472 results
Why Capterra is free
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing. Learn more about AppTrana
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise. Learn more about AppTrana
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
RedShield Programmatically Minimizes Threat Surface. Fix Findings Fast With App Shields. Learn more about RedShield
RedShield removes the risk from vulnerabilities in your web-facing applications and APIs. RedShield's service, aided by bespoke technology & AI, will tune and operate a WAF for you, then uses shields (code objects) to make complex vulnerabilities, such as business logic flaws undiscoverable to attackers (which will be confirmed by pen tests). RedShield's baseline service also includes - Application layer DDoS & advanced bot protection - Attack reporting & analysis - 24/7 incident response Learn more about RedShield
RedShield removes the risk from vulnerabilities in your web-facing applications and APIs. RedShield's service, aided by bespoke technology & AI, will tune and operate a WAF for you, then uses shields...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about Perch Security
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market. Learn more about Perch Security
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Learn more about Alert Logic MDR
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas. Learn more about Alert Logic MDR
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ConnectWise Fortify is an advanced cybersecurity solution delivering the managed detection & response protection your clients require. Learn more about ConnectWise Fortify
ConnectWise Fortify, a ConnectWise solution is the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. A fully managed solution trusted by over 100,000 IT professionals. Start your demo now! Learn more about ConnectWise Fortify
ConnectWise Fortify, a ConnectWise solution is the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. A fully managed solution...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats. Learn more about Malwarebytes for Teams
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage....

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses. Learn more about DataDome
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum speed. Based on AI & Machine Learning, our cybersecurity solution detects & blocks in real-time the most advanced bot attacks, including automated OWASP. - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams Learn more about DataDome
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Comprehensive cyber breach prevention, a single pane of glass of your existing cyber security tools and cloud systems. Learn more about ThreatAware
ThreatAware provides comprehensive cyber breach prevention by combining your existing cyber security tools and cloud systems, for better intelligence, more protection and greater productivity. It is an agentless design, which automatically locates all of the devices accessing your corporate systems. The systems alerts to any gaps in your cyber security defences and gives you control to fix them directly through the platform. The visibility and central control, is a huge timesaver Learn more about ThreatAware
ThreatAware provides comprehensive cyber breach prevention by combining your existing cyber security tools and cloud systems, for better intelligence, more protection and greater productivity. It is...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors Learn more about Modshield SB
NO-COMPROMISE FEATURES FOR ROBUST SECURITY With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks Unlimited domains and applications using a single instance at no additional cost Active threat intelligence for real-time protection Denial of Service (DoS) protection helps safeguard the application from random repetitive attacks Bot, Crawlers, Spider Protection Learn more about Modshield SB
NO-COMPROMISE FEATURES FOR ROBUST SECURITY With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
CyberSmart offers same-day government-backed certification: Cyber Essentials & IASME Governance/GDPR Readiness continuous compliance. Learn more about CyberSmart
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet found the process too complicated or limited by financial or human resources. CyberSmart offers same-day government-backed certification: Cyber Essentials and IASME Governance/GDPR Readiness, ensuring all devices are continuously compliant through the usage of our mobile and desktop apps. Learn more about CyberSmart
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multilayered technology, machine learning, and human expertise combined with automated security management. Learn more about ESET Endpoint Security
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SpamTitan Email Security for business email that helps control mail flow, clean it, and protect against unwanted email spam and malware Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and outbound scanning. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business and msp without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ArkAngel is a technology-agnostic tool that monitors security devices and networks, ensuring a secure IT environment at all times. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a 360 degree view. The automated log and security event correlation from distributed devices facilitates threat detection and significantly improves the efficiency of the incident response management process. ArkAngel allows our security experts to collaborate with clients in a secure environment. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
We reduce the risk of people clicking on phishing emails. World's most cost effective solution. Fully managed service available. Learn more about Phishing Tackle
Phishing Tackle reduces the risk of users clicking on phishing emails. Our automated easy-to-use security awareness training, simulated phishing and policy management platform reduces the risk of users clicking phishing emails by over 90%. Phish your users immediately with hundreds of premade email templates and landing pages. Track email interactions, including attachments. Identify which users are click-prone and provide instant, concise training to improve the security of your organisation. Learn more about Phishing Tackle
Phishing Tackle reduces the risk of users clicking on phishing emails. Our automated easy-to-use security awareness training, simulated phishing and policy management platform reduces the risk of...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option. Learn more about Infocyte
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker. Learn more about Infocyte
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ThreatMark enables banks to secure trusted banking experiences with legitimate users, seamlessly across all digital channels. Learn more about ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. Major banks use ThreatMark's AI-powered technology to build secured banking experience by precisely validating their legitimate users, seamlessly across all digital channels. All while securing the users' most precious assets and keeping the fraudsters away. Learn more about ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. Major banks use ThreatMark's AI-powered technology to build secured banking experience by...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Detectify automates the knowledge of the best ethical hackers in the world to secure web apps. Stay on top of threats with Detectify. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilities within the OWASP top 10 categories and beyond. Detectifys Deep Scan and Asset Monitoring services identifies security vulnerabilities and misconfigurations across all layers of your internet-facing assets and keeps you up to date for the latest threats. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Work with our certified experts to confidently operate to the standards of ISO 270001, NIST and the NCSC. Learn more about Cyber Security Services
Our certified experts deliver accredited services, coupled with industry-leading technology from our chosen partners, to support your maintenance of a strong security posture, desktop to Data Centre and into the Cloud. Our portfolio of modular tiered service offerings for Cyber Security delivers a tailored solution to meet your individual needs. Protect your data, secure your network, manage your incidents, comply with regulations and control access to your system. Learn more about Cyber Security Services
Our certified experts deliver accredited services, coupled with industry-leading technology from our chosen partners, to support your maintenance of a strong security posture, desktop to Data Centre...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Robust security for small offices that want real-time protection against ransomware and advanced threats, for all business devices. Learn more about Avast Small Office Protection
Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all business devices. Get multi-OS support for up to 10 devices - including PCs, Macs, iPads, iPhones, and Android mobile devices. Small Office Protection works effortlessly with your business existing hardware and devices, and theres no IT experience required to manage it. Learn more about Avast Small Office Protection
Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all business devices. Get multi-OS support for up to 10 devices -...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
LogPoint's SIEM platform helps businesses protect data from intrusions & respond on cyberattacks in compliance with regulatory norms. Learn more about LogPoint
LogPoint provides easy to use, accurate, high-speed analysis of your data to detect and respond to threats securely with real-time application of correlation rules and fewer false positives. Detect advanced threats and reduce investigation time with UEBA for all data sources. Rich reporting provides the actionable intelligence you need to make the right choices, faster. Learn more about LogPoint
LogPoint provides easy to use, accurate, high-speed analysis of your data to detect and respond to threats securely with real-time application of correlation rules and fewer false positives. Detect...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Exein

Exein

(0 reviews)
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Policy management software that allows you to easily automate, deliver and maintain your organisation's policy management life cycle. Learn more about MetaCompliance
Our policy management software automates your policy management life cycle and provides the “evidential weight” required to protect organisations from brand degradation and reputational threats. From creation and management to publishing and delivery, our cloud-based policy management software enables organisations to measure and demonstrate the continuing improvements in awareness, and highlight areas that require attention before they pose a risk to security and compliance. Learn more about MetaCompliance
Our policy management software automates your policy management life cycle and provides the “evidential weight” required to protect organisations from brand degradation and reputational...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
.IDentity based digital signatures based on your true identity, secured by the toughest cryptography and identity verification. Learn more about .ID Signatures
.ID Digital Signature platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a click of your pin code or just a thumbprint. The .ID identity based electronic signatures are different from other digital signature solutions on the market. The .ID is not based on a scribbled drawing of your signature placed on a PDF, but the signature is sealed with encrypted code. Learn more about .ID Signatures
.ID Digital Signature platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports....

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Smokescreen is a deception technology solution that blankets your network with decoys to trap hackers and bad guys. Learn more about Smokescreen
Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBlack, you'll understand how adversaries operate and see how decoys planted all over your network provide high-fidelity detections every step of the way. It's easy to understand, easy to use, and we've got you covered on the Perimeter, Cloud, internal network, endpoints, and Active Directory. Learn more about Smokescreen
Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBlack, you'll...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Proven compliance analytics to detect, identify, and convert unpaid software use Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get insight into who's using it, how long they've used it, and how widely they've deployed it. Compliance Intelligence has helped customers uncover tens of millions of infringers around the world. Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
CybelAngel is the world leading Digital Risk Protection Platform to detect & resolve threats before they cause harm. Learn more about CybelAngel
CybelAngel is the world leading Digital Risk Protection Platform that detects and resolves threats before they cause harm. We combine comprehensive IP scanning with Machine Learning and professional remediation services for end to end protection. We find leaks others don't, no false positives, always actionable intelligence. Avoid breaches, fraud, ransomware, compliance failures and loss of reputation with CybelAngel. Learn more about CybelAngel
CybelAngel is the world leading Digital Risk Protection Platform that detects and resolves threats before they cause harm. We combine comprehensive IP scanning with Machine Learning and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks. Learn more about Agari Secure Email Cloud
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks. Learn more about Agari Secure Email Cloud
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Uncover suspicious user behavior in real-time, before fraudulent activity occurs with our online fraud prevention and detection suite. Learn more about Precognitive
Precognitive is transforming the way that businesses identify and prevent fraud, preserve revenues and protect customer accounts. Our fraud prevention platform is a multidimensional solution that combines device intelligence, advanced behavioral analytics, and a real-time decision engine to stop all types of payment fraud, including account takeover and account opening fraud. Learn more about Precognitive
Precognitive is transforming the way that businesses identify and prevent fraud, preserve revenues and protect customer accounts. Our fraud prevention platform is a multidimensional solution that...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against attack. Learn more about Atomic ModSecurity Rules
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - and more More info: https://www.atomicorp.com/atomic-modsecurity-rules/ Learn more about Atomic ModSecurity Rules
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
IronNet enables cybersecurity teams with shared interests to work together in near-real-time to collaboratively defend against attacks. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps enterprises to increase visibility into the threat landscape, to reduce the impact of an attack and to improve the overall effectiveness of their cybersecurity investments. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
All-In-One Software-Based Network Security & Management Solution for Coworking Spaces, SMEs, Hotels & Retail. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes and disasters while keeping you 100% DoT compliance. BhaiFi is very simple to use & doesn't require extra technical skill to operate, leveraging Machine Learning & Artificial Intelligence to do the tough job itself. Being software-based, it is scalable, cost-effective & integrates with your other software. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise. Learn more about Appgate SDP
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises. Learn more about Appgate SDP
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting