wdt_ID | Product | Company | Category | Sub-Category | Open Source | Website | Details |
---|---|---|---|---|---|---|---|
1 | Elastic Compute Cloud (EC2) | Amazon | Compute | Cloud | https://aws.amazon.com/ec2/ | ||
2 | Elastic Block Store (EBS) | Amazon | Storage | Cloud | https://aws.amazon.com/ebs/ | ||
3 | Simple Storage Service (S3) | Amazon | Storage | Cloud | https://aws.amazon.com/s3/ | ||
4 | Amazon Cognito | Amazon | IAM | Cloud | https://aws.amazon.com/cognito/ | ||
5 | Amazon Inspector | Amazon | Vulnerability Management | Cloud | https://aws.amazon.com/inspector/ | ||
6 | Amazon Macie | Amazon | Data Security | Cloud | https://aws.amazon.com/macie/ | ||
7 | AWS Key Management Service | Amazon | KMS | Cloud | https://aws.amazon.com/kms/ | ||
8 | AWS CloudHSM | Amazon | KMS | Cloud | https://aws.amazon.com/cloudhsm/ | ||
9 | AWS CloudTrail | Amazon | Logging | Cloud | https://aws.amazon.com/cloudtrail/ | ||
10 | Amazon QuickSight | Amazon | Analytics | Cloud | https://aws.amazon.com/quicksight/ | ||
11 | Amazon Detective | Amazon | Analytics | Cloud | https://aws.amazon.com/detective/ | ||
12 | AWS Artifact | Amazon | Reports | Cloud | https://aws.amazon.com/artifact/ | ||
13 | Azure Virtual Machines | Microsoft | Compute | Cloud | https://azure.microsoft.com/en-us/products/virtual-machines/ | ||
14 | Azure Blob Storage | Microsoft | Storage | Cloud | https://azure.microsoft.com/en-us/products/storage/blobs/ | ||
15 | Azure Disk Storage | Microsoft | Storage | Cloud | https://azure.microsoft.com/en-us/products/storage/disks/ | ||
16 | Microsoft Sentinel | Microsoft | SIEM | Cloud | https://azure.microsoft.com/en-us/services/microsoft-sentinel/ | ||
17 | Microsoft Purview | Microsoft | Data Security | Cloud | https://azure.microsoft.com/en-us/products/purview/ | ||
18 | Azure Information Protection | Microsoft | Data Security | Cloud | https://azure.microsoft.com/en-us/services/information-protection/ | ||
19 | Azure Bastion | Microsoft | Network | Cloud | https://azure.microsoft.com/en-us/services/azure-bastion/ | ||
20 | Key Vault | Microsoft | KMS | Cloud | https://azure.microsoft.com/en-us/products/key-vault/ | ||
21 | Azure Dedicated HSM | Microsoft | KMS | Cloud | https://azure.microsoft.com/en-us/services/azure-dedicated-hsm/ | ||
22 | Compute Engine | Compute | Cloud | https://cloud.google.com/compute | |||
23 | Cloud Storage | Storage | Cloud | https://cloud.google.com/storage | |||
24 | Filestore | Storage | Cloud | https://cloud.google.com/filestore | |||
25 | Cloud Identity | IAM | Cloud | https://cloud.google.com/identity | |||
26 | Cloud Data Loss Prevention | Data Security | Cloud | https://cloud.google.com/dlp | |||
27 | Chronicle SOAR | Vulnerability Management | Cloud | https://cloud.google.com/solutions/security-orchestration-automation-response | |||
28 | Secret Manager | KMS | Cloud | https://cloud.google.com/secret-manager | |||
29 | Titan Security Key | IAM | Cloud | https://cloud.google.com/titan-security-key | |||
30 | Chronicle SIEM | SIEM | Cloud | https://cloud.google.com/solutions/security-information-event-management | |||
31 | Chronicle Security Operations | Vulnerability Management | Cloud | https://cloud.google.com/solutions/chronicle-security-operations | |||
32 | Access Transparency | Logging | Cloud | https://cloud.google.com/access-transparency | |||
33 | Oracle Virtual Machines | Oracle | Compute | Cloud | https://www.oracle.com/cloud/compute/virtual-machines/ | ||
34 | Block Volumes | Oracle | Storage | Cloud | https://www.oracle.com/cloud/storage/block-volumes/ | ||
35 | Object Storage | Oracle | Storage | Cloud | https://www.oracle.com/cloud/storage/object-storage/ | ||
36 | File Storage | Oracle | Storage | Cloud | https://www.oracle.com/cloud/storage/file-storage/ | ||
37 | Identity and Access Management | Oracle | IAM | Cloud | https://www.oracle.com/security/cloud-security/identity-cloud/ | ||
38 | Cloud Guard | Oracle | Analytics | Cloud | https://www.oracle.com/security/cloud-security/cloud-guard/faq/ | ||
39 | Bastion | Oracle | Network | Cloud | https://www.oracle.com/security/cloud-security/bastion/ | ||
40 | Data Safe | Oracle | Data Security | Cloud | https://www.oracle.com/security/database-security/data-safe/ | ||
41 | Vulnerability Scanning | Oracle | Vulnerability Management | Cloud | https://www.oracle.com/security/cloud-security/vulnerability-scanning-service/ | ||
42 | Key Management | Oracle | KMS | Cloud | https://www.oracle.com/security/cloud-security/key-management/ | ||
43 | Oracle Analytics Platform | Oracle | Analytics | Cloud | https://www.oracle.com/business-analytics/analytics-platform/ | ||
44 | Logging Analytics | Oracle | Analytics | Cloud | https://www.oracle.com/manageability/logging-analytics/ | ||
45 | Elastic Compute Service | Alibaba | Compute | Cloud | https://www.alibabacloud.com/id/product/ecs | ||
46 | Elastic Block Storage | Alibaba | Storage | Cloud | https://www.alibabacloud.com/product/disk | ||
47 | Object Storage Service | Alibaba | Storage | Cloud | https://www.alibabacloud.com/product/oss | ||
48 | IDaaS | Alibaba | IAM | Cloud | https://www.alibabacloud.com/product/identity-as-a-service-idaas | ||
49 | Sensitive Data Discovery & Protection | Alibaba | Data Security | Cloud | https://www.alibabacloud.com/product/sddp | ||
50 | Log Service | Alibaba | Logging | Cloud | https://www.alibabacloud.com/product/log-service | ||
51 | ActionTrail | Alibaba | Logging | Cloud | https://www.alibabacloud.com/product/actiontrail | ||
52 | Cisco Secure Firewall | Cisco | Network | Firewall | https://www.cisco.com/site/us/en/products/security/firewalls/index.html | ||
53 | Cisco Secure IPS | Cisco | Network | Threat Management | https://www.cisco.com/c/en/us/products/security/ngips/index.html | ||
54 | Juniper Advanced Threat Prevention | Juniper | Network | Threat Management | https://www.juniper.net/us/en/products/security/advanced-threat-prevention.html | ||
55 | Juniper Next-Generation Firewall | Juniper | Network | Firewall | https://www.juniper.net/us/en/products/security/next-generation-firewall-services.html | ||
56 | Fortinet Next-Generation Firewall | Fortinet | Network | Firewall | https://www.fortinet.com/products/next-generation-firewall | ||
57 | FortiGuard IPS Security Service | Fortinet | Network | Threat Management | https://www.fortinet.com/products/ips | ||
58 | Palo Alto Next-Generation Firewall | Palo Alto | Network | Firewall | https://www.paloaltonetworks.com/network-security/next-generation-firewall | ||
59 | Palo Alto Advanced Threat Prevention | Palo Alto | Network | Threat Management | https://www.paloaltonetworks.com/network-security/advanced-threat-prevention | ||
60 | Check Point Next Generation Firewall | Check Point | Network | Firewall | https://www.checkpoint.com/quantum/next-generation-firewall/ | ||
61 | Check Point Advanced Network Threat Prevention | Check Point | Network | Threat Management | https://www.checkpoint.com/quantum/advanced-network-threat-prevention/ | ||
62 | BIG-IP Advanced Firewall Manager | F5 | Network | Firewall | https://www.f5.com/products/security/advanced-firewall-manager | ||
63 | Unified Threat Management | Aruba (Hewlett Packard Enterprise) | Network | Threat Management | https://www.arubanetworks.com/products/security/unified-threat-management/ | ||
64 | NSX Firewall | VMware | Network | Firewall | https://www.vmware.com/solutions/nsx-firewall.html | ||
65 | Network Access Control | Forescout | Network | Access Control | https://www.forescout.com/solutions/network-access-control/ | ||
66 | Barracuda CloudGen Firewall | Barracuda | Network | Firewall | https://www.barracuda.com/products/network-security/cloudgen-firewall | ||
67 | ExtremeCloud IQ | Extreme Networks | Network | https://www.extremenetworks.com/extremecloud-iq/ | |||
68 | Arista Network Detection & Response (NDR) | Arista | Network | Threat Management | https://www.arista.com/en/products/network-detection-and-response | ||
69 | pfSense | pfSense | Network | Firewall | Open Source | https://www.pfsense.org/ | |
70 | Snort | Cisco | Network | Threat Management | Open Source | https://www.snort.org | |
71 | OPNsense | OPNsense | Network | Firewall | Open Source | https://opnsense.org/ | |
72 | openNAC | openNAC | Network | Access Control | Open Source | http://opennac.org | |
73 | Suricata | Open Information Security Foundation | Network | Threat Management | Open Source | https://suricata.io/ | |
74 | Synopsys | Synopsys | Application | https://www.synopsys.com/software-integrity/security-testing.html | |||
75 | Checkmarx One | Checkmarx | Application | https://checkmarx.com/product/application-security-platform/ | |||
76 | Veracode | Veracode | Application | https://www.veracode.com | |||
77 | Fortify | Micro Focus | Application | https://www.microfocus.com/en-us/cyberres/application-security | |||
78 | Acunetix | Invicti | Application | https://www.acunetix.com/product/ | |||
79 | Imperva Web Application Firewall | Imperva | Application | https://www.imperva.com/products/web-application-firewall-waf/ | |||
80 | Barracuda Web Application Firewall | Barracuda | Application | https://www.barracuda.com/products/application-cloud-security/web-application-firewall | |||
81 | FortiWeb Web Application Firewall | Fortinet | Application | https://www.fortinet.com/products/web-application-firewall/fortiweb | |||
82 | BIG-IP Advanced WAF | F5 | Application | https://www.f5.com/products/security/advanced-waf | |||
83 | SonarQube | SonarQube | Application | Open Source | https://www.sonarqube.org/features/security/ | ||
84 | OWASP Zed Attack Proxy (ZAP) | OWASP | Application | Open Source | https://www.zaproxy.org/ | ||
85 | GitLab | GitLab | DevSecOps | https://about.gitlab.com/platform/ | |||
86 | Jenkins | DevSecOps | Open Source | https://www.jenkins.io/ | |||
87 | Azure DevOps Server | Microsoft | DevSecOps | Cloud | https://azure.microsoft.com/en-us/products/devops/ | ||
88 | AWS CodePipeline | Amazon | DevSecOps | Cloud | https://aws.amazon.com/codepipeline/ | ||
89 | CircleCI | CircleCI | DevSecOps | https://circleci.com | |||
90 | Bitrise | Bitrise | DevSecOps | Mobile | https://www.bitrise.io/ | ||
91 | Oracle | Oracle | Database | https://www.oracle.com/database/technologies/security.html | |||
92 | SQL Server | Microsoft | Database | https://www.microsoft.com/en-us/sql-server/ | |||
93 | IBM Security Guardium Data Protection | IBM | Database | https://www.ibm.com/products/ibm-guardium-data-protection | |||
94 | Imperva SecureSphere | Imperva | Database | https://www.imperva.com/products/securesphere-appliances/ | |||
95 | McAfee Database Security | McAfee/Trellix | Database | https://docs.trellix.com/bundle/database-security-4.6.5-product-guide/page/GUID-7643B210-67F8-473F-A8CF-88F7814CD75E.html | |||
96 | FortiGuard Database Security Service | Fortinet | Database | https://www.fortinet.com/products/security-subscriptions/database-security | |||
97 | IBM Security Verify | IBM | IAM | Access Management | https://www.ibm.com/verify | ||
98 | Cyberark Identity | Cyberark | IAM | Access Management | https://www.cyberark.com/resources/cyberark-identity | ||
99 | ForgeRock Identity Platform | ForgeRock | IAM | Access Management | https://www.forgerock.com/identity-and-access-management-platform | ||
100 | Okta Customer/Workforce Identity Cloud | Okta | IAM | Access Management | https://www.okta.com | ||
101 | Ping Identity | Ping | IAM | Access Management | https://www.pingidentity.com | ||
102 | Duo | Cisco | IAM | Access Management | https://duo.com/ | ||
103 | Oracle Identity and Access Management | Oracle | IAM | Access Management | https://www.oracle.com/security/identity-management/ | ||
104 | NetIQ IAM | Micro Focus | IAM | Access Management | https://www.microfocus.com/en-us/cyberres/identity-access-management | ||
105 | One Identity | Quest | IAM | Access Management | https://www.oneidentity.com/ | ||
106 | Red Hat Identity Management | Red Hat | IAM | Access Management | https://access.redhat.com/products/identity-management | ||
107 | OpenIAM | OpenIAM | IAM | Access Management | Open Source | https://www.openiam.com/ | |
108 | Qualys Vulnerability Management, Detection & Response (VMDR) | Qualys | Vulnerability Management | https://www.qualys.com/apps/vulnerability-management-detection-response/ | |||
109 | Nessus | Tenable | Vulnerability Management | https://www.tenable.com/products/nessus | |||
110 | InsightVM | Rapid7 | Vulnerability Management | https://www.rapid7.com/products/insightvm/ | |||
111 | GFI LanGuard | GFI | Vulnerability Management | https://www.gfi.com/products-and-solutions/network-security-solutions/languard | |||
112 | OpenVAS | Greenbone Networks | Vulnerability Management | https://www.openvas.org/ | |||
113 | QRadar | IBM | SIEM | https://www.ibm.com/products/qradar-siem | |||
114 | Splunk Enterprise Security SIEM | Splunk | SIEM | https://www.splunk.com/en_us/products/enterprise-security.html | |||
115 | Securonix Next-Gen SIEM | Securonix | SIEM | https://www.securonix.com/products/next-generation-siem/ | |||
116 | Exabeam SIEM | Exabeam | SIEM | https://www.exabeam.com/product/siem/ | |||
117 | LogRhythm SIEM | LogRhythm | SIEM | https://logrhythm.com/products/logrhythm-siem/ | |||
118 | Nagios | Nagios | SIEM | Open Source | https://www.nagios.com/solutions/log-monitoring/ | ||
119 | Elastic SIEM | Elastic | SIEM | Open Source | https://www.elastic.co/security/siem | ||
120 | AlienVault OSSIM | AT&T Cybersecurity | SIEM | Open Source | https://cybersecurity.att.com/products/ossim | ||
121 | System Center | Microsoft | Monitoring | https://www.microsoft.com/en-us/system-center | |||
122 | DX Unified Infrastructure Management | Broadcom | Monitoring | https://www.broadcom.com/products/software/aiops-observability/infrastructure-management/server-monitoring-software | |||
123 | SolarWinds Hybrid Systems Monitoring | SolarWinds | Monitoring | https://www.solarwinds.com/solutions/hybrid-systems-monitoring | |||
124 | Network Performance Monitoring | VIAVI | Monitoring | https://www.viavisolutions.com/en-us/ptv/solutions/network-performance-monitoring | |||
125 | Splunk Infrastructure Monitoring | Splunk | Monitoring | https://www.splunk.com/en_us/products/infrastructure-monitoring.html | |||
126 | nGeniusONE | NETSCOUT | Monitoring | https://www.netscout.com/product/ngeniusone-platform | |||
127 | PRTG | Paessler PRTG | Monitoring | https://www.paessler.com/prtg | |||
128 | OpManager Plus | ManageEngine | Monitoring | https://www.manageengine.com/it-operations-management/ | |||
129 | Zabbix | Zabbix | Monitoring | Open Source | https://www.zabbix.com/ | ||
130 | Nagios XI | Nagios | Monitoring | Open Source | https://www.nagios.com/products/nagios-xi/ | ||
131 | Percona Monitoring and Management | Percona | Monitoring | Database | Open Source | https://www.percona.com/software/database-tools/percona-monitoring-and-management | |
132 | Prometheus | Prometheus | Monitoring | Open Source | https://prometheus.io/ | ||
133 | OpenNMS | OpenNMS | Monitoring | Network | Open Source | https://www.opennms.com/ | |
134 | OSSEC | OSSEC | Monitoring | Open Source | https://www.ossec.net/ | ||
135 | Zeek | Zeek | Monitoring | Open Source | https://zeek.org/ | ||
136 | Checkmk | Checkmk | Monitoring | Open Source | https://checkmk.com/ | ||
137 | Wazuh | Wazuh | Monitoring | Open Source | https://wazuh.com/ | ||
138 | Commvault | Commvault | Backup & Recovery | https://www.commvault.com/complete-data-protection | |||
139 | NetBackup | Veritas | Backup & Recovery | https://www.veritas.com/protection/netbackup | |||
140 | PowerProtect | Dell Technologies | Backup & Recovery | https://www.dell.com/en-us/dt/data-protection/index.htm | |||
141 | Veeam Backup & Replication | Veeam | Backup & Recovery | https://www.veeam.com/vm-backup-recovery-replication-software.html | |||
142 | Enterprise Data Protection | Rubrik | Backup & Recovery | https://www.rubrik.com/products/zero-trust-data-management | |||
143 | Cohesity DataProtect | Cohesity | Backup & Recovery | https://www.cohesity.com/products/dataprotect/ | |||
144 | Quorum onQ | Quorum | Backup & Recovery | https://quorum.com/product | |||
145 | Acronis Cyber Protect | Acronis | Backup & Recovery | https://www.acronis.com/en-us/products/cyber-protect/backup/ | |||
146 | Bacula Enterprise | Bacula Systems | Backup & Recovery | Open Source | https://www.baculasystems.com/corporate-data-backup-software-solutions/bacula-enterprise-data-backup-software/ | ||
147 | WIndows Defender | Microsoft | Endpoint | Antivirus | https://www.microsoft.com/en-us/windows/comprehensive-security | ||
148 | Symantec Endpoint Security | Broadcom | Endpoint | Antivirus | https://www.broadcom.com/products/cybersecurity/endpoint | ||
149 | HCL BigFix | HCL | Endpoint | UEM | https://www.hcltechsw.com/bigfix | ||
150 | Ivanti Neurons for UEM | Ivanti | Endpoint | UEM | https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management | ||
151 | McAfee | McAfee | Endpoint | Antivirus | https://www.mcafee.com/ | ||
152 | Sophos Endpoint Protection | Sophos | Endpoint | EDR | https://www.sophos.com/en-us/products/endpoint-antivirus | ||
153 | Kaspersky | Kaspersky | Endpoint | Antivirus | https://kaspersky.com | ||
154 | Trend Micro Endpoint Security | Trend Micro | Endpoint | UEM | https://www.trendmicro.com/en_us/business/products/user-protection/endpoint-security.html | ||
155 | SentinelOne | SentinelOne | Endpoint | EDR | https://www.sentinelone.com/surfaces/endpoint/ | ||
156 | CrowdStrike Falcon | CrowdStrike | Endpoint | EDR | https://www.crowdstrike.com/products/endpoint-security/ | ||
157 | ClamAV | Cisco | Endpoint | Antivirus | Open Source | https://www.clamav.net/ | |
158 | Open EDR | Xcitium | Endpoint | EDR | Open Source | https://openedr.com/ | |
Company | Category | Sub-Category | Open Source |
wdt_ID:
Product:
Company:
Category:
Sub-Category:
Open Source:
Website:
Details: