AI Tools

Search and filter curated AI tools. Find the right tool for your task.

RegistryGuard

Checked 2h agoLink OKPro

RegistryGuard monitors Windows Registry modifications to detect malware persistence mechanisms and system configuration changes. The tool flags suspicious registry keys commonly used by ransomware and trojans. Policy enforcement prevents unauthorized registry modifications without administrator approval. Forensic investigators use registry event logs to confirm malware presence. Windows security teams rely on RegistryGuard for comprehensive endpoint protection.

RemoteExecution

Checked 2h agoDead linkEnterprise

RemoteExecution provides secure remote access to compromised endpoints for immediate investigation and containment. Analysts execute commands remotely, gather files, and run scripts without physical access. All remote actions are audited with timestamps and operator identification. The platform supports browser-based shell access for easy integration. Incident responders use RemoteExecution to accelerate triage and containment.

SecurityConfig

Checked 2h agoDead linkPro

SecurityConfig enforces baseline security configurations across Windows, macOS, and Linux endpoints. The platform deploys hardening scripts based on CIS Benchmarks and DISA guidelines. Compliance scanning validates that configurations have not drifted from baseline. Automated remediation re-applies hardening policies when detected. System administrators use SecurityConfig to maintain consistent security posture.

SecurityEvents

Checked 2h agoDead linkPro

SecurityEvents aggregates security-relevant audit logs from all endpoints into a centralized platform for investigation. The system collects Windows Event Logs, syslog, and native EDR events in one searchable database. Retention policies automatically archive old data while maintaining fast search performance. Compliance reports prove logging and monitoring for audits. SOCs use SecurityEvents to correlate endpoint events with network and cloud logs.

SentinelGuard

Checked 2h agoLink OKEnterprise

SentinelGuard is an EDR platform that monitors endpoint behavior in real time to detect compromise and ransomware attacks. The agent collects process telemetry, network connections, and file system events from every machine. Analysts use timeline investigation to reconstruct attacker activity and lateral movement paths. The platform supports automated response like process termination and network isolation. Thousands of enterprise customers rely on SentinelGuard to defend against advanced threats.

SupplyChainGuard

Checked 2h agoDead linkPro

SupplyChainGuard monitors endpoint software and dependencies for vulnerabilities and vulnerable versions. The platform tracks software provenance and licensing for software compliance audits. Alerts notify teams when installed software has published security advisories. Integration with SBOM tools provides comprehensive software inventory. Organizations use SupplyChainGuard to reduce supply chain compromise risks.

SystemTracer

Checked 2h agoDead linkPro

SystemTracer maintains detailed audit logs of every system call and user action on monitored endpoints. The platform uses syscall-level tracing to reveal evasion techniques and rootkit activity. Forensic investigators use the tamper-proof logs to reconstruct attacks for legal proceedings. Integration with SIEMs forwards events in real time for correlation. Regulated industries rely on SystemTracer to prove endpoint integrity to auditors.

TamperDetect

Checked 2h agoDead linkEnterprise

TamperDetect alerts security teams when EDR agents themselves are uninstalled or disabled on monitored endpoints. The platform uses cryptographic validation to ensure agents have not been modified or disabled. If tampering is detected, the system immediately escalates to security and can trigger containment responses. Backup communication channels ensure alerts reach SOCs even if primary comms are blocked. Enterprise customers rely on TamperDetect to prevent attackers from disabling protections.

UsbGuard

Checked 2h agoDead linkPro

UsbGuard enforces device control policies to block unauthorized USB access and data exfiltration. The platform allows approved USB devices while blocking removable media without administrator approval. Policy exceptions support business needs like external storage for authorized users. Audit logs track all USB access for forensics and compliance. Organizations use UsbGuard to prevent data theft via external devices.

VulnAssess

Checked 2h agoDead linkPro

VulnAssess scans endpoints for missing patches, weak configurations, and vulnerable software installations. The platform integrates vulnerability feeds to identify exploitable weaknesses on each system. Reporting shows patch priority based on actual vulnerable applications running on each endpoint. Integration with patch management systems automates remediation workflows. IT teams use VulnAssess to maintain secure endpoint configurations.

AlertMute

Checked 2h agoDead linkPro

AlertMute intelligently suppresses low-value alerts and groups related alerts to reduce alert fatigue in busy SOCs. Analysts define suppression rules based on time windows, source patterns, and known approved activities. Machine learning suggests grouping rules by analyzing false positive patterns. The system maintains a confidence score for each suppression decision. Alert fatigue drops 40 to 60 percent, letting analysts focus on genuine threats.

AssetMap

Checked 2h agoDead linkPro

AssetMap maintains an always-current inventory of devices, applications, and cloud resources across your infrastructure. The platform auto-discovers new assets and tracks lifecycle changes using agentless scanning. Teams tag and group assets to align with business units and applications. Security policies are automatically applied based on asset properties. Vulnerability and compliance tools use AssetMap data to target scans and prioritize remediation.

AuditTrace

Checked 2h agoDead linkPro

AuditTrace captures comprehensive audit logs from operating systems, applications, and cloud services into a tamper-proof store. The platform uses cryptographic hashing to prove log integrity for legal proceedings. Analysts query logs using natural language to reconstruct user actions and system changes. Retention policies automatically enforce regulatory requirements for your industry. Compliance teams rely on AuditTrace to prove system accountability during audits.

BreachResponse

Checked 2h agoDead linkEnterprise

BreachResponse provides incident response orchestration with templates for common attack scenarios, from ransomware to data theft. Teams execute responses step by step with built-in communication plans for executives and customers. The platform tracks remediation timelines and validates containment actions. Post-incident templates accelerate the review process and document lessons learned. Organizations use BreachResponse to ensure coordinated, compliant responses to major security incidents.

CodeGuard

Checked 2h agoDead linkPro

CodeGuard scans source code and artifacts in CI/CD pipelines for hardcoded secrets, vulnerable dependencies, and suspicious patterns. The tool blocks commits that violate policy without requiring developer context switching. Findings are triaged in a central dashboard and linked to remediation guidance. Teams integrate CodeGuard with GitHub, GitLab, and Bitbucket to catch issues early. Security-conscious development teams prevent credential leaks and vulnerable code from reaching production.

ComplianceCheck

Checked 2h agoLink OKPro

ComplianceCheck automates evidence collection and assessment of your infrastructure against compliance standards like SOC2, CIS, and PCI. The tool queries logs, scans systems, and pulls configuration data to build compliance dashboards. Automated reports show which controls are passing, failing, or at risk. Teams remediate findings and the system tracks proof of remediation. Compliance managers use ComplianceCheck to reduce audit preparation time by 70 percent.

CredVault

Checked 2h agoDead linkEnterprise

CredVault is a privileged access management platform that stores secrets with encryption and rotation policies. Every access to credentials is logged and requires approval workflows. The tool integrates with identity systems to provision temporary credentials that expire. Teams use CredVault to eliminate hardcoded secrets from code and configuration files. The system supports credential rotation for databases, APIs, and cloud service accounts.

DefenseFlow

Checked 2h agoDead linkPro

DefenseFlow is a behavioral analytics engine that learns normal activity baselines to detect anomalies without signature databases. The system profiles user and entity behavior across your infrastructure and flags deviations. Machine learning models adapt to organizational changes, reducing false positives over time. Integration with major SIEMs and endpoint tools makes deployment straightforward. SOC teams rely on DefenseFlow to catch zero-day and insider threats that signature tools miss.

EventFusion

Checked 2h agoDead linkEnterprise

EventFusion correlates security events from disparate systems into cohesive attack narratives using entity and timeline analysis. The system reconstructs attacker movement by linking logins, file access, and lateral movement. Advanced correlation detects multi-stage attacks that individual tools would miss. Analysts export timelines with evidence for legal and regulatory audiences. SOC teams use EventFusion to shift from alert triage to attack-centric investigations.

ForensicDepth

Checked 2h agoDead linkEnterprise

ForensicDepth performs deep memory and file system analysis on endpoints to uncover advanced attacks, rootkits, and data exfiltration. The tool can be deployed post-incident or continuously for threat hunting. Investigators use a visual timeline to correlate process execution, file access, and network events. The platform stores analyzed artifacts for later case review and legal discovery. Security teams trust ForensicDepth when they need evidence that will hold up in audits.