Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
Crypto Wallets
Crypto wallets enable users to store, send, and receive cryptocurrencies securely. These wallets are essential for interacting with blockchain networks and typically come in two main types: hot wallets (connected to the internet) and cold wallets (offline storage). Crypto wallets use private and public keys to facilitate transactions, ensuring that the funds are securely transferred and accessed. While hot wallets are more convenient for frequent transactions, cold wallets are preferred for long-term storage due to their enhanced security features. Some crypto wallets also offer additional functionalities, such as staking, managing NFTs, and supporting multiple cryptocurrencies.
Crypto Tools
Crypto tools are software solutions designed to assist users in managing, trading, analyzing, and securing cryptocurrencies. These tools can include cryptocurrency wallets, exchange platforms, mining software, price tracking applications, and portfolio management tools. They help individuals and businesses with tasks such as buying, selling, tracking market trends, managing digital assets, and ensuring security. Crypto tools are essential for both beginners and experienced users who wish to engage with the rapidly evolving cryptocurrency space in a safe and efficient manner.
  • 1
    ELLIPAL

    ELLIPAL

    ELLIPAL

    Completely connection free, absolute protection against all remote attacks. Hardware and software specifically designed to protect your keys from physical attacks. Users can verify all transactions and import their own keys and recovery phrases. ELLIPAL App works individually as a hot wallet. Pair with ELLIPAL Titan Cold Wallet for maximum security. Store multiple coins under one account. Open numerous accounts for different purposes, all in one ELLIPAL.
  • 2
    AdaLite

    AdaLite

    AdaLite

    ...If you lose your mnemonic, we cannot help you to restore the access to your funds. The mnemonic is handled in your browser and never leaves your computer. However, if a virus or a hacker compromises your computer, the attacker can steal the mnemonic you entered on the AdaLite website and access your funds. AdaLite allows you to access your funds using a hardware wallet. It currently supports Trezor model T, Ledger Nano X and Ledger Nano S. This enables you to interact with AdaLite in the safest manner possible without giving away your mnemonic. An attacker can’t steal your mnemonic or private key since they don’t leave Ledger. ...
  • 3
    Cosmostation

    Cosmostation

    Cosmostation

    ...The metrics and charts displayed on Defistation allows you to gain insight into the growing trends and movements in decentralized finance. Impenetrable structure to prevent various attacks on our validator node. 24/7 monitoring of malicious traffic coming in and out of our nodes. Private network connected with other trusted partners. Currently reviewing implementing HSM, a physical computing device that safeguards digital keys for strong authentication. With HSM, validator private key is stored physically and is never programmatically exposed.
  • 4
    OneKey

    OneKey

    OneKey

    ...After careful security considerations, we use industry-leading encryption algorithms to ensure that each user's assets can be properly encrypted and kept locally. Hardware wallets can upgrade your asset security to a new level, physically isolate hackers, Trojan horses, and virus software attacks. All transfer operations must be reviewed by the hardware wallet, so you don’t have to worry about the loss or theft of your mobile phone. We choose to grow with users, not capital. Suggestions to us through various channels will be heard. Restricted by human hands, not all needs can be met, but we will try our best to give the best solution at the moment.
  • 5
    NGRAVE

    NGRAVE

    NGRAVE

    ...Communication between the ZERO and the app occurs through QR-codes. This way, the app never has access to the secret keys on the ZERO. Hence, the secret keys are never exposed to any online attack vector. Not even when signing transactions. Create a computationally unique, unbreakable, & unpredictable secret key with a strong True Random Number Generation (TRNG) process. NGRAVE takes into account & radically improves every single step of the user journey. The coldest wallet generation & management.
  • 6
    MyCrypto

    MyCrypto

    MyCrypto

    ...Check your transaction recipient against 50M+ labeled Ethereum accounts to be sure you're sending to the right place. Get your information out of other people's hands and back into yours. Protect yourself from phishing attacks and malicious extensions. Open-source and fully verifiable. MyCrypto is an open-source tool that allows you to manage your Ethereum accounts privately and securely. Developed by and for the community since 2015, we’re focused on building awesome products that put the power in people’s hands.
  • 7
    Status

    Status

    Status

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties. Keep your private messages private with Status. Browse the growing ecosystem of DApps including marketplaces, exchanges, games and social networks. Latest security standards ensure a private browsing experience. ...
  • 8
    Decred

    Decred

    Decred

    Decred employs an innovative hybrid proof-of-work/proof-of-stake system that layers security and carefully aligns incentives. This system yields the best of both worlds, making it an order of magnitude more expensive to attack than pure proof-of-work or pure proof-of-stake. Decred’s built-in governance systems empower its community with formal rights to make consensus changes and manage project-level decisions. These systems make Decred adaptable, allowing it to evolve per the will of the stakeholders, resist forks and incorporate new technology over the long run. ...
  • 9
    Komodo Wallet
    Many DEXs in the blockchain space today aren’t genuinely non-custodial since user funds placed in liquidity pools are constantly exposed to impermanent loss, rugpulls, and vampire attacks. Komodo Wallet (formerly AtomicDEX), in contrast, avoids these issues by using decentralized P2P order books. Komodo Wallet doesn’t limit trading to a single blockchain protocol. Komodo Wallet offers the widest cross-protocol support in the entire blockchain space. It’s easy to trade BTC, ETH, all ERC-20 tokens, KMD, and hundreds of other digital assets natively from dozens of blockchains — no proxy tokens required. ...
  • 10
    Ledger Stax
    ...Simply get another Ledger Stax or any other Ledger and recover access to your accounts using the Secret Recovery phrase. Software wallets store private keys on systems or devices that are connected to the internet, making them susceptible to all kinds of attacks. Holding your crypto on an exchange means entrusting the private keys to a third party and not having any control over your funds. Ledger Stax stores your private keys offline on a Secure Element chip, and provides full isolation between the keys and your computer/smartphone to give you complete control over your assets.
  • 11
    BitVault

    BitVault

    BitVault

    ...Unlike traditional wallets, it employs multisig technology combined with time-delayed transactions, giving users hours or even days to cancel unauthorized transfers. This innovative setup ensures that even if an attacker gains access to your device or keys, they cannot instantly move your funds. BitVault also integrates seamlessly with major hardware wallets like Keystone, Jade, and Passport, while offering future support for additional devices. With options to self-host the convenience service on Umbrel and full open-source transparency, users maintain complete control over their assets. ...
    Starting Price: $199
  • 12
    DeFiChain

    DeFiChain

    DeFiChain

    ...From trust-based to trust-less, decentralized finance overcomes what Fintech could not solve in traditional finance. Wide range of crypto-economic financial operations. Unparalleled high transaction throughput for all transactions. Turing-incomplete for reduced attack vectors. Rapidly create a variety of DeFi apps on one chain. Reliable decentralized governance, on and off-chain. Immutable by anchoring to the Bitcoin blockchain. Designed and engineered for decentralized finance dApps. Swap and arbitrage on the DEX, mine liquidity for up to 100x high yields, and more, with the DeFiChain wallet app. ...
  • 13
    Ledger Live
    ...Like getting interest payments from a traditional bank. Ledger Live’s backed up by the most trusted hardware wallet available. Our wallets are independently certified and designed to resist sophisticated cyber attacks. So you’re in full control. Safely send and receive over 1,800 coins and tokens straight from your smartphone or computer using Ledger Live. Manage even more using external wallets. Grow your crypto at home and on the go with our Android, iOS and desktop apps.
  • 14
    Ledger Nano S Plus
    ...Hardware wallets keep your coins offline and protected. Ledger Live’s backed up by the most trusted hardware wallet available. Our wallets are independently certified and designed to resist sophisticated cyber attacks.
    Starting Price: $79 one-time payment
  • 15
    CYBAVO

    CYBAVO

    CYBAVO

    ...Through our expertise in cybersecurity and decentralized technology, we empower blockchain companies with enterprise­-ready cryptocurrency wallet management services, secured with the best technology available. Our robust cryptographic scheme protects your private keys and minimizes the risk of key loss by implementing a shared responsibility model. Any attacker would need to compromise at least three different entities in order to theoretically gain access to your keys. Security is the core foundation of our solution. Our platform is secure on every front, from the operating system and programming language level, all the way up to strong enforcement of our transaction policy.
  • 16
    SecuX

    SecuX

    SecuX

    ...From concept to product, the SecuX team of experts inspects safety and security features at all levels to deliver the highest-quality hardware wallet. Software and online exchange wallets are frequent targets for cyber-attacks. SecuX hardware wallets keep your data offline and keep you off the radar.
    Starting Price: $199 one-time payment
  • 17
    Fireblocks

    Fireblocks

    Fireblocks

    ...With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. ...
  • Previous
  • You're on page 1
  • Next