AI Tools

Search and filter curated AI tools. Find the right tool for your task.

ProvisioningEngine

Checked 2h agoDead linkPro

ProvisioningEngine automates user account creation and deletion across all applications and systems. The platform learns provisioning workflows from HR data and defined policies. Request tracking ensures provisioning completes on time. Integration with IT ticketing systems coordinates provisioning with IT operations. HR and IT teams use ProvisioningEngine to reduce manual account management.

RiskScorer

Checked 2h agoDead linkPro

RiskScorer assigns real-time risk scores to authentication attempts based on user, device, network, and behavioral signals. The platform triggers additional authentication factors for high-risk logins. Historical risk profiles learn legitimate patterns to reduce false positives. Integration with identity systems enables risk-based access decisions. Organizations reduce breach risk while maintaining usability.

SamlBridge

Checked 2h agoDead linkPro

SamlBridge connects legacy applications to modern identity providers using SAML bridging. The system translates authentication requests from applications that only support SAML to modern protocols. Session management handles authentication state across bridged systems. Backward compatibility ensures legacy applications continue to function without modification. Organizations modernize identity infrastructure without replacing legacy applications.

SessionShield

Checked 2h agoDead linkPro

SessionShield monitors and controls active user sessions to detect and prevent session hijacking and token theft. The platform invalidates compromised sessions automatically based on risk signals. Behavioral analysis flags unusual session activity like logins from new locations. Real-time session revocation prevents attackers from maintaining persistence. SOC teams rely on SessionShield to prevent account takeover.

SmartCardMgmt

Checked 2h agoDead linkEnterprise

SmartCardMgmt manages the lifecycle of smart cards and hardware security tokens for physical and logical access. The platform provisions certificates on smart cards and handles retirement. Multi-factor authentication using smart cards meets high security requirements. Integration with physical access control prevents orphaned credentials. Enterprises use SmartCardMgmt for hardware-based authentication.

ApplicationControl

Checked 2h agoDead linkEnterprise

ApplicationControl provides whitelist and blacklist management to control which applications can run on endpoints. The platform learns benign applications through supervised learning to reduce manual tuning. Policies support role-based execution, allowing different users different application sets. Alerts notify teams when unknown or blocked applications attempt execution. Security teams use ApplicationControl to reduce malware infection rates by 90 percent.

BehaviorAnalytics

Checked 2h agoDead linkPro

BehaviorAnalytics establishes baselines of normal user and system behavior to detect insider threats and account compromise. The platform flags unusual login times, access patterns, and data exfiltration attempts. Machine learning adapts baselines as legitimate behavior changes over time. Analysts investigate flagged behavior with detailed activity logs and context. Organizations use BehaviorAnalytics to balance security with employee privacy and productivity.

CrashAnalysis

Checked 2h agoDead linkPro

CrashAnalysis debugs application crashes and system errors to identify root causes and security implications. The platform collects crash dumps automatically and analyzes them for security vulnerabilities. Analysts correlate crashes with malware activity to detect compromise. Development teams use CrashAnalysis to ship more stable and secure applications. Organizations track crash trends to predict system failures.

DnsInspector

Checked 2h agoLink OKPro

DnsInspector analyzes DNS queries from endpoints to detect beaconing C2 communication and domain generation algorithms. The platform maintains blocklists of known malicious domains and detects suspicious patterns. Integration with threat intelligence services auto-updates detection rules. Analysts investigate resolved domains using OSINT tools. Network and security teams use DnsInspector to catch command and control activity.

EndpointShield

Checked 2h agoDead linkEnterprise

EndpointShield combines endpoint detection, response, and forensics into one integrated platform. The agent captures process relationships, file modifications, and privilege escalation attempts at kernel level. Interactive incident response lets analysts execute commands remotely to contain threats instantly. Historical data is kept for 90 days to support post-incident investigations. Organizations use EndpointShield to move from detection-only to active threat hunting.

FileGuardian

Checked 2h agoDead linkPro

FileGuardian monitors file system activity across Windows and Linux endpoints to detect and prevent unauthorized changes. The system maintains cryptographic hashes of critical files to detect tampering. Real-time notifications alert teams when sensitive directories are modified. Automated response can quarantine infected files or restore from backup. Development and operations teams use FileGuardian to maintain software supply chain integrity.

IncidentPlaybook

Checked 2h agoDead linkPro

IncidentPlaybook automates common EDR incident response tasks like evidence collection and containment actions. Analysts trigger playbooks from alerts to isolate compromised endpoints automatically. Guided workflows ensure consistent response to different threat types. Playbook execution is logged for compliance and post-incident review. SOC teams rely on IncidentPlaybook to respond faster with fewer manual errors.

KernelProtect

Checked 2h agoDead linkEnterprise

KernelProtect operates at kernel level to provide exploit protection and system integrity validation on endpoints. The platform prevents kernel-mode attacks like privilege escalation exploits and rootkit installation. Control flow guard and return-oriented programming defenses protect against modern attack techniques. Integration with hardware security features provides robust protection. Security-critical organizations rely on KernelProtect for endpoint hardening.

MalwarePrevent

Checked 2h agoDead linkEnterprise

MalwarePrevent uses signatures, heuristics, and behavioral analysis to block known and unknown malware on endpoints. The platform integrates with sandboxes to detonate suspicious files before allowing execution. Real-time threat intelligence updates detection rules to match new malware variants. Quarantine management allows analysts to safely store and analyze suspicious files. Enterprise antivirus teams rely on MalwarePrevent for comprehensive endpoint protection.

MemoryHunter

Checked 2h agoDead linkEnterprise

MemoryHunter performs in-memory forensics on running processes to detect injected code, rootkits, and fileless malware. The tool compares process memory against clean baselines to flag suspicious modifications. Analysts extract suspicious memory regions for submission to malware analysis services. The platform supports both offline memory dumps and live analysis. Security teams use MemoryHunter to catch advanced malware that avoids disk storage.

NetworkCapture

Checked 2h agoDead linkEnterprise

NetworkCapture records and analyzes network traffic from endpoint network stacks to detect C2 communication and data theft. The platform performs protocol analysis without decrypting TLS, allowing privacy while maintaining detection. Analysts can export captured traffic for lab analysis and malware reverse engineering. The system correlates network anomalies with process behavior to confirm attacks. SOC teams trust NetworkCapture to catch exfiltration attempts.

PatchTracker

Checked 2h agoDead linkPro

PatchTracker maintains inventory of installed patches and identifies missing security updates across all endpoints. The platform flags systems that lag on security patches and triggers deployment workflows. Automated scanning discovers unpatched third-party applications like Adobe and Java. Compliance reports prove patch management to auditors. IT and security teams coordinate using PatchTracker to reduce attack surface.

PrivilegeMonitor

Checked 2h agoDead linkPro

PrivilegeMonitor logs every privilege escalation attempt and tracks who has administrative access across your endpoints. The system enforces policies to restrict dangerous operations like credential dumping and USB access. Automated alerts notify teams when sensitive privilege operations occur. Audit trails prove compliance with privileged access management requirements. Organizations use PrivilegeMonitor to reduce insider threats and credential theft.

ProbeWatch

Checked 2h agoDead linkPro

ProbeWatch deploys lightweight agents on endpoints that hunt for behavioral anomalies and attack indicators without slowing performance. The platform uses machine learning to profile normal execution patterns for each application. Suspicious behavior generates alerts with context about which files were accessed or which users were created. Teams can hunt across all endpoints using the unified query interface. Security teams achieve 100x faster threat response with ProbeWatch.

ProcessIntel

Checked 2h agoLink OKPro

ProcessIntel provides deep visibility into process execution, parent-child relationships, and command lines across your infrastructure. The platform uses behavioral baselining to flag unusual process activities and privilege escalation. Custom detection rules let security teams define what process behavior is suspicious in their environment. The tool exports findings to SIEMs and ticketing systems. Threat hunters use ProcessIntel to surface sophisticated attacks hiding in plain sight.