Browse Software
List Your Product
Showing 1 - 20 of 20 Products
AWS Firewall Manager logo

AWS Firewall Manager

AWS Firewall Manager | Centralized Firewall Management | Amazon Web Services (AWS) Write a Review

AWS Firewall Manager allows you to centrally configure and manage your firewall rules across accounts and applications.

Read more
IBM Cloud Network Security logo

IBM Cloud Network Security

Network Security - Overview Write a Review

IBM Cloud network security solutions offer firewalls and security groups to protect servers and end users from malicious activity.

Read more
Cisco DNA Center logo

Cisco DNA Center

Cisco DNA Center - Cisco DNA Center 2.1.2.x Data Sheet 4.3 Based on 33 Ratings

Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco's intent-based network. It addresses the demands of digitization, cloud, IoT, and mobility by eliminating IT complexity and facilitating alignment with business intent.

Read more
Cisco Defense Orchestrator logo

Cisco Defense Orchestrator

Security Policy Management | Cisco Defense Orchestrator 4.9 Based on 4 Ratings

Cisco Defense Orchestrator (CDO) is a cloud-based security policy and device manager that simplifies and unifies policy across your Cisco firewalls. Seamlessly orchestrate policy changes across tens or thousands of devices with confidence.

Read more
McAfee ePolicy Orchestrator logo

McAfee ePolicy Orchestrator

McAfee ePolicy Orchestrator | McAfee Products Write a Review

McAfee ePolicy Orchestrator (McAfee ePO) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Read more
R80.30 Cyber Security Management logo

R80.30 Cyber Security Management

Unified Cyber Security Platform of the Future | Check Point Software Write a Review

R81 is the industry’s most advanced Threat Prevention and security management software that delivers uncompromising simplicity and consolidation.

Read more
Multi-Domain Security Management logo

Multi-Domain Security Management

Security Management for Multi-Domains | Check Point Software Write a Review

Multi-Domain Security Management allow businesses of all sizes to easily create virtual domains to strengthen their security and simplify management.

Read more
SolarWinds Network Configuration Manager logo

SolarWinds Network Configuration Manager

Network Configuration Management Tool - NCM Software | SolarWinds 4.6 Based on 30 Ratings

Network Configuration Manager can help save time by configuring devices to policy, preventing unwanted changes, and identifying config drift. Free trial!

Read more
Palo Alto Networks Panorama logo

Palo Alto Networks Panorama

Panorama - Management Solution. 4.3 Based on 7 Ratings

Panorama network security management provides static rules and dynamic security updates. Reduce administrator workload and improve your overall security posture.

Read more
Junos Space Security Director logo

Junos Space Security Director

Security Director Network Security Management | Juniper Networks 4.1 Based on 11 Ratings

Quickly understand threats & how to remediate them with Junos Space Security Director. This responsive network security management application empowers your security team to keep your company safe.

Read more
F5 Advanced Firewall Manager logo

F5 Advanced Firewall Manager

Advanced Firewall Manager 3.7 Based on 12 Ratings

Stop even the most massive and complex DDoS attacks with BIG-IP Advanced Firewall Manager: advanced data center protection against layer 3–4 threats.

Read more
Tufin logo


Security Policy Automation Write a Review

Introducing Tufin the powerful security policy automation technology that helps secure the network and cloud environments, and deploy a Zero Trust Architecture. For those organizations transitioning to hybrid enterprise infrastructure, Tufin’s cutting-edge technology assures end-to-end network security with a single solution tailored for both network and cloud security teams. Through advanced automation, Tufin makes coordination between the teams simpler and more efficient. The unique dashboards offer detailed visibility into all of the applications, connections, policies, and risk levels while providing unprecedented speed when it comes to identifying mistakes or inconsistencies in your architecture. Secure changes are made quickly and accurately using automated analysis, testing, and verification processes. Employing Tufin also gives organizations the confidence that their defenses are compliant with regulatory landscapes without the need to hire additional staff or partner with specialized consultants. With continuously updated intelligence on threats across public clouds, networks are constantly monitored for malicious activity and fully automated corrective actions are taken in real time. Tufin provides organizations the agility they need to move faster while still protecting their brand reputation from damaging security events. Invest in peace of mind by choosing Tufin for comprehensive network security solutions backed by trusted customer service experts giving users the confidence needed as the digital transformation journey continues.

Read more
AlgoSec logo


Firewall Management | Security Policy Management | AlgoSec 4.5 Based on 1 Ratings

AlgoSec enables the world's largest organizations to align business and security strategies. It provides holistic, business-level visibility across the entire network security infrastructure. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec.

Read more
Change Tracker Gen7 R2 logo

Change Tracker Gen7 R2

Change Tracker Generation 7™ 4.8 Based on 7 Ratings

Change Tracker Gen7R2 is the only solution designed to reduce change noise and the complexity of integrity monitoring and policy management. Gen7 R2 enables organizations to: - Define the systems that need protection. - Ensure those systems are secured, compliant and fit for purpose at all times. - Enable organizations to move projects securely from Development to Operations.

Read more
Forward Networks logo

Forward Networks

Secure and assure multi-cloud Write a Review

Speed remediation with detailed information on all devices connected to a compromised host. Identify and fix affected devices faster with Network Query Engine and Intent-based Checks features. View security zone connectivity, rendering complex interactions in an easy-to-understand visualization.

Read more
Banyan Security logo

Banyan Security

Secure Remote Access for the Modern Enterprise Write a Review

Web filtering with private application and network access protects your hybrid workforce from internet-based threats. Fine-grained controls based on device posture, supporting agent-based and agentless options, add frictionless security to existing single-sign-on and eliminate phishing attacks and account takeover. State-of-the-art security uses trust scoring and continuous authorization. Performance is optimized by inserting security in the data path only when needed.

Read more
Indeni logo


Security Infrastructure Automation | Locates Issues Automatically 4.4 Based on 13 Ratings

Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Crowd companies can create an infrastructure that is adaptable to change.

Read more
Ostendio MyVCM logo

Ostendio MyVCM

Strengthen Your Security Posture Write a Review

Ostendio MyVCM is the only always-on security and risk management platform that reduces up to 80% time spent on security audits - and guarantees a successful audit.

Read more
OPSWAT Security Score logo

OPSWAT Security Score

Trusted Globally to Defend What’s Critical Write a Review

Introducing OPSWAT Security Score, the ultimate solution for securing their computer system against the ever-growing threat of cyberattacks. In today's digital world, safeguarding their valuable information is of utmost importance. With our revolutionary software, they can confidently identify and resolve any theyaknesses in their computer security system, ensuring that their sensitive data remains private and protected. Designed with professionals in mind, OPSWAT Security Score provides an all-in-one suite of tools that work tirelessly behind the scenes to actively analyze their system's vulnerabilities. This advanced algorithms scan every nook and cranny of their computer, scrutinizing each component to pinpoint any potential entry points for cybercriminals. From outdated software and weak passwords to misconfigured settings, our state-of-the-art technology leaves no stone unturned when it comes to fortifying their digital fortress. But OPSWAT Security Score doesn't stop at just detecting the weak spots. This powerful software goes above and beyond, guiding they through the process of fixing these vulnerabilities step by step. With clear and concise instructions tailored to their specific system, even those with limited technical expertise can confidently take action to boost their security. No more sleepless nights worrying about the potential breaches that could compromise their personal or professional information – they've got they covered. As a professional, they understand the importance of maintaining a top-notch reputation in their industry. A single cyberattack can devastate not only their finances but also their hard-earned credibility. Don't let a security breach be the downfall of their career. OPSWAT Security Score equips they with the tools necessary to stay one step ahead of the ever-evolving threats posed by cybercriminals.

Read more
Konsta logo


Scala| solved Write a Review

Konsta, is an L1 EVM-compatible decentralized blockchain that uses hybrid PoSA (Proof of Stake Authority) consensus to ensure the safety of their transactions. In simpler terms, this means that every transaction is manually verified by Super Validators known as Notariuses, eliminating the risk of malicious activity. What sets Konsta apart from other blockchains is its shorter block finality compared to existing EVMs. This means that their transactions are confirmed and finalized at a faster rate, saving you time and reducing the risk of double-spending. Not to mention, Konsta is 2x faster than other popular blockchains such as Solana and Polygon. But that's not all. Konsta also offers a unique cost-saving feature. Public keys are not used until the network demands it, keeping the cost of the network at a minimum. This allows for scalability in case of growth, providing a cost-efficient solution for their blockchain needs. And for all you Ethereum dApps enthusiasts, Konsta is EVM-compatible. This means that you can easily deploy their dApps on Konsta and run them seamlessly.

Read more

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.



Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.



Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed