Security Compliance

These solutions can help automate compliance monitoring, risk assessment, and policy enforcement—while still allowing for human oversight and control. Many platforms support a hybrid approach, combining AI-driven efficiencies with expert guidance to align with evolving regulatory requirements and security standards. Key features often include audit management, documentation control, and compliance reporting across multiple frameworks.

39
Total Listings
0
Subcategories
39
Verified
0
Active Deals

Security Compliance Products

39 shown
Cerbos logo
CerbosVerified
Security Compliance
Cerbos is an open-source authorization layer for fine-grained access.
View Profile
Drata logo
DrataVerified
Entity Management
Drata is a compliance automation platform that helps organizations achieve and maintain SOC 2, ISO 27001, HIPAA, GDPR,...
View Profile
Descope logo
DescopeVerified
Customer Identity and Access Management
Descope provides drag-and-drop auth workflows for user management.
View Profile
Fortinet logo
FortinetVerified
Carrier Management
Fortinet provides enterprise-grade cybersecurity solutions including next-generation firewalls (FortiGate), SD-WAN, end...
View Profile
Mosyle logo
MosyleVerified
Patch Management
Mosyle provides a unified Apple device management platform combining MDM, endpoint security, encrypted DNS, app managem...
View Profile
Jamf logo
JamfVerified
Password Management
Jamf is the leading Apple device management platform providing MDM, security, and identity solutions for organizations...
View Profile
Auth0 logo
Auth0Verified
OT Security
Auth0 (by Okta) is an identity platform providing authentication, authorization, and user management APIs for web, mobi...
View Profile
Vault Warden logo
Vault WardenVerified
Password Management
Vaultwarden is a lightweight, open-source Bitwarden-compatible server written in Rust for self-hosted password manageme...
View Profile
Authentik logo
AuthentikVerified
Remote Support Tools
Authentik is an open-source identity provider that supports SAML, OAuth, OIDC, LDAP, and SCIM, providing a self-hosted...
View Profile
Better Auth logo
Better AuthVerified
Email Security Platforms
Better Auth is a framework-agnostic TypeScript authentication library providing email/password, social login, two-facto...
View Profile
Socket logo
SocketVerified
Supply Chain Management
Socket detects malicious open-source dependencies and supply chain risks.
View Profile
Clam logo
ClamVerified
AI Agents & Sidekicks
Clam builds security infrastructure for AI agents ensuring safe behavior.
View Profile
FOSSA logo
FOSSAVerified
Customer Win-Loss Analysis
FOSSA is a software composition analysis platform that automates open-source license compliance, vulnerability scanning...
View Profile
1Password logo
1PasswordVerified
OT Security
1Password is a password manager that stores credentials, secrets, and sensitive data for individuals and teams with zer...
View Profile
SailPoint logo
SailPointVerified
Peer Review and 360 Feedback
SailPoint is an identity governance and administration platform that provides automated access management, compliance,...
View Profile
GitGuardian logo
GitGuardianVerified
CI/CD
GitGuardian is a code security platform that detects secrets and sensitive data in source code, preventing credential l...
View Profile
Hexnode logo
HexnodeVerified
Optical Retail POS
Hexnode is a unified endpoint management platform that provides device management, app management, and security for mul...
View Profile
Lacework logo
LaceworkVerified
Cybersecurity
Lacework is a cloud-native security platform using AI-driven threat detection to protect cloud workloads, containers, a...
View Profile
Laika logo
LaikaVerified
Workflow Automation
Laika provides compliance automation for SOC 2, ISO 27001, and GDPR with AI.
View Profile
Doppler SecretOps logo
Doppler SecretOpsVerified
API Security Platforms
Doppler SecretOps provides centralized secret management, rotation, and sync across applications, environments, and inf...
View Profile
Bitwarden logo
BitwardenVerified
Mobile Device Management
Bitwarden is an open-source password management solution for individuals, teams, and enterprises providing encrypted cr...
View Profile
CyberArk logo
CyberArkVerified
Entity Management
CyberArk is the leader in privileged access management and identity security, protecting the most critical enterprise c...
View Profile
Tines logo
TinesVerified
Workflow Automation
Tines is a no-code security automation platform that enables security teams to build workflows and automate repetitive...
View Profile
Fleet logo
FleetVerified
Version Control Hosting
Fleet is an open-source device management platform built on osquery that provides real-time visibility, vulnerability m...
View Profile
HashiCorp Vault logo
HashiCorp VaultVerified
Entity Management
HashiCorp Vault is a secrets management and data protection platform that provides centralized secret storage, encrypti...
View Profile
Agentic Fabriq logo
Agentic FabriqVerified
OT Security
Agentic Fabriq builds identity and authorization for AI agents in enterprises.
View Profile
Okta logo
OktaVerified
Employee Directory
Okta is a cloud identity and access management platform providing single sign-on, multi-factor authentication, lifecycl...
View Profile
Arcjet logo
ArcjetVerified
OT Security
Arcjet provides security as code for developers with bot detection, rate limiting, email validation, and attack protect...
View Profile
Orca Security logo
Orca SecurityVerified
Kubernetes Security
Orca Security provides agentless cloud security platform covering workloads, configurations, identities, and data acros...
View Profile
OneSpan logo
OneSpanVerified
AI Customer Onboarding
OneSpan provides digital agreements, identity verification, and fraud prevention solutions that secure high-value trans...
View Profile
Kandji logo
KandjiVerified
Expert Witness Management
Kandji is an Apple device management and security platform that combines MDM with automated compliance enforcement and...
View Profile
Oneleet logo
OneleetVerified
Workflow Automation
Oneleet is a compliance automation platform focused on SOC 2 that combines automated evidence collection, policy genera...
View Profile
StrongDM logo
StrongDMVerified
Database Tools
StrongDM provides infrastructure access management for databases, servers, Kubernetes, and cloud services with audit lo...
View Profile
Thoropass logo
ThoropassVerified
Innovation Management
Thoropass (formerly Laika) is a compliance and audit management platform that streamlines SOC 2, ISO 27001, HIPAA, and...
View Profile
Ory logo
OryVerified
API Gateway Platforms
Ory provides open-source identity infrastructure including authentication (Kratos), authorization (Keto), OAuth2 (Hydra...
View Profile
Mondoo logo
MondooVerified
Cybersecurity
Mondoo is a security and compliance platform that continuously assesses infrastructure, workloads, and SaaS application...
View Profile
FusionAuth logo
FusionAuthVerified
Entity Management
FusionAuth is a customer identity and access management platform providing authentication, authorization, and user mana...
View Profile
HashiCorp Boundary logo
HashiCorp BoundaryVerified
Entity Management
HashiCorp Boundary provides identity-based access management for dynamic infrastructure, enabling secure remote access...
View Profile
Cascade Security logo
Cascade SecurityVerified
Compliance Monitoring
Cascade provides security monitoring and control for AI agents.
View Profile
Explore deeper. Search and filter across all products in the discovery workbench.Open Workbench