Compare Products
Showing all 477 products
Sort by
Reviews: Sorts listings by the number of user reviews we have published, greatest to least.
Sponsored: Sorts listings by software vendors running active bidding campaigns, from the highest to lowest bid. Vendors who have paid for placement have a ‘Visit Website’ button, whereas unpaid vendors have a ‘Learn More’ button.
Avg Rating: Sorts listings by overall star rating based on user reviews, highest to lowest.
A to Z: Sorts listings by product name from A to Z.
ConnectWise Cybersecurity Management
ConnectWise Cybersecurity Management
What is ConnectWise Cybersecurity Management? ConnectWise Cybersecurity Management software and support solutions help MSPs protect their clients’ critical business assets. From 24/7 threat detection monitoring, incident response...Read more about ConnectWise Cybersecurity Management
ConnectWise SIEM
ConnectWise SIEM
ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality wi...Read more about ConnectWise SIEM
ManageEngine Log360
ManageEngine Log360
Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. ...Read more about ManageEngine Log360
NordPass Business
NordPass Business
NordPass Business — The Ultimate Password Manager for Your Organization. Trusted by businesses worldwide, NordPass Business offers a cutting-edge, zero-knowledge security architecture password management solution for businesses o...Read more about NordPass Business
Huntress
Huntress
Huntress is a cloud-based cybersecurity solution, designed to help small to midsize businesses determine and respond to threats and vulnerabilities. Security teams can use the dashboard to track active incidents and investigatio...Read more about Huntress
ManageEngine PAM360
ManageEngine PAM360
PAM360 is a web-based privileged access management (PAM) solution that defends enterprises against privilege misuse by regulating access to sensitive company information. Through powerful privileged access governance, smoother wor...Read more about ManageEngine PAM360
Alyne
Alyne
The Alyne platform for governance, risk and compliance (GRC) provides intuitive, AI-enabled capabilities to dynamic enterprises across the globe. Mitratech’s GRC platform enables organizations of all sizes to transform their GRC p...Read more about Alyne
Revulytics Compliance Intelligence
Revulytics Compliance Intelligence
Revulytics Compliance Intelligence is a cyber-solutions platform that provides automated solutions for identifying and monetizing the unpaid use of software applications. RCI's patented approach combines internal and external data...Read more about Revulytics Compliance Intelligence
MetaCompliance
MetaCompliance
MetaCompliance provides a one-stop-shop solution for Security Awareness Training and compliance capabilities, in one powerful platform. With a focus on Personalised Security Awareness, we deliver content in employees' preferred la...Read more about MetaCompliance
Cohesity
Cohesity
Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, and get value from data—across the data center, edge, and cloud. Cohesity helps organizations defend against cyber...Read more about Cohesity
Ermetic
Ermetic
Holistic security for AWS, Azure and GCP Tenable's holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery ...Read more about Ermetic
BroShield
BroShield
BroShield is an endpoint protection and anti-spam platform that helps users streamline processes related to content restriction, live activity monitoring, content censorship, application blocking, and more on a centralized platfor...Read more about BroShield
Jscrambler
Jscrambler
Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Complia...Read more about Jscrambler
Jazz Platform
Jazz Platform
Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses with threat detection and response automation. Key features include data protection, image capture, forensic anal...Read more about Jazz Platform
Axonius
Axonius
Axonius is an information technology asset management (ITAM) solution designed to assist small to large enterprises with monitoring inventory of software and hardware assets. It enables users to automatically validate security enf...Read more about Axonius
InsightIDR
InsightIDR
insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can...Read more about InsightIDR
Cymulate
Cymulate
Cymulate is a SaaS cybersecurity solution that helps businesses identify security gaps, raise phishing awareness, manage web application firewalls, handle data exfiltration operations and more on a centralized platform. It allows ...Read more about Cymulate
Modshield SB
Modshield SB
Modshield SB is a web application firewall (WAF), which helps small to large businesses filter and monitor traffic and protect data from malicious attacks. Features bot/crawler protection, compliance metrics, custom rules, log for...Read more about Modshield SB
Cloudbric
Cloudbric
Cloudbric is a cloud-based web security provider, offering a web application firewall (WAF), DDoS protection and SSL. Its comprehensive set of security services protect against vulnerabilities including cyberattacks, data leakage,...Read more about Cloudbric
Haltdos
Haltdos
Haltdos helps users protect websites and web services by providing DDoS mitigation. It helps monitor, detect and mitigate DDoS attacks. It offers heuristic, behavioral and reputational-based anomaly detection to counter DDoS attac...Read more about Haltdos
Horangi Warden
Horangi Warden
Horangi offers cloud-based cybersecurity solutions for businesses of all sizes. Features include security breach and threat detection, web scanning, open source intelligence (OSINT) analysis, security reporting and third-party in...Read more about Horangi Warden
InfiSecure
InfiSecure
InfiSecure is a cloud-based bot mitigation solution that provides protection to online businesses against threats from scrapers, hackers and spammers. InfiSecure features bot detection technology that protects websites against t...Read more about InfiSecure
Spybot
Spybot
Spybot is an on-premise endpoint security solution designed to help businesses detect unauthorized access to data and remove various spyware and malware attacks. Features include script editor, automated signature updates, system ...Read more about Spybot
StackRox
StackRox
StackRox is a Kubernetes and container security platform, which helps businesses and government agencies protect cloud applications and manage processes related to network segmentation, incident response and more. The platform let...Read more about StackRox
Cyber Security Suite
Cyber Security Suite
CYBEROO's MDR (Managed Detection & Response) service, combines Artificial Intelligence, Machine Learning and the analysis of over 50 cyber security specialists. To protect you from the most advanced cyber threats. 24 hours a day. ...Read more about Cyber Security Suite
Detectify
Detectify
Detectify is a vulnerability management software designed to help security teams and developers automate asset monitoring processes to secure web applications. Businesses can scan crawled URLs to identify security threats and mana...Read more about Detectify
ComplyAssistant
ComplyAssistant
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations (e.g. HIPAA, HI...Read more about ComplyAssistant
Smarsh
Smarsh
Smarsh is a comprehensive and user-friendly compliance platform. Inclusive of capture, archive, supervision and data export capabilities across 100+ communication channels, the Smarsh platform delivers unparalleled efficiency at y...Read more about Smarsh
ESET Endpoint Security
ESET Endpoint Security
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users t...Read more about ESET Endpoint Security
Falcon
Falcon
CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. ...Read more about Falcon
F-Secure Business Suite
F-Secure Business Suite
F-Secure Business Suite by F-Secure Corporation is a cybersecurity suite solution supports multi-layer protection protocols. It is suited to businesses of all sizes that are looking to manage security for multiple devices, includi...Read more about F-Secure Business Suite
Netwrix Auditor
Netwrix Auditor
Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwrix solutions empower you with total control over what's going on in your hybrid IT environment by delivering acti...Read more about Netwrix Auditor
A-LIGN
A-LIGN
A-LIGN is the only end-to-end cybersecurity compliance solutions provider with the readiness to report compliance automation software paired with professional audit services under one roof, trusted by more than 3,300 global organi...Read more about A-LIGN
Apptega
Apptega
Apptega is a cloud-based compliance management solution that helps businesses design cybersecurity frameworks/programs and generate compliance reports. It enables users to build security frameworks in accordance with selected regu...Read more about Apptega
MailGuard
MailGuard
MailGuard is a leading email security service that protects businesses against email-borne cyber threats, including phishing attacks, ransomware, business email compromise (BEC) and other malicious content. The platform leverages ...Read more about MailGuard
Secureworks
Secureworks
Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, Red Cloak Threat Detection and Response (TDR), to help businesses detect adversaries across endpoints, networks an...Read more about Secureworks
Promisec Endpoint Manager
Promisec Endpoint Manager
Promisec Endpoint Manager is a cloud-based endpoint security management solution designed to help businesses with compliance management, threat detection, and data breach prevention. The software enables users to maintain complian...Read more about Promisec Endpoint Manager
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information ...Read more about CyberArk Privileged Access Manager
DriveStrike
DriveStrike
DriveStrike is a data breach protection software designed to help businesses locate, track, lock and wipe all computers, laptops, tablets and phones across multiple locations to protect against stolen or lost devices, insider thre...Read more about DriveStrike
PK Protect
PK Protect
Smartcrypt is a data encryption solution that helps businesses manage data protection operations for both structured and unstructured data from within a centralized platform. It lets staff members utilize the compression functiona...Read more about PK Protect
SpinOne
SpinOne
For companies that need to protect SaaS data in mission critical apps, SpinOne is an all-in-one SaaS security platform that helps IT security teams consolidate point solutions, save time by automating data protection, reduce downt...Read more about SpinOne
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Webroot is a cloud-based endpoint security solution that helps small to large enterprises perform antivirus scans and prevent cyber threats across networks. It comes with an admin console, which enables users to configure system s...Read more about Webroot Business Endpoint Protection
Splunk Enterprise
Splunk Enterprise
The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includes data indexing tools, which enable users to locate specific data across large data sets. The software is desi...Read more about Splunk Enterprise
SafeDNS
SafeDNS
SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection against dangerous, inappropriate and irrelevant sites. The solution also caters to educational institutions and ...Read more about SafeDNS
Google Cloud
Google Cloud
Featuring G-Suite and GCP, Google Cloud is a platform that provides a reliable and easy-to-use set of solutions that can be used to tackle the toughest challenges in any type of industry. It provides secure storage options, integr...Read more about Google Cloud
IntSights
IntSights
IntSights is a cloud-based endpoint security suite designed to help businesses detect, manage and remediate threats across the dark web. It includes several solutions for proactively monitoring and identifying data or credential l...Read more about IntSights
SpamTitan
SpamTitan
SpamTitan is a spam filtering solution that caters to businesses, managed service providers (MSPs) and schools to help them to block spam, viruses, malware, ransomware, phishing attempts and other email threats. The solution can e...Read more about SpamTitan
Acunetix
Acunetix
Acunetix (by Invicti) is a cloud-based digital security solution that assist security analysts with data protection, manual testing and compliance reporting. It is primarily designed to scan websites and identify vulnerabilities t...Read more about Acunetix
Invicti
Invicti
Invicti, formerly Netsparker, is a cloud-based and on-premise solution designed to help businesses manage the entire application security lifecycle through automated vulnerability assessments. Key features include maintenance sche...Read more about Invicti
Radware Bot Manager
Radware Bot Manager
Radware Bot Manager (formerly SheildSquare) is a security solution that provides websites with protection from bots, web scraping, content theft, and spam. The solution uses machine learning to detect and mitigate new threats from...Read more about Radware Bot Manager
Avast Business CloudCare
Avast Business CloudCare
AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party managed security service providers (MSSPs), who can use this tool to manage security on behalf of their clients. ...Read more about Avast Business CloudCare
JumpCloud Directory Platform
JumpCloud Directory Platform
JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provi...Read more about JumpCloud Directory Platform
Alert Logic MDR
Alert Logic MDR
Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for various environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform and hybrid environment. ...Read more about Alert Logic MDR
Perimeter 81
Perimeter 81
Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabiliti...Read more about Perimeter 81
Cynet 360
Cynet 360
Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully integrated solution for endpoint security, vulnerability management, deception, threat intelligence, network analyti...Read more about Cynet 360
CloudJacketXi
CloudJacketXi
CloudJacketXi manages, detects, and responds to ongoing cybersecurity threats. It can be deployed on-premise, virtually, in the cloud or a hybrid combination. It can protect SMBs to mid-market enterprises against data breaches by ...Read more about CloudJacketXi
AppTrana
AppTrana
AppTrana is a website and application security tool, designed to help businesses manage and maintain cloud security using scanning, Pen Testing, risk detection, always-on security, WAF, traffic monitoring, and more. It provides a ...Read more about AppTrana
ThreatMark
ThreatMark
ThreatMark is the future of trust in the digital world. The company was founded with a vision of bringing trust to interactions across all digital channels through profound cybersecurity know-how and the latest advancements in AI ...Read more about ThreatMark
GetSecured
GetSecured
GetSecured is a comprehensive security scanning solution, which helps businesses find breached data, exposed servers, web app/AWS cloud vulnerabilities, and compliance issues. This platform can be easily understood by a non-tech...Read more about GetSecured
Paladion
Paladion
Paladion is a managed detection and response service provider that enables businesses to detect cybersecurity threats using artificial intelligence (AI) and machine learning techniques. Paladion's analysts can to identify or detec...Read more about Paladion
Prophaze WAF
Prophaze WAF
Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcare, manufacturing, fintech and more protect Kubernetes clusters on-premise and on the cloud. Key features include ...Read more about Prophaze WAF
SuperTokens
SuperTokens
SuperTokens is an open source user authentication solution backed by Y-Combinator and one of the fastest growing OS startups of 2022 (Q1). We're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers a...Read more about SuperTokens
Open Systems
Open Systems
Open Systems is a threat detection and response management solution that helps businesses in healthcare, insurance, manufacturing, NGOs, financial and other industries manage secure access, cyber risk and more. The platform enable...Read more about Open Systems
Agrello
Agrello
Agrello's platform simplifies everything from document management to digital signatures with all the back-and-forth drafting that happens in-between. When starting and running a business, there is a lot of paperwork that needs to...Read more about Agrello
CipherBox
CipherBox
CipherBox is a Managed Detection & Response solution that provides your company with protection from cyber threats. Get alerts when threats to your digital environment arise and let Cipher act to notify you and mitigate them. Resp...Read more about CipherBox
Critical Insight
Critical Insight
Critical Insight MDR provides managed detection and response (MDR) services to businesses, allowing them to identify and mitigate potential cyber threats. By integrating machines with human intelligence, the application automatic...Read more about Critical Insight
Malwarebytes for Teams
Malwarebytes for Teams
Malwarebytes for Teams is a cybersecurity solution that provides malware detection and remediation tools for small businesses. It provides malicious website blocking, ransomware blocking, exploitation protection and incident respo...Read more about Malwarebytes for Teams
Appgate SDP
Appgate SDP
Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce risk and ensure network security within a digital environment. Serving more than 1,000 organizations across 40 count...Read more about Appgate SDP
BhaiFi Core
BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes and disasters while keeping you 100% DoT...Read more about BhaiFi Core
Cyver Core
Cyver Core
Cyver is a cloud-based pentest management platform enabling businesses to deliver cybersecurity through client and vulnerability findings management, report automation and tool integration capabilities, Key features include compli...Read more about Cyver Core
OnDMARC
OnDMARC
OnDMARC is a message authentication system for business emails. It helps to prevent malicious use of business domains for spoof messages. Email is the main source of security breaches, and the system prevents unauthorized sendin...Read more about OnDMARC
BooleBox
BooleBox
Boolebox is a data protection suite designed to protect sensitive information against unwelcome hackers and third parties. Although no system is completely invulnerable, the application aims to provide nearly unbreakable high-leve...Read more about BooleBox
AVG Antivirus Business Edition
AVG Antivirus Business Edition
AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party managed security service providers (MSSPs), who can use this tool to manage security on behalf of their clients. ...Read more about AVG Antivirus Business Edition
Myra Web Application Security
Myra Web Application Security
Myra Security is a cloud-based web application security solution designed to help e-commerce companies, SaaS providers, and online publishers protect web applications and APIs from cyber threats. The platform offers robust protect...Read more about Myra Web Application Security
Qostodian Recon
Qostodian Recon
CISOs and auditors demand faster tools to find sensitive data and eliminate the unacceptable amount of false positives they receive with current technology. Qostodian Recon helps security teams find and secure data, even in the ...Read more about Qostodian Recon
condignum
condignum
condignum is a SaaS solution, which enables businesses to manage compliance, risks and security requirements from within a unified platform. Supervisors can add widgets and track the status of iterations using a centralized dashbo...Read more about condignum
Kymatio
Kymatio
Kymatio is a cyber risk management software that helps businesses manage cyber awareness requirements and training sessions and execute personalized awareness itineraries. With Kymatio's platform, users are better equipped to meet...Read more about Kymatio
Ncontracts
Ncontracts
Many financial institutions manage risk and compliance with manual process. Departments suffer from lack of communication and collaboration, incurring massive fines and penalties if efforts fall short. Ncontracts offers integrate...Read more about Ncontracts
Magnet AXIOM Cyber
Magnet AXIOM Cyber
Magnet AXIOM Cyber is a incident response and digital forensics software solution. It was specifically created for businesses that require performing acquisitions remotely and that need to analyze as well as collect evidence from ...Read more about Magnet AXIOM Cyber
Netacea Bot Management
Netacea Bot Management
Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicious bots, respond to attacks, and adapt to evolving threats. Netacea provides real-time threat data and can build ...Read more about Netacea Bot Management
S.O.A.R
S.O.A.R
S.O.A.R is an endpoint detection and response software designed to help businesses detect threats to mitigate risks and prevent breaches across systems. Administrators can automatically organize and prioritize events based on tria...Read more about S.O.A.R
CloudPassage Halo
CloudPassage Halo
CloudPassage Halo is a security solution that helps brands and businesses in finance, e-commerce, healthcare, gaming, B2B SaaS, biotech and digital media sectors safeguard cloud infrastructures. The CloudPassage Halo allows users ...Read more about CloudPassage Halo
GitGuardian
GitGuardian
GitGuardian, founded in 2017 by Jérémy Thomas and Eric Fourrier, has rapidly emerged as the leader in automated secrets detection and is now focused on providing a comprehensive code security platform. The company has raised a $56...Read more about GitGuardian
OnSecurity
OnSecurity
Pen testing platform designed for the flexibility that you need. Hourly billing functionality makes us 38% more cost-effective than traditional vendors. It enables users to view and book tests from one secure platform and get tes...Read more about OnSecurity
FluxCDN
FluxCDN
Content delivery network aimed at website security, such as DDoS Protection and WAF (Web Application Firewall)....Read more about FluxCDN
Reflectiz
Reflectiz
Take control of your website security with Reflectiz. Our proprietary website security sandbox creates a complete digital application inventory in minutes — the first of its kind. This inventory displays all the external applicati...Read more about Reflectiz
LogPoint
LogPoint
LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats with real-time application of correlation rules. LogPoint enables organizations to identify advanced threats and...Read more about LogPoint
zIPS
zIPS
zIPS is a mobile intrusion prevention software, which helps enterprises manage and secure access to data and company systems across employees' mobile devices or applications. It facilitates security against unauthorized devices, n...Read more about zIPS
Veracode
Veracode
Veracode is a static application security testing (SAST) solution that helps businesses manage security risk across the application building pipeline. It enables software developers to monitor source codes to identify vulnerabilit...Read more about Veracode
Cyware
Cyware
Cyware provides virtual cyber fusion centers built to enable end-to-end threat intelligence automation, sharing, and unprecedented threat response for global organizations....Read more about Cyware
Blumira
Blumira
Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue...Read more about Blumira
HID IdenTrust
HID IdenTrust
IDenTrust is a trusted provider of secure digital certificates, authentication services, and infrastructure for managing IP addresses in support of your organization's PKI. It delivers trusted and secure products to large organiza...Read more about HID IdenTrust
Verimatrix Code Shield
Verimatrix Code Shield
Verimatrix Code Shield is an automated solution that enables development teams to build and deploy applications. It injects automated and self-defending security directly into apps. It also hardens apps so it’s virtually impossibl...Read more about Verimatrix Code Shield
Vijilan
Vijilan
Vijilan offers managed service providers (MSPs) a suite of continuous monitoring solutions that allow them to detect and remediate security breaches. MSPs and IT providers can utilize log collection and storage, security threat an...Read more about Vijilan
LIAPP
LIAPP
LIAPP provides security features that mobile apps require to gain the power to protect themselves with source code protection, anti-tampering, anti-debugging, virtual machine detection, hacking tool detection, memory protection, l...Read more about LIAPP
Beagle Security
Beagle Security
Discover website security issues at the right time and address them in the right way using Beagle Security. With the ability to automate vulnerability assessment and accelerate remediation, you can secure your web applications fr...Read more about Beagle Security
IncMan SOAR
IncMan SOAR
IncMan SOAR is a cloud-based and on-premise solution, designed to helps MSSPs and organizations across finance, energy, healthcare or retail industries manage, measure, and orchestrate various security tasks such as threat hunting...Read more about IncMan SOAR
Beyond Identity
Beyond Identity
Beyond Identity is fundamentally changing the way workforces and customers log in. We eliminate passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible...Read more about Beyond Identity
ThreatAware
ThreatAware
ThreatAware is a Cyber Asset Management platform that integrates with existing security tools and systems to identify and protect every asset. ThreatAware locates any device or user that accesses corporate data and services, and c...Read more about ThreatAware
Siemplify
Siemplify
Siemplify is a cloud-native SOAR platform designed to help security professionals automate various security processes by building playbooks using a drag-and-drop interface. Key features include playbook automation, case management...Read more about Siemplify
Defend
Defend
Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFEND monitors all keyboard and pointer activity on the workstation or endpoint, using behavioral biometrics to veri...Read more about Defend
D3 SOAR
D3 SOAR
D3 SOAR is a cybersecurity and incident response solution that helps businesses streamline operations related to security automation, compliance management, auditing and more from within a unified platform. With the built-in visua...Read more about D3 SOAR
ThreatConnect TI Ops Platform
ThreatConnect TI Ops Platform
ThreatConnect is a cloud-based solution that helps businesses determine and prevent potential threats using security orchestration, automation and response (SOAR) capabilities. Supervisors can maintain a log of daily activities an...Read more about ThreatConnect TI Ops Platform
DataDome
DataDome
DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobi...Read more about DataDome
PhishDeck
PhishDeck
PhishDeck provides a powerful phishing simulation platform that enables organizations to run modern and advanced phishing campaigns in an environment that is safe both for the user as well as their targets. PhishDeck is powered b...Read more about PhishDeck
PhishER
PhishER
PhishER is a web-based Security Orchestration, Automation and Response (SOAR) platform designed to help information security and security operations teams automate the prioritization of emails and respond to threats quickly. Key f...Read more about PhishER
Active Bot Protection
Active Bot Protection
Active Bot Protection is a security platform, which helps businesses identify threats and protect websites or APIs from DDoS attacks. It lets IT teams visualize the web traffic and block malicious bots. The solution enables prof...Read more about Active Bot Protection
STORM
STORM
STORM is a cybersecurity software designed to help security operation centers identify, prioritize and resolve incidents. The platform enables administrators to collect and analyze cybersecurity incident-related data and automatic...Read more about STORM
Feedzai
Feedzai
Feedzai is a cloud-based solution that helps businesses identify, remediate and prevent financial frauds using artificial intelligence (AI) technology and machine learning capabilities. Professionals can use the dashboard to estab...Read more about Feedzai
Orca Security
Orca Security
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an a...Read more about Orca Security
Office Protect
Office Protect
Be your client’s security hero without the heavy lifting! Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. An exclusive Sherweb product, it provides best practice security settings, live mo...Read more about Office Protect
HackerOne
HackerOne
HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. Hac...Read more about HackerOne
Privatise
Privatise
Privatise offers organizations the ability to secure end- user devices regardless of where they are or what device they work from. Offering all the standard network security you would expect to find in the office simply by install...Read more about Privatise
QSEC
QSEC
QSEC® - The software for GRC, ISMS and data protection - complete, sustainable, effective and cost-efficient! QSEC® is a multi-compliance solution for Governance Risk Compliance, Information Security and Data Protection. In add...Read more about QSEC
Cytellix
Cytellix
www.cytellix.com Cytellix is a cloud-based solution that manages, plans, and executes the ongoing IT Security activities of service providers, enterprises, and small and medium businesses. It is transforming the security industry...Read more about Cytellix
Namogoo Digital Journey Continuity
Namogoo Digital Journey Continuity
Namogoo is a digital journey continuity platform, which enables brands to maximize the potential of each online journey for every eCommerce brand, by truly experiencing everything from their customers' eyes. With proprietary techn...Read more about Namogoo Digital Journey Continuity
RedShield
RedShield
RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government agencies proactively discover and remediate application and API vulnerabilities using artificial intelligence (AI)...Read more about RedShield
Claroty
Claroty
Claroty is a cybersecurity solution designed to help businesses in industries such as healthcare, utilities, defense, real estate and other industries safeguard their cyber-physical systems. With visibility, robust protection, and...Read more about Claroty
Silverfort
Silverfort
Silverfort is a unified identity protection solution that protects organizations against ransomware and identity-based cyber threats. The solution is designed to help mid-size to large enterprises in finance, healthcare, retail, ...Read more about Silverfort
iboss
iboss
iboss is a network security solution that helps finance, education, healthcare and other businesses manage secure access to network and applications across multiple devices and locations. The application allows organizations to en...Read more about iboss
DNSFilter
DNSFilter
DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to streamline threat detection and content filtering processes. Professionals can classify unknown websites into mul...Read more about DNSFilter
Area 1
Area 1
Area 1 Horizon is a secure email gateway software designed to help businesses detect and mitigate phishing attacks across web pages, emails and networks. It provides business email compromise (BEC) filtering functionality, enablin...Read more about Area 1
Redflags
Redflags
ThinkCyber's Redflags® software is a uniquely real-time solution to deliver secure behaviour change with corporate staff. Real-time and drip-fed security awareness interventions engage users "at the point of risk", allowing you to...Read more about Redflags
ThreatSTOP DNS Defense
ThreatSTOP DNS Defense
ThreatSTOP connects the best Threat Intelligence (TI) to your existing DNS systems, and blocks threats before damage is done. The SaaS platform aggregates and curates more than 900 Threat Intelligence (TI) feeds, removing the comp...Read more about ThreatSTOP DNS Defense
GuardRails
GuardRails
GuardRails is a security platform that empowers developers to build secure applications by giving them continuous protection. GuardRails provides a seamless experience for you and your team by securing all the critical component...Read more about GuardRails
Defendify
Defendify
Defendify is a cybersecurity solution that protects businesses from online threats. It caters to small and midsize companies and organizations without security teams, including IT and technology providers across all industries. D...Read more about Defendify
Exein
Exein
Exein is a cloud-based and open-source security solution for IoT and SCADA firmware systems, which runs autonomously on running devices and enables enterprises to detect issues or suspicious behavior. Exein Core automatically ex...Read more about Exein
INFIMA
INFIMA
INFIMA is a security awareness training solution that helps organizations design and manage custom training programs to deliver knowledge about compliance regulation, cyber safety, threat management, and best practices. The platfo...Read more about INFIMA
Uptycs
Uptycs
The Uptycs CNAPP + XDR Platform is a comprehensive security solution designed for modern attack surfaces. Uptycs enables organizations to reduce risk and respond to threats with a single, unified platform that covers the entire mo...Read more about Uptycs
Risk Ident
Risk Ident
Risk Ident is an online fraud prevention software solution that's designed to help companies identify, prevent and protect themselves against fraud. Risk Ident software automatically evaluates data points and calculates results, e...Read more about Risk Ident
ActiveFence
ActiveFence
ActiveFence is a threat intelligence tool stack designed to help trust and safety teams protect online platforms from malicious behavior and content. This solution is suitable for global teams in various industries including onlin...Read more about ActiveFence
Quixxi
Quixxi
Quixxi provides a detailed analysis of your app from a security perspective, reporting each detected vulnerability with a description, an explanation of the risks associated and recommendations for fixing the vulnerability. Quixxi...Read more about Quixxi
BluBracket Code Security Suite
BluBracket Code Security Suite
BluBracket Code Security Suite is a cloud-based software that helps developers with code security. The software offers features such as deep scans, coding mistake fixes, active token invalidations, stale reviews invalidations, dir...Read more about BluBracket Code Security Suite
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud unifies backup, anti-malware, antivirus and endpoint management capabilities (such as vulnerability assessments, patch management, remote access and monitoring, etc.) in one integrated, easy-to-use solu...Read more about Acronis Cyber Protect Cloud
NVADR
NVADR
NVADR is a continuous perimeter security solution to discover, track and monitor your internet-facing infrastructure, identify data leakages and identify security issues. NVADR continuously checks for your organization's assets s...Read more about NVADR
Integrite
Integrite
Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI and ML. The data gathered is used to derive actionable intelligence, and is presented on an insightful dashboard ...Read more about Integrite
DAtAnchor
DAtAnchor
DAtAnchor is a cloud-based cybersecurity solution that provides persistent encryption, access controls, and forensic logging for sensitive files. The platform caters to organizations that handle confidential data such as engineeri...Read more about DAtAnchor
Guardio
Guardio
Guardio is a Google Chrome extension designed to help businesses across a variety of industries protect private information and browse the web securely and quickly. Key features include suspicious site detection, on-demand scan, p...Read more about Guardio
CTM360
CTM360
CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities across the Surface, Deep & Dark web. Subscribers of the CTM360 platform get access to external attack surface manageme...Read more about CTM360
Cyber Security Services
Cyber Security Services
Cyber Security Services is a complete solution for security operations on-premise or in the cloud. It allows organizations to discover and monitor inactive or active assets across networks, check cloud configuration, perform vulne...Read more about Cyber Security Services
ThreatCop
ThreatCop
Threatcop Security Awareness Training (TSAT) is a cloud-based cybersecurity awareness tool, which helps businesses assess the threat posture and measure the vulnerability level of employees through an interactive questionnaire. Fe...Read more about ThreatCop
ShadowKat
ShadowKat
ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as we...Read more about ShadowKat
ASPIA
ASPIA
To provide intelligent security and vulnerability management, ASPIA's security orchestration automation includes data gathering, alerting, reporting, and ticketing. Gain a clear overview of security status with ASPIA to improve bu...Read more about ASPIA
Intigriti
Intigriti
Intigriti is a rapidly growing cybersecurity company based in Belgium. Our industry-leading bug bounty platform enables companies to tap into our global community of 50,000 ethical hackers, who use their unique expertise to f...Read more about Intigriti
FileWall
FileWall
FileWall is a security solution for Microsoft 365 that provides ultimate protection against file-based cyber-attacks for business applications like Exchange Online, SharePoint, Teams and OneDrive. It leverages Deep File Analysis (...Read more about FileWall
Twingate
Twingate
Twingate is the easiest way for organizations to adopt a Zero Trust Network Access solution and replace outdated, difficult-to-maintain, and insecure corporate VPNs. Built to make the lives of developers, DevOps, IT teams, and end...Read more about Twingate
Risk Assistant
Risk Assistant
Risk Assistant provides a simplified way to manage cybersecurity risks. It offers an easy way to deploy effective defensive measures and provides an integrated personal dashboard capability to manage exposure....Read more about Risk Assistant
Hackuity
Hackuity
Hackuity is not a simple vulnerability detection tool. It intervenes between detection and remediation to allow CISOs to optimize the remediation of the various vulnerabilities identified. It is thus possible to centralize all t...Read more about Hackuity
SoSafe Awareness Platform
SoSafe Awareness Platform
SoSafe Awareness Platform is a comprehensive cyber security awareness training and human risk management solution that helps protect your organization from cyber threats and social engineering attacks by activating Human Firewall ...Read more about SoSafe Awareness Platform
Hook Security
Hook Security
Hook Security understands how important it is to reduce the risk of security threats to your company, all while creating a positive and productive company culture. They provide phishing testing and security awareness training tha...Read more about Hook Security
Crowdsec
Crowdsec
CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors...Read more about Crowdsec
Acronis Cyber Protect
Acronis Cyber Protect
Acronis Cyber Protect has created a new benchmark in easy and fast recovery after cyberattacks or data loss, for organizations of all sizes, including modern multisite organizations and environments, including industrial IT. It de...Read more about Acronis Cyber Protect
Heimdal Threat Prevention
Heimdal Threat Prevention
Heimdal Threat Prevention is an advanced DNS security solution that adds hunting on top of traditional endpoint detection and response. It achieves this by filtering traffic at the levels of the DNS, HTTP, and HTTPS on both your e...Read more about Heimdal Threat Prevention
Avast Small Office Protection
Avast Small Office Protection
Avast Small Office Protection is a cybersecurity platform that helps small businesses protect devices such as PCs, laptops, mobiles and tablets from viruses and cyber-attacks. It enables IT teams to prevent unauthorized access to ...Read more about Avast Small Office Protection
Fingerprint
Fingerprint
Fingerprint is the leading device intelligence platform, supporting developers working on high-scale web and mobile applications. With highly accurate identification, we empower developers to construct top-notch fraud detection so...Read more about Fingerprint
Resecurity Risk
Resecurity Risk
Resecurity Risk allows carriers, drivers and logistics corporations to monitor and tracks the movement of goods, services and information across global supply chains. It helps companies in managing risks, with modules that include...Read more about Resecurity Risk
cleanAD
cleanAD
cleanAD is the most effective approach for online publishers and programmatic advertising platforms to block malicious ads, and the only anti-malvertising solution that forces malvertisers to pay for the impressions they attempt t...Read more about cleanAD
Argon
Argon
Argon’s first-to-market holistic security solution protects the integrity of software development environments’ CI/CD pipelines, eliminating risks from misconfigurations, vulnerabilities, and preventing major scale software supply...Read more about Argon
ReaQta-Hive
ReaQta-Hive
ReaQta-Hive is a AI-powered Autonomous Detection & Response platform that leverages Dynamic Behavioral Analysis to identify and block the most advanced attacks, including zero day threats, in-memory malware and ransomware. Equipp...Read more about ReaQta-Hive
CODA Footprint
CODA Footprint
CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimizes both discovery and evaluation of active software vulnerabilities. The CODA Footprint platform offers a compreh...Read more about CODA Footprint
Qualys Cloud Platform
Qualys Cloud Platform
Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attac...Read more about Qualys Cloud Platform
Pentera
Pentera
The Pentera automated penetration testing platform uses an algorithm to scan and ethically attack networks, providing real-time penetration tests at scale. Pentera safely performs the actions that a malicious adversary would — rec...Read more about Pentera
WebTitan
WebTitan
WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also provides web and DNS filtering control and is suitable for large and midsize businesses across all industries. ...Read more about WebTitan
Morphisec Guard
Morphisec Guard
Morphisec is an endpoint security platform designed to help small to large businesses manage and protect devices by camouflaging applications and web browsers from malware and data intrusions. It uses moving target defense (MTD) t...Read more about Morphisec Guard
Security Manager by FireMon
Security Manager by FireMon
FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Wi...Read more about Security Manager by FireMon
HarfangLab
HarfangLab
Designed for businesses of all sizes, HarfangLab is a cloud-based endpoint protection software that helps neutralize unknown cyberattacks on computers and servers. Key features include API, third-party integrations, activity monit...Read more about HarfangLab
MixMode
MixMode
MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. We deliver a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to...Read more about MixMode
Atomic ModSecurity Rules
Atomic ModSecurity Rules
Atomic ModSecurity Rules enables businesses to secure applications and web servers against cyber-attacks through web application firewall (WAF) rules. It enables IT professionals to prevent distributed denial of service (DDoS) and...Read more about Atomic ModSecurity Rules
Flashstart
Flashstart
Flashstart is an internet filtering service that assists businesses with DNS-based content or URL filtering, malware protection, and internet usage reporting. Businesses can utilize geoblocking capability to restrict user access a...Read more about Flashstart
Astra Security
Astra Security
Astra Security is a cybersecurity software designed to help businesses protect online stores and recover hacked websites. The platform enables administrators to block IP addresses, spam, suspicious login attempts and bad bots. Ma...Read more about Astra Security
CyberEasy
CyberEasy
CyberEasy is a cybersecurity solution, which enables businesses to identify and respond to suspicious behaviors, anomalies, malware, and attacks. Professionals can utilize the platform to receive alerts about issues and track inbo...Read more about CyberEasy
Web.com
Web.com
Web.com is a proprietary software platform that has been designed for the small business market. It offers an easy-to-use website builder, email, security and online marketing solutions in one place. It delivers all these services...Read more about Web.com
VaultCore
VaultCore
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. With VaultCore, administrators can a...Read more about VaultCore
Endpoint Detection and Response
Endpoint Detection and Response
Endpoint Detection and Response is an endpoint protection software designed to help businesses detect and mitigate threats using AI-enabled tools. The platform enables administrators to deploy policies, analyze threat patterns and...Read more about Endpoint Detection and Response
S2ME
S2ME
S2ME is free security assessment software. It evaluates risks with its statistical measurement tool and informs the user when the process is finished. It offers features such as categorizing threats, improvement recommendations an...Read more about S2ME
Cyber Risk Aware
Cyber Risk Aware
Designed for businesses of all sizes, Cyber Risk Aware is a cloud-based risk assessment software that helps deliver threat analysis training, monitor phishing attacks, and generate compliance reports on a unified platform. Key fea...Read more about Cyber Risk Aware
PhishingBox
PhishingBox
PhishingBox is a cloud-based security awareness training platform that helps small to large organizations conduct simulated phishing attacks to identify end-users’ susceptibility to threats. Features include pre-defined phishing e...Read more about PhishingBox
PA File Sight
PA File Sight
PA File Sight is ransomware protection and access auditing software that can be installed on Windows devices. Various types of organizations can use this tool to meet compliance requirements, detect and stop ransomware attacks, pr...Read more about PA File Sight
HTTPCS Cyber Vigilance
HTTPCS Cyber Vigilance
Data leaks monitoring and cyber threats detection solution. Your real-time malicious network monitoring solution (web, deepweb and darknet) to protect your company from cyberattacks. Based on the development of virtual agents c...Read more about HTTPCS Cyber Vigilance
Appsealing
Appsealing
AppSealing is a cloud-based and on-premise runtime app security solution that offers a no-coding approach to safeguarding users' applications. With AppSealing, staff members can enjoy zero friction while adding a protective layer ...Read more about Appsealing
Acra
Acra
Acra database security suite is a single multi-layered data protection tool that solves your data security vital needs. Acra provides 9 security controls application-level encryption allows you to encrypt sensitive data on the ap...Read more about Acra
Coro
Coro
Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, transportation, and legal services secure devices, users, and data against online threats via a unified portal. The a...Read more about Coro
Enginsight
Enginsight
Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the plat...Read more about Enginsight
WP Cerber Security
WP Cerber Security
WP Cerber Security is a WordPress malware protection plugin. It is designed to protect WordPress websites from malicious attacks such as SQL Injection, XSS, RFI and more. It offers real-time monitoring of all incoming requests wit...Read more about WP Cerber Security
DigitalStakeout Scout
DigitalStakeout Scout
DigitalStakeout Scout is an open source intelligence (OSINT) software platform designed for corporate security teams. The software enables users to efficiently monitor and analyze data from across the surface web, social media, an...Read more about DigitalStakeout Scout
Securden
Securden
Securden is an identity management software designed to help businesses of all sizes handle privileged accounts and passwords. The platform enables managers to consolidate details of servers and endpoints and manage approval workf...Read more about Securden
Teleport
Teleport
Teleport is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications. Teleport provides access control for all your cloud resources in one place. It simplifies the management of SSH keys...Read more about Teleport
Arkose Labs
Arkose Labs
Large enterprises and medium-sized businesses enhance the security and user experience of their online platforms with Arkose Labs' innovative cybersecurity solutions. The Arkose Bot Manager comprehensive bot detection and mitigati...Read more about Arkose Labs
iManage Threat Manager
iManage Threat Manager
iManage Threat Manager offers threat detection, intervention, analytics and data governance to protect sensitive content with compliance monitoring. The system protects sensitive information from internal and external threat vect...Read more about iManage Threat Manager
Symantec Hybrid Cloud Security
Symantec Hybrid Cloud Security
Symantec's Hybrid Cloud Security is a comprehensive suite of security solutions designed to protect workloads across public and private clouds, as well as traditional on-premises data centers. With Hybrid Cloud Security, organizat...Read more about Symantec Hybrid Cloud Security
Fidelis Elevate
Fidelis Elevate
Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and use...Read more about Fidelis Elevate
Exabeam
Exabeam
Exabeam is an analytics and automation solution for accelerated threat detection. From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIE...Read more about Exabeam
Darktrace
Darktrace
Darktrace is a cyber security solution designed to help businesses prevent cyber-attacks including ransomware and email phishing in real-time. It allows IT professionals to provide security against threats to cloud environments an...Read more about Darktrace
SecurityScorecard
SecurityScorecard
SecurityScorecard is a security ratings platform that enables enterprises to instantly rate, understand and continuously monitor the security risk of any company worldwide, non-intrusively and from an outside-in perspective. We ...Read more about SecurityScorecard
Reveelium
Reveelium
Reveelium is a cloud-based and on-premise solution cybersecurity and safety solution that helps businesses in aviation, hospitality, IT, computer software, retail, broadcast media, and other sectors identify thefts, manage threats...Read more about Reveelium
ThreatX
ThreatX
ThreatX is an enterprise-level security platform that helps businesses protect their data and systems from cyber threats. It is designed to protect web applications and APIs from bot-based attacks, zero-day attacks, malware commun...Read more about ThreatX
Agari Secure Email Cloud
Agari Secure Email Cloud
Secure Email Cloud is an on-premises email security solution that is built on next-generation architecture. It integrates seamlessly with cloud-only on-premises and hybrid email configurations without risk of disruption to email o...Read more about Agari Secure Email Cloud
Interset
Interset
Interset is a cybersecurity solution that uses advanced algorithms to analyze user and entity behavior and detect anomalies and unusual activity. It can be used to monitor activity across multiple data sources, including network t...Read more about Interset
BitSight
BitSight
BitSight is transforming the way that the global marketplace addresses cyber risk with cybersecurity ratings and analytics. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings ...Read more about BitSight
ThreatLocker
ThreatLocker
Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlis...Read more about ThreatLocker
FortMesa
FortMesa
FortMesa can transform an MSP into a cybersecurity powerhouse. By delivering cybersecurity programs based on industry standards (NIST, ISO, SOC2, CIS, CMMC, Fedramp, CJIS, and more) MSPs take command of their customers cyber needs...Read more about FortMesa
Quantum Armor
Quantum Armor
With Quantum Armor, users can detect, monitor, and analyze all of their public-facing digital assets around-the-clock. All at the click of a button. Quantum Armor will even guide users step-by-step on how to mitigate their vulner...Read more about Quantum Armor
Sonrai Public Cloud Security Platform
Sonrai Public Cloud Security Platform
Sonrai Public Cloud Security Platform delivers an enterprise identity and data governance platform to protect your cloud from insider threats, external threats, cybercrime, and information loss. Sonrai gives IT teams the visibili...Read more about Sonrai Public Cloud Security Platform
AwareGO
AwareGO
AwareGO is a human risk assessment solution that helps businesses identify, measure and remedy the human risk factor when it comes to cybersecurity. It enables professionals to measure top human attack vectors including - - Phis...Read more about AwareGO
Blackpoint MDR
Blackpoint MDR
Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber exp...Read more about Blackpoint MDR
swIDch Auth SDK
swIDch Auth SDK
swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. swIDch Aut...Read more about swIDch Auth SDK
Volterra
Volterra
F5's Volterra is a distributed cloud platform to deploy, connect, secure, and manage applications and data across multiple clouds, private and public, and at edge locations. Volterra’s global network allows you to secure cloud app...Read more about Volterra
6clicks
6clicks
6clicks is an easy way to implement your risk & compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate t...Read more about 6clicks
Phishing Tackle
Phishing Tackle
Phishing Tackle is a cloud-based cyber security solution designed to help private, public and non-profit organizations manage security awareness training using simulated phishing attacks. It offers various features such as knowled...Read more about Phishing Tackle
Bitdefender GravityZone
Bitdefender GravityZone
Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mob...Read more about Bitdefender GravityZone
SharePass
SharePass
SharePass is an online solution for sharing secrets and confidential information using a web application, browser extension, or mobile app. SharePass will deliver a one-time encrypted link from the sender to the receiver; it expi...Read more about SharePass
Acronis Cyber Protect Home Office (formerly Acronis True Image)
Acronis Cyber Protect Home Office (formerly Acronis True Image)
Acronis Cyber Protect Home Office (formerly Acronis True Image) provides reliable backup and advanced anti-malware in one full-featured solution. It’s simple and easy to use — better protection at a fraction of the cost: that’s th...Read more about Acronis Cyber Protect Home Office (formerly Acronis True Image)
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is on...Read more about F5 Distributed Cloud Bot Defense
IDA Pro
IDA Pro
IDA Pro is a binary code analysis tool. It's capable of creating maps of software's execution to show the binary instructions that are actually executed by the processor in a symbolic representation called assembly language. This ...Read more about IDA Pro
Naq Cyber
Naq Cyber
Naq Cyber is an automated healthcare compliance platform enabling healthcare innovators to bring solutions to the market by automating compliance with the frameworks required to grow. Naq's automated platform streamlines complia...Read more about Naq Cyber
Wallarm WAF
Wallarm WAF
Wallarm WAF is a network security and PCI compliance tool that enables programmers to build web-based apps securely. Key features include PCI assessment, threat intelligence, log & patch management, access control, intrusion detec...Read more about Wallarm WAF
Blacklock
Blacklock
Blacklock is an award-winning service that offers consultant-grade testing with an On-Demand experience. The service allows you to perform penetration testing when you need it. We love to make security things simple, practical and...Read more about Blacklock
CnSight
CnSight
CnSight is a cybersecurity performance management platform that helps businesses effectively manage cyber and risk across the enterprise. CnSight helps manage your business of cybersecurity. This innovative solution is designed t...Read more about CnSight
Sealit
Sealit
Sealit solutions provide end-to-end encryption giving full data management to its users with email and file protection. Seamlessly implemented with communication & collaboration tools that you already use. Best for small businesse...Read more about Sealit
Astra Pentest
Astra Pentest
Astra Pentest offers a vulnerability assessment tool that packs the intelligence acquired over years of security testing. The vulnerability scanner conducts 8000+ tests ensuring a thorough evaluation of a user's security strength....Read more about Astra Pentest
Managed Detection and Response (MDR)
Managed Detection and Response (MDR)
Managed Detection and Response (MDR) is a cloud-based cybersecurity platform that provides businesses with tools to identify, manage and resolve security threats. Professionals can store information about security incidents and mo...Read more about Managed Detection and Response (MDR)
Security for Everyone
Security for Everyone
Your users and visitors depend on you to keep their information safe. If you want to be sure your digital assets are secure, Security for Everyone is the tool for you. With S4E, you will have: 1- Manual Vulnerability Scanning 2- ...Read more about Security for Everyone
SYSVOOT Antivirus Pro
SYSVOOT Antivirus Pro
SYSVOOT Antivirus Pro comes with the best features bundled in a single software and that to with unmatched price. Download now and shield your PC/Laptop against latest internet threats....Read more about SYSVOOT Antivirus Pro
Wallarm API Security
Wallarm API Security
Wallarm API Security platform provides visibility, robust protection and automated incident response across your entire API portfolio. Wallarm API security provides robust protection for APIs, microservices and serverless workload...Read more about Wallarm API Security
Appaegis Isolation Access Cloud
Appaegis Isolation Access Cloud
Appaegis provides the most secure agentless zero trust remote access solution to connect authorized users and devices to enterprise applications and data. Appaegis’ cloud-native solution fits into any organization’s remote access ...Read more about Appaegis Isolation Access Cloud
CanIPhish
CanIPhish
CanIPhish is a phishing simulation and security awareness training platform that helps organizations train employees to detect and report phishing threats. The software caters to information security and IT teams in companies of a...Read more about CanIPhish
Secyour Enterprise
Secyour Enterprise
Secyour Enterprise is a business security solution. It provides application security testing to ensure the integrity of web and mobile applications and data. Infrastructure testing is offered to test the security of application in...Read more about Secyour Enterprise
Tenacy
Tenacy
Tenacy is the platform that simplifies cybersecurity management for all ISS teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. You can then continuously measure your secu...Read more about Tenacy
Trend Micro Cloud One
Trend Micro Cloud One
Trend Micro Cloud One is a compliance and computer security solution that helps businesses streamline processes related to threat monitoring, vulnerability scanning, behavioral analysis, file integrity monitoring, and more on a ce...Read more about Trend Micro Cloud One
MobileWall
MobileWall
Create the secure, mobile network that works for your business. MobileWall provides security, visibility, and control of mobile data through a patented, cloud-based mobile firewall. Customers gain visibility and take control of ...Read more about MobileWall
Defense.com
Defense.com
Defense.com is a cybersecurity platform that helps enterprises ensure compliance with security policies and manage detection/protection of data and applications from online threats. The solution enables businesses to create user p...Read more about Defense.com
SpectralOps
SpectralOps
Spectral Enables teams to build and ship software faster while avoiding security mistakes, credential leakage, misconfiguration and data breaches without agents, across the entire software development lifecycle. Now you can code s...Read more about SpectralOps
Hackrate
Hackrate
Hackrate Bug Bounty platform helps organizations to identify software vulnerabilities in a cost-efficient way. A bug bounty is about utilizing the power of crowdsourced security to secure businesses. During a bug bounty program, ...Read more about Hackrate
Octiga
Octiga
Octiga applies coherent best practice security posture for Office 365 through automation. As a result, clients achieve Instant corporate-wide security for config, users, azureAD groups, mailboxes, teams, SharePoint, intune and e...Read more about Octiga
CybeReady
CybeReady
CybeReady is a cloud-based cybersecurity awareness training solution, designed to help organizations of all sizes across finance, manufacturing, and pharmaceutical sectors build and assign training sessions to employees. CybeRe...Read more about CybeReady
Red Sentry
Red Sentry
Red Sentry is the industry leader in fast and affordable penetration testing. Our unique value comes in combining our fast pentests with our automated platform, keeping customers protected 24/7/365....Read more about Red Sentry
Beyond DLP
Beyond DLP
Due to increased risk and HIPAA regulation demands for DLP and file tracking, PharmScript, provider of long-term care pharmacy services to healthcare facilities across 10 states was required to implement a regulatory compliant dat...Read more about Beyond DLP
ThreatDefence XDR Platform
ThreatDefence XDR Platform
Designed for small to large businesses in education, legal services, finance and other industries, ThreatDefence XDR Platform is an on-premise and cloud-based platform that helps manage cybersecurity via threat intelligence, machi...Read more about ThreatDefence XDR Platform
Probely
Probely
Probely is a cloud-based web vulnerability scanning solution for security teams and developers. It is suitable for companies that build digital services. The solution scans web applications and manages the lifecycle of detected vu...Read more about Probely
Risk Ledger
Risk Ledger
Risk Ledger is a network of connected organisations, working together to improve security and reduce risk in the supply chain. It provides help and support to suppliers to put controls in place that keeps their organisation safe a...Read more about Risk Ledger
Trava
Trava
Trava is a cybersecurity solution, which enables investors, managed service providers and businesses to identify threats, secure financial assets and assess risks. Trava's automated assessments let organizations can scan technic...Read more about Trava
FileFlex
FileFlex
FileFlex Enterprise is a service that allows users to remotely access and share files and folders located anywhere on an organization’s storage structure over the internet - without the need for a VPN. This makes it ideal not jus...Read more about FileFlex
vRx
vRx
<-- Patch Everything You Need --> Automatically or manually install all prioritized updates for which a patch is available across your OS and Apps. Focus on the vulnerabilities that have a real probability of being exploited inste...Read more about vRx
WhiteSource
WhiteSource
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or comp...Read more about WhiteSource
MeghOps
MeghOps
MeghOps emerges as a reliable partner for businesses seeking a holistic and hassle-free cybersecurity solution. By integrating cloud security compliance, a robust firewall, and a suite of security services, MeghOps empowers organi...Read more about MeghOps
EBRAND X-RAY
EBRAND X-RAY
EBRAND X-RAY is a digital risk protection solution that prevents, monitors, and counters online threats to safeguard a company's online assets. The platform uses AI-powered tools such as RADAR for threat detection and TRACKER for ...Read more about EBRAND X-RAY
SpamTitan Plus
SpamTitan Plus
SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspicious or malicious links. The main features of SpamTitan Plus include time-of-click analysis, malicious link neutr...Read more about SpamTitan Plus
SpyWarrior
SpyWarrior
SpyWarrior is an antivirus software that protects computers against malware, viruses and other threats. It caters to individual users, small businesses and enterprises. SpyWarrior provides real-time protection that automatically...Read more about SpyWarrior
Abnormal Security
Abnormal Security
Abnormal stops text-only based socially engineered attacks with natural language processing understanding what normal looks like to block never-before-seen attacks. Abnormal has complete visibility into all email traffic, includ...Read more about Abnormal Security
Versa SASE
Versa SASE
At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime. Protect – Every asset (device, user, site, workload) in the organization. Connect – E...Read more about Versa SASE
Resecurity Context
Resecurity Context
Resecurity Context is a cloud-based threat analysis tool that allows companies to quickly identify and remediate external risks. The platform allows users to identify the exposure of sensitive data, identify the exposure of confid...Read more about Resecurity Context
Enigma Vault
Enigma Vault
Enigma Vault offers cloud-based data security solutions that protect what's most important. Practically every industry has been plagued with data security issues: data breaches through application vulnerabilities, cloud bucket st...Read more about Enigma Vault
IPinfo
IPinfo
IPinfo's cloud-based APIs and databases offer industry-leading IP address data. Individuals and businesses of all sizes use these insights to implement unique use cases on their websites. It can help businesses to customize websit...Read more about IPinfo
LetsDefend
LetsDefend
LetsDefend is a cybersecurity training platform that provides hands-on cybersecurity training in a simulated security operations center environment. LetsDefend caters to information security professionals looking to strengthen the...Read more about LetsDefend
SOAR Tools
SOAR Tools
As organizations around the world face a constant and dynamic barrage of cybersecurity threats, the development of Security Orchestration tools to accelerate security operations, automation and response have rapidly increased. Th...Read more about SOAR Tools
CLAW
CLAW
CLAW is a cybersecurity platform that helps businesses identify real-time threats and assess network's gaps. Organizations can build composite datasets that quickly identify false positives. Using CLAW, businesses can enhance sn...Read more about CLAW
Phished
Phished
As a global security awareness company, Phished is on a daily mission to predict and prevent cyber incidents. With the aid of our smart and fully automated AI-driven platform, we train your employees to become a real Human Firewal...Read more about Phished
Indeni
Indeni
Indeni is a cloud-based network monitoring solution which assists medium to large-sized firms with collecting and analyzing performance and configuration data. Its key features include issue tracking, troubleshooting, ticket manag...Read more about Indeni
usecure
usecure
usecure's human risk management (HRM) platform evaluates employee security posture against evolving cyber threats and reduces user-related security incidents caused by human error, whilst demonstrating compliance with core securit...Read more about usecure
CYBERAWARE SECURITY
CYBERAWARE SECURITY
Contrary to what many might think, technology is not the biggest weapon against cyber crime. While technology can offer protection to a great extent, it is useless if computer users themselves voluntarily allow hackers to access a...Read more about CYBERAWARE SECURITY
Make IT Safe
Make IT Safe
Make IT Safe is a cyber risk management software solution. It is designed for organizations seeking to strengthen the information security posture and ensure compliance with data privacy regulations like the General Data Protectio...Read more about Make IT Safe
Agari Phishing Defense
Agari Phishing Defense
Agari Phishing Defense is a cloud-based software that helps protect businesses from online attacks — whether that be social engineering, spearphishing and other forms of identity theft. The solution combines behavioral analysis wi...Read more about Agari Phishing Defense
Fortra's Agari DMARC Protection
Fortra's Agari DMARC Protection
Agari Brand Protection allows organizations to ensure security from email spoofing, phishing, and other online threats. A cloud-based solution, Agari provides DMARC email authentication, enterprise-grade SPF and DKIM that help pr...Read more about Fortra's Agari DMARC Protection
Arcules
Arcules
Arcules is a cloud surveillance solution that can manage all live and recorded videos across 4,000+ devices and 100,000+ channels. Arcules delivers a simple and unified access control, video surveillance, and analytics platform ...Read more about Arcules
Zero Threat Advanced
Zero Threat Advanced
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security (AV/NGAV), endpoint detection and response (EDR), endpoint management capabilities, and 5 mobile device management (MDM) licenses to...Read more about Zero Threat Advanced
Jamf Protect
Jamf Protect
Jamf Protect is an endpoint security solution designed to help businesses identify, prevent and resolve threats across Mac devices. The application allows users to gain visibility across remote devices and send automated alerts in...Read more about Jamf Protect
EncryptRIGHT
EncryptRIGHT
EncryptRIGHT simplifies application level data protection by abstracting data protection policies from application programming, while providing a complete separation of duties between information security and application programmi...Read more about EncryptRIGHT
vPenTest
vPenTest
vPentest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge,...Read more about vPenTest
Orna
Orna
ORNA is a SaaS Cyber Incident Response Platform for midsize businesses, designed to replace the old-fashioned paper or PDF-based cyber incident response Plans and Playbooks. By using ORNA, businesses can effortlessly respond to th...Read more about Orna
Worldr for Microsoft Teams
Worldr for Microsoft Teams
Worldr for Microsoft Teams is a game-changing solution that enables data sovereignty, compliance, and enhanced security for the platform. The solution allows organizations to localize their communication data and store it wherever...Read more about Worldr for Microsoft Teams
CalQRisk
CalQRisk
CalQRisk is a bespoke, tailored solution to Governance Risk and Compliance. This integrated web app solution is available on all devices and allows clients to manage risk, third party management, governance, compliance, sports reg...Read more about CalQRisk
Webz.io
Webz.io
Webz.io deploys a wide array of crawlers, specifically designed for particular verticals, sources, and formats. These crawlers run continuously, in real-time, extracting and parsing data from across the web, and building it into v...Read more about Webz.io
Portnox CLEAR
Portnox CLEAR
Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect compromised devices, and automate mitigation to high-risk devices. It allows staff members to configure essential ...Read more about Portnox CLEAR
Scytale
Scytale
Scytale aims to save fast-moving tech startups hundred of hours by automating their SOC 2 and IS0 27001 readiness process and enables teams to manage compliance workflows all within the tool. Scytale makes compliance simple throug...Read more about Scytale
BrowseControl
BrowseControl
With BrowseControl web filtering and application blocking software by CurrentWare you can prevent the launching of applications and control what websites can be accessed based on URL, IP address, and web content category. When a...Read more about BrowseControl
Elastic Security
Elastic Security
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of data, automating key processes, and bringing native endpoint security to every host. Elastic S...Read more about Elastic Security
Flare
Flare
Flare is a digital footprint monitoring platform that scans the internet to identify exposed or leaked enterprise assets. It is designed to help companies protect their sensitive data and financial resources. Using AI technology, ...Read more about Flare
Tricent
Tricent
Automate compliance in Microsoft 365 or Google Workspace with Tricent - a tool that helps you audit and clean up (external) access to files and Teams. Problem: Most businesses have no way of knowing if critical or personal infor...Read more about Tricent
Netrinos
Netrinos
Netrinos is a secure private networking solution designed for remote workers, travelers, and distributed teams who require connectivity across various locations. This software enables instant access to devices from anywhere, provi...Read more about Netrinos
Conviso
Conviso
Conviso is a Static Application Security Testing tool that helps businesses secure application development pipelines via vulnerability scanning, automated testing, and more. This platform is designed for businesses in finance, eCo...Read more about Conviso
tbSIEM
tbSIEM
tbSIEM is a log management solution that helps businesses manage multiple data sources and network performances. The platform enables managers to monitor, analyze and investigate the data collected by various security tools, inclu...Read more about tbSIEM
Malwarebytes for Business
Malwarebytes for Business
Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response. The platform provides enterprise-class threat detection, isolation, and ...Read more about Malwarebytes for Business
Cyberday
Cyberday
Cyberday is an easy-to-use compliance tool for IT specialists and cyber security professionals. It helps users manage all the needed actions to get certification-ready. Cyberday offers a unique solution for many different factors...Read more about Cyberday
ESET PROTECT MDR
ESET PROTECT MDR
Organizations now need increased visibility into their computers and networks to ensure that emerging threats, careless behavior by employees or unwanted applications do not put their profits or reputations at risk. The answer is ...Read more about ESET PROTECT MDR
CyLock Anti-Hacker
CyLock Anti-Hacker
CyLock Anti-Hacker is a software designed to protect systems from hacker attacks by identifying weaknesses across the network and websites and providing information to address vulnerabilities. The dashboard allows managers to moni...Read more about CyLock Anti-Hacker
Specops Secure Service Desk
Specops Secure Service Desk
Secure Service Desk provides multi-factor authentication for your service desk, allowing businesses to verify the accounts of users with existing data in an active Directory. Users can send a one-time code to the mobile number as...Read more about Specops Secure Service Desk
Specops uReset
Specops uReset
Specops uReset is a self-service password reset solution that enables users to reset their password using an authentication engine. It also updates locally cached credentials, even when users are off VPN. The platform allows organ...Read more about Specops uReset
Specops Password Auditor
Specops Password Auditor
Specops Password Auditor is a password audit tool that can identify password-related vulnerabilities within Active Directory accounts. Designed to improve password security and help organizations meet compliance requirements, this...Read more about Specops Password Auditor
Specops Password Policy
Specops Password Policy
Specops Password Policy password management tools and services to prevent attacks and breaches. The platform supports multiple identity and access management systems, including Active Directory, LDAP, OpenLDAP and NIS and offers i...Read more about Specops Password Policy
CloudWize
CloudWize
CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture design to runtime. We are the only cloud security cloud center of excellence. CloudWize provides 360° protection to pr...Read more about CloudWize
Reblaze
Reblaze
Reblaze is a cloud-based web security software that can integrate with other solutions for extra security. The Reblaze WAF is deployed as part of a unique private cloud and does not use shared clouds to avoid vulnerabilities. The ...Read more about Reblaze
Pareto Security
Pareto Security
Pareto Security helps businesses avoid common security mistakes on Mac. The app regularly checks Mac's security configuration and it helps businesses take care of security tasks that prevent problems. ...Read more about Pareto Security
iQ.Suite aaS
iQ.Suite aaS
iQ.Suite aaS is a comprehensive email management solution that provides enterprises using Microsoft 365 with email security capabilities. Designed to ensure email communications within an organization are secure, this solution off...Read more about iQ.Suite aaS
ESET Home Office Security Pack
ESET Home Office Security Pack
ESET Home Office Security Pack is a cloud console that provides visibility, administration and detailed information in a centralized way. ESET Home Office Security Pack includes 4 advanced cybersecurity technology products: - ESE...Read more about ESET Home Office Security Pack
HighGround
HighGround
HighGround offers a range of technology capabilities that allow IT and security managers to take control of their security experience. It allows them to have full visibility and control of their security posture and gives them the...Read more about HighGround
BigID
BigID
BigID is a cloud-based platform that helps businesses manage data intelligence via data governance, privacy, scanning, classification and more. The software offers various features such as machine learning (ML), cloud management, ...Read more about BigID
PC Matic PRO
PC Matic PRO
PC Matic PRO is an endpoint security suite that provides application whitelisting, endpoint protection, endpoint detection and response, and remote monitoring and management capabilities. The solution targets IT departments and ma...Read more about PC Matic PRO
NetFilter
NetFilter
Lenovo NetFilter and Lenovo NetFilter+ are cloud-based and AI-driven, providing powerful, real-time protection for student devices in both onsite and remote learning environments. ...Read more about NetFilter
Holm Security VMP
Holm Security VMP
The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one inte...Read more about Holm Security VMP
Armor
Armor
Minerva Armor is the industry's first multi-layered anti-ransomware solution, built to completely prevent ransomware at the earliest stage of the attack, often months before other solutions can even detect them. Minerva Armor wor...Read more about Armor
SiteLock
SiteLock
SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the online business against hackers. Designed for all industries, the platform provides solutions for vulnerability ...Read more about SiteLock
ManageEngine Firewall Analyzer
ManageEngine Firewall Analyzer
ManageEngine Firewall Analyzer is a robust network security management solution, providing in-depth insights into firewall activity. It empowers organizations to monitor, analyze, and optimize firewall performance effortlessly. Wi...Read more about ManageEngine Firewall Analyzer
Incapsula
Incapsula
Incapsula is a cloud-based application delivery controller (ADC) platform, which uses a global content delivery network (CDN) to manage website performance, compliance and application security against distributed denial of service...Read more about Incapsula
Delivery Trust
Delivery Trust
Delivery Trust offers users total control over emails throughout their entire lifecycle. Messages are secured with the click of a button and empower senders to maintain control of their messages by restricting recipients’ printing...Read more about Delivery Trust
Chariot
Chariot
The Chariot Platform enables organizations to identify, assess and reduce vulnerabilities in their networks as well as rapidly respond to real-time attacks. The platform’s unique approach to attacking cyber threats provides custom...Read more about Chariot
Netwrix Threat Manager (formerly StealthDEFEND)
Netwrix Threat Manager (formerly StealthDEFEND)
Netwrix StealthDEFEND protects critical Active Directory and file system data. Detect even highly sophisticated threats in real-time. Respond automatically to attacks and abnormal behavior. Send threat data to ServiceNow, Slack, M...Read more about Netwrix Threat Manager (formerly StealthDEFEND)
ESOF VMDR
ESOF VMDR
ESOF (Enterprise Security in One Framework) VMDR is the product launched by TAC Security in 2018. The product quickly assesses the risk and addresses prime concerns. ESOF VMDR is a risk-based vulnerability management platform for...Read more about ESOF VMDR
GeeTest CAPTCHA
GeeTest CAPTCHA
GeeTest's advanced CAPTCHA and bot management solutions shield websites, mobile apps and APIs from automated bot attacks like ATO, credential stuffing and web scalping. Since 2012, GeeTest has been developing human-bot verificatio...Read more about GeeTest CAPTCHA
SentinelOne
SentinelOne
SentinelOne is a cloud-based solution that helps businesses of all sizes manage processes related to the entire threat lifecycle for providing endpoint security. Key features include behavioral analytics, activity log, whitelistin...Read more about SentinelOne
Asimily Insight
Asimily Insight
Asimily’s best-in-class Insight IoMT and IoT risk remediation platform, developed specifically for medical devices, is designed to meet the latest data security and data privacy compliance requirements, continuously monitors, iden...Read more about Asimily Insight
IRONSCALES
IRONSCALES
IRONSCALES is the leading cloud email security platform for the enterprise that uses artificial intelligence (AI) and human insights (HI) to stop advanced phishing attacks that bypass traditional security solutions. Its award-winn...Read more about IRONSCALES
Sherlock
Sherlock
We market a solution that protects SMEs from cyber attacks. It is simple, effective and affordable. It is a probe that constantly monitors your network. Its embedded interface presents an inventory of all devices connected to the ...Read more about Sherlock
ShadowHQ
ShadowHQ
ShadowHQ is a mobile and desktop application. When a cyber threat or attack is detected by the IT team, users in the organization can open ShadowHQ and activate an incident. That incident will send out an alert to everyone in your...Read more about ShadowHQ
Lucidum
Lucidum
Lucidum was founded on two concepts adjacent to the security environment. First, the ability of ad space technology to identify, categorize, and target users from their scant metadata yet do so with sufficient precision to yield m...Read more about Lucidum
Phalanx GRC
Phalanx GRC
Build a world-class security and compliance program with Phalanx GRC. The platform, which you can start using today for free, helps organizations build, manage, and maintain various compliance programs including ISO 27001, SOC 2, ...Read more about Phalanx GRC
TTB Antivirus
TTB Antivirus
TTB Antivirus is an antivirus solution designed to maintain system integrity and compliance for personal and business users. The software caters to individuals, small businesses, and enterprises seeking advanced malware protection...Read more about TTB Antivirus
SEKOIA.IO
SEKOIA.IO
Sekoia.IO is a cloud-based cybersecurity platform designed to help organizations anticipate, detect and respond to cyber threats. The platform caters to security teams across industries looking to improve their defense capabilitie...Read more about SEKOIA.IO
Gradient Cyber
Gradient Cyber
Gradient Cyber is the only SOCaaS company working to improve your security with 24/7 cybersecurity expertise, a SecOps platform for threat detection across all your IT infrastructure ‘swim lanes’, and continuous diagnostics to str...Read more about Gradient Cyber
Banyan Security
Banyan Security
Banyan Security’s next-generation zero trust network access platform offers seamless remote access to corporate resources hosted on-premise or in hybrid and multi-cloud environments. Banyan enhances security by reducing your attac...Read more about Banyan Security
Timus
Timus
Companies struggle to meet the network security demands of the cloud era; balancing easier remote access with stricter cybersecurity requirements. Existing solutions like VPNs and hardware-based firewalls don’t cut it. VPNs are ...Read more about Timus
BLACKbox
BLACKbox
BLACKbox provides a cloud-based data loss prevention and data theft prevention solution that prevents data leakage, protects intellectual property, and safeguards information assets. It becomes difficult to maintain continuity if...Read more about BLACKbox
Push Security
Push Security
Push is a vulnerability scanner for your cloud identities. Map out your entire cloud identity attack surface and harden it against identity-based attacks. Push uses a lightweight browser extension to give you real-time visibility...Read more about Push Security
Ace Managed Security Services
Ace Managed Security Services
ACE Managed Security Services is a managed cybersecurity offering with a suite of next-generation security solutions. It includes Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment solutions. Businesses...Read more about Ace Managed Security Services
Shieldoo
Shieldoo
Shieldoo is a new way of secure connection, no matter where you are, designed to make it easier than ever for individuals and businesses, regardless of their technical knowledge or experience level. It's as simple as opening the a...Read more about Shieldoo
Panzura
Panzura
Panzura provides unstructured file data mobility, access, security, and control through a single, global file system—native to the cloud—to simplify IT infrastructure and file storage. Our award-winning hybrid cloud platform suppo...Read more about Panzura
Onehub
Onehub
Onehub is a cloud-based collaboration tool and virtual data room that helps users securely store and share their business files. It can be customized to meet users' specific requirements and custom branding needs. Onehub offe...Read more about Onehub
LogicGate Risk Cloud
LogicGate Risk Cloud
LogicGate Risk Cloud® is a no-code governance, risk, and compliance (GRC) platform that scales and adapts to your changing business needs and regulatory requirements. It combines a suite of purpose-built Applications with intuitiv...Read more about LogicGate Risk Cloud
Match
Match
Match helps improve organizational efficiencies and productivity by automating detection activities to quickly profile a threat and its impact on the organization to enable an effective response. Match collects security telemetry...Read more about Match
The Anomali Platform
The Anomali Platform
The Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence repository, to automatically correlate all installed security telemetry against active threat intelligence to stop breac...Read more about The Anomali Platform
CyberCompass
CyberCompass
CyberCompass is a cloud-based governance, risk and compliance management solution that helps organizations in regulated industries such as financial services, healthcare and education manage compliance requirements. The software o...Read more about CyberCompass
ManageEngine Key Manager Plus
ManageEngine Key Manager Plus
Today's complicated IT infrastructure encompasses a lot of machine to machine interactions, using digital identities like SSH keys, SSL/TLS certificates, and PGP keys. Compromised or stolen digital identities pose a huge security ...Read more about ManageEngine Key Manager Plus
CYRISMA
CYRISMA
CYRISMA provides a complete risk assessment and mitigation ecosystem to organizations via a unified platform. The cloud-delivered solution is easy to deploy and use, with capabilities for internal and external vulnerability scanni...Read more about CYRISMA
Field Effect
Field Effect
Field Effect provides businesses of all sizes with powerful cybersecurity solutions to protect them. It delivers complete protection across the entire IT environment, all from one portal. Get visibility into clients’ security pos...Read more about Field Effect
CERMAT
CERMAT
CERMAT allows you to keep track of all employee qualifications in one place. This is particularly useful for industrial companies. The software can be used to record all mandatory trainings, certificates and examinations for each ...Read more about CERMAT
Todyl Security Platform
Todyl Security Platform
Todyl Security Platform is a comprehensive cybersecurity solution that unifies networking, threat prevention, detection, response, and compliance tools into a single platform. The platform aims to help enterprises of all sizes sim...Read more about Todyl Security Platform
SafeGuard Cyber Security
SafeGuard Cyber Security
SafeGuard Cyber Security is a cybersecurity solution that protects businesses’ communications and data from social-engineering attacks, phishing emails and more using a natural language understanding (NLU) analytics engine. Risk ...Read more about SafeGuard Cyber Security
Keeper Security
Keeper Security
Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a "zero-knowledge" security feature, which allows users only with access to the information being s...Read more about Keeper Security
i-RADAR
i-RADAR
i-RADAR is a cybersecurity platform that allows businesses to detect exposed digital assets within their environment using artificial intelligence. Unlike traditional security systems, the attack surface management platform provid...Read more about i-RADAR
Lookout
Lookout
Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, ...Read more about Lookout
IPQS
IPQS
IPQS is a leading fraud prevention solution tailored for businesses like yours. Powered by the most up-to-date and comprehensive data, our advanced APIs and datasets specialize in real-time fraud prevention with unparalleled accur...Read more about IPQS
Deepinfo Attack Surface Platform
Deepinfo Attack Surface Platform
Deepinfo Attack Surface Platform is a cloud-based solution that helps businesses discover and monitor digital assets, detect issues and vulnerabilities, and remediate them. To optimize cybersecurity efforts, administrators can p...Read more about Deepinfo Attack Surface Platform
Clario
Clario
Clario is an all-in-one cybersecurity solution with built-in 24/7 live chat. Key features include: Automatic public Wi-Fi security 24/7 security expert help Spyware detector (Android) Daily malware scan (Android and macOS) Fraud ...Read more about Clario
ALog Series
ALog Series
ALog Series is a cloud-based and on-premise log management solution that assists enterprises with log extraction, context analysis and summary. It offers a search engine which helps users search, report, and manage time-series dat...Read more about ALog Series
cyberscan.io
cyberscan.io
cyberscan.io combines the functions of vulnerability scanner, penetration tool and OSINT scanner in one product. The scanner identifies all IP addresses and sub-domains associated with a domain and scans them for open ports. The r...Read more about cyberscan.io
ManageEngine Password Manager Pro
ManageEngine Password Manager Pro
ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager P...Read more about ManageEngine Password Manager Pro
PingSafe
PingSafe
PingSafe is an industry-leading all-in-one cloud security platform with a comprehensive knowledge of the attackers’ modus operandi. PingSafe is a comprehensive CNAPP that scans your entire cloud infrastructure through an attacke...Read more about PingSafe
ChatMail
ChatMail
Identity theft, fraud, and ransomware can happen to anyone - individuals and businesses need to ramp up their mobile security defences. By adopting a secure mobile solution with E2EE hosted on a private secure infrastructure, mobi...Read more about ChatMail
ShadowPlex
ShadowPlex
ShadowPlex is a cloud-based cybersecurity software that helps businesses automate alert triage, control cyber vaccines, monitor network casualties, and more. The solution allows users to gain insights into identity repositories an...Read more about ShadowPlex
ThreatAdvice Breach Prevention
ThreatAdvice Breach Prevention
ThreatAdvice vCISO is a cybersecurity solution, which enables businesses to manage data security by assessing risks and tracking vulnerabilities. Organizations can educate and train employees about cyber threats and store security...Read more about ThreatAdvice Breach Prevention
Arctic Wolf Managed Detection and Response
Arctic Wolf Managed Detection and Response
Arctic Wolf Managed Detection and Response is a SOC-as-a-service solution that helps businesses monitor, detect and respond to cyber threats. It allows users to automatically collect, retain, analyze and search log data from exist...Read more about Arctic Wolf Managed Detection and Response
UnderDefense MAXI
UnderDefense MAXI
UnderDefense MAXI is a holistic security-as-a-service platform allowing you to consolidate, orchestrate, and manage all your security tools within one interface. The SECaaS platform is specially developed for teams of one or hundr...Read more about UnderDefense MAXI
CimTrak Integrity Suite
CimTrak Integrity Suite
CimTrak Integrity Suite is a database monitoring software designed to help businesses identify and remediate unauthorized changes across files to secure critical assets. The platform offers dynamic version control capability, whic...Read more about CimTrak Integrity Suite
Sense Defence AI
Sense Defence AI
Sense Defence AI WAF is a Web Application Firewall (WAF) solution that leverages the power of artificial intelligence to provide robust protection for web applications. It offers real-time threat detection and intelligent traffic ...Read more about Sense Defence AI
Enclave
Enclave
Enclave is a secure private network connectivity solution that eliminates the need for VPNs or opening firewall ports. Enclave enables organizations to connect endpoints across any infrastructure through a zero-trust network acces...Read more about Enclave
INLYSE Malware.AI
INLYSE Malware.AI
INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware. It offers plugins for specific needs and provides an added layer of security beyond traditional anti-virus solu...Read more about INLYSE Malware.AI
Hive
Hive
Hive is a self-hosted multi-tool penetration testing workspace for pentesters and their clients or managers. Work with findings, create tasks, track testing progress, and generate reports. ...Read more about Hive
ProVision
ProVision
ProVision is a single source for cybersecurity and compliance monitoring. With ProVision, organizations can get streamlined insights into their security posture by combining the information provided by disparate security tools lik...Read more about ProVision
ManageEngine Endpoint DLP Plus
ManageEngine Endpoint DLP Plus
ManageEngine's Endpoint DLP Plus is an enterprise-ready solution that helps IT administrators set up DLP policies that closely monitor the three important types of data, which are Data-in-motion, Data-at-rest, and Data-in-use, fro...Read more about ManageEngine Endpoint DLP Plus
Veza
Veza
Veza provides a simple way to visualize the full complexity of identity-to-data relationships and provides both out-of-the-box and custom reports, alerts and risks, and much more. Configuring Veza is quick and easy; it typically ...Read more about Veza
Flusk Vault
Flusk Vault
Elevate the safety of your Bubble application, minimize mistakes made by humans, and preserve precious time when faced with potential security threats. The platform includes advanced automated detection algorithms that expertly e...Read more about Flusk Vault
OpenText Cyber Security
OpenText Cyber Security
OpenText Cyber Security is a cloud-based solution that enables organizations streamline processes related to identification, investigation, and management of anomalous and malicious behavior across enterprise IT infrastructure. It...Read more about OpenText Cyber Security
Vade
Vade
Vade is an email security solution powered by AI and enhanced by people. Its proprietary neural network automatically classifies emails into more than 10,000 different categories (Blockers, Phishing, Spam), then assigns a risk sco...Read more about Vade
GlobalSuite
GlobalSuite
GlobalSuite is a governance, risk and compliance (GRC) software designed to help businesses identify, assess, analyze and manage risks. The platform enables managers to protect privacy data, manage audits, and ensure compliance on...Read more about GlobalSuite
Nfina Technologies
Nfina Technologies
Since 2012, Nfina Technologies has provided products and solutions to IT departments who seek the most up-to-date technology to satisfy their expanding compute and storage needs and make the most of their IT infrastructure budgets...Read more about Nfina Technologies
Senteon
Senteon
Senteon is a comprehensive cybersecurity solution designed to help managed service providers (MSP) and organizations of all sizes protect information systems without technical complexities. Senteon enables users to automate multi...Read more about Senteon
PureDome
PureDome
PureDome is a leading business VPN solution, dedicated to boosting network security for organizations and remote teams worldwide. With its easy-to-use interface and advanced security features, PureDome empowers businesses to prote...Read more about PureDome
Radiant Security
Radiant Security
Radiant Security is a computer security solution that leverages artificial intelligence (AI) technology to streamline and automate the workflows of security analysts. It provides a gen AI assistant that helps administrators detect...Read more about Radiant Security
Netsurion
Netsurion
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you ...Read more about Netsurion
Cisco Secure Cloud Analytics
Cisco Secure Cloud Analytics
Cisco Secure Cloud Analytics is a network security solution, which helps businesses of all sizes automatically detect threats across on-premises and cloud environments. The application lets users track abnormal behavior or malic...Read more about Cisco Secure Cloud Analytics
Tripwire Enterprise
Tripwire Enterprise
Fortra's Tripwire Enterprise is a proven solution for policy compliance, system integrity, and remediation management that reaches far beyond simple compliance. It helps organizations quickly identify security misconfigurations an...Read more about Tripwire Enterprise
CyberRes Galaxy
CyberRes Galaxy
CyberRes Galaxy is a threat intelligence and cybersecurity platform that provides organizations with the ability to protect sensitive data from unauthorized access and theft. It includes features such as data encryption, tokenizat...Read more about CyberRes Galaxy
Nudge Security
Nudge Security
Designed for businesses in finance, consulting and other industries, Nudge Security is a cybersecurity platform that helps manage endpoint devices, risk assessment, automated workflows and more. Unlike legacy solutions that attemp...Read more about Nudge Security
FYEO DI
FYEO DI
FYEO Domain Intelligence is a cyber security platform that leverages one of the largest databases of leaked credentials, cracked passwords, and phone numbers to notify your organization of 3rd party data breaches impacting your em...Read more about FYEO DI
RiskProfiler
RiskProfiler
RiskProfiler provides a full range of tools designed for Continuous Threat Exposure Management, ensuring your organization's online safety. With Cyber RiskProfiler users can evaluate online safety levels and receive a cyber risk r...Read more about RiskProfiler
Verosint
Verosint
Verosint is a leading provider of account fraud detection and prevention platform helping digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and...Read more about Verosint
GoTo Resolve
GoTo Resolve
Built with today's SMBs in mind, GoTo Resolve is an all-in-one IT support software that offers everything you need to run your business, from anywhere - all in one place. GoTo Resolve enables IT professionals to streamline their ...Read more about GoTo Resolve
Virtual Desktops
Virtual Desktops
ComputerVault Virtual Desktops are an on-premises virtual desktop infrastructure (VDI) solution that provides users with a secure, scalable, and accessible computing environment. It allows organizations to centralize their desktop...Read more about Virtual Desktops
Zscaler
Zscaler
Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious...Read more about Zscaler
Onyxia Dynamic Cybersecurity
Onyxia Dynamic Cybersecurity
Onyxia is a Dynamic Cybersecurity Management platform designed to empower CISOs and security executives with the ability to measure, manage, and convey the business value within their cybersecurity program. Onyxia is the world’s...Read more about Onyxia Dynamic Cybersecurity
GoDMARC
GoDMARC
GoDMARC is a comprehensive SaaS solution and Managed Services that enables enterprises to deploy DMARC services with ease. Our solution is designed to provide a range of email authentication and security features that help safegua...Read more about GoDMARC
BlackBerry CylancePROTECT
BlackBerry CylancePROTECT
CylancePROTECT is a cloud-based solution that helps businesses of all sizes manage processes related to the entire threat lifecycle by preventing zero-day attacks using various security controls. Key features include web threat ma...Read more about BlackBerry CylancePROTECT
Rzilient
Rzilient
Managing iT park is not easy. Doing it while respecting the environment is even less so. However, it is now essential to reconcile IT and eco-responsibility. This is precisely the mission set up at the Rzilient club, to facilitate...Read more about Rzilient
Hobsec
Hobsec
Hobsec is a comprehensive security solution that protects digital assets and reputation from online threats. With automatic detection and correction capabilities, teams can ensure the protection of the company's digital presence....Read more about Hobsec
Webacy
Webacy
Webacy is the fortress, ensuring the utmost protection for self-custodied assets. Through the secure self-custody suite, businesses can deploy smart contracts to shield blockchain-based wealth. With the groundbreaking risk score f...Read more about Webacy
ThreatMon
ThreatMon
ThreatMon is designed to protect businesses from external threats. With a combination of Threat Intelligence, External Attack Surface Management, and Digital Risk Protection, ThreatMon empowers organizations to identify vulnerabil...Read more about ThreatMon
GlitchSecure
GlitchSecure
Designed for businesses in technology, telecommunications, healthcare and other industries, GlitchSecure is a cloud-based solution that helps manage cybersecurity operations through vulnerability assessment, penetration testing, c...Read more about GlitchSecure
Libraesva Email Security
Libraesva Email Security
Protect your business from disruption, financial loss and reputational damage. Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides except...Read more about Libraesva Email Security
Libraesva Email Archiver
Libraesva Email Archiver
Libraesva Email Archiver is an email archiving solution that helps organizations with email governance, risk management, and compliance. It provides rapid e-Discovery through instant full-text search of archived emails. The softw...Read more about Libraesva Email Archiver
CyberHoot
CyberHoot
Say goodbye to employee cybersecurity training headaches with CyberHoot! With its Power Platform, get a Learning Management System, Phish testing, and Governance, Risk, and Compliance tool all in one. With over 1000 fun cybersecur...Read more about CyberHoot
Security Event Manager
Security Event Manager
Security & Event Manager by SolarWinds is a log management solution that caters to businesses across various industries. Key features include compliance reporting, real-time event correlation, file-integrity monitoring, USB device...Read more about Security Event Manager
Lockwell
Lockwell
Lockwell is a cybersecurity suite designed to offer protection in a digital landscape of businesses. Users can import or manually add account details in an encrypted format. Integrated 2FA ensures security while custom fields allo...Read more about Lockwell
Quadrant XDR
Quadrant XDR
Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. With intelligent action and rapid response, XDR's proprietary technology is operated by sea...Read more about Quadrant XDR
ReversingLabs Titanium Platform
ReversingLabs Titanium Platform
ReversingLabs Titanium Platform is an advanced malware analysis solution that leverages machine learning technology to provide threat analysis and identification. With support for a vast array of file formats and types, the platfo...Read more about ReversingLabs Titanium Platform
Keplersafe
Keplersafe
Keplersafe is a cloud-based cybersecurity tool created to help companies manage and protect their users, devices, email, and data against cyberattacks across a variety of industries, including healthcare, transportation, banking, ...Read more about Keplersafe
Mitiga
Mitiga
Mitiga was created by a team of cloud and SaaS incident response experts to accelerate and simplify breach investigations and modernize incident response for organizations. Our IR2 platform is a next-gen approach to cloud incide...Read more about Mitiga
SURFSecurity
SURFSecurity
SURFSecurity is a browser solution that helps small to large businesses streamline cybersecurity via endpoint data encryption, phishing protection, employee privacy settings, extension management and risk assessment....Read more about SURFSecurity
UNGUESS
UNGUESS
AppQuality is built on 4 main assets: the community of testers, a team of Quality Leaders, a network of UX Researchers, and the cloud platform. AppQuality, together with its 250,000+ reachable testers worldwide, offers a diversifi...Read more about UNGUESS
remote.it
remote.it
remote.it is a ground-breaking service that brings zero-trust network connectivity as a service to the world of IT and OT, effectively transforming the way businesses think about remote access and network management. The service f...Read more about remote.it
EcoTrust
EcoTrust
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced ...Read more about EcoTrust
Baffle
Baffle
Baffle is a cloud-based solution for data protection that allows users to safely put more data to work, reduce the effort and cost of protecting sensitive information, and eliminate the impact of data breaches. It allows users to ...Read more about Baffle
ISS
ISS
INSSIDE Security Suite is a leading platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes....Read more about ISS
Corero SmartWall One
Corero SmartWall One
Corero SmartWall One is a cloud-based DDoS solution that lets IT and network teams hours of hands-on time out of the box. Corero's SmartWall One network DDoS protection platform delivers full line-rate performance for the fastest,...Read more about Corero SmartWall One
Red Access
Red Access
Red Access is a browsing security platform that provides seamless protection of browsing activities across browsers, devices, web apps, and SaaS applications. The platform ensures security without compromising on user experience w...Read more about Red Access
Cyberelements
Cyberelements
Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze user behavior, enable multi-factor authentication, and detect suspicious activities. The platform lets administrato...Read more about Cyberelements
ESET PROTECT Complete
ESET PROTECT Complete
Designed for small to large businesses, ESET PROTECT Complete is a cybersecurity solution that helps streamline endpoint protection, server security and cloud application protection. Key features include disk encryption, email sec...Read more about ESET PROTECT Complete
Passpack
Passpack
Passpack is a web-based solution to store and organize usernames and passwords. Users can access it from any device such as mobile, tablet or PC. You can manage the credentials for both customers and staff. Itis a secure platform ...Read more about Passpack
Strobes RBVM
Strobes RBVM
Enable a robust offensive security program with the help of Strobes. With the combination of ASM, PTaaS and VM we help you achieve great progress toward building a robust CTEM program. Our best-in-class security experts along with...Read more about Strobes RBVM
Guardz
Guardz
Guardz was specifically built to empower MSPs with the tools to holistically secure and insure SMEs against ever-evolving threats such as phishing, ransomware attacks, data loss, and user risks by leveraging AI and a multilayered ...Read more about Guardz
Systancia Access
Systancia Access
Systancia Access is an access management, user authentication, and authentication (Single Sign On) solution that provides secure and centralized management of credentials as well as enhances user authentication through Multi-Facto...Read more about Systancia Access
eSentire
eSentire
eSentire is a technology-enabled service provider that uses managed detection and response(MDR) services to help businesses automate processes related to threat identification, log data retention, false-positive elimination and mo...Read more about eSentire
HP Wolf Security
HP Wolf Security
HP Wolf Security offers a unified platform for managing all aspects of security, including endpoint protection, network security, and identity management. It protects against malware and other threats that target endpoints such as...Read more about HP Wolf Security
TEHTRIS XDR Platform
TEHTRIS XDR Platform
Create your playbooks and interconnect your cyber solutions: Orchestrate all your cyber tools from a single console and get quicker responses to attacks. Automate your processes, create on-call scenarios, and group your alerts i...Read more about TEHTRIS XDR Platform
Guardey
Guardey
Guardey is your ultimate plug-and-play cyber security solution, trusted by thousands of businesses to provide 24/7, affordable, user-friendly protection. With Guardey, you can rest assured that your business data and operations ar...Read more about Guardey
Arkose Labs Bot Manager
Arkose Labs Bot Manager
Arkose Labs Bot Manager stands as a bot detection solution, combining transparent detection with precise attack response to identify potential fraudulent activities early in the customer journey without causing disruption to legit...Read more about Arkose Labs Bot Manager
CryptoSpike
CryptoSpike
CryptoSpike is a data protection solution that continuously monitors all file access transactions across your data center’s storage, using behavioral analysis to automatically block ransomware attacks in real time. In the event of...Read more about CryptoSpike
TruOps
TruOps
TruOps' powerful GRC platform transforms traditionally siloed risk functions into a comprehensive Risk Operations Center. Designed to integrate and automate critical GRC functions, TruOps simplifies the security, risk, and complia...Read more about TruOps
Rivial Data Security
Rivial Data Security
Rivial Data Security enables organizations to accurately measure their risk, automate compliance, and mature their cybersecurity program. Our six-module platform, which includes Governance, Risk, Compliance, Vulnerabilities, Vend...Read more about Rivial Data Security
Quick Heal Internet Security
Quick Heal Internet Security
Quick Heal Internet Security is a cybersecurity solution that enables users to protect devices against various viruses, including ransomware, phishing, spyware, malware, and more. Key features include data breach alert, safe ba...Read more about Quick Heal Internet Security
Mailock
Mailock
Exchange confidential information with customers using your existing email setup. Encrypt messages and attachments, and authenticate your recipients. Features include: AES-256 email encryption, multi-factor recipient authenticati...Read more about Mailock
TRAC
TRAC
TRAC is a budget-friendly, integrated GRC tool designed to make compliance painless. Combining built-in intelligence and easy-to-use workflows, TRAC users can complete critical information security tasks such as vendor management...Read more about TRAC
Redamp.io
Redamp.io
Redamp.io is a cloud-based cybersecurity solution for safeguarding digital environments, ensuring the security of corporate endpoints, which include both mobile and desktop devices, as well as networks and cloud systems, all while...Read more about Redamp.io
Bitwarden Secrets Manager
Bitwarden Secrets Manager
Bitwarden Secrets Manager is a secrets management solution, offering a simplified and faster way for development, DevOps, and IT teams to secure and manage secrets across the entire development lifecycle. it helps teams manage sec...Read more about Bitwarden Secrets Manager
HawkkEye
HawkkEye
HawkkEye serves as a centralized security management platform, consolidating various endpoint security products into a single cloud-based console. It aims to help users simplify security monitoring, control, and management for bus...Read more about HawkkEye
Visiativ Cyber
Visiativ Cyber
Visiativ Cyber is a threat intelligence software that helps businesses ensure the security of a company's web applications. The platform enables administrators to audit multiple security checkpoints to analyze vulnerabilities base...Read more about Visiativ Cyber
Uniqkey
Uniqkey
Designed for businesses of all sizes, Uniqkey is a cloud-based access and password management solution that helps mitigate cyber threats, facilitate 2FA encryption and autofill passwords. Key features include employee password m...Read more about Uniqkey
Dark Web ID
Dark Web ID
Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about ...Read more about Dark Web ID
Hack The Box
Hack The Box
Hack The Box is the Cyber Performance Center with the mission to provide a human-first platform to create and maintain high-performing cybersecurity individuals and organizations. It caters to individuals, businesses, and universi...Read more about Hack The Box
Excelitte
Excelitte
Excelitte is an electronic data capture software platform designed expressly to protect crucial data from ransomware attacks. It integrates into the core file formats of any business’s software applications with an easy-to-use int...Read more about Excelitte
Oodrive Save
Oodrive Save
Designed for businesses in financial services, healthcare, aerospace and other sectors, Oodrive Save is a cloud-based solution that helps set up and manage regular data backups and recovery. Key features include scheduling, remote...Read more about Oodrive Save
Oodrive Meet
Oodrive Meet
Oodrive Meet is a cloud-based software that assists users with organizing and conducting meetings via a unified portal. This platform lets users handle every aspect of remote meetings, including scheduling, document compilation, c...Read more about Oodrive Meet
Oodrive Sign
Oodrive Sign
Oodrive Sign is a powerful electronic signature solution that streamlines document workflows, digitizes paperwork, and collects data remotely or in person, all in compliance with European eIDAS regulations. The signature process ...Read more about Oodrive Sign
Insights
Insights
With InQuest Insights, you gain access to the most complete dataset anywhere, aggregated and curated from an array of public, private, and internal sources. With our platform, you'll receive the earliest possible threat indicators...Read more about Insights
WIZ
WIZ
Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company...Read more about WIZ
Yakabod Cyber Incident Manager
Yakabod Cyber Incident Manager
Yakabod’s best-in-class zero trust platform is developed to facilitate secure collaboration to quickly and securely work cyber incident cases. The solution is purpose built, validated, tested and vetted for the past 17 years for t...Read more about Yakabod Cyber Incident Manager
IntelliGRC
IntelliGRC
Cybersecurity is always going to be complicated, but it can be made easier, and completing compliance activities made faster. IntelliGRC strives to eliminate the confusion that many in the industry experience when trying to adhere...Read more about IntelliGRC
CyberHive Connect
CyberHive Connect
CyberHive Connect High performance software-defined mesh network. Why CyberHive Connect? CyberHive Connect implements a secure software-defined mesh network that transforms how devices communicate. Built using a secure-by-design ...Read more about CyberHive Connect
Carbon Black Endpoint
Carbon Black Endpoint
Carbon Black Endpoint is an on-premise and cloud-based consolidated security platform, which uses data analytics to protect endpoints and workloads from even advanced threats. Additionally, it enables users to forecast, evaluate,...Read more about Carbon Black Endpoint
Cyber Hawk
Cyber Hawk
Cyber Hawk open-source software is based on SUSE Linux Enterprise and contains a reliable and secure codebase that implements a collection of tools needed for analysis and threat intelligence. Cyber Hawk offers a unique solution...Read more about Cyber Hawk
Carbon Black EDR
Carbon Black EDR
Carbon Black ER is a continuous, real-time EDR solution that delivers continuous visibility into offline, air-gapped and disconnected environments. Carbon Black ER integrates directly with the Carbon Black User Interface to create...Read more about Carbon Black EDR
MailTAC
MailTAC
InQuest's Integrated Cloud Email Security (ICES) solution, leverages our patented, Deep File Inspection (DFI) technology to analyze, identify, and ultimately prevent malware, phishing, ransomware, spam, and scams from being delive...Read more about MailTAC
FileTAC
FileTAC
FileTAC scans deeper and uncovers more file-borne vulnerabilities than any other tool. FileTAC leverages machine learning and advanced analytic algorithms to go beyond known-only threat hunting, keeping you ahead of the curve. Our...Read more about FileTAC
Quick Heal AntiVirus Pro
Quick Heal AntiVirus Pro
Quick Heal AntiVirus Pro is a security software designed to help users protect home computers from various cyber threats. The software offers multi-layered protection, utilizing advanced AI technology to detect and block potential...Read more about Quick Heal AntiVirus Pro
Quick Heal Total Security
Quick Heal Total Security
Quick Heal Total Security is an antivirus solution that offers complete protection for the online world and helps users ensure device and data safety. One of the key features of Quick Heal Total Security is its ability to provide...Read more about Quick Heal Total Security
Dasera
Dasera
Dasera is a cloud-based data governance and security solution designed to offer users deep insights and visibility across various data environments, including cloud-based systems, on-premises setups, and hybrid infrastructures. It...Read more about Dasera
FractalScan Surface
FractalScan Surface
Every asset your business has connected to the internet is a potential entry point for attackers. As more systems move to the cloud, even a small business's online estate can quickly become unmanageable. FractalScan Surface is a...Read more about FractalScan Surface
Cerberus
Cerberus
Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, arms, ransomware, and CSEA. Trusted globally by law enforcement and government agencies, Cerberus uses proprietary...Read more about Cerberus
RedRok
RedRok
RedRok is a cybersecurity suite that offers complete security optimization to protect businesses of all sizes against digital threats. Red monitors the dark web for leaked information and credentials, providing real-time notific...Read more about RedRok
Cisco Umbrella
Cisco Umbrella
Cisco Umbrella is a cloud-based solution that helps businesses detect cybersecurity threats and remotely manage the usage of cloud applications on a centralized platform. Using Umbrella Investigate, professionals can monitor and g...Read more about Cisco Umbrella
Digital Armor
Digital Armor
Digital Armor is a cybersecurity platform that allows businesses to secure mobile applications. The shielding process starts by uploading a mobile application package such as APK, AAB, or IPA to the platform, selecting the securit...Read more about Digital Armor
NordLayer
NordLayer
NordLayer is a remote network access solution for modern companies, particularly suitable for SMBs searching for an effective and agile way to update legacy infrastructure and implement profound Secure Service Edge (SSE) practices...Read more about NordLayer
ManageEngine Application Control Plus
ManageEngine Application Control Plus
Application Control Plus helps you monitor and regulate different applications installed on managed endpoints on a centralized platform. The solution effectively prevents certain unsafe applications from entering an enterprise's I...Read more about ManageEngine Application Control Plus
Panther
Panther
The software has automation tools that support teams in identifying and categorizing incidents to enable experts to analyze events effectively, driving informed decision-making. It supports IT experts in processing and retaining c...Read more about Panther
Commvault Cloud
Commvault Cloud
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid enterprise at the lowest TCO, in the face of ransomware and other cyber threats. Commvault Cloud unifies the best dat...Read more about Commvault Cloud
Fidelis Halo
Fidelis Halo
Fidelis Halo is a cloud-native application protection (CNAPP) platform that helps businesses secure servers, containers, and cloud assets. The platform enables administrators to protect, detect, remediate, and continually improve ...Read more about Fidelis Halo
Vortex
Vortex
Engineered to elevate existing frameworks, tools, and techniques, Vortex integrates simulation intelligence and signature-less detection capabilities to bridge gaps and surpass limitations present in contemporary solutions. At it...Read more about Vortex
FastPass IVM
FastPass IVM
FastPass IVM (Identity Verification Manager) is designed to fortify the security of IT help desks by enhancing user identity verification processes. The tool is crucial for Chief Information Security Officers (CISOs) to safeguard ...Read more about FastPass IVM
Jit
Jit
Jit enables full application and cloud security coverage in minutes with codified security plans. Using these plans, you can tailor a developer security toolchain to your use case and implement it across your repos in Jit’s clicka...Read more about Jit
UTunnel VPN
UTunnel VPN
UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This enables businesses to establish secure remote access for employees while ensuring encrypted sit...Read more about UTunnel VPN
Reporter
Reporter
Reporter is a cybersecurity software that helps businesses enhance efficiency in security assessments and reporting. Teams can document findings using templates or references from previous research. The platform enables managers t...Read more about Reporter
blacklens.io
blacklens.io
Blacklens serves as a cybersecurity platform and an extended attack surface monitor. Its purpose is to assist businesses in minimizing security vulnerabilities and actively monitoring potential threats. This platform employs adv...Read more about blacklens.io
SharkGate
SharkGate
SharkGate is a cutting-edge website security solution that aims to protect websites from hackers and cyber threats. With a quick and easy firewall setup process, SharkGate offers comprehensive protection for all types of websites,...Read more about SharkGate
Predictive
Predictive
Predictive is a cloud-based application designed to fortify organizations against cyber threats, empowering them with informed insights for decisive action. Key features of Predictive' s robust offering include: 1. Security Audi...Read more about Predictive
GoodAccess
GoodAccess
GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. Developed with simplicity and ease of use in mind, GoodAccess is a secure remote access solution that interconnects remo...Read more about GoodAccess
DarkSight
DarkSight
Darksight is a comprehensive vulnerability assessment and patch management solution that aids organizations in identifying and eliminating critical vulnerabilities in a seamless and automated manner. By focusing on addressing thir...Read more about DarkSight
Venn
Venn
Venn’s purpose-built patented Secure BYO-PC technology is designed to secure remote work on any unmanaged or BYOD computer and provide a new alternative to VDI. Similar to an MDM solution, but for laptops – work lives in a company...Read more about Venn
Fraudlogix
Fraudlogix
Fraudlogix is a platform designed to address fraud and cyber threats for various teams, such as programmatic, affiliate, and cybersecurity professionals. It assists in protecting their digital presence by providing valuable insigh...Read more about Fraudlogix
Protect360
Protect360
Protect360 is at the forefront of cybersecurity education, offering a gamified platform that transforms training into an engaging and effective experience. By integrating gamification elements such as leaderboards, badges, and rew...Read more about Protect360
BIMA
BIMA
BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart integration ensures a proactive shield against cyber threats, boosting organizational resilience. With streamline...Read more about BIMA
Hyper ICT
Hyper ICT
Introducing HPA, Your ZTNA-Powered Access Solution for SASE and CASB Integration. Securing access to critical resources across diverse environments demands a modern approach. Traditional solutions often fall short, leaving organiz...Read more about Hyper ICT
Logsign Unified SO Platform
Logsign Unified SO Platform
Logsign Unified SO Platform, recognized by Gartner in their Magic Quadrant for SIEM for the past two years, delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intel...Read more about Logsign Unified SO Platform
Cisco Secure Access
Cisco Secure Access
Cisco Secure Access is a cloud-delivered security service edge (SSE) solution designed to protect data and applications of a hybrid workforce. Features offered are multimode DLP, DNS security, remote browser isolation (RBI), sandb...Read more about Cisco Secure Access
4conform ENTERPRISE ISMS
4conform ENTERPRISE ISMS
The 4conform ENTERPRISE system is the first "hybrid" risk management tool that provides support to Chief Information Security Officers (CISOs) in their daily work within their respective organizations. By combining the strengths o...Read more about 4conform ENTERPRISE ISMS
In-App Protection
In-App Protection
In-App Protection is an essential solution for ensuring the security of banking and fintech applications. In-App Protection focuses on safeguarding the authentication process by protecting it against potential threats on insecure ...Read more about In-App Protection
NG Firewall
NG Firewall
NG Firewall is a cloud-based network security solution that helps businesses monitor network activities and view the status of firewall servers. The application enables managers to gain insights into the activities of remote worke...Read more about NG Firewall
VMware AppDefense
VMware AppDefense
VMware AppDefense is a workload protection solution that provides advanced security to workloads running on premises and in the cloud. By modeling intended application behavior and identifying anomalous activity early, AppDefense ...Read more about VMware AppDefense
Defense In Depth
Defense In Depth
Defense In Depth is a cybersecurity solution designed to assist organizations in protecting their digital assets. It is particularly suitable for businesses handling sensitive data, such as healthcare providers, insurance companie...Read more about Defense In Depth
Cloudflare
Cloudflare
Cloudflare is a cloud-based web performance and security tool, which helps firms in the public and private sectors with protection and speed acceleration of websites applications and other internet services against hackers. D...Read more about Cloudflare