Cloud Security Software

Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.

Por que o Capterra é gratuito
Avanan is the premier security solution for cloud-based email, messaging, and collaboration. Deploying in minutes, Avanans unique, multi-vendor security solution leverages the industrys best technologies to protect organizations from advanced threats such as phishing, malware, data leakage, account takeover, and shadow IT. Saiba mais sobre o Avanan Cloud Security Platform In just one click, secure enterprise SaaS applications such as Office 365, G Suite, Slack, and more against the latest threats. Saiba mais sobre o Avanan Cloud Security Platform

da Lacework

(1 avaliação)
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Laceworks unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance. Saiba mais sobre o Lacework Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks. Saiba mais sobre o Lacework

da CloudPassage

(0 avaliações)
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, and find and respond to critical risks other tools miss. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, portability and automation needed to succeed in these new environments. Saiba mais sobre o CloudPassage Halo Cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks other tools miss. Saiba mais sobre o CloudPassage Halo

da Sumo Logic

(16 avaliações)
Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Saiba mais sobre o Sumo Logic Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Saiba mais sobre o Sumo Logic

da Saviynt

(1 avaliação)
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner. Saiba mais sobre o Saviynt Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security. Saiba mais sobre o Saviynt

da TitanHQ

(186 avaliações)
Filtro de conteúdo da Internet baseado em DNS e camada de segurança da Internet para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. WebTitan filtra mais de 2 bilhões de solicitações de DNS todos os dias, identifica 300.000 iterações de malware por dia e tem mais de 7.500 clientes. Versões disponíveis para nuvem e gateway. Melhore a segurança cibernética agora. Faça uma avaliação gratuita do WebTitan hoje, suporte incluído. Ótimo preço mensal. Hospedado localmente. Saiba mais sobre o WebTitan Filtro de conteúdo da Internet baseado em DNS para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. Saiba mais sobre o WebTitan

da LifeOmic

(0 avaliações)
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious. Saiba mais sobre o JupiterOne Manage all of your security and compliance operations from one real-time location. Saiba mais sobre o JupiterOne
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Saiba mais sobre o ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Saiba mais sobre o ESET Endpoint Security
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Saiba mais sobre o Alert Logic Cybersecurity Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Saiba mais sobre o Alert Logic Cybersecurity
TokenEx é uma plataforma de tokenização de classe empresarial, baseada na nuvem, que oferece flexibilidade praticamente ilimitada na forma como os clientes podem acessar, armazenar e proteger dados. Trabalha com múltiplos canais de aceitação de dados e mantém uma abordagem agnóstica ao processador, o que significa que pode transformar em token e proteger quase qualquer tipo de dados, incluindo PCI, PII, PHI e até mesmo formatos de dados não estruturados, integrando-se praticamente a qualquer processador ou endpoint. Saiba mais sobre o Cloud-Based Tokenization Plataforma de segurança de dados baseada na nuvem, que oferece tokenização e proteção segura de dados na nuvem para todos os tipos de dados sensíveis. Saiba mais sobre o Cloud-Based Tokenization

da CloudSploit

(0 avaliações)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. Saiba mais sobre o CloudSploit Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source. Saiba mais sobre o CloudSploit

da Skybox Security

(0 avaliações)
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Saiba mais sobre o Vulnerability Control Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Saiba mais sobre o Vulnerability Control

da Secomba

(11 avaliações)
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with Single Sign-on or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud. Saiba mais sobre o Boxcryptor Cross-platform encryption solution for the cloud and NAS systems that supports more than 30 cloud providers (e.g. Dropbox, OneDrive). Saiba mais sobre o Boxcryptor

da ZEROSPAM

(122 avaliações)
Protect your email against ransomware, spearphishing and all other threats. ZEROSPAM is a highly effective and easy to use Cloud Email Security solution with a proven catch rate of 99.9% against all forms of email-borne threats. Fully compatible with Office 365, it provides superior ransomware and phishing protection, the best spearphishing protection in the industry and a very low false positive rate. We are an service-oriented team with a complete and highly accurate antispam. A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities. Protect your business across physical, virtual cloud and container environments with central visibility and control.

da SiteLock

(13 avaliações)
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.

da NetApp

(10 avaliações)
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure. Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

da CipherCloud

(3 avaliações)
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.

da Palo Alto Networks

(3 avaliações)
Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows

da Enginsight

(3 avaliações)
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.

da SecureAuth

(2 avaliações)
Adaptive access control, empowering organizations to determine identities with confidence. Adaptive access control, empowering organizations to determine identities with confidence.

da ThreatTrack Security

(2 avaliações)
Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud.

da Zscaler

(2 avaliações)
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.

da Intego

(1 avaliação)
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.

da Vircom

(1 avaliação)
With modusCloud, secure your business email with cloud based spam protection, targeted phishing protection, email archiving, secure email encryption, and more for Microsoft Exchange and Office 365. The modusCloud solution provides email continuity, advanced threat protection, URL and attachment defense, driven by machine learning to ensure industry leading catch rates and lower false positives. 24/7/365 Customer support will ensure your email security is always in good hands. Eliminate spam and viruses from your mail via email security tool with machine-learning, anti-virus, and archiving capabilities.

da CA Technologies

(1 avaliação)
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.

da Cequence Security

(1 avaliação)
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

da C3M

(1 avaliação)
C3M is a unique security management solution giving enterprises complete control over their cloud environment and the ability to manage compliance with HIPAA, PCI-DSS, GDPR, GLBA, ISO 27001, NIST and other relevant compliances, all at the click of a button. C3M monitors an enterprise's cloud infrastructure 24/7, combining it with C3M's real-time analytics platform to detect resources that drift from security best practices and auto-remediate any violations back to a compliant state. A platform ensuring total cloud control along with ease of managing cloud security and compliance across multiple cloud environments.

da Entrust Datacard

(1 avaliação)
Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.

da Templarbit

(1 avaliação)
Prevents attacks on your APIs and web applications with a data driven approach to AppSec. Prevents attacks on your APIs and web applications with a data driven approach to AppSec.

da EmpowerID

(0 avaliações)
All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance. All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance.

da Cloud Raxak

(0 avaliações)
Cloud Raxak automates the delivery of cloud security compliance across the enterprise. Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
DataDome é especializada em proteger e acelerar negócios digitais. Graças à solução de gestão de bots com tecnologia IA, as empresas podem melhorar o desempenho de sites sobrecarregados com raspagem intensiva; proteger os dados do usuário contra hackers; tomar melhores decisões de marketing e de negócio, graças aos dados de análise que não estão contaminados pelo tráfego de bots. Desenvolva e execute a estratégia de gestão de bots graças ao painel, relatórios e alertas em tempo real. Solução de gestão de bots com tecnologia IA para proteger todos os pontos de vulnerabilidade (sites, aplicativos…) e acelerar os negócios digitais.

da Threat Stack

(0 avaliações)
Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more.

da Marty Soft Conception

(0 avaliações)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

da Akamai Technologies

(0 avaliações)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

da Rohde & Schwarz Cybersecurity

(0 avaliações)
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills. R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support

da Cato Networks

(0 avaliações)
The Cato Cloud securely connects all business locations, people, and applications. Cato reduces MPLS costs, eliminates distributed appliances, provides secure internet access, and globally extends the WAN to mobile users and cloud datacenters. Cato provides a global SD-WAN with built-in network security, delivered as a cloud service.

da NCP engineering

(0 avaliações)
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.

da Forcepoint

(0 avaliações)
Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, real-time user activity monitoring, and more. Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

da Threat X

(0 avaliações)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Elastic Workload Protector is a Cloud analytics solution which integrates a vulnerability scanner. This way, customers infrastructure are protected all the time because they know every new vulnerability or other potential risk and have detailed reports with adapted remediation solutions. EWP protects every infrastructure (traditional, Cloud, virtualized, hybrid) and containers. Its patented Clone & Scan feature allows customers to make precise analysis without impacting the production. Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously.

da Tigera

(0 avaliações)
Solution for secure application connectivity for the cloud-native world. Solution for secure application connectivity for the cloud-native world.

da OPAQ Networks

(0 avaliações)
A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report.

da Check Point Software Technologies

(0 avaliações)
Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications. Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.

da Barracuda Networks

(0 avaliações)
Protection and Performance for the Cloud Era Protection and Performance for the Cloud Era

da Palo Alto Networks

(0 avaliações)
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.

da Clarip

(0 avaliações)
A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices.

da Bolt SaaS

(0 avaliações)
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.

da Maddox

(0 avaliações)
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.

da Coronet

(0 avaliações)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

da SecureStack

(0 avaliações)
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

da Cossack Labs

(0 avaliações)
Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Acra provides selective encryption, multi-layered access control, database leakage prevention and intrusion detection capabilities in a convenient, developer-friendly package. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.

da Protego

(0 avaliações)
Serverless security automated in 20 minutes. Serverless security automated in 20 minutes.
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. MailGuard is a leading cloud-based email security provider. MailGuard detects and stop new threats 2-48 hours ahead of competitors.

da Ryver

(0 avaliações)
Combining AI + video management to create automated threat detection software. Combining AI + video management to create automated threat detection software.

da CloudHawk

(0 avaliações)
CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS. CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS.

da Turbot

(0 avaliações)
Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails that ensure your cloud infrastructure is secure, compliant, scalable and cost optimized. Turbot enables your cloud team to focus on delivering higher-level value while your application teams remain agile through use of native AWS, Azure, and GCP tools. Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails.

da McAfee

(0 avaliações)
A data security product that allows users to detect, protect, and correct data in the cloud. A data security product that allows users to detect, protect, and correct data in the cloud.

da SecretHub

(0 avaliações)
A developer tool to keep passwords and other secrets out of automation scripts. A developer tool to keep passwords and other secrets out of automation scripts.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it. Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.

da GitGuardian

(0 avaliações)
Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time. Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time.

da iboss

(0 avaliações)
Secure user Internet access on any device, from any location in the cloud. Secure user Internet access on any device, from any location in the cloud.

da Armor Cloud Security

(0 avaliações)
Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads. Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads.

da Atomicorp

(0 avaliações)
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a single lightweight agent. AtomicWP secures workloads running in Amazon AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, or in any hybrid environment. AtomicWP secures both VM-based and container-based workloads. For more info: https://www.atomicorp.com/atomic-wp/ AtomicWP Workload Protection helps to secure workloads in a variety of environments while enhancing the security.
Cloud security with cloud partner ecosystem and multi-tenant architecture. Cloud security with cloud partner ecosystem and multi-tenant architecture.

da G-Core Labs

(0 avaliações)
Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs. Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs.