Cybersecurity Software

Cybersecurity software aims to prevent unauthorized access to data that is stored electronically. This type of software protects businesses from data theft and malicious data and system usage by third parties.

Why Capterra is Free
SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. Learn more about SolarWinds Threat Monitor SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. Learn more about SolarWinds Threat Monitor
Streamline the aggregation and correlation of asset, threat, vulnerability and ticket data. Gain better visibility into your organization's risk posture with advanced risk scoring algorithms that provide business context beyond CVSS scores, such as asset criticality. Help your IT team prioritize the right vulnerabilities and effectively communicate progress to all your stakeholders. Easily scale these processes to millions of assets and tens of millions of cyber vulnerabilities. Learn more about IT Risk & Compliance Gain greater risk intelligence by prioritizing your cyber vulnerabilities based on business criticality for more efficient remediation. Learn more about IT Risk & Compliance

by Acunetix

(26 reviews)
Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix Vulnerability Management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix
Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security

by CyberGRX

(1 review)
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Learn more about CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Learn more about CyberGRX
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection

by TitanHQ

(176 reviews)
DNS Based Web content filter and web security layer for Business that blocks malware, ransomware and phishing as well as providing web content control. WebTitan filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Great monthly pricing available. Hosted locally. Learn more about WebTitan DNS Based web content filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Learn more about Alert Logic Cybersecurity Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Learn more about Alert Logic Cybersecurity

by Netwrix

(126 reviews)
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. Learn more about Netwrix Auditor Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Learn more about Netwrix Auditor

by Power Admin

(0 reviews)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight

by ManageEngine

(4 reviews)
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about Log360 Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about Log360

by Cryptosense

(1 review)
Cryptosense Analyzer software helps our customers find security weaknesses in the cryptography they use in their infrastructure and applications, and then fix them before theyre exploited. Our software is currently used to analyze the systems that protect: the majority of interbank messages worldwide; more than half of all global Forex trades; the worlds largest financial transaction database; and the cryptography used by the worlds largest cloud providers. Learn more about Cryptosense Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Learn more about Cryptosense

by WorkPuls

(39 reviews)
60% of costly digital attacks happen from within. Empluse prevents insider threats to make your workplace safe, secure and productive. Monitor employee behavior around-the-clock, secure your companys data, and protect your bottom line with insider threat detection, data loss prevention, employee monitoring, IT Forensics and more. All from a refreshingly intuitive dashboard. Finally, sophisticated endpoint cybersecurity thats simple to use. Learn more about empulse Endpoint security for companies who care about their data: insider threat detection, data loss prevention, employee monitoring & more. Learn more about empulse
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. Learn more about HTTPCS Cyber Vigilance The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you. Learn more about HTTPCS Cyber Vigilance
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type including PCI, PII, PHI and even unstructured data formats and integrate with nearly any processor or endpoint. Learn more about Cloud-Based Tokenization Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types. Learn more about Cloud-Based Tokenization

by Teramind

(51 reviews)
Teramind provides a user-centric security approach to monitor employee's PC behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure regulatory compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and securely as possible. Learn more about Teramind Take our Free Trial to see what the buzz is about. User Activity Monitoring and Data Theft Prevention made easy with Teramind. Learn more about Teramind

by ComplyAssistant

(5 reviews)
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Learn more about ComplyAssistant ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. Learn more about ComplyAssistant
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Learn more about Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Learn more about Horangi Web Security Services

by Kiuwan

(28 reviews)
We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, with the broadest language coverage and third party intergations to name but a few of the possibilities brought about by our platform. SAST and open source management of your entire portfolio. Learn more about Kiuwan DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Learn more about Kiuwan

by SecurityStudio

(2 reviews)
Backed by more than 100 years of combined information security expertise, VENDEFENSE was custom built and designed specifically for organizations that use third-party vendors. This vendor risk management tool eases the burden on program managers who are tasked with evaluating and managing vendors. Learn more about VENDEFENSE Vendor Risk Management software that simplifies managing your VRM program. Simplify. Standardize. Defend. Learn more about VENDEFENSE
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Learn more about Agari Secure Email Cloud Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO. Learn more about Agari Secure Email Cloud

by Praetorian

(0 reviews)
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios. Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios.

by SiteLock

(13 reviews)
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.

by Cybereason

(3 reviews)
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.

by Indeni

(12 reviews)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

by Jscrambler

(0 reviews)
Jscrambler is the leader in security for JavaScript Applications, working on highly innovative security products to protect Web and Mobile apps. Their products are used by 30.000 users in 145 countries, including some of the most innovative companies in the world and Fortune 500 organizations, in a number of sectors including Finance, Advertising, Media and Gaming. Recently, a new Webpage Integrity module was introduced that extends their code protection expertize to the webpage. Make Your JavaScript Application Protect Itself

by Alyne

(0 reviews)
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.

by Crypho

(0 reviews)
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.

by Intego

(1 review)
Anti-virus Mac solution designed to monitor online employee activity and protect your network. Anti-virus Mac solution designed to monitor online employee activity and protect your network.

by TraceSecurity

(1 review)
Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies. Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

by Heimdal Security

(4 reviews)
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

by BluSapphire

(0 reviews)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

by Argus Cyber Security

(0 reviews)
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

by Fortify1

(0 reviews)
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program

by Okta

(225 reviews)
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.

by CoNetrix

(20 reviews)
Tandem Security & Compliance Software by CoNetrix is an innovative suite of information security and compliance management tools used by more than 1400 U.S. financial institutions. Modules include: Risk Assessment, Policies, Business Continuity Planning, Vendor Management, Social Media Management, Audit Management, Phishing, Cybersecurity, and more. Software features include secure document storage, unlimited users, roles & responsibilities, tasks, email reminders, and incredible support. Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

by Incapsula

(46 reviews)
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.

by ESM Software Group

(30 reviews)
ESM+Strategy helps organizations design, track, and adapt their strategic plan. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life. When starting out, you'll go through a tutorial to enter in key strategic objectives, measures, and initiatives. Once the strategic architecture is in place, organizations use ESM to centrally collect updates on progress, eliminating the need for exhausting spreadsheets and slide decks. Track the progress of your strategic plan with Balanced Scorecards, Strategy Maps, dashboards, and instantly generated exports.
Centrify Application Services improves end-user productivity, securing every users access to cloud & on-premises applications. How? Single Sign-On with Adaptive MFA for access to your cloud, mobile & on-premises apps. Workflow & Lifecycle Management routes app requests & provisions users across all apps, from a central control point. Our App Gateway secures granular access to infrastructure assets regardless of location & without the hassles of a VPN. Mobility Management (EMM) is included. Improve end-user productivity, securing every users access to cloud & on-premises applications.

by Barkly

(26 reviews)
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required. Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.

by Astra Security

(20 reviews)
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.

by Netikus.net

(17 reviews)
Award-winning and comprehensive monitoring suite which monitors applications through log file, event log, performance counters and third-party tools, ensuring that all aspects of your IT infrastructure are performing optimally. Also includes disk space, service, network, environment, and Syslog/SNMP features. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Powerful system & log monitoring solution with performance monitoring capabilities and sophisticated alerting & reporting.

by Cobweb Security

(11 reviews)
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.

by Apptega

(8 reviews)
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.

by SolarWinds Security Management

(8 reviews)
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance.

by DKSU4Securitas

(6 reviews)
ACSIA is a server based cybersecurity monitoring, alerting and mitigation tool. It is environment agnostic and it can be installed both on cloud and on-premise. It comes in 2 different editions and also available on AWS Marketplace: 1) ACSIA Lite Edition - Designed and tailored for SMEs - https://acsia.io/docs/ACSIA_Lite_Version.pdf 2) ACSIA Enterprise Edition - Designed for large organizations - https://acsia.io/docs/ACSIA_Enterprise_Version.pdf ACSIA monitors your servers and captures any threats by notifying you with a severity level and enabling you to mitigate instantly.

by Safer Social

(5 reviews)
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes.

by F-Secure

(5 reviews)
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

by NxtSoft

(5 reviews)
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

by DigitalBulls

(5 reviews)
VirusVanish is a US based third party independent virus protection software. The company has its branches in U.S.A. and U.K. VirusVanish is a US based third party independent virus protection software. The company has its branches in U.S.A. and U.K.

by Tines

(5 reviews)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.

by Check Point Software Technologies

(4 reviews)
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks. CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

by JumpCloud

(4 reviews)
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi. JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.

by Darktrace

(3 reviews)
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

by Secure Digital Solutions

(3 reviews)
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.

by Snyk

(3 reviews)
Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies. Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.

by Pulsedive

(3 reviews)
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

by Ekran System

(2 reviews)
Ekran Systems is an advanced insider threat detection solution for companies of any size, can record all terminal, remote, local user sessions and alert security personnel to suspicious events. Ekran offers more than just session review tools and increased internal visibility. Enhanced multi-layer search indexes, flexible alerts, reports, access management and incident response tools - we are ready to assist in your investigations, audits, continuous monitoring, and regulation compliance. Ekran Systems® is universal software that can help you monitor employees, control subcontractors, PAM and handle compliance tasks.

by Proofpoint

(2 reviews)
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Security management and operations platform with detection, analytics, and response capabilities. Security management and operations platform with detection, analytics, and response capabilities.

by KeepSolid

(2 reviews)
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks

by CYBEATS

(2 reviews)
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.

by Swascan

(2 reviews)
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.

by RedSeal Networks

(1 review)
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.

by FireEye

(1 review)
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows. Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

by TulipControls

(1 review)
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

by Argent Software

(1 review)
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

by Twistlock

(1 review)
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

by CyberSaint Security

(1 review)
The CyberStrong Platform implements the language of cyber for the future of business. Empower your team to streamline continuous compliance and risk management with CyberStrong's unparalleled time-to-value, breakthrough AI and Machine Learning, and agile workflow. Get instant visibility into any combination of compliance standards and experience what immediate cybersecurity ROI feels like. Get a Free Demo: https://www.cybersaint.io CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.

by Redsift

(1 review)
OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but uses the latest technology to guide you to full protection. OnDMARC is an email security product that helps organisations of all sizes deploy DMARC with confidence.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection

by PortSwigger

(1 review)
PortSwigger is a Web Security software for web security professionals for testing web applications. PortSwigger is a Web Security software for web security professionals for testing web applications.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening

by Entrust Datacard

(1 review)
Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.

by FireMon

(0 reviews)
The FireMon platform manages devices across an organization to reduce complexity, increase compliance and improve network security. The FireMon platform manages devices across an organization to reduce complexity, increase compliance and improve network security.
DataDome specializes in protecting and accelerating digital businesses. Thanks to its AI powered bot management solution, businesses can improve the performance of websites burdened by intensive scraping; protect user data from hackers; make better marketing and business decisions, thanks to analytics data that aren't contaminated by bot traffic. Develop and execute your bot management strategy thanks to our dashboard, reports and real-time alerts AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business

by Marty Soft Conception

(0 reviews)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

by Zartech

(0 reviews)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

by Twizo

(0 reviews)
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

by Akamai Technologies

(0 reviews)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

by Synopsys

(0 reviews)
Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses. Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

by FourV Systems

(0 reviews)
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

by Fidelis Cybersecurity

(0 reviews)
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.

by DataResolve Technologies

(0 reviews)
Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information. Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

by Techefix

(0 reviews)
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

by Flowmon Networks

(0 reviews)
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics.

by NetLib Security

(0 reviews)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

by Ericom Software

(0 reviews)
Browser Isolation technology that prevents malware and zero-day attacks. Browser Isolation technology that prevents malware and zero-day attacks.

by Apility.io

(0 reviews)
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

by APMG International

(0 reviews)
CDCAT provides a comprehensive cyber security strategy and capability improvement service. CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

by inWebo

(0 reviews)
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

by TekMonks

(0 reviews)
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

by Syneidis

(0 reviews)
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.

by BioCatch

(0 reviews)
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats. Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

by Uplevel

(0 reviews)
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

by Perception Point

(0 reviews)
Perception Point helps to stop email attacks at the earliest possible stage more accurate protection. Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.

by EclecticIQ

(0 reviews)
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

by Cryptomage

(0 reviews)
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Namogoos disruptive technology detects and blocks unauthorized product and promotional ads injected into visitor sessions, preventing your customers from being diverted to your competitors. By eliminating unauthorized ads and invasive content from disrupting your customer journeys, Namogoo consistently increases conversion and revenue. Namogoo is a customer hijacking prevention, technology identifies and blocks unauthorized ads injected into consumer web sessions.

by Kaymera Technologies

(0 reviews)
Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense. Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.

by VigiTrust

(0 reviews)
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.
With Traditional Managed IT Service Contracts, you may pay for MORE than you need! With Traditional Managed IT Service Contracts, you may pay for MORE than you need!

by Kobil Systems

(0 reviews)
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

by Nexus Guard

(0 reviews)
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

by Outpost24

(0 reviews)
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

by Giegerich & Partner

(0 reviews)
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

by Ercom

(0 reviews)
CRYPTOSMART is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises The ultimate solution to secure mobile communications and devices

by CybelAngel

(0 reviews)
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

by Cognicase Management Consulting

(0 reviews)
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

by MyIP.io

(0 reviews)
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

by XM Cyber

(0 reviews)
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

by Threat X

(0 reviews)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

by Interset Software

(0 reviews)
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

by Cynet

(0 reviews)
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

by Secure Channels

(0 reviews)
All-in-one data encryption solution that supports all your data protection needs. All-in-one data encryption solution that supports all your data protection needs.

by SixGill

(0 reviews)
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

by Infocyte

(0 reviews)
Infocyte helps you proactively fight back against sophisticated cyber threats. Our award-winning threat detection and incident response platform, Infocyte HUNT, helps security teams detect, isolate, and respond to advanced cyber threats10x faster. What is proactive cyber security? Rather than waiting for alerts to appear and incidents to occur, Infocyte HUNT automatically and continuously scans your environment to proactively identify attackers capable of evading your defensive tooling. Defend your data and fight back against sophisticated cyber attacks. We help you identify, contain, and eradicate threats10x faster.

by Hdiv Security

(0 reviews)
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.
Axonius is the only cybersecurity asset management platform that provides actionable visibility and automated policy enforcement for all assets, devices, and users. Seamlessly integrated with 100+ management and security solutions and covering more than one million endpoints for companies like AppsFlyer, Natera, and The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.

by Barracuda Networks

(0 reviews)
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.

by Aqua Networks

(0 reviews)
CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanners, hackers and all other evolving threats. CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

by Pcysys

(0 reviews)
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button

by Introviz

(0 reviews)
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

by CyStack Security

(0 reviews)
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.
Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches. Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.

by CyberMDX Technologies

(0 reviews)
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

by Group-IB

(0 reviews)
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices

by Gleam AI

(0 reviews)
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business

by Apptimi

(0 reviews)
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.

by Systancia

(0 reviews)
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.

by Cequence Security

(0 reviews)
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

by Indusface

(0 reviews)
Indusface secures thousands of cloud apps, from small companies to large enterprise. Indusface secures thousands of cloud apps, from small companies to large enterprise.

by Zeguro

(0 reviews)
Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks. Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks.

by Strategix Application Solutions

(0 reviews)
An Information Security Management System (ISMS) is a set of policies and procedures implemented by organisations to manage information risks such as cyber attacks or data theft. ISO 27001 is the auditable international standard that requires a company to establish, implement and maintain best-practice information processes via its ISMS. An Information Security Management System (ISMS) is a set of policies and procedures implemented.

by Digital Shadows

(0 reviews)
Digital Shadows monitors and manages an organization's digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. Digital Shadows monitors an organization's digital risk, providing relevant threat intelligence across the open, deep, and dark web.

by Hacker Combat

(0 reviews)
Monitor and control the development of responsive and secret information over your network. Monitor and control the development of responsive and secret information over your network.

by Rohde & Schwarz Cybersecurity

(0 reviews)
R&S®Trusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&S®Trusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team. R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.

by EdGuards

(0 reviews)
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks. Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.

by Silverbolt

(0 reviews)
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

by Coronet

(0 reviews)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

by SecureStack

(0 reviews)
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. Security-as-a-Service platform that helps businesses secure data with SIIP Server, hardened operating systems, & SIEM.

by Lucy Security

(0 reviews)
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.

by Synametrics Technologies

(0 reviews)
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.

by Thales SIX GTS

(0 reviews)
Based on robust technologies and on the Thales savoir-faire, the Citadel Team service can support millions of users and already offers a Chatbot technology to safely integrates business applications. The application guarantees a high level of security and is in the process of elementary qualification by the ANSSI (The French National Cubersecurity Agency). Today, the Citadel community represents tens of thousands members among more than 50 companies and organizations. Citadel Team is an instant and trustworthy communication service, developped, hosted and operated by the french Group, Thales.

by Wandera

(0 reviews)
Wandera is a mobile security software, providing visibility and protection for your device from cyber threats. Wandera is a mobile security software, providing visibility and protection for your device from cyber threats.

by ITrust.fr

(0 reviews)
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems

by RiskSense

(0 reviews)
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

by BeyondTrust

(0 reviews)
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.