477 results
Why Capterra is free
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise. Learn more about Appgate SDP
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises. Learn more about Appgate SDP
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enable them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Astra Security serves all PHP-based websites. It is highly compatible with websites built on CMS like WordPress, Magento, Joomla, etc.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. This means you can get rid of multiple security solutions & let Astra take care of it all.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ESM supports beginner and advanced strategy practitioners. Our STRATEGY, OKR, CYBER, and PERFORM modules stand alone or link together.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER enables organizations to manage risk, compliance, and cyber security. ESM+PERFORM empowers employees to link goals to the organizational strategy. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web security solutions to prevent data theft, phishing, botnets, and other malware to harm your business and resources.
Ransomware, botnets, phishing, and cryptojacking are a few among the daily threats millions of organizations are exposed to worldwide. SafeDNS blocks such threats at the Domain Name Server (DNS) Level before they jeopardize your entire network and harm your staff and image. Get your free trial today for 15 days.
Ransomware, botnets, phishing, and cryptojacking are a few among the daily threats millions of organizations are exposed to worldwide. SafeDNS blocks such threats at the Domain Name Server (DNS)...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web-based solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Industry leading prices AND strong service experience in 100+ countries. We only sell using channel (no direct sales)
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult content etc. We only sell via channel partners. Services are delivered over a global ANYCAST network. We tune cyber threat protection and content categories to country specific needs using advanced analytics and AI. Chat with us live NOW and connect direct to the owners and our skilled engineers
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying your cybersecurity. Choose your frameworks, including CMMC, NIST, ISO, PCI, SOC 2, HIPAA, & more & manage your program with automated cybersecurity framework crosswalks, real-time compliance scoring, project management, collaboration, budgeting, policy & plan templates, & guidance & support.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
OnDMARC helps users to implement and maintain DMARC - the email authentication protocol that blocks domain-based phishing attacks.
OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but, combined with machine learning and excellent customer support, gets users to full protection quickly but sustainably.
OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Automate the FFIEC CAT and NCUA ACET while ensuring accurate responses and gain a clearer picture of your cybersecurity risk.
Ncyber simplifies FFIEC CAT and NCUA ACET, allowing for cross-department collaboration. The tool converts the questionnaires into a straightforward workflow, saving you time, keeping you organized and allowing you to review results, identify gaps and areas for improvement, and determine the next actionable steps all in one place.
Ncyber simplifies FFIEC CAT and NCUA ACET, allowing for cross-department collaboration. The tool converts the questionnaires into a straightforward workflow, saving you time, keeping you organized...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Innovative Cybersecurity Platform. Protects your software vulnerabilities!
Tired of the same old cybersecurity software repackaged? Meet TOPIA, Vicarius¿ innovative approach to a constantly evolving world of software vulnerabilities. TOPIA protects your company¿s unique profile with an easy to use, efficient, and adaptive cybersecurity platform that covers digital apps and assets patch management. TOPIA is a powerful cybersecurity solution that takes an innovative and comprehensive approach to managing your company¿s security needs.
Tired of the same old cybersecurity software repackaged? Meet TOPIA, Vicarius¿ innovative approach to a constantly evolving world of software vulnerabilities. TOPIA protects your company¿s unique...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time.
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Spinbackup provides comprehensive Cloud Backup and Cybersecurity protection from data loss and leaks for G Suite or Office 365.
Thousands of organizations rely on Spinbackup to orchestrate G Suite and Office 365 administration and provide effective threat intelligence, which safeguards critical business data against ransomware and human error. Spinbackup, an API-based Cloud Access Security Broker, helps customers protect their valuable information against data leak and data loss disasters in the cloud by backing up company data to secure cloud storage and alerting G Suite Admins with any potential data breach.
Thousands of organizations rely on Spinbackup to orchestrate G Suite and Office 365 administration and provide effective threat intelligence, which safeguards critical business data against...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Automate configuration management across virtual and physical servers, workstations, and desktops.
Automate configuration management across virtual and physical servers, workstations, and desktops.
Automate configuration management across virtual and physical servers, workstations, and desktops.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without disturbing your current workflow. Perform continuous security in the early stages of your agile development lifecycle and quickly fix vulnerabilities. Get in your issue tracker easy step-by-step instructions on where and how to fix each vulnerability. Start a free trial.100% free. No Credit Card
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Native cybersecurity application for Microsoft Office 365 mailboxes build for business
Native cybersecurity application for Microsoft Office 365 mailboxes built for business
Native cybersecurity application for Microsoft Office 365 mailboxes built for business

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Identity management solution helping organizations create, manage and protect digital and non-digital data.
The powerful and sophisticated, yet easy to use, software that identifies, connects and integrates all the data of your company.
The powerful and sophisticated, yet easy to use, software that identifies, connects and integrates all the data of your company.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Monitoring hidden online data for digital risk protection and threat intelligence.
Echosec Systems is a threat intelligence and digital risk protection company. We gather billions of data points from the dark web, deep web, social media, and other online networks to support government intelligence, security teams, and corporate entities with real-time and near real-time information. Our platform and API are used extensively for counterterrorism, transportation security, situational awareness during global events, and cybersecurity threat detection.
Echosec Systems is a threat intelligence and digital risk protection company. We gather billions of data points from the dark web, deep web, social media, and other online networks to support...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting &...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Using Tor with a VPN gives you an extra layer of privacy because the VPN encryption prevents the Tor entry node from exposing exit node
TOR Browser Private Web + VPN is a unique combo app, giving you the power of an anonymous Tor Browser and the intractability of a VPN connection. TOR Browser Private Web + VPN is built with the simple belief that privacy is everybody's right and should be protected under all circumstances.
TOR Browser Private Web + VPN is a unique combo app, giving you the power of an anonymous Tor Browser and the intractability of a VPN connection. TOR Browser Private Web + VPN is built with the...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, acquired ShieldSquare in March 2019.
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages Intent-based Deep Behavior Analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, card fraud, content
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Helping Security Teams, Enterprises, and MSSPs Prioritize and Respond to What Really Matters.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry, which includes co-editing several industry standards such as ISO 27043 and ISO 30121. Its flagship product, IncMan SOAR, is multi-patented, and it has been adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in EMEA Americas and APAC.
DFLabs is a pioneer and recognized global leader in Security Orchestration, Automation, and Response (SOAR) technology. The companys management team has helped shape the cyber security industry,...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an...

Features

  • AI/Machine Learning
  • Behavioural Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting