Best Security software Startups & Tools

Security and privacy tools that protect apps, data, and access: threat detection, pentesting, monitoring, passwordless login, and PII vaults.

Recently Listed

5 launches
Sort
Locksy - Tab Locker & Password Protection Featured

Browser tabs containing bank logins, client files, and sensitive emails remain completely unprotected throughout the workday. Locksy solves this by adding encryption and automatic locking directly within the browser, eliminating the need for traditional password managers or manual security rituals. The product targets anyone who handles confidential information in a browser but finds existing security tools either invasive or inconvenient—remote workers, consultants, and professionals dealing with sensitive client materials fall into this category. Locksy's defining characteristic is its refusal to rely on cloud infrastructure. All encryption happens locally on the user's device, meaning data never leaves the browser itself. This architecture eliminates an entire category of risk that cloud-based competitors cannot escape: the possibility of a central breach, subpoenaed logs, or a company pivoting toward data monetization. The product functions offline, removing dependency on internet connectivity for basic security operations. Auto-locking addresses the behavioral side of security—where users fail to manually protect information. By making protection automatic rather than optional, the product closes the gap between intention and action. The company's bootstrapped foundation shapes its entire approach differently than venture-backed security startups. While competitors pile on features to justify premium subscriptions, Locksy provides free access to core functionality. This reflects confidence in the value proposition and an emphasis on removing adoption friction rather than maximizing revenue per user immediately. The founders articulate their philosophy clearly: they built Locksy out of frustration with security products that sacrifice usability in the name of safety. That focus on combining practical convenience with actual security distinguishes the positioning. Rather than attempting to replace password managers or become an identity platform, Locksy tackles one specific problem exceptionally rather than many problems adequately. The product mentions military-grade encryption, though specifics on cryptographic standards or implementation details aren't disclosed in available materials. For a security product, greater technical transparency would strengthen confidence among informed users, though the offline-first architecture already eliminates major attack surfaces that cloud competitors face. Locksy represents a meaningful attempt to solve a real problem—unprotected browser tabs—without the surveillance capitalist undertones that plague many privacy-focused tools.

Security-software
V
Vansh Sethi
DCL Evaluator

Regulatory pressure on AI deployments is mounting, but most organizations lack a way to prove what their systems actually output or detect tampering with audit records. DCL Evaluator addresses this gap by layering cryptographic verification on top of any LLM pipeline, converting probabilistic AI outputs into deterministic, tamper-evident decisions that pass compliance scrutiny. The product targets engineering teams deploying AI agents in regulated environments—financial services, healthcare, EU-regulated markets—where policy compliance and audit trails are non-negotiable. The integration approach is notably frictionless: developers add three lines of code to pipe LLM responses through the verification engine, receiving back a cryptographic proof tied to a chain of prior decisions. What distinguishes DCL Evaluator from conventional LLM safety filters is its commitment to determinism. While most guardrails rely on secondary models that can drift or contradict themselves, this tool applies bit-for-bit reproducible policy checks, using SHA-256 hash chaining to make any tampering with historical records mathematically impossible—alter one decision and the entire chain invalidates. The claimed track record—zero false positives across 1000+ EU AI Act evaluations—reflects this deterministic design philosophy. The product includes built-in policy templates for major compliance regimes (EU AI Act, GDPR, finance, medical) plus custom YAML support for bespoke requirements. A drift monitor using statistical testing provides early warning of behavioral anomalies before they escalate to violations, with four configurable modes: normal, warning, escalation, and block. The system supports outputs from any major model (Claude, GPT-4, Grok, DeepSeek, Gemini) as well as local deployments via Ollama. On the technical side, the webhook API design sidesteps installation overhead—teams can evaluate outputs without touching their infrastructure. Export functionality covers JSON, PDF, and CEF formats for downstream compliance workflows and auditor reviews. The business model remains unclear from the available material. The site emphasizes free availability and 30-second trial access, though the distinction between free and paid tiers is not articulated. For organizations already shipping AI into regulated markets, the deterministic audit capability may justify pricing that isn't yet public. For those still evaluating risk, the zero-friction onboarding makes experimentation cost-free.

Security-software
D
Dari Rinch
Cortex EDR
Cortex EDR 🔥 Trending

Security teams and development organizations face a persistent challenge: ensuring that both human-written and AI-generated code remains free of vulnerabilities at scale. Cortex EDR positions itself as an intelligent code auditing platform designed to identify and eradicate security flaws and architectural weaknesses in real time through multi-agent analysis. The product's core differentiator is its claim to go beyond traditional syntax-based scanning. Rather than simple pattern matching, Cortex employs seven specialized agents that perform deep contextual analysis across multiple dimensions: security vulnerabilities, architecture quality, code quality assessment, technical debt identification, and explicit analysis of AI-generated code. Each agent contributes to a comprehensive semantic understanding of a repository's logic flows, intent mapping, and architectural boundaries. This multi-layered approach targets teams that need more than surface-level code review and want to understand not just what code does, but why it does it. The reconnaissance and analysis capabilities include automatic repository mapping, file discovery across large codebases, dependency tracking, and identification of entry points and configuration files. The platform reports findings through structured outputs including JSON and PDF reports, enabling integration into existing audit workflows. For organizations with continuous deployment needs, Cortex offers CI/CD pipeline hooks and REST API access, positioning it as a tool built for development workflows rather than standalone auditing. The pricing structure reveals a freemium approach with three tiers. The free tier provides basic scanning with limited capacity and public-repository-only access. The mid-tier at $19 per cycle, available at promotional pricing of $9, expands scanning capacity and adds private repository support, making it accessible to small professional teams or independent auditors. The enterprise tier at $59 per cycle, or $29 on promotion, includes unlimited scanning capacity, multi-agent orchestration, and a 99.9% uptime SLA—features explicitly targeting organizations that require reliability and scale. The emphasis on AI-generated code analysis distinguishes Cortex in an increasingly relevant market. The company's positioning around the idea that "your AI coded it, we audit it" acknowledges an emerging workflow challenge: as teams rely more heavily on AI assistants for code generation, verification of that code's security and quality becomes critical infrastructure. This focus addresses a contemporary development concern rather than serving as a general-purpose security replacement.

Security-software
H
Hamza Hafeez
VeilDB

Protecting sensitive customer data during database operations remains a fundamental challenge for development teams. VeilDB addresses this by automating the process of masking and removing personally identifiable information from database backups, allowing teams to safely share sanitized copies without compromising data privacy or security. The platform targets development and QA teams that regularly need access to production-like data for testing and debugging but face compliance and privacy constraints. Rather than forcing developers to request backups from technical leads or work with artificial datasets, VeilDB enables self-service access to masked data through a straightforward workflow: connect your database, scan its contents, configure masking rules, and distribute sanitized backups to team members with appropriate access controls. What distinguishes VeilDB is its emphasis on practical usability. The platform features a visual rule builder that abstracts away technical complexity, letting teams define how to handle sensitive columns without writing code. Configuration rules can replace, update, or remove data based on user-defined parameters. The solution also introduces a scheduling system that automates backup creation and masking on a recurring basis, reducing manual intervention and ensuring teams always have access to current sanitized data. The access control model reflects a team-centric philosophy. Rather than a simple binary structure, VeilDB implements group-based permissions that allow organizations to segment database access across multiple team members with varying privilege levels. This is particularly valuable in larger organizations where developers working on different features or services require different data views. Integration appears straightforward. The platform supplies a command-line tool that developers can install locally, reducing friction compared to solutions requiring database-level modifications or complex deployment steps. The four-stage setup flow—application setup, database scanning, rule configuration, and team distribution—suggests a focus on reducing implementation complexity. One limitation evident from the available information is the absence of concrete pricing details or a published cost model. The website mentions documentation and a GitHub repository, suggesting some level of technical transparency, but specifics on whether the offering is open-source, subscription-based, or usage-metered remain unstated. Interested teams must request a demo to understand licensing terms. VeilDB occupies a practical niche in the data security landscape. For teams struggling with the tension between needing realistic data for development while maintaining privacy obligations, it offers a plausible solution that prioritizes ease of use alongside security fundamentals. The product's success will depend on how well the claimed integration simplicity holds up under real-world deployment.

Security-software
I
Ihor Klymchuk
FixMyMacNow

Disk clutter on macOS presents a genuine problem for longtime users, whose machines accumulate cache files, developer leftovers, and forgotten downloads that consume storage and degrade performance. FixMyMacNow targets users seeking an all-in-one solution to reclaim space and restore their systems to a snappier state. The product bundles four major functional areas into a single application. The cleanup suite scans for system cache, log files, unused applications, browser caches, and development artifacts, with the vendor claiming the ability to recover up to 74 gigabytes of storage from a typical Mac. A dedicated space cleaner provides tools for identifying large files, purging old downloads, and detecting duplicates through hash-based matching. An optimization module focuses on performance by managing startup items, background applications, and maintenance scripts. A fourth component supplies real-time system monitoring, tracking CPU usage, memory pressure, disk activity, and network throughput. What distinguishes this offering is the emphasis on batch operations and simplicity. Rather than requiring users to manually navigate individual files or system settings, FixMyMacNow presents recommendations it can apply en masse—disabling multiple startup items at once or terminating background processes with a single action. The claimed 60-second scan time and the ability to perform major cleanup operations in a single click suggests the designers prioritized user convenience. The application supports macOS 12 and later. Pricing follows a freemium model. A seven-day free trial provides access to all features at no cost, after which a subscription begins at $9.99 per year. This positions the product as an economical option compared to many system utilities. The vendor emphasizes security, labeling the cleaning process as "100% secure," though the website offers no detailed explanation of what safety mechanisms protect against accidental deletion of essential files. The product's functionality overlaps significantly with established competitors, making differentiation a strategic challenge. The low entry price and breadth of tools provide potential value for users who prefer consolidated system maintenance to juggling multiple specialized utilities.

Security-software
M
Maxime