138 results
Why Capterra is free
SOC Prime TDM is a SaaS platform offering threat detection content that can be used across many platforms including cloud-native SIEMs. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contains SOC ready dashboards, rule packages, threat detection and incident response scenarios that cover the latest attacks, as well as content that can be used across various analytic-based platforms, including cloud-native SIEMs like Microsoft Azure Sentinel and Sumo Logic. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contain...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. Learn more about CloudPassage Halo
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and resp...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SI...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
100+ cloud assets? Get instant-on, workload-level security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee d...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering fil...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs fro...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
The industry's first and only comprehensive collaboration, chat, and social media security platform. Learn more about SafeGuard Cyber
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than 50 channels, SafeGuard Cyber helps security, compliance, and marketing teams work better together to drive business forward. Learn more about SafeGuard Cyber
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. Price from $49.99 Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encry...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Unified Cloud-Native Security Vulnerability Management Platform Learn more about TOPIA
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating systems? No problem. With TOPIA, dynamic and diverse cloud environments are secure. A dynamic, yet light cloud security solution for the modern cloud-native infrastructure. Able to analyze and prioritize risk across a complex web of applications and assets. Learn more about TOPIA
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
365 Total Protection offers two packages for your company's security management developed specifically for Microsoft Office 365. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a wide range of features that ensure email and data security in Office 365. The Enterprise version covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a w...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integrat...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its con...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
AtomicWP Workload Protection helps to secure workloads in a variety of environments while enhancing the security. Learn more about AtomicWP
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a single lightweight agent. AtomicWP secures workloads running in Amazon AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, or in any hybrid environment. AtomicWP secures both VM-based and container-based workloads. For more info: https://www.atomicorp.com/atomic-wp/ Learn more about AtomicWP
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a singl...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
OpsCompass drives true multi-cloud operational control, visibility, and security in addition to SaaS posture management. Learn More. Learn more about OpsCompass
OpsCompass drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Goolge Cloud Platform. Additional services include license management and SaaS posture management. The intuitive UI provides clear data visualization for resource management, remediation, and configuration drift management. Learn More. Learn more about OpsCompass
OpsCompass drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Goolge Cloud Platform. Additional services include license management and SaaS posture mana...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Qloaked

Qloaked

(0 reviews)
Qloaked provides instant security for third-party domains, provisioned on the fly, with no downtime. Learn more about Qloaked
Qloaked provides instant security for third-party domains, provisioned on the fly, with no downtime. Gain all the benefits of SSL (security, speed, SEO improvements), without the pain of transitioning users. Use it to secure one, one hundred or one thousand customer domains pointed at your service in just minutes, removing the headache of insecure connections once and for all. Your happy clients enjoy encrypted domains for their visitors, with no extra work. Free proof of concept available. Learn more about Qloaked
Qloaked provides instant security for third-party domains, provisioned on the fly, with no downtime. Gain all the benefits of SSL (security, speed, SEO improvements), without the pain of transitioning ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that po...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method.
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zero...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protect your business across physical, virtual cloud and container environments with central visibility and control.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard co...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom. Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future a...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the pl...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers com...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Real-Time Bot protection that deploys in minutes (SaaS) and runs on autopilot.
DataDome is the #1 SaaS bot protection solution for e-commerce and classifieds businesses. DataDome offers real-time AI protection against all OWASP automated cyber threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping. The solution deploys in minutes on any web infrastructure, without changing the existing architecture. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups.
DataDome is the #1 SaaS bot protection solution for e-commerce and classifieds businesses. DataDome offers real-time AI protection against all OWASP automated cyber threats, including credential stuff...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Manage all of your security and compliance operations from one real-time location.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint complia...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applicat...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows...
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. For more info, visit www.boolebox.com
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
IP address management solution that assists users with data organization, network allocation, configuration tasks, and more
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP. The result is a significant decrease in errors and the sheer amount of tasks required to keep networks available, flexible and secure.
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software....
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct ...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security management and operations platform with detection, analytics, and response capabilities.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smart...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collect...
  • Threat Intelligence
  • Behavioural Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication