Shielded VM
A security feature in Google Cloud that protects virtual machines against rootkits, bootkits, and other malicious activities targeting the boot process and kernel integrity.
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
A security feature in Google Cloud that protects virtual machines against rootkits, bootkits, and other malicious activities targeting the boot process and kernel integrity.
A service for managing and maintaining cloud security posture across multiple AWS accounts and services.
A PHP/MySQL web application designed for security professionals to practice and enhance their skills by exploiting common web vulnerabilities.
A solution for securing cloud-native applications across their lifecycle, integrating CSPM and CWPP capabilities.
A solution for securing serverless architectures, focusing on application security and data protection.
A cloud security assessment tool that automates governance and enhances visibility across multi-cloud environments.
A serverless security tool that integrates with cloud providers to monitor and protect serverless functions, focusing on behavioral protection, code security, and client-side security permissions.
A SaaS security posture management platform that provides visibility and control over SaaS environments to prevent data breaches and manage security risks.
Kong Gateway is a cloud-native API gateway designed to manage and secure API traffic in hybrid and multi-cloud environments, particularly for microservices and distributed architectures.
Cloudflare provides security solutions for web applications, APIs, and infrastructure, protecting against various threats including DDoS attacks and data breaches.
A framework for understanding and mitigating API vulnerabilities, focusing on the most critical API security risks.
A cloud-based Web Application Firewall (WAF) that protects web applications from network and application-layer threats.