595 results
Why Capterra is free
Detection, protection, training and compliance – all from a single cyber security SaaS platform. Try it today with a 14-day free trial. Learn more about Defense.com
Defense.com is an all-in-one cyber security SaaS platform, containing everything your business needs to identify threats, protect against hackers, train your staff and maintain compliance. Defense.com includes many essential cyber security features as standard, including Endpoint Protection, Penetration Testing, Threat Intelligence, Vulnerability Management and much more. Any threats or vulnerabilities are automatically prioritised for remediation and displayed in a single dashboard. Learn more about Defense.com

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web security solutions to prevent data theft, phishing, botnets, and other malware to harm your business and resources. Learn more about SafeDNS
Ransomware, botnets, phishing, and cryptojacking are a few among the daily threats millions of organizations are exposed to worldwide. SafeDNS blocks such threats at the Domain Name Server (DNS) Level before they jeopardize your entire network and harm your staff and image. Get your free trial today for 15 days. Learn more about SafeDNS

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
VMware Carbon Black Endpoint protects endpoints and workloads. Reduce down time and resolve threats faster even on day one. Learn more about Carbon Black Endpoint
VMware Carbon Black Endpoint is a cloud-native platform that protects endpoints and workloads. Multiple capabilities from essential NGAV and EDR to advanced threat hunting can be added as needed and are accessible from one agent and console. Empower your security operations teams with the right tools to identify and stop even advanced threats with reduced downtime and faster time to resolution even on day one. Learn more about Carbon Black Endpoint

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Intigriti’s bug bounty platform enables agile, continuous and scalable security testing to help companies protect their assets & brand. Learn more about Intigriti
Businesses can carry out continuous security testing by hosting a bug bounty program on Intigriti's platform. The interactive bug bounty platform commonly identifies crucial vulnerabilities within 48 hours, facilitates comms between ethical hackers and IT security teams and features real-time reports of current vulnerabilities. Intigriti's community of ethical hackers mimic the activity of real cybercriminals, enabling businesses to identify security blind spots and improve cyber defences. Learn more about Intigriti

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cymulate Extended Security Posture Management enables companies to challenge, assess and optimize their cyber-security postures. Learn more about Cymulate
For companies wanting to assure their security resilience against the evolving threat landscape. Cymulate SaaS-based Extended Security Posture Management (XSPM) automates end-to-end risk assessment, thus challenging, assessing, and optimizing their cyber-security posture simply and continuously. Cymulate gives security professionals visibility to know, control and remediate their dynamic environment. Learn more about Cymulate

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
Comprehensive cyber breach prevention, a single pane of glass of your existing cyber security tools and cloud systems. Learn more about ThreatAware
ThreatAware provides comprehensive cyber breach prevention by combining your existing cyber security tools and cloud systems, for better intelligence, more protection and greater productivity. It is an agentless design, which automatically locates all of the devices accessing your corporate systems. The systems alerts to any gaps in your cyber security defences and gives you control to fix them directly through the platform. The visibility and central control, is a huge timesaver Learn more about ThreatAware

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
The importance of cybersecurity rises with the growing numbers of cyber-attacks and malicious activities businesses face every second. Securing the data and constantly mitigating external threats like malware, phishing, or unfiltered websites is a challenge easier to overcome with advanced solutions. NordLayer is designed and developed with Secure Access Service Edge (SASE) architecture and Zero Trust model in mind to adhere to the most comprehensive and contemporary security landscape. Learn more about NordLayer

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues. Learn more about GetSecured
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues. This tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more. Learn more about GetSecured

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats. Learn more about Endpoint Detection and Response
N-able™ Endpoint Detection and Response (EDR), an integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats—and recover quickly when ransomware or other exploits strike. Remediation and rollback help reverse the effects of an attack and restore endpoints to their pre-attack healthy state to minimize customer downtime. Gain full monitoring and management of your endpoint security, all from a single dashboard. Learn more about Endpoint Detection and Response

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AI-Driven Cybersecurity Training: Hyperrealistic, Localized and 100% automated. Help your employees reduce phishing clicks by 96%. Learn more about Phished
Hyperrealistic, AI-Driven Simulations. 100% Personalised. Local & Native Content. Phished is a double award-winning platform that focuses on the human side of cybersecurity. The fully-automated training software combines personalised, realistic phishing simulations with the educational program of the Phished Academy. This way, you help your employees reduce phishing clicks by 96%. Learn more about Phished

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ConnectWise Fortify is an advanced cybersecurity solution delivering the managed detection & response protection your clients require. Learn more about ConnectWise Fortify
ConnectWise Fortify, a ConnectWise solution is the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. A fully managed solution trusted by over 100,000 IT professionals. Start your demo now! Learn more about ConnectWise Fortify

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
CyberSmart offers same-day government-backed certification: Cyber Essentials & IASME Governance/GDPR Readiness continuous compliance. Learn more about CyberSmart
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet found the process too complicated or limited by financial or human resources. CyberSmart offers same-day government-backed certification: Cyber Essentials and IASME Governance/GDPR Readiness, ensuring all devices are continuously compliant through the usage of our mobile and desktop apps. Learn more about CyberSmart

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Learn more about Perimeter 81

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times. Learn more about Pentera
Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations Learn more about Pentera

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
HackerOne is the industry standard for hacker-powered security. Learn more about HackerOne
HackerOne can provide a unique security experience for businesses of all sizes and industries empowering the world to build a safer internet. Feel confident with not just another security vendor, but a true security partner. See greater coverage, instant results and seamless remediation all on one integrated platform. Our offerings include Penetration Testing, Vulnerability Management, Bug Bounty Programs and much more. Learn more about HackerOne

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multilayered technology, machine learning, and human expertise combined with automated security management. Learn more about ESET Endpoint Security
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ArkAngel is a technology-agnostic tool that monitors security devices and networks, ensuring a secure IT environment at all times. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a 360 degree view. The automated log and security event correlation from distributed devices facilitates threat detection and significantly improves the efficiency of the incident response management process. ArkAngel allows our security experts to collaborate with clients in a secure environment. Learn more about ArkAngel

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
We reduce the risk of people clicking on phishing emails. World's most cost effective solution. Fully managed service available. Learn more about Phishing Tackle
Phishing Tackle reduces the risk of users clicking on phishing emails. Our automated easy-to-use security awareness training, simulated phishing and policy management platform reduces the risk of users clicking phishing emails by over 90%. Phish your users immediately with hundreds of premade email templates and landing pages. Track email interactions, including attachments. Identify which users are click-prone and provide instant, concise training to improve the security of your organisation. Learn more about Phishing Tackle

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Our 100% remotely deployed and managed MDR service gives you the peace of mind that you can detect and respond to incidents quickly. Learn more about Infocyte
Over 50% of breaches are missed by existing cyber defense tools. Our behavioral monitoring solutions are based on the MITRE ATT&CK framework to enable detection of, and response to, a wide variety of cyberattacks. With both agent-based and agentless install, you'll receive the ability to identify, investigate, and respond to sophisticated fileless, in-live memory cyber attacks in minutes. Contain, remediate, and recover more quickly. Learn more about Infocyte

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ReaQta-Hive is an Autonomous Detection & Response platform that protects endpoints against threats. Learn more about ReaQta-Hive
ReaQta, an IBM company, is a top-tiered AI Autonomous Detection & Response platform built by an elite group of cyber security experts & AI/ML researchers. ReaQta allows organizations to eliminate the most advanced endpoint threats in real-time. Equipped with proprietary NanoOS technology, ReaQta-Hive delivers unprecedented visibility into processes and applications running on endpoints and is tamper-free to malware & attackers. ReaQta was named a 2020 Gartner Cool Vendor in Endpoint Security. Learn more about ReaQta-Hive

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Orchestrate, Automate and Respond to security alerts using Visual Playbooks and Case Management modules from the platform. Learn more about SOAR Tools
SOAR Tools lets users orchestrate, automate and respond to security alerts using Visual Playbooks and Case Management modules from the platform.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SpamTitan Email Security for business email that helps control mail flow, clean it, and protect against unwanted email spam and malware Learn more about SpamTitan
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot Business Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Learn more about Webroot Business Endpoint Protection

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
Minimise the risk of cyber threats and compliance failure. We make cyber security and data protection easier for your employees. Learn more about MetaCompliance
Our cyber security awareness software helps keep your staff safe online, secure your digital assets, and protect your corporate reputation. MetaCompliance's award winning SaaS platform provides a one-stop-shop solution to engage users, provide defence against cyber threats, and deliver regulator reporting. It provides customers with a fully integrated suite of cybersecurity and compliance capabilities that include policy management, privacy, eLearning, simulated phishing, and risk management. Learn more about MetaCompliance

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Learn more about Boxcryptor

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SharePass is an online solution for confidential data sharing. No agents, cross-platform supported. Learn more about SharePass
SharePass is an online solution for sharing secrets and confidential information using a web application, browser extension, or an app. SharePass will deliver a one-time encrypted link from the sender to the receiver; it expires once that link is opened, leaving no digital footprint. When it comes to data privacy, SharePass or any of its employees cannot see the passwords. The passwords can be seen only by the exchanging parties. Learn more about SharePass

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Peace of mind for your phone. Protecting your mobile device with Cyber Security Solution gives you one less thing to worry about. Learn more about Web.com
Securing your device is good for business. Some of your biggest decisions happen on a small screen. Protect your business and the people who rely on it by securing the devices you use every day. With 24/7 access to a team of world-class cyber security experts, you'll have everything you need to fix, prevent, and investigate potential security issues. Includes: *Identity Protection *Device Monitoring *Theft Prevention *Safe Browsing *Contact Backup *Stores photos and call history online Learn more about Web.com

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Learn more about SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Learn more about SpectralOps

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
BeyondDLP Enables A Safe Data Experience A unique & Proactive Data Loss & Leakage Prevention solution to protect your data - anywhere. Learn more about Beyond DLP
ITsMine provides safety and protection to your shared and distributed work environment, along with regulatory compliance. ITsMine’s technology overcomes the major challenges and complexities of current data security solutions by automatically constructing “Safe Zones." ITsMine is agentless, API-based, and can be deployed in approximately 30 minutes. Proactively protecting against internal and external threats; while covering data at rest, in motion, and in use. Inside and beyond the company. Learn more about Beyond DLP

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. Learn more about SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 10 million companies continuously rated. SecurityScorecard's patented rating technology is used by over 22,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. Learn more about SecurityScorecard

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. Learn more about Cyber Hawk

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Proven compliance analytics to detect, identify, and convert unpaid software use Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get insight into who's using it, how long they've used it, and how widely they've deployed it. Compliance Intelligence has helped customers uncover tens of millions of infringers around the world. Learn more about Revulytics Compliance Intelligence

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Learn more about ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Learn more about ManageEngine Key Manager Plus

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
CybelAngel is the world leading Digital Risk Protection Platform to detect & resolve threats before they cause harm. Learn more about CybelAngel
CybelAngel is the world leading Digital Risk Protection Platform that detects and resolves threats before they cause harm. We combine comprehensive IP scanning with Machine Learning and professional remediation services for end to end protection. We find leaks others don't, no false positives, always actionable intelligence. Avoid breaches, fraud, ransomware, compliance failures and loss of reputation with CybelAngel. Learn more about CybelAngel

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks. Learn more about Agari Secure Email Cloud
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ManageEngine PAM360 Complete privileged access security for enterprise IT Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security. Learn more about ManageEngine PAM360

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
United Kingdom Local product
Work with our certified experts to confidently operate to the standards of ISO 270001, NIST and the NCSC. Learn more about Cyber Security Services
Our certified experts deliver accredited services, coupled with industry-leading technology from our chosen partners, to support your maintenance of a strong security posture, desktop to Data Centre and into the Cloud. Our portfolio of modular tiered service offerings for Cyber Security delivers a tailored solution to meet your individual needs. Protect your data, secure your network, manage your incidents, comply with regulations and control access to your system. Learn more about Cyber Security Services

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ThreatMark enables banks to secure trusted banking experiences with legitimate users, seamlessly across all digital channels. Learn more about ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. Major banks use ThreatMark's AI-powered technology to build secured banking experience by precisely validating their legitimate users, seamlessly across all digital channels. All while securing the users' most precious assets and keeping the fraudsters away. Learn more about ThreatMark

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting