Home / Threat Intelligence and Detection / Intrusion Detection and Prevention Systems (IDPS)

Intrusion Detection and Prevention Systems (IDPS)

Detect and prevent cyber threats with advanced Intrusion Detection and Prevention Systems (IDPS).

Try these 234 AI Intrusion Detection and Prevention Systems (IDPS) Tools

Siege Technologies
Free

Siege Technologies

Siege Technologies, now part of ThreatConnect, pioneered advanced multi-purpose cybersecurity solutions by emulating attacker methodologies. Their distinguished engineering team conducts cutting-edge research to develop deployable technologies that both detect and prevent sophisticated threats, empowering organizations with a robust offensive and defensive cybersecurity posture. Siege's legacy focuses on driving innovation to support client objectives and significantly reduce organizational risk.

Multi-purpose cybersecurity products and services
Leverages offensive and defensive technologies
Groundbreaking cybersecurity research
SlashNext
Free

SlashNext View SlashNext

SlashNext's Internet Access Protection System (IAPS) offers advanced, zero-day threat prevention that surpasses traditional security measures. It uniquely defends against all internet access threats, including sophisticated social engineering, phishing, malware, exploits, and callback attacks. By employing cognitive computing to mimic human reasoning, SlashNext provides comprehensive protection for users and systems across all internet connections, safeguarding against complex, interconnected cyber threats.

Zero-Day Threat Prevention against all attack vectors
Advanced Social Engineering and Phishing Defense
Malware and Exploit Detection and Blocking
Smokescreen
Free

Smokescreen View Smokescreen

Smokescreen's IllusionBLACK leverages advanced deception technology to proactively detect, deflect, and defeat sophisticated cyberattacks. By deploying a comprehensive network of unique deception tripwires, IllusionBLACK provides unparalleled visibility into the entire attack kill-chain, effectively identifying even evasive, non-malware-based threats and lateral movement across all subnets. This solution ensures rapid, out-of-band deployment with zero performance impact, enterprise scalability, and minimal false positives, empowering security teams with faster breach detection and enhanced incident response capabilities.

Advanced Deception Technology
Comprehensive Attack Kill-Chain Detection
Malware-less Attack Identification
Snode Technologies
Free

Snode Technologies View Snode Technologies

Snode's Guardian cybersecurity platform leverages advanced learning machines, sophisticated mathematics, and a powerful synergy of human and artificial intelligence (Intelligence Amplification) to provide comprehensive, proactive threat detection and response across all network-connected devices. Its real-time, interactive visualizations, coupled with behavioral-based analytics and predictive capabilities, empower organizations to make informed, data-driven decisions and anticipate security issues before they impact operations. Guardian ensures robust security for traditional endpoints, BYOD, cloud environments, and IoT devices.

Unified threat detection and response across all devices
Intelligence Amplification (IA) combining human and AI
Behavioral-based anomaly detection
Sola Security
Free

Sola Security View Sola Security

Sola Security is an innovative cybersecurity startup, currently operating in stealth mode, dedicated to developing groundbreaking, unrevealed cybersecurity technology. Our mission is to create advanced solutions that fundamentally change how businesses approach digital defense. We leverage cutting-edge research and development to anticipate and neutralize emerging threats, ensuring our clients remain resilient in the face of evolving cyber risks.

Stealth Mode Operation
Proprietary Cybersecurity Technology Development
Focus on Next-Generation Threat Neutralization
Spambrella
Free

Spambrella View Spambrella

Spambrella offers comprehensive, SaaS-based email security with advanced, real-time threat protection against malware and phishing attacks. It seamlessly integrates with Office 365 and G Suite, providing essential features like email continuity, archiving, and encryption all within a single, easy-to-manage service. Spambrella dynamically classifies imposter emails, sandboxes suspicious URLs, and utilizes big-data analysis to accurately categorize bulk mail, ensuring robust defense for your organization's email communications.

Real-time advanced threat protection
SaaS-based, zero installation required
Malware and phishing detection
SquareX
Free

SquareX View SquareX

SquareX provides robust, privacy-first online security for consumers by isolating web browsing in secure, cloud-based sandboxes. This innovative approach prevents malicious code from ever reaching user devices, effectively neutralizing threats like phishing and malware without impacting browsing speed or productivity. Protect yourself from the evolving landscape of cyber threats with SquareX's advanced, proactive defense system.

Cloud-based browsing sandboxes for complete isolation
Blocks malicious websites and phishing attempts
Prevents malware downloads onto local devices
Stamus Networks
Free

Stamus Networks View Stamus Networks

Stamus Networks empowers security professionals by transforming noisy alerts into actionable threat intelligence. Their Scirius enterprise solution integrates advanced Suricata IDS, network traffic analysis, and a powerful analytics engine to deliver unparalleled visibility and enriched threat hunting capabilities. Accelerate incident detection and response with meaningful insights into your organization's security posture.

Advanced Suricata IDS Integration
Comprehensive Network Traffic Analysis
Enriched Threat Hunting Capabilities
Sublime Security
Free

Sublime Security View Sublime Security

Sublime Security offers an advanced, adaptive email security platform engineered to deliver best-in-class threat prevention with unparalleled visibility and control. Leveraging sophisticated AI and a transparent detection engine, Sublime proactively safeguards your organization against the full spectrum of email-borne attacks. Streamline incident response and minimize the impact of email-originated threats, allowing your teams to focus on strategic initiatives rather than reactive cleanup.

AI-driven threat detection and prevention
Comprehensive visibility into email activity
Automated investigation and remediation
Sunartek Labs
Free

Sunartek Labs View Sunartek Labs

Sunartek Labs leverages expert resources and advanced technology to proactively identify and neutralize cyber threats, fortifying your organization's security network against potential breaches. We are committed to pioneering innovative R&D in cybersecurity, setting new industry benchmarks, and delivering robust solutions that ensure a safer, more secure operational environment for businesses worldwide. Our dedication to understanding evolving breach patterns empowers clients with effective defense strategies, fostering growth within a secure digital landscape.

Advanced Cyber Threat Detection & Prevention
Proactive Breach Identification
Cutting-edge R&D in Cybersecurity
Synology
Free

Synology View Synology

Synology delivers robust and secure Network Attached Storage (NAS) solutions designed for exceptional performance and data integrity. Leveraging Synology Disk Station Manager (DSM), its advanced high availability and intrusion detection systems proactively safeguard your operations against disruptions and threats, ensuring continuous service and data protection.

High-performance Network Attached Storage (NAS)
Advanced Disk Station Manager (DSM) OS
Synology High Availability (SHA) for seamless failover
ThreatER
Free

ThreatER View ThreatER

ThreatER is an advanced cybersecurity platform engineered to deliver active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. Leveraging patented technology, ThreatER proactively safeguards organizations by blocking all known threats, thereby enhancing the efficiency and effectiveness of your existing security infrastructure. The platform's core components, ThreatER Collect and ThreatER Enforce, empower you to consolidate vast amounts of threat intelligence, including millions of open-source Indicators of Compromise (IOCs) and proprietary datasets, ensuring real-time, automated blocking of malicious actors from your network.

Automated discovery, enforcement, and analysis of cyber threats
Real-time, scalable threat intelligence aggregation
Proactive blocking of all known cyber threats
ThreatView by Turaco Labs
Free

ThreatView by Turaco Labs View ThreatView by Turaco Labs

ThreatView by Turaco Labs is a sophisticated threat detection and digital forensics solution specifically engineered to safeguard eCommerce websites. By leveraging advanced analytics and deep industry expertise, ThreatView offers a scalable range of service tiers, from a complimentary option to a premier, comprehensive cyber threat detection and monitoring platform. Turaco Labs is dedicated to empowering growth-oriented eCommerce businesses with innovative, tailored cybersecurity that ensures robust protection against the evolving threat landscape.

Specialized eCommerce threat detection
Advanced digital forensics capabilities
Scalable service tiers for all business sizes
TitanHQ
Free

TitanHQ View TitanHQ

TitanHQ is a comprehensive SaaS cybersecurity platform designed to shield SMBs, Service Providers, and educational institutions worldwide from a spectrum of internet-based threats. Our multi-layered security approach, featuring SpamTitan for advanced AI-driven email phishing and malware protection, and WebTitan for robust DNS security and content filtering, proactively defends against emerging cyberattacks. Empower your organization with unparalleled web filtering and zero-day threat intelligence to ensure a secure digital environment and prevent user vulnerability.

AI-driven, zero-day threat intelligence
Advanced email phishing and malware protection
Proactive malicious web threat and attack prevention
Topsec Cloud Solutions
Free

Topsec Cloud Solutions View Topsec Cloud Solutions

Topsec Cloud Solutions is a premier provider of cloud-based managed email and web security, safeguarding your organization against sophisticated threats. Our advanced platform leverages a powerful fusion of traditional algorithms and cutting-edge AI/ML threat detection to eliminate spam, viruses, malware, and phishing attacks. By collaborating with over 30 intelligence partners, Topsec delivers world-class security insights and comprehensive protection in an easily manageable package.

Advanced AI/ML-based threat detection
Comprehensive spam, virus, malware, and phishing elimination
Real-time threat intelligence from 30+ partners
Total Defense
Free

Total Defense View Total Defense

Total Defense delivers robust, multi-layered security solutions designed to combat the dynamic landscape of cyberthreats. Our comprehensive offerings, including advanced anti-malware, anti-virus, intrusion prevention, and mobile security, safeguard over 4 million consumers globally. We are dedicated to providing industry-leading technology and proactive support, ensuring our customers and their families remain secure across all their devices from evolving crimeware and sophisticated attacks.

Advanced Anti-Malware and Anti-Virus Protection
Real-time Intrusion Prevention Systems
Dedicated Mobile Security Solutions
TotalAV
Free

TotalAV View TotalAV

TotalAV Antivirus offers robust, free-to-use malware protection with essential tools for detection and removal. This comprehensive solution provides real-time threat monitoring, hourly definition updates, and advanced security features, trusted by millions worldwide to maintain a secure digital environment. Beyond core antivirus, TotalAV integrates additional privacy and security tools within a single, user-friendly application.

Real-time Antivirus Protection
Next-Gen Malware Detection & Removal
Hourly Virus Definition Updates
Traced
Free

Traced View Traced

Traced is revolutionizing mobile cybersecurity with robust solutions for both individuals and organizations. Our free app shields Android and iOS users from privacy breaches and security threats, while Traced Control provides businesses with advanced Mobile Threat Defense (MTD) capabilities. Gain critical visibility, in-depth threat analysis, and the necessary tools for investigation and response to safeguard your mobile environment.

Comprehensive mobile privacy protection for Android and iOS
Free personal security app
Advanced Mobile Threat Defense (MTD) for businesses
Traversal Networks
Free

Traversal Networks View Traversal Networks

Traversal Networks offers a next-generation Network Intrusion Detection System (NIDS) engineered to proactively identify novel and unknown cyber threats. Our easily deployable Lateral Threat Detector appliances leverage analyst-assisted sensors that learn network traffic patterns to detect sophisticated attacks like lateral exploitation, backdoors, bots, malware, and reconnaissance activities. By combining advanced machine learning, IP and DNS reputation, and cloud-based analysis, Traversal Networks provides a robust defense against evolving threats.

Proactive detection of unknown and emerging threats
Analyst-assisted sensors learning network traffic
Real-time detection of lateral exploitation and backdoors
Treacle Technologies
Free

Treacle Technologies View Treacle Technologies

Treacle Technologies specializes in cutting-edge defensive cybersecurity solutions, empowering organizations to proactively identify and neutralize threats. Our expertise spans the development of advanced Deception Technology, custom honeypots, and robust intrusion detection systems, creating layered defenses against sophisticated cyberattacks. We are committed to building innovative, novel security solutions with a team of experienced professionals and top-tier technical advisors.

Custom Honeypot Development
Advanced Deception Technology
Network Intrusion Detection Systems (NIDS)
Trinity Cyber
Free

Trinity Cyber View Trinity Cyber

Trinity Cyber's patent-pending Proactive Threat Interference technology fundamentally shifts cybersecurity by stopping threats before they reach internal networks. This additive solution operates externally to traditional detection methods, offering unparalleled speed and efficiency in actively preventing attacks. By intercepting threats outside network perimeters, Trinity Cyber significantly reduces risk for organizations while increasing the operational cost and complexity for adversaries.

Patent-pending Proactive Threat Interference technology
Prevents cyberattacks before network ingress
Operates externally to network perimeters
Trinsec 7
Free

Trinsec 7 View Trinsec 7

Trinsec 7 pioneers a unified approach to security, seamlessly integrating cybersecurity, electronic security, and identity protection into a single, intelligence-driven solution. Designed for the dynamic needs of growing businesses and modern families, our proactive methodology anticipates threats, fortifies defenses, and ensures optimal resource allocation. We deliver tailored security, precisely aligned with your actual risks, not just trends or fear.

Unified Cybersecurity and Electronic Security
Intelligence-Driven Threat Anticipation
Personalized Identity Protection
Trustifi
Free

Trustifi View Trustifi

Trustifi offers unparalleled ease of use and deployment for comprehensive email security, safeguarding your organization's most critical asset: its data. Our unified platform provides robust inbound and outbound protection, ensuring your reputation and brand are protected from all email-borne threats.

Unified Inbound and Outbound Email Security
Data Loss Prevention (DLP)
Advanced Email Encryption
Trustlook
Free

Trustlook View Trustlook

Founded in 2013, Trustlook is a pioneer in mobile and blockchain security, headquartered in San Jose, CA, with global operations in Hangzhou, China, and Toronto, Canada. Leveraging its advanced SECUREai engine, Trustlook delivers cutting-edge, AI-driven cybersecurity solutions designed for comprehensive threat protection across mobile devices, network appliances, IoT devices, and smart contracts. Our mission is to be the global leader in next-generation cybersecurity, safeguarding digital assets against evolving malware and sophisticated attacks.

AI-driven threat intelligence with SECUREai engine
Comprehensive protection for mobile devices
Network appliance security