Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
Crypto Tools
Crypto tools are software solutions designed to assist users in managing, trading, analyzing, and securing cryptocurrencies. These tools can include cryptocurrency wallets, exchange platforms, mining software, price tracking applications, and portfolio management tools. They help individuals and businesses with tasks such as buying, selling, tracking market trends, managing digital assets, and ensuring security. Crypto tools are essential for both beginners and experienced users who wish to engage with the rapidly evolving cryptocurrency space in a safe and efficient manner.

48 Products for "attack" with 1 filter applied:

  • 1
    ELLIPAL

    ELLIPAL

    ELLIPAL

    Completely connection free, absolute protection against all remote attacks. Hardware and software specifically designed to protect your keys from physical attacks. Users can verify all transactions and import their own keys and recovery phrases. ELLIPAL App works individually as a hot wallet. Pair with ELLIPAL Titan Cold Wallet for maximum security. Store multiple coins under one account. Open numerous accounts for different purposes, all in one ELLIPAL.
  • 2
    Clipper DEX

    Clipper DEX

    Clipper DEX

    ...The platform's architecture is designed to protect liquidity providers from common DeFi challenges such as frontrunning, Miner Extractable Value (MEV) bots, and sandwich attacks. Clipper's core pool actively arbitrages market prices, converting volatility into higher yields for LPs while safeguarding them from potential attackers. For traders, Clipper offers a user-friendly interface with no explicit fees; instead, the platform takes a small portion of LP gains from each profitable trade.
  • 3
    LendaBit

    LendaBit

    LendaBit.com

    ...Additional layer of security provided by the 2-step verification process. Intrusion detection and prevention tools, system monitoring, multiple levels of protection to make successive attacks highly improbable. System of effective DDoS-attack deflection regardless of its complexity.
  • 4
    ACE Exchange

    ACE Exchange

    ACE Exchange

    ...ACE Exchange has closely partnered with several well-known international law firms, experienced accountants, financial institutions, regulatory and legislative units to meet the strictest risk control standards. Our certified in-house AML specialists will also ensure ACE adheres to the strictest KYC and AML regulations. ACE Exchange has adopted a world-class DDos attack prevention mechanism and artificial intelligence application firewall, effectively defending ACE‘s system from hackers, server attacks, and maximizing the protection of users’ assets. ACE is the first exchange in Taiwan that adopt a “user growth system”. Users will be able to earn ACE points through a variety of interactions with ACE and therefore receive exclusive discounts and prizes.
  • 5
    OceanEx

    OceanEx

    OceanEx

    ...Bank-level SSL security technology with advanced machine learning algorithms to actively detect attacks and safeguard your assets and transactions. Providing an actively protected and ultra-liquid cryptocurrency trading market,full-fledged quantitative trading capabilities, and a rich set investment tools and products.
  • 6
    AdaLite

    AdaLite

    AdaLite

    ...If you lose your mnemonic, we cannot help you to restore the access to your funds. The mnemonic is handled in your browser and never leaves your computer. However, if a virus or a hacker compromises your computer, the attacker can steal the mnemonic you entered on the AdaLite website and access your funds. AdaLite allows you to access your funds using a hardware wallet. It currently supports Trezor model T, Ledger Nano X and Ledger Nano S. This enables you to interact with AdaLite in the safest manner possible without giving away your mnemonic. An attacker can’t steal your mnemonic or private key since they don’t leave Ledger. ...
  • 7
    Axie Infinity

    Axie Infinity

    Axie Infinity

    ...With billions of possible genetic combinations, the possibilities are truly infinite! Become a land baron and start your own Kingdom! Use land to farm rare resources, tokens, and attack dungeons!
  • 8
    GorillaPool

    GorillaPool

    GorillaPool

    GorillaPool is a BSV exclusive mining pool. For our hashing partners, we support the rule of “1 CPU, 1 Vote,” so that every ape can play a part in enforcing the bitcoin protocol against malicious attack. That means we accept your hash power, and we give a voice to every ape; big or small. Let’s have fun while lowering transaction fees and exploring uncharted corners of the bitcoin stack. If you want to grab bananas from the blocks, join us.
  • 9
    Mooniswap

    Mooniswap

    Mooniswap

    Mooniswap is a cutting-edge automated market maker (AMM), which redistributes earnings to liquidity pools, capitalizes on user slippages and protects traders from front-running attacks. Mooniswap is the next generation of an automated market maker with virtual balances — enabling liquidity providers to capture profits otherwise captured by arbitrageurs. The idea is fully realized in the Mooniswap design. The new AMM is capable of keeping most of the slippage revenue in the pool by maintaining virtual balances for different swap directions.
  • 10
    Etherisc

    Etherisc

    Etherisc

    ...Instant payouts are triggered by wind speed registered by weather-stations within 30 mile radius from insured’s permanent location. Protection against risk of theft and attacks of hackers on wallet smart contracts. Affordable, accessible protection against risk of death or heavy illness of a community member. Immediate emergency payment which helps to get through critical times.
  • 11
    Router Protocol

    Router Protocol

    Router Protocol

    ...Smart order routing accross various DEXes on different blockchains. Router allows seamless communication and transfers across different blockchains. Supporting developers who identifies potential attack vectors on various Router products. Funding researchers and developers who can help in optimizing our existing protocol. If you or your company want to partner with Router Protocol.
  • 12
    GOPAX

    GOPAX

    Streami Inc.

    ...All devices connected to the Internet are inherently vulnerable. Thus, GOPAX stores the majority of the cryptocurrency deposits in an offline wallet for safe protection against various online attacks. The access to this wallet is compartmentalized and encrypted through our multi-layered security system, where only a select few personnel may gain access. No security system should be in the hands of a single person. The access to our asset management system is protected by requiring the multiple approvals. GOPAX separates the resources for deposit/withdrawal processing and for asset management. ...
  • 13
    Korbit Exchange
    ...Korbit's mission is to enable trading of any blockchain assets. We are continuously listing new coins. Korbit has security measures in place to protect against hacking attacks. Your asset is safely stored and secured in an offline cold wallet. Korbit has a unique experience and value as the first Bitcoin exchange in Korea. Korbit provides the best security system and a stable server based on the know-how accumulated over the years. Customer enquiries must be dealt with timely and effectively. Korbit boasts a 90% service level and quickly response time for email enquiries.
  • 14
    LATOKEN

    LATOKEN

    LATOKEN

    ...All data from website is transmitted using encrypted Transport Layer Security (TLS) connections (i.e., HTTPS). Advanced distributed system architecture built to protect against DDoS to ensure that trading cannot be halted by outside attacks. Two-Factor Authentication (2FA) is required for actions such as withdrawals or changes in account settings.
    Starting Price: 0.02% Fee
  • 15
    Bitcoiva

    Bitcoiva

    Bitcoiva Exchange

    Completely Configured as combating against the malicious attacks, your crypto - assets are stored securely with the user-friendly interface, wallet and its infrastructure is highly protected. Users can instantly deposit or withdraw the INR, it takes just a fraction of a second. Bitcoiva offers the best payment options to the traders by means of accepting payments through BHIM, Phonepe, etc. The spot exchange is termed as spot trading, where the traders can immediately buy/sell their cryptocurrencies. ...
  • 16
    Tuned

    Tuned

    Tuned

    One of the main rules to success in trading is the ability to trust the data and the plan, mainly during periods of loss. While it is possible to make money in the market without a plan of attack, the most viable plans are those with a set goal. Emotions are the number one reason people consistently lose money in the markets. It is estimated that 70 to 80 percent of trading in the stock market is done via automated trading. Take your gut out of the equation and trust in the strategies that you can build and hone with Tuned. ...
  • 17
    Alterdice

    Alterdice

    Alterdice

    Alterdice is the easiest place to buy, sell and trade digital currencies, including Bitcoin, Ethereum, XRP, BNB, Zcash and many more. 98% of customer funds are stored offline. We use auto DDoS attack protection, create daily BackUps and enable 2FA for all users. Whether you're an experienced trader or just getting started, Alterdice offers an advanced charting functionality allowing traders to visualise orders, positions and price alerts. Trading fees are determined based on trading activity and don't exceed 0.2%. Free deposit and minimal withdrawal fees for all assets. ...
  • 18
    Paritex

    Paritex

    Paritex

    ...We keep full reserves so that you can always withdrawal immediately on demand. We conduct regular security audits of our stock exchange together with partners experienced in the field of cryptocurrencies. Thanks to this, we actively prevent attacks on our infrastructure. All sensitive account information is encrypted at rest at both the system and data level. Access is strictly controlled and monitored. We constantly monitor all operations on the stock market in search of unusual situations to detect and block attempts to take over user accounts.
  • 19
    Resfinex

    Resfinex

    Resfinex

    ...Two-Factor Authentication is highly recommended for every every user and each account has the option to enable it for actions such as withdrawals. Our DDoS mitigation techniques immediately resist any malicious attacks on our website that may threaten service performance. Multiple signatories are required to transfer funds out of cold storage, which is secured by ledger vault technology.
    Starting Price: 0.15% trading fee
  • 20
    BlockTrades

    BlockTrades

    BlockTrades

    ...Instead, you simply send in the desired amount of cryptocurrency you wish to spend, and we transfer to your wallet an equivalent amount of the cryptocurrency you are buying. This protects you from possible losses that can occur when you hold your cryptocurrency on an exchange that is vulnerable to attacks by hackers. Purchases can also be made very rapidly (speed is dependent on the underlying confirmation speeds of the currencies being converted between) and large purchases do not tend to move market prices the way they do when placing an order on a centralized exchange. In addition to acting as a market maker across cryptocurrency market pairs, BlockTrades offers consulting services and OEM software for businesses looking to interact with blockchain-based technologies as well as general purpose software development contractors (C++, SQL, and web-based software development).
  • 21
    Cosmostation

    Cosmostation

    Cosmostation

    ...The metrics and charts displayed on Defistation allows you to gain insight into the growing trends and movements in decentralized finance. Impenetrable structure to prevent various attacks on our validator node. 24/7 monitoring of malicious traffic coming in and out of our nodes. Private network connected with other trusted partners. Currently reviewing implementing HSM, a physical computing device that safeguards digital keys for strong authentication. With HSM, validator private key is stored physically and is never programmatically exposed.
  • 22
    Tenta

    Tenta

    Avast

    The internet is under constant threat of breaches, exploits and cyber attacks. Decentralized web 3.0 promises to solve these issues of trust and privacy, but the average user can't reach it. Access today's internet securely with built-in privacy tools- Explore the new internet through native blockchain integrations. Connect to secure encrypted networks that have earned your trust. Blockchain needs a killer app where user experience matters most.
  • 23
    OneKey

    OneKey

    OneKey

    ...After careful security considerations, we use industry-leading encryption algorithms to ensure that each user's assets can be properly encrypted and kept locally. Hardware wallets can upgrade your asset security to a new level, physically isolate hackers, Trojan horses, and virus software attacks. All transfer operations must be reviewed by the hardware wallet, so you don’t have to worry about the loss or theft of your mobile phone. We choose to grow with users, not capital. Suggestions to us through various channels will be heard. Restricted by human hands, not all needs can be met, but we will try our best to give the best solution at the moment.
  • 24
    BitPrime

    BitPrime

    BitPrime

    ...Deal directly with a NZ-based cryptocurrency retailer for simplicity, education and extra security. Know who you are dealing with. Easy trading of 50 crypto coins. Get expert advice. Book 1-on-1 support calls or consultation sessions. DDoS attack protection, full data encryption, robust ID verification. Fast order execution for buy and sell. Easy trading you can trust. Standard Internet banking, POLI for faster processing. Officially registered & regulated, IRD compliant.
  • 25
    Risk Harbor

    Risk Harbor

    Risk Harbor

    ...Maximize capital efficiency with market-informed dynamic pricing. Purchase protection and secure your capital. Risk Harbor programmatically secures your assets against a wide spectrum of risks, exploits, and attacks. Get instant payouts with objective and transparent event assessments. Purchase protection and secure your capital. Invest capital with Risk Harbor and earn additional rewards on already productive assets. Leverage dynamic risk assessment data to allocate funds safely and efficiently. We’re securing an ever-expanding universe of financial applications and are always looking to integrate with new and existing solutions.
  • 26
    Babylon

    Babylon

    Babylon

    ...Powered by the fast unbinding and scalable restaking features of the protocol, stakers can also enjoy maximal liquidity and yields. Say goodbye to the risk of bridging, wrapping, or pegging your crypto. Complete security against PoS attacks. The perfect plug-in for every PoS chain. Babylon project designs security protocols that scale Bitcoin to secure the decentralized world. To this end, Babylon utilizes the three primary facets of Bitcoin; the asset, the PoW-secured timestamping server, and the most censorship-resistant blockspace in the world. Through inventing pioneering protocols, Babylon envisions a more secure and Bitcoin-centric decentralized world.
  • 27
    F2Pool

    F2Pool

    F2Pool

    ...Supporting mining for more than 40 digital currencies, and the world’s largest mining pool for BTC, LTC, ETH and ZEC. World leading technology, transparent revenue and unique architecture to effectively prevent DDoS attacks. View comprehensive information for the 40+ cryptocurrencies supported, and revenue comparison for popular mining hardware.Download the IOS and Android app. Monitor your hashrate and revenue, as well as key data including network hashrate and difficulty. Manage your mining machines, view their hashrate and status, and group or delete workers for easy management. ...
  • 28
    Bitkub

    Bitkub

    Bitkub

    ...Correctly register business With a registered capital of 290 million baht. Sincere service and ready to help customers with all problems and questions all the time. Invite friends to trade for Get cash back up to 20%. We prevent DDoS attacks by encrypting and storing most of the coins in offline storage.
  • 29
    P2Pool

    P2Pool

    P2Pool

    P2Pool is a decentralized Bitcoin mining pool that works by creating a peer-to-peer network of miner nodes. As opposed to usual pools, P2Pool helps to secure Bitcoin against double-spending and 51% attacks. P2Pool's initial setup requires a little more effort but provides equivalent payouts with a higher variance and no need for trust in a pool operator. Due to SegWit already activating upgraded users of P2Pool must not mine SegWit transactions as they are incompatible with older P2Pool versions. After v17 shares activate a new release will be made which removes this restriction. ...
    Starting Price: 1% Fee
  • 30
    API3

    API3

    API3

    ...API3 data feeds are governed by an open DAO of stakeholders, industry experts and project partners. This allows dAPIs to be operated with maximal transparency, minimal required trust in centralized operators, and no centralized attack surfaces. API token holders can take a direct part in governing the project by staking API3 tokens into the API3 insurance staking contract, which grants them shares in the API3 DAO.
  • Previous
  • You're on page 1
  • 2
  • Next