
Shielded VM
A security feature in Google Cloud that protects virtual machines against rootkits, bootkits, and other malicious activities targeting the boot process and kernel integrity.
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
A security feature in Google Cloud that protects virtual machines against rootkits, bootkits, and other malicious activities targeting the boot process and kernel integrity.
A solution for securing cloud-native applications across their lifecycle, integrating CSPM and CWPP capabilities.
A PHP/MySQL web application designed for security professionals to practice and enhance their skills by exploiting common web vulnerabilities.
A cloud security assessment tool that automates governance and enhances visibility across multi-cloud environments.
A solution for securing serverless architectures, focusing on application security and data protection.
A SaaS security posture management platform that provides visibility and control over SaaS environments to prevent data breaches and manage security risks.
A serverless security tool that integrates with cloud providers to monitor and protect serverless functions, focusing on behavioral protection, code security, and client-side security permissions.
Cloudflare provides security solutions for web applications, APIs, and infrastructure, protecting against various threats including DDoS attacks and data breaches.
Kong Gateway is a cloud-native API gateway designed to manage and secure API traffic in hybrid and multi-cloud environments, particularly for microservices and distributed architectures.
A cloud-based Web Application Firewall (WAF) that protects web applications from network and application-layer threats.
A framework for understanding and mitigating API vulnerabilities, focusing on the most critical API security risks.
A multi-layered security platform that protects applications and servers from various threats using Azion's Edge Computing capabilities.