248 results
Filter Results (248)
Pricing Options
Deployment
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Make it easy for employees to work remotely from any location or device in a secure environment with solutions from VMware & Softchoice
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We can help you set up, manage, secure, and optimize IT performance for your remote workforce using VMware solutions. Explore how solutions like VMware Horizon 7 and Workspace ONE can make your IT staff more efficient, save your company money, and maximize your companys end user experience.
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Protect your business across physical, virtual cloud and container environments with central visibility and control.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Windows Local & Cloud Server Backup
NovaBACKUP Server is fast, affordable Windows server backup software with local and cloud storage. Includes file and image backups with single file restore, automation, encryption, central monitoring, HIPAA compliance and optional support for Microsoft Exchange, SQL, and virtual machines. All NovaBACKUP licenses for servers come with setup assistance, unmatched technical support and all updates and upgrades included at no additional cost.
NovaBACKUP Server is fast, affordable Windows server backup software with local and cloud storage. Includes file and image backups with single file restore, automation, encryption, central...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence.
With Netsparker, security teams can:
- Automate security tasks and save hundreds of ho
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
The 1st zero-trust environment for Google Workspace
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user. It covers any site users visit while authenticated against Google Workspace in Chrome (requires Google Cloud Protect to ensure Chrome is used & Shield is deployed).
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in....
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Unified Cloud-Native Security Vulnerability Management Platform
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating systems? No problem. With TOPIA, dynamic and diverse cloud environments are secure. A dynamic, yet light cloud security solution for the modern cloud-native infrastructure. Able to analyze and prioritize risk across a complex web of applications and assets.
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
BetterCloud is the mission control center for discovering, managing, and securing SaaS applications, data, and users.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our work is to ensure organizations get the transformative value and benefits of adopting SaaS applications, while ensuring IT has complete control over their environment and can serve as an enabler for the business.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Employee Onboarding and Engagement App. The easiest way to increase employee engagement and simplify your onboarding process.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in touch. Share and discuss updates. Introduce the team and what it stands for to a new member. Provide quick access to members' contact details. Any group of people united by a common idea and purpose, who don't meet up on a daily basis, will find WISP extremely helpful.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
A total HIPAA solution built for Covered Entities and Business Associates to help simplify and automate your HIPAA compliance.
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you confidence in your compliance plan to reduce risk, increase patient loyalty, and profitability of your organization.
Why Compliancy Group?
-HIPAA Audit Support, no client has ever failed an audit!
-HIPAA Seal of Compliance
-Dedicated Compliance Coaches
-Total HIPAA Solution
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Gain unified cloud security posture management and market-leading breach protection for cloud workloads and containers.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for speed, scale and reliability.
CrowdStrike Cloud Security goes beyond ad-hoc approaches by unifying everything you need for cloud security in a single platform to deliver comprehensive protection from the host to the cloud and everywhere in between.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Scalable cloud-based log management.
Get powerful searching on huge volumes of log data for fast MTTR with SolarWinds Loggly. Enjoy scalable, cloud-based log management for fast searching and troubleshooting. Move from reactive to proactive real-time log monitoring, and view app performance, system behavior, and unusual activity across the stack. Trace issues down to their root cause by analyzing them in the context of the entire stack. Analyze and visualize your data to help answer key questions and track SLA compliance.
Get powerful searching on huge volumes of log data for fast MTTR with SolarWinds Loggly. Enjoy scalable, cloud-based log management for fast searching and troubleshooting. Move from reactive to...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent.
The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting &...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
We Enable Customers to Efficiently Manage Digital Identities, Securely and Confidently
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and devices to create an identity-enabled enterprise. From on-premises and cloud-based access management software, to identity analytics and protecting unstructured data, SailPoint can solve your most complex identity and access management challenges.
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
The strongest authentication on the planet.
Beyond Identity is the most secure authentication solution on earth. An innovator in passwordless, the Beyond Identity Passwordless Identity Platform uses real-time access controls to verify identities with devices, and checks granular risk signals for continuous authentication. Breaking down the barriers between cybersecurity, identity, and device management, Beyond Identity fundamentally changes the way the world logs in, enabling teams to continue to work in a zero trust world.
Beyond Identity is the most secure authentication solution on earth. An innovator in passwordless, the Beyond Identity Passwordless Identity Platform uses real-time access controls to verify...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Advanced preventive protection for cloud email, collaboration and storage.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your company communication, collaboration and cloud storage. Our easy-to-use cloud console gives you an overview of quarantined items and immediately notifies you when detection occurs.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Effortlessly backup and restore ExchangeOnline, OneDrive, SharePoint, and Teams including all files, folders, and document libraries.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud supports cloud-to-cloud backup directly from Microsoft 365 to the Axcient Cloud. Given the critical nature of business data, companies need a secure second cloud option so they are not 100% dependent on Microsoft for their data security. The Axcient Cloud supports HIPAA, SOC-2, and GDPR.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
GorillaStack
(5)
Local product
GorillaStack is cloud automation software for reducing cloud bills, managing backup lifecycles, and real time security remediation.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily....
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.
We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
JupiterOne is a cloud-native security platform providing visibility security and governance to your entire cyber asset environment.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and much more are collected, graphed, and analyzed automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relationships as the single source of truth for an organization’s security and infrastructure operations.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript.
Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java,...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises
adopting cloud services, ensuring confidential and sensitive data is protected at
all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
ThisData prevents account takeover by using machine learning & contextual information to verify the identity of a user as they login.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through industry-leading technology and expertise, an unrivaled global data network of 35 billion events per month, and a commitment to long-term customer partnerships. Global brands such as Twitter, Airbnb and Twilio rely on Sift to gain competitive advantage in their markets.
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud-based security solution that helps businesses of all sizes secure emails against spam, viruses, ransomware, scams and phishing.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas mode helps protect businesses, associations and local communities unwanted messages: spam, viruses, phishing, ransomware, advertising.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies.
By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius
deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Cloud Control automates cloud security and compliance monitoring and management.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
SOC Prime TDM is a SaaS platform offering threat detection content that can be used across many platforms including cloud-native SIEMs.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contains SOC ready dashboards, rule packages, threat detection and incident response scenarios that cover the latest attacks, as well as content that can be used across various analytic-based platforms, including cloud-native SIEMs like Microsoft Azure Sentinel and Sumo Logic.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Infoblox delivers Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. With 8,000 customers and 350 of the Fortune 500, Infoblox is running the worlds most sophisticated networks.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which...
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Features
- Threat Intelligence
- Behavioral Analytics
- Application Security
- Intrusion Detection System
- Endpoint Management
- Two-Factor Authentication