Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (4)
Deployment
  • (5)
  • (3)
  • (30)
Customer Types
  • (2)
  • (1)
  • (29)
  • (30)
  • (28)
Pricing Model
  • (10)
  • (4)
  • (1)
  • (2)
  • (2)
  • (29)
Integrated With
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 30 Products

Top 5 JupiterOne Alternatives

Axonius logo
Uncover Security Gaps, and Automate Action Write a Review
Visit Website + Add to Compare

What is Axonius and how does it work?

Axonius is a cybersecurity asset management platform that provides organizations with a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius can deploy in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.

Read more

Axonius Pricing

  • Free Trial Not Available
  • Axonius Offers Custom plan.
CyCognito logo
External Attack Surface Management Write a Review
Visit Website + Add to Compare

What is CyCognito and how does it work?

Gain visibility and control of your attack surface with our advanced botnet and discovery engine. Our cutting-edge technology uses graph data modeling to map and classify the assets and attack surface of your organization. This allows you to uncover and eliminate critical security risks that you were not previously aware of. See exactly what attackers see and gain control over your attack surface. By understanding your attack surface, you can proactively find and mitigate potential threats and vulnerabilities before they become a major issue. Get ahead of the curve and protect your organization with our powerful botnet and discovery engine.

Read more

CyCognito Pricing

  • Free Trial Not Available
  • CyCognito Offers Custom plan.
Wiz logo

Wiz

SECURE EVERYTHING YOU BUILD Write a Review
Visit Website + Add to Compare

What is Wiz and how does it work?

Wiz is a way helpful for different organizations and all size businesses they all uses wiz to rapidly identify and remove most critical risks in AWS, Azure, GCP, and Kubernetes so that it could work fast and more securely.Wiz implements full coverage in just few minutes. Wiz can scales to any cloud environment with zero impact on resource or workload performance also when it connect no agents or sidecars required and it collects every information from each layer of the cloud slack without slowing you business operation down. Wiz also builds inventory of your cloud infrastructure — across workloads, accounts, and environments . wiz continuously analysis the security stack to discover the toxic combinations that represents real risks. You can see your whole cloud environment through wiz security graph displays your cloud resources and their fields and interconnections to uncover the attackers view to a breach. Wiz provided end to end visibility prevents issues from reaching production. Wiz is proven under fortune 500 companies. Over 20% of the Fortune 500 uses Wiz to rapidly identify and remove critical risks in their cloud estate.

Read more

Wiz Pricing

  • Free Trial Not Available
  • Wiz Offers Custom plan.
Threatwatch logo
Next generation threat protection for all attack surfaces 4.9 Based on 10 Ratings
Visit Website + Add to Compare

What is Threatwatch and how does it work?

ThreatWatch can help detect and prioritize the impact of critical threats up to 3 months earlier than leading scanners without the need for redundant scanning or having to deploy black-box agents. Secure your entire DevOps pipeline as an asset. Protect your source code repository, open-source dependencies, containers, and production cloud against malware, vulnerabilities, security misconfiguration, and information leaks (secrets in source code). Model virtually any kind of asset including network devices, IOT devices, golden images, and other assets that are hard to scan or out of reach of traditional scanning tools.

Read more

Threatwatch Pricing

  • Free Trial Available
  • Threatwatch Offers Free-forever and Custom plan.

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

DisruptOps logo
A Cloud Security Software 5 Based on 3 Ratings
Visit Website + Add to Compare

What is DisruptOps and how does it work?

DisruptOps software is a platform used to manage Cloud Security with alerts to automate workflows. The software offers continuously monitor and multi-account inventory of all cloud resources with tags. Collaborate with your team with role-based access control to ensure only authorized parties can make changes to the parts of the cloud. It integrates with Slack, Jira, Microsoft Teams. Small, Medium and Large companies make use of the software.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 62%
  • Momentum 61%
  • Popularity 72%

DisruptOps Pricing

  • Free Trial Available
  • Starts at $3000.0.

Products Similar to JupiterOne

FireEye Data Center Security logo
Protecting the data center from cyber attacks Write a Review
Visit Website + Add to Compare

What is FireEye Data Center Security and how does it work?

FireEye cybersecurity products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature-reliant defenses. Shield data centers from advanced persistent threats (APTs) and sophisticated malware found in content stores, web and application servers, and common file shares. Protect your key assets and prevent attacks with products and services that work together and share threat intelligence.

Read more

FireEye Data Center Security Pricing

  • Free Trial Not Available
  • FireEye Data Center Security Offers Custom plan.
Qualys Cloud Platform logo
Revolutionary IT security structure 4 Based on 86 Ratings
Visit Website + Add to Compare

What is Qualys Cloud Platform and how does it work?

Qualys Cloud Platform offers you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they exist. It has automated, built-in threat prioritization, patching, and other response capabilities, which makes it a complete, end-to-end security solution.The software’s capabilities include asset discovery and inventory, vulnerability management, remediation prioritization, compliance monitoring, container security, web application scanning and firewall, file integrity monitoring, endpoint detection and response, and others.On-premises, at endpoints, on mobile, in containers, or the cloud, Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. The sensors are remotely deployable, centrally managed, and self-updating, come as physical or virtual appliances or lightweight agents. The cloud agents work on servers, mobile devices, endpoints, everywhere. Local hardware scanners for internal storage. With out-of-band sensors, you can secure highly locked-down devices and an air gapper network.

Read more

Qualys Cloud Platform Pricing

  • Free Trial Available
  • Qualys Cloud Platform Offers Custom plan.
Symantec Data Center Security logo
Complete server protection, monitoring, and workload micro-segmentation 4.5 Based on 12 Ratings
Visit Website + Add to Compare

What is Symantec Data Center Security and how does it work?

Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products.

Read more

Symantec Data Center Security Pricing

  • Free Trial Not Available
  • Symantec Data Center Security Offers Custom plan.
BeyondTrust Vulnerability Management logo
Secure your business on the web 4.4 Based on 13 Ratings
Visit Website + Add to Compare

What is BeyondTrust Vulnerability Management and how does it work?

BeyondTrust is the first vulnerability management system built from the ground up to give context-aware vulnerability assessment and risk analysis to enterprises. Retina's results-driven architecture collaborates with users to proactively discover security vulnerabilities, assess business impact, and plan and implement remediation across network, online, mobile, cloud, virtual, and IoT infrastructure. Learn about network, online, mobile, cloud, virtual, and Internet of Things infrastructure. Assess asset configuration and risk, as well as identify vulnerabilities, malware, and assaults. By separating high-risk assets and using advanced threat analytics, you can assess threat potential, return on remediation, and more. Integrate patch management to address vulnerabilities. Vulnerabilities, compliance, benchmarks, and other information should be reported. Endpoints should be protected from client-side attacks. Simply trusting users and systems isn't enough in a world with stolen identities, phished credentials, and sophisticated fakes. Our Universal Privilege Management technology provides trusted access that is monitored, managed, secured, and delivered just-in-time, protecting your business while allowing it to operate efficiently.

Read more

BeyondTrust Vulnerability Management Pricing

  • Free Trial Not Available
  • BeyondTrust Vulnerability Management Offers Custom plan.
Juniper Secure Analytics logo
Manage Data with Threat Protection Tool 4.2 Based on 14 Ratings
Visit Website + Add to Compare

What is Juniper Secure Analytics and how does it work?

Juniper Secure Analytics software is a platform used to discover and respond threats. The software integrates information from Juniper and third-party network devices in a cost-effective picture of network infrastructure. The Vulnerability Manager lets organizations conduct rapid network scans, discover and isolate high-risk vulnerabilities, and automate regulatory compliance via dashboard.

Read more

Juniper Secure Analytics Pricing

  • Free Trial Not Available
  • Juniper Secure Analytics Offers Custom plan.
VMware AppDefense logo
Workload Protection Software 4.5 Based on 2 Ratings
Visit Website + Add to Compare

What is VMware AppDefense and how does it work?

VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc.

Read more

VMware AppDefense Pricing

  • Free Trial Not Available
  • VMware AppDefense Offers Custom plan.
Cisco ACI logo
Facilitates application agility and data center automation 4.5 Based on 20 Ratings
Visit Website + Add to Compare

What is Cisco ACI and how does it work?

Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality.

Read more

Cisco ACI Pricing

  • Free Trial Available
  • Cisco ACI Offers Custom plan.
ServerProtect for Linux logo
Stops malware from spreading through Linux Servers 3 Based on 1 Ratings
Visit Website + Add to Compare

What is ServerProtect for Linux and how does it work?

Trend Micro ServerProtect™ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation.

Read more

ServerProtect for Linux Pricing

  • Free Trial Available
  • ServerProtect for Linux Offers Custom plan.
HashiCorp Vault logo
Store and Secure Your Valuable Data in A Vault 4.6 Based on 119 Ratings
Visit Website + Add to Compare

What is HashiCorp Vault and how does it work?

HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets.

Read more

HashiCorp Vault Pricing

  • Free Trial Not Available
  • Starts at $0.03. Offers Custom plan.
Aaronis Cyberprotect Cloud logo
Prevent client downtime and data loss Write a Review
Visit Website + Add to Compare

What is Aaronis Cyberprotect Cloud and how does it work?

Acronis Cyber Protect Cloud is the ultimate solution for service providers, offering unified backup and next-generation AI-based anti-malware and antivirus protection management. By integrating and automating these processes, service providers can significantly reduce complexity and increase productivity while also cutting operating costs. The advanced AI-based behavioral detection engine provides the best protection against malware, ransomware, and zero-day attacks on client workloads. Additionally, full-image and file-level backup and recovery capabilities ensure that workloads on more than 20 platforms are safeguarded with near-zero Recovery Point Objectives and Recovery Time Objectives.

Read more

Aaronis Cyberprotect Cloud Pricing

  • Free Trial Not Available
  • Aaronis Cyberprotect Cloud Offers Custom plan.
ManageEngine OpManager Plus logo
IT Operations Management Write a Review
Visit Website + Add to Compare

What is ManageEngine OpManager Plus and how does it work?

OpManager Plus is a powerful, integrated solution that streamlines the process of IT operations management, eliminating the need for multiple monitoring tools. This holistic tool provides greater visibility across your IT infrastructure, helping you to remove operational bottlenecks, optimize performance and gain the maximum output from your IT infrastructure. With advanced IT operations monitoring and management capabilities, OpManager Plus offers four layers of visibility into an organization's IT operations - IT infrastructure security, IT infrastructure application performance, server and storage IT operations, and network performance. This multi-level visibility into IT operations helps IT admins identify and troubleshoot faults at various levels easily, thereby ensuring greater SLA compliance, proactive IT fault management, greater customer service and consistent IT infrastructure performance.

Read more
Datto SaaS Defense logo
Advanced Threat Protection for Microsoft 365 Write a Review
Visit Website + Add to Compare

What is Datto SaaS Defense and how does it work?

Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data.

Read more

Datto SaaS Defense Pricing

  • Free Trial Not Available
  • Datto SaaS Defense Offers Custom plan.
Hitachi Content Intelligence logo
Intelligent data discovery and transformation Write a Review
Visit Website + Add to Compare

What is Hitachi Content Intelligence and how does it work?

Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights and boost productivity with robust searches.

Read more

Hitachi Content Intelligence Pricing

  • Free Trial Not Available
  • Hitachi Content Intelligence Offers Custom plan.
VoltShare logo
Secure Data Sharing Write a Review
Visit Website + Add to Compare

What is VoltShare and how does it work?

VoltShare helps you securely share your critical data while ensuring compliance. Send and store confidential information with end-to-end encryption that eliminates the age-old problem of shared secrets and public-key mgmt. Maximize the privacy of your information. Then confidently share information with an individual or group of people. Share your confidential information like you do today Slack, email, Dropbox, SharePoint, etc. Simplify compliance through automated logs and auditability for all shared data including successful and failed decryption attempts.

Read more

VoltShare Pricing

  • Free Trial Not Available
  • VoltShare Offers Free-forever and Custom plan.
GitGuardian logo
A Monitoring Platform Built To Uncover Sensitive Company Information And Address Data Leak Issues Write a Review
Visit Website + Add to Compare

What is GitGuardian and how does it work?

GitGuardian is a private solution built to monitor and detect credential data leaks. It monitors official repositories listed under the GitHub organization and also the developer’s personal or public repositories. The platform covers 200+ API providers, private keys, database connection strings, certificates, usernames, and passwords. It comes with sophisticated pattern matching techniques that help to detect credentials that cannot be strictly defined with distinctive patterns. Developers are alerted alongside security teams and the meantime to detect is just a few seconds. It’s integrated with SIEM, ticketing systems, chats, and ITSM. It collaborates with developers and collects developer feedback directly in the dashboard to better investigate and prioritize issues. Users can monitor their internal repositories either public or private. The internal repositories monitoring feature includes integrations with GitHub and GitLab natively. Users can use the platform’s API to integrate into git hooks or in the CI as well. It comes with the ability to define custom detectors to identify specific internal tokens or hostnames.

Read more

GitGuardian Pricing

  • Free Trial Available
  • GitGuardian Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed