Vendors
This is information only for those who are looking for quick solution to explore.
There is no informed research other than personal experience and preferences:
Used and Liked
Used and Liked
Network Visualization, Modeling, Breach [Threat] Modeling, Risks
Network Visualization, Modeling, Breach [Threat] Modeling, Risks
Vulnerability scanner and More
Vulnerability scanner and More
Malware hash lookup
Malware hash lookup
https://www.virustotal.com/gui/
Cybersecurity training platform
Cybersecurity training platform
Dashboard | Cybrary - more specifically, a set of free courses labeled MITRE ATT&CK Defender.
https://www.academy.attackiq.com/ - adversary emulation
https://tryhackme.com/ - a bit of everything
https://portswigger.net/web-security - web app pen testing
Good Reputation
Good Reputation
DNS Filtering and Web Browsing Filtering
DNS Filtering and Web Browsing Filtering
EDR
EDR
Secuirty Audit
Secuirty Audit
Secuirty Audit for Active Directory: PingCastle
Malware hash lookup
Malware hash lookup
https://metadefender.opswat.com/?lang=en
Interactive Malware Sandbox
Interactive Malware Sandbox
ANY.RUN - Interactive Online Malware Sandbox
SIEM, UEBA
SIEM, UEBA
Detection and Automatic Breach Response AI-based
Detection and Automatic Breach Response AI-based
Adversarial Emulation
Adversarial Emulation
Just Heard About from trusted sources - No Opinion
Just Heard About from trusted sources - No Opinion
Cloud authorization | Access analysis
Cloud authorization | Access analysis
Email security
Email security
Asset Discovery
Asset Discovery
Adversarial Emulation
Adversarial Emulation
Research
Research
Application Security - Static Code Analysis
Application Security - Static Code Analysis
Code Quality Tool & Secure Analysis with SonarQube | Sonar (sonarsource.com)