Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
Cryptocurrency Exchanges
Cryptocurrency exchanges are online platforms that facilitate the buying, selling, and trading of digital assets like Bitcoin, Ethereum, and other cryptocurrencies. They provide users with tools to exchange cryptocurrencies for fiat money or other digital currencies, acting as intermediaries in transactions. These exchanges often include features like price tracking, market analysis, wallet integration, and secure storage. Depending on the type, exchanges can be centralized, with a managing authority, or decentralized, offering peer-to-peer trading. They play a crucial role in the cryptocurrency ecosystem by providing liquidity and access to global markets for users of all levels.
Crypto Tools
Crypto tools are software solutions designed to assist users in managing, trading, analyzing, and securing cryptocurrencies. These tools can include cryptocurrency wallets, exchange platforms, mining software, price tracking applications, and portfolio management tools. They help individuals and businesses with tasks such as buying, selling, tracking market trends, managing digital assets, and ensuring security. Crypto tools are essential for both beginners and experienced users who wish to engage with the rapidly evolving cryptocurrency space in a safe and efficient manner.

16 Products for "attack" with 2 filters applied:

  • 1
    OceanEx

    OceanEx

    OceanEx

    ...Bank-level SSL security technology with advanced machine learning algorithms to actively detect attacks and safeguard your assets and transactions. Providing an actively protected and ultra-liquid cryptocurrency trading market,full-fledged quantitative trading capabilities, and a rich set investment tools and products.
  • 2
    GOPAX

    GOPAX

    Streami Inc.

    ...All devices connected to the Internet are inherently vulnerable. Thus, GOPAX stores the majority of the cryptocurrency deposits in an offline wallet for safe protection against various online attacks. The access to this wallet is compartmentalized and encrypted through our multi-layered security system, where only a select few personnel may gain access. No security system should be in the hands of a single person. The access to our asset management system is protected by requiring the multiple approvals. GOPAX separates the resources for deposit/withdrawal processing and for asset management. ...
  • 3
    Korbit Exchange
    ...Korbit's mission is to enable trading of any blockchain assets. We are continuously listing new coins. Korbit has security measures in place to protect against hacking attacks. Your asset is safely stored and secured in an offline cold wallet. Korbit has a unique experience and value as the first Bitcoin exchange in Korea. Korbit provides the best security system and a stable server based on the know-how accumulated over the years. Customer enquiries must be dealt with timely and effectively. Korbit boasts a 90% service level and quickly response time for email enquiries.
  • 4
    Bitcoiva

    Bitcoiva

    Bitcoiva Exchange

    Completely Configured as combating against the malicious attacks, your crypto - assets are stored securely with the user-friendly interface, wallet and its infrastructure is highly protected. Users can instantly deposit or withdraw the INR, it takes just a fraction of a second. Bitcoiva offers the best payment options to the traders by means of accepting payments through BHIM, Phonepe, etc. The spot exchange is termed as spot trading, where the traders can immediately buy/sell their cryptocurrencies. ...
  • 5
    Tuned

    Tuned

    Tuned

    One of the main rules to success in trading is the ability to trust the data and the plan, mainly during periods of loss. While it is possible to make money in the market without a plan of attack, the most viable plans are those with a set goal. Emotions are the number one reason people consistently lose money in the markets. It is estimated that 70 to 80 percent of trading in the stock market is done via automated trading. Take your gut out of the equation and trust in the strategies that you can build and hone with Tuned. ...
  • 6
    Alterdice

    Alterdice

    Alterdice

    Alterdice is the easiest place to buy, sell and trade digital currencies, including Bitcoin, Ethereum, XRP, BNB, Zcash and many more. 98% of customer funds are stored offline. We use auto DDoS attack protection, create daily BackUps and enable 2FA for all users. Whether you're an experienced trader or just getting started, Alterdice offers an advanced charting functionality allowing traders to visualise orders, positions and price alerts. Trading fees are determined based on trading activity and don't exceed 0.2%. Free deposit and minimal withdrawal fees for all assets. ...
  • 7
    Paritex

    Paritex

    Paritex

    ...We keep full reserves so that you can always withdrawal immediately on demand. We conduct regular security audits of our stock exchange together with partners experienced in the field of cryptocurrencies. Thanks to this, we actively prevent attacks on our infrastructure. All sensitive account information is encrypted at rest at both the system and data level. Access is strictly controlled and monitored. We constantly monitor all operations on the stock market in search of unusual situations to detect and block attempts to take over user accounts.
  • 8
    Resfinex

    Resfinex

    Resfinex

    ...Two-Factor Authentication is highly recommended for every every user and each account has the option to enable it for actions such as withdrawals. Our DDoS mitigation techniques immediately resist any malicious attacks on our website that may threaten service performance. Multiple signatories are required to transfer funds out of cold storage, which is secured by ledger vault technology.
    Starting Price: 0.15% trading fee
  • 9
    Babylon

    Babylon

    Babylon

    ...Powered by the fast unbinding and scalable restaking features of the protocol, stakers can also enjoy maximal liquidity and yields. Say goodbye to the risk of bridging, wrapping, or pegging your crypto. Complete security against PoS attacks. The perfect plug-in for every PoS chain. Babylon project designs security protocols that scale Bitcoin to secure the decentralized world. To this end, Babylon utilizes the three primary facets of Bitcoin; the asset, the PoW-secured timestamping server, and the most censorship-resistant blockspace in the world. Through inventing pioneering protocols, Babylon envisions a more secure and Bitcoin-centric decentralized world.
  • 10
    F2Pool

    F2Pool

    F2Pool

    ...Supporting mining for more than 40 digital currencies, and the world’s largest mining pool for BTC, LTC, ETH and ZEC. World leading technology, transparent revenue and unique architecture to effectively prevent DDoS attacks. View comprehensive information for the 40+ cryptocurrencies supported, and revenue comparison for popular mining hardware.Download the IOS and Android app. Monitor your hashrate and revenue, as well as key data including network hashrate and difficulty. Manage your mining machines, view their hashrate and status, and group or delete workers for easy management. ...
  • 11
    API3

    API3

    API3

    ...API3 data feeds are governed by an open DAO of stakeholders, industry experts and project partners. This allows dAPIs to be operated with maximal transparency, minimal required trust in centralized operators, and no centralized attack surfaces. API token holders can take a direct part in governing the project by staking API3 tokens into the API3 insurance staking contract, which grants them shares in the API3 DAO.
  • 12
    Status

    Status

    Status

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties. Keep your private messages private with Status. Browse the growing ecosystem of DApps including marketplaces, exchanges, games and social networks. Latest security standards ensure a private browsing experience. ...
  • 13
    nft.storage

    nft.storage

    nft.storage

    ...Just upload your data and you'll receive an IPFS hash of the content (a CID) that can be used in on-chain NFT data as a pointer to the content. Filecoin provides long-term storage for the data ensuring that even if nft.storage is attacked or taken down the NFT data persists! Optionally, you can provide additional redundancy by running your own IPFS node and pinning the CIDs of content uploaded to NFT.Storage. Alternately, you can use an additional pinning service for redundancy (NFT.Storage already does this when it backs things up to Pinata). Doing this is not necessary, but might be of interest for users looking to be in full control of their data and its availability.
  • 14
    Komodo Wallet
    Many DEXs in the blockchain space today aren’t genuinely non-custodial since user funds placed in liquidity pools are constantly exposed to impermanent loss, rugpulls, and vampire attacks. Komodo Wallet (formerly AtomicDEX), in contrast, avoids these issues by using decentralized P2P order books. Komodo Wallet doesn’t limit trading to a single blockchain protocol. Komodo Wallet offers the widest cross-protocol support in the entire blockchain space. It’s easy to trade BTC, ETH, all ERC-20 tokens, KMD, and hundreds of other digital assets natively from dozens of blockchains — no proxy tokens required. ...
  • 15
    CYBAVO

    CYBAVO

    CYBAVO

    ...Through our expertise in cybersecurity and decentralized technology, we empower blockchain companies with enterprise­-ready cryptocurrency wallet management services, secured with the best technology available. Our robust cryptographic scheme protects your private keys and minimizes the risk of key loss by implementing a shared responsibility model. Any attacker would need to compromise at least three different entities in order to theoretically gain access to your keys. Security is the core foundation of our solution. Our platform is secure on every front, from the operating system and programming language level, all the way up to strong enforcement of our transaction policy.
  • 16
    Fireblocks

    Fireblocks

    Fireblocks

    ...With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. ...
  • Previous
  • You're on page 1
  • Next