306 results
Why Capterra is free
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.

by TulipControls

(1 review)
View Profile
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

by DataResolve Technologies

(1 review)
View Profile
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

by Argent Software

(1 review)
View Profile
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

by Ericom Software

(1 review)
View Profile
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security. Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.

by SecurityScorecard

(1 review)
View Profile
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.

by Twistlock

(1 review)
View Profile
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

by Cobweb Security

(1 review)
View Profile
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
View Profile
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
View Profile
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
View Profile
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.

by Cequence Security

(1 review)
View Profile
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
View Profile
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
View Profile
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
View Profile
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

by Thales SIX GTS

(1 review)
View Profile
Based on robust technologies and on the Thales savoir-faire, the Citadel Team service can support millions of users and already offers a Chatbot technology to safely integrates business applications. Every communication is encrypted (chat, call, file sharing,...). The application guarantees a high level of security and is in the process of elementary qualification by the ANSSI (The French National Cubersecurity Agency). Citadel Team is an instant and trustworthy communication service, developped, hosted and operated by the french Group, Thales.
View Profile
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code

by SecureWorks

(1 review)
View Profile
Secureworks combines machine learning with human intelligence to predict and prevent more threats. Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores. Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

by Defendify

(1 review)
View Profile
An all-in-one platform to simplify cybersecurity for small businesses. An all-in-one platform to simplify cybersecurity for small businesses.

by Tripwire

(0 reviews)
View Profile
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

by PKWARE

(0 reviews)
View Profile
PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With Smartcrypt, your organization can eliminate security gaps, maintain enterprisewide control over sensitive data, and meet your data security goals. PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and more.

by ImageWare Systems

(0 reviews)
View Profile
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.

by TransUnion

(0 reviews)
View Profile
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.

by Prilink

(0 reviews)
View Profile
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.

by Crypho

(0 reviews)
View Profile
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.

by BluSapphire

(0 reviews)
View Profile
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

by UpGuard

(0 reviews)
View Profile
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world. Reduce cyber risk, prevent data breaches and protect customer data.

by Marty Soft Conception

(0 reviews)
View Profile
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

by FICO

(0 reviews)
View Profile
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

by PreEmptive Solutions

(0 reviews)
View Profile
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data. PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.

by Zartech

(0 reviews)
View Profile
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

by Twizo

(0 reviews)
View Profile
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

by RIPS Technologies

(0 reviews)
View Profile
RIPS is the only code analysis solution dedicated to Java and PHP language. It detects the most complex security vulnerabilities deeply nested within Java and PHP code that no other tools are able to find. It supports all major Java and PHP frameworks, SDLC integration, relevant industry standards and can be deployed as a self-hosted software or used as a cloud service. With its high accuracy and no false positive noise, RIPS is the ideal choice for analyzing your code. Automatically detect real security issues in Java and PHP applications without false positive noise to optimize team efficiency.

by Akamai Technologies

(0 reviews)
View Profile
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

by FourV Systems

(0 reviews)
View Profile
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

by Fidelis Cybersecurity

(0 reviews)
View Profile
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.

by Techefix

(0 reviews)
View Profile
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

by Securonix

(0 reviews)
View Profile
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

by NetLib Security

(0 reviews)
View Profile
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

by Apility.io

(0 reviews)
View Profile
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

by APMG International

(0 reviews)
View Profile
CDCAT provides a comprehensive cyber security strategy and capability improvement service. CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

by inWebo

(0 reviews)
View Profile
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

by TekMonks

(0 reviews)
View Profile
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

by Syneidis

(0 reviews)
View Profile
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.

by BioCatch

(0 reviews)
View Profile
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats. Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

by Uplevel

(0 reviews)
View Profile
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

by EclecticIQ

(0 reviews)
View Profile
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

by Cryptomage

(0 reviews)
View Profile
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

by Namogoo

(0 reviews)
View Profile
Namogoos disruptive technology detects and blocks unauthorized product and promotional ads injected into visitor sessions, preventing your customers from being diverted to your competitors. By eliminating unauthorized ads and invasive content from disrupting your customer journeys, Namogoo consistently increases conversion and revenue. Namogoo is a customer hijacking prevention, technology identifies and blocks unauthorized ads injected into consumer web sessions.

by Kaymera Technologies

(0 reviews)
View Profile
Cybersecurity solution providing protection on any device and maintain effective cyber defense. Cybersecurity solution providing protection on any device and maintain effective cyber defense.

by VigiTrust

(0 reviews)
View Profile
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.

by Kobil Systems

(0 reviews)
View Profile
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

by Nexus Guard

(0 reviews)
View Profile
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

by Outpost24

(0 reviews)
View Profile
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

by Giegerich & Partner

(0 reviews)
View Profile
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

by Ercom

(0 reviews)
View Profile
Cryptosmart is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises Cryptosmart, the ultimate solution to secure mobile communications and devices

by CybelAngel

(0 reviews)
View Profile
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

by Cognicase Management Consulting

(0 reviews)
View Profile
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

by MyIP.io

(0 reviews)
View Profile
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

by XM Cyber

(0 reviews)
View Profile
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

by ThreatX

(0 reviews)
View Profile
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

by Interset Software

(0 reviews)
View Profile
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

by AGARI Data

(0 reviews)
View Profile
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO.

by SixGill

(0 reviews)
View Profile
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

by Argus Cyber Security

(0 reviews)
View Profile
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

by Infocyte

(0 reviews)
View Profile
Infocyte's cybersecurity software helps security teams detect and respond to file-less threats, APTs, ransomware, and malware¿faster. Integrate and augment your endpoint security (SIEM, SOAR, EDR, and more) with our easy-to-use cloud-hosted console. Managed security service providers leverage our platform to deliver cost-effective cybersecurity risk and compromise assessments, security incident response, and managed detection and response (MDR) security services. Detect and respond to sophisticated threats, risks, and vulnerabilities with Infocyte's easy-to-use cybersecurity software platform.

by Hdiv Security

(0 reviews)
View Profile
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

by Precognitive

(0 reviews)
View Profile
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts. Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.

by Barracuda Networks

(0 reviews)
View Profile
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.

by Aqua Networks

(0 reviews)
View Profile
CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanners, hackers and all other evolving threats. CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

by Introviz

(0 reviews)
View Profile
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

by CyStack Security

(0 reviews)
View Profile
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.

by Famteck

(0 reviews)
View Profile
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases. nstance Resolve is one of the most secure database solution with 6 solutions in 1 product. Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation; Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.

by Group-IB

(0 reviews)
View Profile
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices

by Gleam AI

(0 reviews)
View Profile
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business

by Apptimi

(0 reviews)
View Profile
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.

by A-LIGN

(0 reviews)
View Profile
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience. A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.

by Systancia

(0 reviews)
View Profile
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.

by CounterCraft

(0 reviews)
View Profile
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.

by Ziwit

(0 reviews)
View Profile
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you.

by Digital Shadows

(0 reviews)
View Profile
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

by Hacker Combat

(0 reviews)
View Profile
Monitor and control the development of responsive and secret information over your network. Monitor and control the development of responsive and secret information over your network.

by Data443 Risk Mitigation

(0 reviews)
View Profile
ClassiDocs delivers comprehensive data classification, governance, discovery, and privacy regulation (GDPR, CCPA & more) compliance within one comprehensive, data security platform, making it truly powerful, yet cost-effective and easy to deploy. ClassiDocs enables the data creator to build, augment, and refine the classification process so they can govern the data they create and communicate its value across the organization. Inventory, Classify and Secure Every Data Point, Every Time

by TokenEx

(0 reviews)
View Profile
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type including PCI, PII, PHI and even unstructured data formats and integrate with nearly any processor or endpoint. Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types.

by Rohde & Schwarz Cybersecurity

(0 reviews)
View Profile
R&STrusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&STrusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team. R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.

by EdGuards

(0 reviews)
View Profile
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks. Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.

by Silverbolt

(0 reviews)
View Profile
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

by Alyne

(0 reviews)
View Profile
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.

by SecureStack

(0 reviews)
View Profile
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

by Lucy Security

(0 reviews)
View Profile
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.

by Wandera

(0 reviews)
View Profile
Wanderas Mobile Security Suite provides a single cloud solution that protects against the broadest range of cyber threats and access-based risks. The Mobile Security Suite consists of Mobile Threat Defense, Data Policy and Broker. Wanderas Security Suite provides a single cloud solution that protects against the broadest range of cyber threats & access risks.

by ITrust.fr

(0 reviews)
View Profile
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems

by RiskSense

(0 reviews)
View Profile
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

by RocketCyber

(0 reviews)
View Profile
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

by MailGuard

(0 reviews)
View Profile
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more

by Brinqa

(0 reviews)
View Profile
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.

by Securden

(0 reviews)
View Profile
The most secure cybersecurity software for enterprise companies. The most secure cybersecurity software for enterprise companies.

by ShieldApps Software Development

(0 reviews)
View Profile
Identity Theft Preventer pays attention to hundreds of micro-parameters on a computer, looking for exposed data that can potentially endanger ones identity. Information logged & stored by browsers, such as login credentials, web-mail services, banking portals, health providers web-accounts & social networks, as well as billing information, such as credit cards numbers, social security information, home address & more, are all reported back and resolved in a couple of clicks! Identity Theft Preventer protects your digital privacy & locally stored personal information from external/foreign abuse.