was a recognition that something needed to change.
Atif Mushtaq, the visionary founder behind SlashNext and one of the main architects of FireEye’s core malware sandbox technology, recognized phishing detection, like malware, needed to move from signature-based reputation techniques to behavioral analysis. What was needed was a faster, more automated, and accurate approach to phishing detection. With that knowledge, SlashNext built an Artificial Intelligence (AI) phishing detection engine with virtual browsers and behavioral analysis using computer vision, natural language processing, and several machine-learning classifiers to detect and stop well-crafted multi-payload phishing attacks delivered multiple communication channels, including legitimate infrastructure.
Today, as humans have moved completely to the cloud, using apps, browsers and mobile devices to communicate with work, family, and friends, SlashNext is uniquely positioned to stop multi-channel phishing and human hacking
Conceal
Secure Web Browser Extension
Conceal is a fast-growing cybersecurity company that offers innovative technology solutions to our customers, globally. Each team member reflects our company’s main goal: to protect the world from ever-growing cyber crimes.
Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser ensuring employee productivity and data protection.
Talon Cyber Security
Talon - Enterprise Browser - Secure Web BrowserTalon, Enterprise Browser, Secure Web Browser, Web Browser Extension and Mobile Web Browser Security
Talon provides Enterprise Browser Security designed to secure any user, any device, any location, and any web application.
LayerX
LayerX - Secure Web Browser ExtensionLayerX - Secure Web Browser Extension
Prompt Security
A.I. Security, GenAI Security, A.I. Web Browser Security, A.I. Redaction, A.I. Code Security, A.I. DevOps SecurityBy deploying Prompt Security's Complete Platform for Generative AI Security, enterprises can benefit from the adoption of Generative AI while protecting their employees, customers, and applications. To prevent the exposure of sensitive data, block harmful content, and prevent GenAI-specific attacks, Prompt inspects prompts and model responses at every touchpoint of Generative AI in an organization — from AI tools used by employees to GenAI integrations in customer-facing products. Furthermore, enterprises can ensure that AI tools used within their organizations are transparent and governed. In an era of Generative AI, Prompt empowers organizations with the confidence they need to embrace A.I. technologies.