Security Compliance
These solutions can help automate compliance monitoring, risk assessment, and policy enforcement—while still allowing for human oversight and control. Many platforms support a hybrid approach, combining AI-driven efficiencies with expert guidance to align with evolving regulatory requirements and security standards. Key features often include audit management, documentation control, and compliance reporting across multiple frameworks.
39
Total Listings
0
Subcategories
39
Verified
0
Active Deals
CerbosVerified
Security Compliance
Cerbos is an open-source authorization layer for fine-grained access.
View ProfileDrataVerified
Entity Management
Drata is a compliance automation platform that helps organizations achieve and maintain SOC 2, ISO 27001, HIPAA, GDPR,...
View ProfileDescopeVerified
Customer Identity and Access Management
Descope provides drag-and-drop auth workflows for user management.
View ProfileFortinetVerified
Carrier Management
Fortinet provides enterprise-grade cybersecurity solutions including next-generation firewalls (FortiGate), SD-WAN, end...
View ProfileMosyleVerified
Patch Management
Mosyle provides a unified Apple device management platform combining MDM, endpoint security, encrypted DNS, app managem...
View ProfileJamfVerified
Password Management
Jamf is the leading Apple device management platform providing MDM, security, and identity solutions for organizations...
View ProfileAuth0Verified
OT Security
Auth0 (by Okta) is an identity platform providing authentication, authorization, and user management APIs for web, mobi...
View ProfileVault WardenVerified
Password Management
Vaultwarden is a lightweight, open-source Bitwarden-compatible server written in Rust for self-hosted password manageme...
View ProfileAuthentikVerified
Remote Support Tools
Authentik is an open-source identity provider that supports SAML, OAuth, OIDC, LDAP, and SCIM, providing a self-hosted...
View ProfileBetter AuthVerified
Email Security Platforms
Better Auth is a framework-agnostic TypeScript authentication library providing email/password, social login, two-facto...
View ProfileSocketVerified
Supply Chain Management
Socket detects malicious open-source dependencies and supply chain risks.
View ProfileClamVerified
AI Agents & Sidekicks
Clam builds security infrastructure for AI agents ensuring safe behavior.
View ProfileFOSSAVerified
Customer Win-Loss Analysis
FOSSA is a software composition analysis platform that automates open-source license compliance, vulnerability scanning...
View Profile1PasswordVerified
OT Security
1Password is a password manager that stores credentials, secrets, and sensitive data for individuals and teams with zer...
View ProfileSailPointVerified
Peer Review and 360 Feedback
SailPoint is an identity governance and administration platform that provides automated access management, compliance,...
View ProfileGitGuardianVerified
CI/CD
GitGuardian is a code security platform that detects secrets and sensitive data in source code, preventing credential l...
View ProfileHexnodeVerified
Optical Retail POS
Hexnode is a unified endpoint management platform that provides device management, app management, and security for mul...
View ProfileLaceworkVerified
Cybersecurity
Lacework is a cloud-native security platform using AI-driven threat detection to protect cloud workloads, containers, a...
View ProfileLaikaVerified
Workflow Automation
Laika provides compliance automation for SOC 2, ISO 27001, and GDPR with AI.
View ProfileDoppler SecretOpsVerified
API Security Platforms
Doppler SecretOps provides centralized secret management, rotation, and sync across applications, environments, and inf...
View ProfileBitwardenVerified
Mobile Device Management
Bitwarden is an open-source password management solution for individuals, teams, and enterprises providing encrypted cr...
View ProfileCyberArkVerified
Entity Management
CyberArk is the leader in privileged access management and identity security, protecting the most critical enterprise c...
View ProfileTinesVerified
Workflow Automation
Tines is a no-code security automation platform that enables security teams to build workflows and automate repetitive...
View ProfileFleetVerified
Version Control Hosting
Fleet is an open-source device management platform built on osquery that provides real-time visibility, vulnerability m...
View ProfileHashiCorp VaultVerified
Entity Management
HashiCorp Vault is a secrets management and data protection platform that provides centralized secret storage, encrypti...
View ProfileAgentic FabriqVerified
OT Security
Agentic Fabriq builds identity and authorization for AI agents in enterprises.
View ProfileOktaVerified
Employee Directory
Okta is a cloud identity and access management platform providing single sign-on, multi-factor authentication, lifecycl...
View ProfileArcjetVerified
OT Security
Arcjet provides security as code for developers with bot detection, rate limiting, email validation, and attack protect...
View ProfileOrca SecurityVerified
Kubernetes Security
Orca Security provides agentless cloud security platform covering workloads, configurations, identities, and data acros...
View ProfileOneSpanVerified
AI Customer Onboarding
OneSpan provides digital agreements, identity verification, and fraud prevention solutions that secure high-value trans...
View ProfileKandjiVerified
Expert Witness Management
Kandji is an Apple device management and security platform that combines MDM with automated compliance enforcement and...
View ProfileOneleetVerified
Workflow Automation
Oneleet is a compliance automation platform focused on SOC 2 that combines automated evidence collection, policy genera...
View ProfileStrongDMVerified
Database Tools
StrongDM provides infrastructure access management for databases, servers, Kubernetes, and cloud services with audit lo...
View ProfileThoropassVerified
Innovation Management
Thoropass (formerly Laika) is a compliance and audit management platform that streamlines SOC 2, ISO 27001, HIPAA, and...
View ProfileOryVerified
API Gateway Platforms
Ory provides open-source identity infrastructure including authentication (Kratos), authorization (Keto), OAuth2 (Hydra...
View ProfileMondooVerified
Cybersecurity
Mondoo is a security and compliance platform that continuously assesses infrastructure, workloads, and SaaS application...
View ProfileFusionAuthVerified
Entity Management
FusionAuth is a customer identity and access management platform providing authentication, authorization, and user mana...
View ProfileHashiCorp BoundaryVerified
Entity Management
HashiCorp Boundary provides identity-based access management for dynamic infrastructure, enabling secure remote access...
View ProfileCascade SecurityVerified
Compliance Monitoring
Cascade provides security monitoring and control for AI agents.
View ProfileExplore deeper. Search and filter across all products in the discovery workbench.Open Workbench