Compare Products
Showing all 378 products
Sort by
Reviews: Sorts listings by the number of user reviews we have published, greatest to least.
Sponsored: Sorts listings by software vendors running active bidding campaigns, from the highest to lowest bid. Vendors who have paid for placement have a ‘Visit Website’ button, whereas unpaid vendors have a ‘Learn More’ button.
Avg Rating: Sorts listings by overall star rating based on user reviews, highest to lowest.
A to Z: Sorts listings by product name from A to Z.
Symantec Endpoint Security
Symantec Endpoint Security
Symantec Endpoint Security is a cybersecurity defense suite specifically designed for needs of the small business. Core features include antivirus, antispyware and a firewall to protect laptops, desktops and file servers from on...Read more about Symantec Endpoint Security
AVG Internet Security Business Edition
AVG Internet Security Business Edition
AVG Internet Security Business Edition is a corporate endpoint security solution aimed towards small and midsize business units. Along with full-time antivirus protection, AVG Internet Security Business Edition also offers it...Read more about AVG Internet Security Business Edition
Avast Ultimate Business Security
Avast Ultimate Business Security
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices, data, and applica...Read more about Avast Ultimate Business Security
Avira Antivirus for Endpoint
Avira Antivirus for Endpoint
Avira Antivirus for Endpoint is a cloud-based security solution that provides businesses with detection and remediation tools to protect the business system against the virus attacks. It scans every file as soon as it is accessed ...Read more about Avira Antivirus for Endpoint
Intercept X Endpoint
Intercept X Endpoint
Sophos Intercept X is a hybrid antivirus solution that provides businesses protection against malware, viruses and offers a remote management tool. The anti-malware protection is designed to identify, block or remove threats, thus...Read more about Intercept X Endpoint
Avira Antivirus for Small Business
Avira Antivirus for Small Business
Designed specifically to meet the needs of small and midsized businesses, Avira Antivirus for Small Business protects PCs and file servers from a broad range of cyber threats. Key features include file scanning which scans ev...Read more about Avira Antivirus for Small Business
ESET Endpoint Security
ESET Endpoint Security
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users t...Read more about ESET Endpoint Security
Malwarebytes for Teams
Malwarebytes for Teams
Malwarebytes for Teams is a cybersecurity solution that provides malware detection and remediation tools for small businesses. It provides malicious website blocking, ransomware blocking, exploitation protection and incident respo...Read more about Malwarebytes for Teams
VIPRE Antivirus Business
VIPRE Antivirus Business
VIPRE Business Protection is a security suite for PCs and Macs that combines web, email and anti-malware protection with mobile device management (MDM). VIPRE Business Protection scans for threats and its anti-malware protect...Read more about VIPRE Antivirus Business
Quantum Network Security
Quantum Network Security
Quantum Network Security by Check Point is a cloud-based security solution that provides scalable protection from cyberattacks on a cloud, network, data center, IoT, and/or remote users. Quantum Network Security users receive a ...Read more about Quantum Network Security
Avast Business CloudCare
Avast Business CloudCare
AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party managed security service providers (MSSPs), who can use this tool to manage security on behalf of their clients. ...Read more about Avast Business CloudCare
Endpoint Protector
Endpoint Protector
Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and...Read more about Endpoint Protector
PureVPN
PureVPN
PureVPN is a virtual private network for businesses. It encrypts businesses' internal and external communications and helps them to protect their assets from data thefts and other malicious attacks. PureVPN designates dedicat...Read more about PureVPN
BluKrypt
BluKrypt
BluKrypt by ParaBlu is an on-premise cloud access security broker (CASB) solution that enforces enterprise security policies as employees access cloud-based resources. It allows businesses to manage their security policy enfo...Read more about BluKrypt
Sensitive Content Manager
Sensitive Content Manager
ARALOC is a cloud-based security platform for desktop and mobile devices. It offers mobile security and data loss prevention. The solution is hosted in the Microsoft Azure cloud but can also support the storage of content on priva...Read more about Sensitive Content Manager
Stellar Data Recovery Professional
Stellar Data Recovery Professional
Stellar Data Recovery Professional is a globally trusted recovery tool developed with a simplified UI. Being a DIY recovery software, it allows even an amateur user to get back the lost data with ease. The software works competent...Read more about Stellar Data Recovery Professional
CrococryptLib
CrococryptLib
CrococryptLib is an on-premise web security encryption integration platform for small and midsize software development and engineering organizations that helps users increase the security of web applications. CrococryptLib co...Read more about CrococryptLib
ThisData
ThisData
ThisData is a cloud-based security solution suitable for small to midsize businesses in a variety of industries. Key features of the solution include real-time detection and notification of security breaches and preemptive measure...Read more about ThisData
NordVPN
NordVPN
NordVPN is a computer security software designed to help businesses encrypt internet connectivity to securely access personal information using a virtual private network. It offers a kill switch module, which allows administrators...Read more about NordVPN
Ivanti Endpoint Security for Endpoint Manager
Ivanti Endpoint Security for Endpoint Manager
Ivanti Endpoint Security for Endpoint Manager is an integrated solution that helps businesses secure and protects critical information and devices on the enterprise network. The centralized dashboard enables users to configure, mo...Read more about Ivanti Endpoint Security for Endpoint Manager
GlassWire
GlassWire
GlassWire is a network monitoring and security solution with a built-in firewall. It provides features such as internet security, bandwidth usage monitoring, remote server monitoring and internet privacy protection. The netwo...Read more about GlassWire
WebTitan
WebTitan
WebTitan is a cloud-based internet security solution that monitors for viruses, ransomware, malware and more. It also provides web and DNS filtering control and is suitable for large and midsize businesses across all industries. ...Read more about WebTitan
Ransomware Defender
Ransomware Defender
ShieldApps’ Ransomware Defender is an on-premise anti-ransomware solution that detects, blocks and blacklists ransomware within a business network. Key features include real-time ransomware detection, scan protection, a history cl...Read more about Ransomware Defender
Shield Antivirus
Shield Antivirus
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware. It is an on-premise solution with features such as threat scanning, scheduled scans, automatic updates and more. The s...Read more about Shield Antivirus
Vulnerability Intelligence
Vulnerability Intelligence
SaaS Vulnerability Scanner is a cloud-based cybersecurity solution that features vulnerability detection, reporting tools and misconfigured service tracking for internet-facing infrastructures. SaaS Vulnerability Scanner uses...Read more about Vulnerability Intelligence
Specops Password Auditor
Specops Password Auditor
Specops Password Auditor is a password audit tool that can identify password-related vulnerabilities within Active Directory accounts. Designed to improve password security and help organizations meet compliance requirements, this...Read more about Specops Password Auditor
SpamTitan
SpamTitan
SpamTitan is a spam filtering solution that caters to businesses, managed service providers (MSPs) and schools to help them to block spam, viruses, malware, ransomware, phishing attempts and other email threats. The solution can e...Read more about SpamTitan
Cynet 360
Cynet 360
Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully integrated solution for endpoint security, vulnerability management, deception, threat intelligence, network analyti...Read more about Cynet 360
Kandji
Kandji
Kandji is the MDM worthy of your Apple devices. Set-up, visibility, and the largest library of pre-built controls — Kandji makes device management beautifully simple and insanely powerful — just the way it should be. Drawing ...Read more about Kandji
BlackBerry CylancePROTECT
BlackBerry CylancePROTECT
CylancePROTECT is a cloud-based solution that helps businesses of all sizes manage processes related to the entire threat lifecycle by preventing zero-day attacks using various security controls. Key features include web threat ma...Read more about BlackBerry CylancePROTECT
Netsurion
Netsurion
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you ...Read more about Netsurion
CrashPlan
CrashPlan
CrashPlan is a cloud-based application that works as a storage platform. It can be operated from any internet connection at a given point in time. It keeps a continuous backup of all the files that are in the home directory of a c...Read more about CrashPlan
Jscrambler
Jscrambler
Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Complia...Read more about Jscrambler
Acunetix
Acunetix
Acunetix (by Invicti) is a cloud-based digital security solution that assist security analysts with data protection, manual testing and compliance reporting. It is primarily designed to scan websites and identify vulnerabilities t...Read more about Acunetix
SiteLock
SiteLock
SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the online business against hackers. Designed for all industries, the platform provides solutions for vulnerability ...Read more about SiteLock
Cloudflare
Cloudflare
Cloudflare is a cloud-based web performance and security tool, which helps firms in the public and private sectors with protection and speed acceleration of websites applications and other internet services against hackers. D...Read more about Cloudflare
USM Anywhere
USM Anywhere
USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response. The security platform enables users to collect and ...Read more about USM Anywhere
iPrism Web Security
iPrism Web Security
iPrism Web Security is a cloud and on-premise web security platform, which helps manage web threats and user productivity across the internet. It enables midsize businesses to streamline secure communications through the real-time...Read more about iPrism Web Security
Netwrix Auditor
Netwrix Auditor
Netwrix Auditor is a security solution that helps organizations overcome compliance and operational challenges. Netwrix solutions empower you with total control over what's going on in your hybrid IT environment by delivering acti...Read more about Netwrix Auditor
ZoneAlarm Pro
ZoneAlarm Pro
ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan horses and more. Key features of this platform include antivirus signatures, web resources, two-way firewall, full st...Read more about ZoneAlarm Pro
EventSentry
EventSentry
EventSentry is an on-premise network monitoring solution that helps businesses monitor the performance of their IP-based devices such as routers, switches and workstations. EventSentry offers four core functionalities: managing lo...Read more about EventSentry
LanScope Cat
LanScope Cat
LanScope Cat provides endpoint security powered by Artificial Intelligence and incorporated into a comprehensive IT asset management solution. LanScope Cat helps companies secure and manage their business applications and their p...Read more about LanScope Cat
Falcon
Falcon
CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. ...Read more about Falcon
Teramind
Teramind
Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM monitors user activities on applications, websites, file systems, network, email, social media and more. Behavio...Read more about Teramind
SentinelOne
SentinelOne
SentinelOne is a cloud-based solution that helps businesses of all sizes manage processes related to the entire threat lifecycle for providing endpoint security. Key features include behavioral analytics, activity log, whitelistin...Read more about SentinelOne
Cortex XDR
Cortex XDR
Cortex XDR (formerly Traps) is cloud-based and on-premise endpoint security solution, which assists security teams with threat detection and response management. Key features include malware protection, incident tracking, root cau...Read more about Cortex XDR
Action1
Action1
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party ...Read more about Action1
Fyde
Fyde
Fyde allows organizations, especially those with a distributed workforce, to mitigate the risk of breach with a secure enterprise resource platform accessible employees, contractors, and other users. It is compatible with any app ...Read more about Fyde
Bitdefender GravityZone
Bitdefender GravityZone
Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mob...Read more about Bitdefender GravityZone
Tanium Endpoint Platform
Tanium Endpoint Platform
Tanium is a cloud-based endpoint management solution, which assists large enterprises and government organizations with firewall management and threat monitoring. Key features include policy enforcement, status tracking, incident ...Read more about Tanium Endpoint Platform
IntSights
IntSights
IntSights is a cloud-based endpoint security suite designed to help businesses detect, manage and remediate threats across the dark web. It includes several solutions for proactively monitoring and identifying data or credential l...Read more about IntSights
Morphisec Guard
Morphisec Guard
Morphisec is an endpoint security platform designed to help small to large businesses manage and protect devices by camouflaging applications and web browsers from malware and data intrusions. It uses moving target defense (MTD) t...Read more about Morphisec Guard
Invicti
Invicti
Invicti, formerly Netsparker, is a cloud-based and on-premise solution designed to help businesses manage the entire application security lifecycle through automated vulnerability assessments. Key features include maintenance sche...Read more about Invicti
SanerNow
SanerNow
SecPod SanerNow is an endpoint security solution that enables businesses to streamline processes related to threat detection, compliance management, and more. Its vulnerability management platform lets users automate operations, c...Read more about SanerNow
Automox
Automox
Automox is the modern, cloud-native endpoint-hardening platform that empowers organizations to remediate vulnerabilities faster than they can be weaponized. This cross-platform solution simplifies and automates critical patching, ...Read more about Automox
Mail Assure
Mail Assure
N-able Mail Assure is a cloud-based email security solution designed to help businesses secure incoming and outgoing emails. The protection and filtering engine uses machine learning to protect against various online threats such ...Read more about Mail Assure
Strobes RBVM
Strobes RBVM
Enable a robust offensive security program with the help of Strobes. With the combination of ASM, PTaaS and VM we help you achieve great progress toward building a robust CTEM program. Our best-in-class security experts along with...Read more about Strobes RBVM
AppTrana
AppTrana
AppTrana is a website and application security tool, designed to help businesses manage and maintain cloud security using scanning, Pen Testing, risk detection, always-on security, WAF, traffic monitoring, and more. It provides a ...Read more about AppTrana
Blackpoint MDR
Blackpoint MDR
Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber exp...Read more about Blackpoint MDR
Rapid7 MDR
Rapid7 MDR
Rapid7 MDR is a technology-enabled managed detection and response solution that helps organizations of all sizes mitigate risks and ensure network security. The solution enables users to identify threats through behavioral analysi...Read more about Rapid7 MDR
Arctic Wolf Managed Detection and Response
Arctic Wolf Managed Detection and Response
Arctic Wolf Managed Detection and Response is a SOC-as-a-service solution that helps businesses monitor, detect and respond to cyber threats. It allows users to automatically collect, retain, analyze and search log data from exist...Read more about Arctic Wolf Managed Detection and Response
Paladion
Paladion
Paladion is a managed detection and response service provider that enables businesses to detect cybersecurity threats using artificial intelligence (AI) and machine learning techniques. Paladion's analysts can to identify or detec...Read more about Paladion
Secureworks
Secureworks
Secure Works is tech-enabled managed detection and response service provider that utilizes their in-house solution, Red Cloak Threat Detection and Response (TDR), to help businesses detect adversaries across endpoints, networks an...Read more about Secureworks
eSentire
eSentire
eSentire is a technology-enabled service provider that uses managed detection and response(MDR) services to help businesses automate processes related to threat identification, log data retention, false-positive elimination and mo...Read more about eSentire
Critical Insight
Critical Insight
Critical Insight MDR provides managed detection and response (MDR) services to businesses, allowing them to identify and mitigate potential cyber threats. By integrating machines with human intelligence, the application automatic...Read more about Critical Insight
Emsisoft Business Security
Emsisoft Business Security
Emsisoft Business Security is an endpoint security solution that helps businesses of all sizes prevent malware such as ransomware, phishing and more. Administrators can set up user permissions, restricting access to malicious webs...Read more about Emsisoft Business Security
InsightIDR
InsightIDR
insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can...Read more about InsightIDR
Jazz Platform
Jazz Platform
Jazz Platform is a cloud-based and on-premise network security solution designed to assist small to large businesses with threat detection and response automation. Key features include data protection, image capture, forensic anal...Read more about Jazz Platform
Great Bay Network Intelligence Platform
Great Bay Network Intelligence Platform
The Great Bay Network Intelligence Platform is a cloud-based solution that helps businesses streamline processes related to endpoint security, asset inventory/onboarding, threat detections and more. It enables IT, security and ope...Read more about Great Bay Network Intelligence Platform
Domotz
Domotz
Domotz is a Network Monitoring Software on a mission to provide all services providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty and so...Read more about Domotz
Perimeter 81
Perimeter 81
Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabiliti...Read more about Perimeter 81
Forcepoint Web Security
Forcepoint Web Security
Forcepoint Web Security is a network protection solution that provides businesses in healthcare, retail, finance and other sectors with protection against web threats including viruses, malware, data loss and phishing attacks. The...Read more about Forcepoint Web Security
Threat Detection Marketplace
Threat Detection Marketplace
Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats....Read more about Threat Detection Marketplace
HTTPShield
HTTPShield
HTTPShield is a website security solution that helps businesses streamline operations related to web traffic analysis, suspicious activity detection, security configuration, content delivery and more on a centralized platform. The...Read more about HTTPShield
Prophaze WAF
Prophaze WAF
Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcare, manufacturing, fintech and more protect Kubernetes clusters on-premise and on the cloud. Key features include ...Read more about Prophaze WAF
CloudJacketXi
CloudJacketXi
CloudJacketXi manages, detects, and responds to ongoing cybersecurity threats. It can be deployed on-premise, virtually, in the cloud or a hybrid combination. It can protect SMBs to mid-market enterprises against data breaches by ...Read more about CloudJacketXi
ManageEngine Application Control Plus
ManageEngine Application Control Plus
Application Control Plus helps you monitor and regulate different applications installed on managed endpoints on a centralized platform. The solution effectively prevents certain unsafe applications from entering an enterprise's I...Read more about ManageEngine Application Control Plus
SafeGuard Cyber
SafeGuard Cyber
SafeGuard Cyber is a comprehensive SaaS platform that allows enterprise-level visibility and control over the information shared over digital channels. Whether digital messaging occurs on a collaboration channel like Slack, a chat...Read more about SafeGuard Cyber
GoodAccess
GoodAccess
GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. Developed with simplicity and ease of use in mind, GoodAccess is a secure remote access solution that interconnects remo...Read more about GoodAccess
CipherBox
CipherBox
CipherBox is a Managed Detection & Response solution that provides your company with protection from cyber threats. Get alerts when threats to your digital environment arise and let Cipher act to notify you and mitigate them. Resp...Read more about CipherBox
StackRox
StackRox
StackRox is a Kubernetes and container security platform, which helps businesses and government agencies protect cloud applications and manage processes related to network segmentation, incident response and more. The platform let...Read more about StackRox
TunnelBear
TunnelBear
TunnelBear is a virtual private network (VPN) software that allows companies to protect corporate data by providing an extra layer of security to online browsing. The solution enables users to access censored or blocked websites b...Read more about TunnelBear
HMA
HMA
HideMyAss is a Virtual Private Network (VPN) solution that allows users to access blocked websites, securely surf the web and encrypt online traffic via a unified portal. The platform includes IP shuffle functionality, which enabl...Read more about HMA
Spybot
Spybot
Spybot is an on-premise endpoint security solution designed to help businesses detect unauthorized access to data and remove various spyware and malware attacks. Features include script editor, automated signature updates, system ...Read more about Spybot
ConnectWise SIEM
ConnectWise SIEM
ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality wi...Read more about ConnectWise SIEM
Proofpoint Email Protection
Proofpoint Email Protection
Proofpoint Email Protection is a cloud-based email fraud protection platform. It helps users by detecting, blocking and giving responses to email threats. It also eliminates email fraud using real-time insights. Proofpoint Em...Read more about Proofpoint Email Protection
Open Systems
Open Systems
Open Systems is a threat detection and response management solution that helps businesses in healthcare, insurance, manufacturing, NGOs, financial and other industries manage secure access, cyber risk and more. The platform enable...Read more about Open Systems
Appgate SDP
Appgate SDP
Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce risk and ensure network security within a digital environment. Serving more than 1,000 organizations across 40 count...Read more about Appgate SDP
1Password
1Password
1Password protects and stores all company secrets beyond SSO such as passwords, security tokens, 2FA codes, documents, and passkeys (coming soon) to centralize and simplify the sign-in experience. Employees get quick, secure acces...Read more about 1Password
Business VoiceEdge
Business VoiceEdge
Comcast offers a cloud-based phone system known as Business VoiceEdge. Business VoiceEdge bundles SIP trunking service with hosted PBX applications. The PBX applications enable directory-based routing of inbound calls and communic...Read more about Business VoiceEdge
Evidian
Evidian
Evidian is a cloud-based and on-premise identity governance and access management solution designed to help enterprises across finance, healthcare, telecom and various other sectors ensure the security of information systems. Feat...Read more about Evidian
Indeni
Indeni
Indeni is a cloud-based network monitoring solution which assists medium to large-sized firms with collecting and analyzing performance and configuration data. Its key features include issue tracking, troubleshooting, ticket manag...Read more about Indeni
Trend Micro Smart Protection Complete Suite
Trend Micro Smart Protection Complete Suite
Trend Micro's Enterprise Security Suite(ESS) is a security management solution that offers in-solution or managed endpoint detection and response. Trend Micro's ESS offers endpoint security, internet gateway, mail server and file ...Read more about Trend Micro Smart Protection Complete Suite
LastPass
LastPass
LastPass is a password management solution for consumers and businesses that allows users to store their passwords in a digital vault. It uses single sign-on with password vaulting to protect users’ passwords. Users can save the w...Read more about LastPass
NetWitness
NetWitness
RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mitigate and prevent cyber threats using various risk management programs. Professionals can monitor current capabi...Read more about NetWitness
Passportal
Passportal
N-able Passportal is a cloud-based solution, which helps small to large managed service providers (MSPs) automate password protection and organize relative documents. Key features include credential injection, password change mana...Read more about Passportal
Promisec Endpoint Manager
Promisec Endpoint Manager
Promisec Endpoint Manager is a cloud-based endpoint security management solution designed to help businesses with compliance management, threat detection, and data breach prevention. The software enables users to maintain complian...Read more about Promisec Endpoint Manager
Qualys Cloud Platform
Qualys Cloud Platform
Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attac...Read more about Qualys Cloud Platform
DriveStrike
DriveStrike
DriveStrike is a data breach protection software designed to help businesses locate, track, lock and wipe all computers, laptops, tablets and phones across multiple locations to protect against stolen or lost devices, insider thre...Read more about DriveStrike
RG System
RG System
RG System is a network monitoring solution designed for managed service providers (MSPs), independent software vendors (ISVs) and office automation companies to monitor, secure and manage IT infrastructures. RG System is a modul...Read more about RG System
Splunk Enterprise
Splunk Enterprise
The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includes data indexing tools, which enable users to locate specific data across large data sets. The software is desi...Read more about Splunk Enterprise
WhiteSource
WhiteSource
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or comp...Read more about WhiteSource
Zero Threat Advanced
Zero Threat Advanced
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security (AV/NGAV), endpoint detection and response (EDR), endpoint management capabilities, and 5 mobile device management (MDM) licenses to...Read more about Zero Threat Advanced
Trellix Endpoint Security
Trellix Endpoint Security
McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (SMBs). The solution offers businesses with a wide array of functionality. A firewall helps keep hackers out o...Read more about Trellix Endpoint Security
Hushmail
Hushmail
Hushmail is an email management and electronic signature solution that helps small to large businesses streamline operations related to user management, email encryption, and archiving, among other processes. It lets staff members...Read more about Hushmail
ConnectWise Automate
ConnectWise Automate
ConnectWise Automate (Formerly LabTech) is a cloud-based and on-premise IT automation solution that helps companies track and manage IT assets from a single location. Content management features allow users to share documents an...Read more about ConnectWise Automate
Cornerstone MFT Server
Cornerstone MFT Server
Cornerstone Managed File Transfer (MFT) is a hybrid file sharing solution that caters to hospitals, financial services and government agencies. It can either be deployed on-premise or hosted in the cloud and offers users features ...Read more about Cornerstone MFT Server
Probely
Probely
Probely is a cloud-based web vulnerability scanning solution for security teams and developers. It is suitable for companies that build digital services. The solution scans web applications and manages the lifecycle of detected vu...Read more about Probely
JumpCloud Directory Platform
JumpCloud Directory Platform
JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provi...Read more about JumpCloud Directory Platform
Vault America Online/ Cloud Backup
Vault America Online/ Cloud Backup
Vault America Cloud Backup and Recovery is a cloud-based data loss prevention solution. Primary modules include server backup and recovery, local backup and recovery, active archiving, eDiscovery, email recovery and continuity. It...Read more about Vault America Online/ Cloud Backup
Syxsense
Syxsense
Syxsense is a leading Unified Security and Endpoint Management (USEM) solution that delivers real-time monitoring and intelligent automation for vulnerability management, patch management, and security remediation in a single con...Read more about Syxsense
Mailinblack
Mailinblack
Mailinblack is a cloud-based and on-premise email security solution designed to help businesses monitor incoming emails and protect inboxes from spam or virus attack. It enables administrators to identify threats and use filters t...Read more about Mailinblack
CertCentral
CertCentral
CertCentral is a cloud-based solution that helps businesses manage Secure Sockets Layer (SSL), Public Key Infrastructure (PKI) and other online certificates from a unified dashboard. The platform automates certificate lifecycle ma...Read more about CertCentral
Stratokey
Stratokey
Stratokey is a cloud-based data protection solution for midsize and large companies. The system offers features like encryption, monitoring, analytics and defense. It automatically blocks unauthorized access to sensitive data. ...Read more about Stratokey
Apex One
Apex One
Apex One is a cloud-based and on-premise endpoint security solution, which assists small to large businesses with threat detection and virtual patching. Key features include URL filtering, pre-execution machine learning, root caus...Read more about Apex One
AVG Antivirus Business Edition
AVG Antivirus Business Edition
AVG CloudCare is a cloud-based security suite designed for small and midsize businesses (SMBs) and the third party managed security service providers (MSSPs), who can use this tool to manage security on behalf of their clients. ...Read more about AVG Antivirus Business Edition
Myra Web Application Security
Myra Web Application Security
Myra Security is a cloud-based web application security solution designed to help e-commerce companies, SaaS providers, and online publishers protect web applications and APIs from cyber threats. The platform offers robust protect...Read more about Myra Web Application Security
MacKeeper
MacKeeper
MacKeeper is an antivirus solution that helps Mac users streamline performance optimization and data protection operations via a unified platform. It enables organizations to scan and remove malware, spyware, adware and ransomware...Read more about MacKeeper
Avast Essential Business Security
Avast Essential Business Security
Avast Essential Business Security is a computer security software that helps small businesses detect and protect systems against cyber threats including ransomware variants and zero-day attacks. The platform enables administrators...Read more about Avast Essential Business Security
GateKeeper Enterprise
GateKeeper Enterprise
Gatekeeper Enterprise is a proximity-based access control solution that helps businesses minimize unauthorized data exploitation via user authentication, password management and more. Professionals can utilize the admin console to...Read more about GateKeeper Enterprise
Endpoint Detection and Response
Endpoint Detection and Response
Endpoint Detection and Response is an endpoint protection software designed to help businesses detect and mitigate threats using AI-enabled tools. The platform enables administrators to deploy policies, analyze threat patterns and...Read more about Endpoint Detection and Response
S.O.A.R
S.O.A.R
S.O.A.R is an endpoint detection and response software designed to help businesses detect threats to mitigate risks and prevent breaches across systems. Administrators can automatically organize and prioritize events based on tria...Read more about S.O.A.R
CloudPassage Halo
CloudPassage Halo
CloudPassage Halo is a security solution that helps brands and businesses in finance, e-commerce, healthcare, gaming, B2B SaaS, biotech and digital media sectors safeguard cloud infrastructures. The CloudPassage Halo allows users ...Read more about CloudPassage Halo
HiddenApp
HiddenApp
HiddenApp is a cloud-based solution that helps businesses manage multiple devices. The platform enables users to view and track devices and manage cross-mobile notifications, alerts, and assets with their customers. In the case ...Read more about HiddenApp
zIPS
zIPS
zIPS is a mobile intrusion prevention software, which helps enterprises manage and secure access to data and company systems across employees' mobile devices or applications. It facilitates security against unauthorized devices, n...Read more about zIPS
Verimatrix Code Shield
Verimatrix Code Shield
Verimatrix Code Shield is an automated solution that enables development teams to build and deploy applications. It injects automated and self-defending security directly into apps. It also hardens apps so it’s virtually impossibl...Read more about Verimatrix Code Shield
Password Safe
Password Safe
BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achiev...Read more about Password Safe
WipeDrive
WipeDrive
WipeDrive is a computer security software, which enables businesses and government organizations to permanently delete data across hard drives, mobile devices, copiers and removable media. It allows enterprises to maintain complia...Read more about WipeDrive
Axonius
Axonius
Axonius is an information technology asset management (ITAM) solution designed to assist small to large enterprises with monitoring inventory of software and hardware assets. It enables users to automatically validate security enf...Read more about Axonius
RedShield
RedShield
RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government agencies proactively discover and remediate application and API vulnerabilities using artificial intelligence (AI)...Read more about RedShield
Defend
Defend
Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFEND monitors all keyboard and pointer activity on the workstation or endpoint, using behavioral biometrics to veri...Read more about Defend
Jamf Protect
Jamf Protect
Jamf Protect is an endpoint security solution designed to help businesses identify, prevent and resolve threats across Mac devices. The application allows users to gain visibility across remote devices and send automated alerts in...Read more about Jamf Protect
Windscribe
Windscribe
Windscribe is a VPN application that encrypts your internet traffic and allows businesses to bypass censorship, access geo-restricted content and keep online activity private. It uses a combination of OpenVPN, PPTP, L2TP/IPSec, SO...Read more about Windscribe
CybrHawk SIEM XDR
CybrHawk SIEM XDR
CybrHawk XDR provides enterprise-wide protection by analyzing data from any source to detect and prevent sophisticated attacks and providing complete visibility. Simplify security operations to reduce average response time (MTTR) ...Read more about CybrHawk SIEM XDR
IPVanish
IPVanish
IPVanish is a virtual private network (VPN) solution that helps businesses establish encrypted internet connections and secure data against unauthorized access. It allows users to view services and websites blocked by internet ser...Read more about IPVanish
FortiEDR
FortiEDR
FortiEDR is an endpoint protection solution that provides threat intelligence for different types of advanced attacks. This solution is designed to help security teams proactively identify and stop breaches without disrupting busi...Read more about FortiEDR
Next Generation Firewall
Next Generation Firewall
Next Generation Firewall is a cloud-based network security and checkpoint software that delivers checkpoints to general packet radio service (GPRS) and universal mobile telecommunications system (UMTS)-enabled wireless networks. ...Read more about Next Generation Firewall
Datadog
Datadog
Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Datadog's SaaS platform integrates and automates infrastructure monitoring, ...Read more about Datadog
Citrix Workspace
Citrix Workspace
Citrix Workspace is a content collaboration software designed to help businesses in the IT sector deploy remote applications and facilitate unified endpoint management across devices. The platform enables administrators to share f...Read more about Citrix Workspace
BroShield
BroShield
BroShield is an endpoint protection and anti-spam platform that helps users streamline processes related to content restriction, live activity monitoring, content censorship, application blocking, and more on a centralized platfor...Read more about BroShield
CyFIR Investigator
CyFIR Investigator
CyFIR Investigator is an endpoint detection and response solution, which enables businesses to identify and respond to cyber threats across computer networks. Managers can remotely investigate internal issues related to sexual har...Read more about CyFIR Investigator
Barracuda Web Security Gateway
Barracuda Web Security Gateway
Barracuda Web Security Gateway is a cloud-based platform designed to help small and medium-sized organizations secure applications and social media platforms from cyber threats, malware, spyware or virus attacks. Barracuda Web S...Read more about Barracuda Web Security Gateway
ServicePilot
ServicePilot
ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applications, surveillance of thousands of devices, and analysis of millions of events. Combining real-time and historica...Read more about ServicePilot
ReaQta-Hive
ReaQta-Hive
ReaQta-Hive is a AI-powered Autonomous Detection & Response platform that leverages Dynamic Behavioral Analysis to identify and block the most advanced attacks, including zero day threats, in-memory malware and ransomware. Equipp...Read more about ReaQta-Hive
ThreatSTOP DNS Defense
ThreatSTOP DNS Defense
ThreatSTOP connects the best Threat Intelligence (TI) to your existing DNS systems, and blocks threats before damage is done. The SaaS platform aggregates and curates more than 900 Threat Intelligence (TI) feeds, removing the comp...Read more about ThreatSTOP DNS Defense
Heimdal Next-Gen Endpoint Antivirus
Heimdal Next-Gen Endpoint Antivirus
Heimdal Next-Gen Endpoint Antivirus is an advanced antivirus solution with next-generation capabilities. Its unmatched threat intelligence combined with progressive forensics and firewall integration can enhance any company’s secu...Read more about Heimdal Next-Gen Endpoint Antivirus
Heimdal Ransomware Encryption Protection
Heimdal Ransomware Encryption Protection
Ransomware Encryption Protection by Heimdal is a revolutionary 100% signature-free component, ensuring market-leading detection and remediation of any type of ransomware, whether fileless or file-based. It can detect any encrypti...Read more about Heimdal Ransomware Encryption Protection
Arctic Wolf SOC-as-a-Service
Arctic Wolf SOC-as-a-Service
Designed for businesses in healthcare, finance, manufacturing and other industries, Arctic Wolf SOC-as-a-Service is a cybersecurity solution that helps businesses collect and analyze security threats. The platform offers threat in...Read more about Arctic Wolf SOC-as-a-Service
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud unifies backup, anti-malware, antivirus and endpoint management capabilities (such as vulnerability assessments, patch management, remote access and monitoring, etc.) in one integrated, easy-to-use solu...Read more about Acronis Cyber Protect Cloud
Guardio
Guardio
Guardio is a Google Chrome extension designed to help businesses across a variety of industries protect private information and browse the web securely and quickly. Key features include suspicious site detection, on-demand scan, p...Read more about Guardio
ASPIA
ASPIA
To provide intelligent security and vulnerability management, ASPIA's security orchestration automation includes data gathering, alerting, reporting, and ticketing. Gain a clear overview of security status with ASPIA to improve bu...Read more about ASPIA
Risk Assistant
Risk Assistant
Risk Assistant provides a simplified way to manage cybersecurity risks. It offers an easy way to deploy effective defensive measures and provides an integrated personal dashboard capability to manage exposure....Read more about Risk Assistant
Avira Antivirus Pro
Avira Antivirus Pro
Avira Antivirus Pro is an antivirus software that can be deployed on computers to protect it against viruses, malware, spyware, and other threats. It protects businesses from threats like ransomware and phishing scams. It also pro...Read more about Avira Antivirus Pro
Acronis Cyber Protect
Acronis Cyber Protect
Acronis Cyber Protect has created a new benchmark in easy and fast recovery after cyberattacks or data loss, for organizations of all sizes, including modern multisite organizations and environments, including industrial IT. It de...Read more about Acronis Cyber Protect
AdsPower
AdsPower
AdsPower is an anti-association service provider that provides secure browser environments with VPN-level encryption. Online and social media accounts can be pre-programmed into the system, allowing users to access each account wi...Read more about AdsPower
Black Duck
Black Duck
From small businesses to large enterprises, the amount of open source code being used in software applications today is increasing substantially. Black Duck is the industry's leading solution for open source management and license...Read more about Black Duck
Crowdsec
Crowdsec
CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors...Read more about Crowdsec
VaultCore
VaultCore
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. With VaultCore, administrators can a...Read more about VaultCore
Qustodio for Schools
Qustodio for Schools
Qustodio is a security software solution for schools and students. This software offers features such as intelligent reporting, smarter web filters, one interface for all devices, safety management and compliance. The software fil...Read more about Qustodio for Schools
Cyber Risk Aware
Cyber Risk Aware
Designed for businesses of all sizes, Cyber Risk Aware is a cloud-based risk assessment software that helps deliver threat analysis training, monitor phishing attacks, and generate compliance reports on a unified platform. Key fea...Read more about Cyber Risk Aware
HarfangLab
HarfangLab
Designed for businesses of all sizes, HarfangLab is a cloud-based endpoint protection software that helps neutralize unknown cyberattacks on computers and servers. Key features include API, third-party integrations, activity monit...Read more about HarfangLab
Cofense PhishMe
Cofense PhishMe
Cofense PhishMe is a cloud-based security awareness training solution, which enables businesses to leverage several simulation scenarios to educate employees about online threats. Professionals can use the platform to search for s...Read more about Cofense PhishMe
Anti-Executable
Anti-Executable
Faronics Anti-Executable blocks any unknown sophisticated threats like zero-day attacks, mutating malware, and advanced persistent threats that necessitate an approach that goes beyond traditional antivirus solutions, by ensuring ...Read more about Anti-Executable
CimTrak Integrity Suite
CimTrak Integrity Suite
CimTrak Integrity Suite is a database monitoring software designed to help businesses identify and remediate unauthorized changes across files to secure critical assets. The platform offers dynamic version control capability, whic...Read more about CimTrak Integrity Suite
east-tec Eraser
east-tec Eraser
East-Tec Eraser is a privacy protection software that helps you protect your personal data and your offline and online privacy by helping you erase all files that store evidence of your computer and Internet activities. It will he...Read more about east-tec Eraser
Sentinel
Sentinel
Sentinel is a cloud-based SIEM platform designed to help security monitoring get up and running fast. It ships with packaged intelligence to address the core needs of SIEM right out of the box and leverages anomaly detection to su...Read more about Sentinel
PA File Sight
PA File Sight
PA File Sight is ransomware protection and access auditing software that can be installed on Windows devices. Various types of organizations can use this tool to meet compliance requirements, detect and stop ransomware attacks, pr...Read more about PA File Sight
Coro
Coro
Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, transportation, and legal services secure devices, users, and data against online threats via a unified portal. The a...Read more about Coro
The Anomali Platform
The Anomali Platform
The Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence repository, to automatically correlate all installed security telemetry against active threat intelligence to stop breac...Read more about The Anomali Platform
SpyShelter
SpyShelter
SpyShelter provides robust protection for Windows PC users, safeguarding against a diverse array of malware, spyware, and other spying threats in real-time. What sets SpyShelter apart is its enhanced application control function...Read more about SpyShelter
UserLock
UserLock
UserLock provides Multi-Factor Authentication and Access Management on Active Directory user accounts. Verify the identity of all users and secure access to Windows Logins, RDP, RD Gateway, VPN, IIS, and Cloud Applications. User...Read more about UserLock
Symantec Endpoint Detection and Response
Symantec Endpoint Detection and Response
Symantec Endpoint Detection and Response is a cutting-edge security solution designed to help organizations detect and respond to advanced threats that traditional security solutions may miss. With its advanced machine learning an...Read more about Symantec Endpoint Detection and Response
CWIS Antivirus Scanner
CWIS Antivirus Scanner
Designed for businesses in the IT industry, CWIS Antivirus Scanner is a web-based software that helps identify malware, detect vulnerabilities, track security upgrades, and more from a unified platform. It lets staff members monit...Read more about CWIS Antivirus Scanner
BitRaser
BitRaser
BitRaser is a data erasure software tool that permanently deletes sensitive data from storage media, including laptops, desktops, and drives. BitRaser is suitable for enterprise service providers, government organizations, and sma...Read more about BitRaser
FortMesa
FortMesa
FortMesa can transform an MSP into a cybersecurity powerhouse. By delivering cybersecurity programs based on industry standards (NIST, ISO, SOC2, CIS, CMMC, Fedramp, CJIS, and more) MSPs take command of their customers cyber needs...Read more about FortMesa
AwareGO
AwareGO
AwareGO is a human risk assessment solution that helps businesses identify, measure and remedy the human risk factor when it comes to cybersecurity. It enables professionals to measure top human attack vectors including - - Phis...Read more about AwareGO
swIDch Auth SDK
swIDch Auth SDK
swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. swIDch Aut...Read more about swIDch Auth SDK
CleanMyMac X
CleanMyMac X
CleanMyMac X is a multipurpose pack of tools for almost any Mac situation. It can free up space, detect hidden apps, and remove tons of unseen clutter. The application is notarized by Apple and has been found malware-free. CleanM...Read more about CleanMyMac X
System Mechanic Ultimate Defense
System Mechanic Ultimate Defense
System Mechanic Ultimate Defense is a suite of 18 PC optimization tools that cleans up and optimizes Windows to run faster and better. Use System Mechanic to fix registry errors, remove junk files, fix long startup times, and impr...Read more about System Mechanic Ultimate Defense
NinjaOne
NinjaOne
NinjaOne is a leading unified IT management software company that simplifies how IT teams work. MSPs and IT departments can automate, manage, and remediate all their device management tasks within one fast, modern, intuitive platf...Read more about NinjaOne
Lacework
Lacework
Lacework is a cloud-based platform that provides intrusion detection, compliance and automated threat defense for multi-cloud containers and workloads. The platform includes password requirements, multi-factor authentication and u...Read more about Lacework
IDA Pro
IDA Pro
IDA Pro is a binary code analysis tool. It's capable of creating maps of software's execution to show the binary instructions that are actually executed by the processor in a symbolic representation called assembly language. This ...Read more about IDA Pro
Blacklock
Blacklock
Blacklock is an award-winning service that offers consultant-grade testing with an On-Demand experience. The service allows you to perform penetration testing when you need it. We love to make security things simple, practical and...Read more about Blacklock
walt.id Identity Infrastructure
walt.id Identity Infrastructure
We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity r...Read more about walt.id Identity Infrastructure
Sealit
Sealit
Sealit solutions provide end-to-end encryption giving full data management to its users with email and file protection. Seamlessly implemented with communication & collaboration tools that you already use. Best for small businesse...Read more about Sealit
Managed Detection and Response (MDR)
Managed Detection and Response (MDR)
Managed Detection and Response (MDR) is a cloud-based cybersecurity platform that provides businesses with tools to identify, manage and resolve security threats. Professionals can store information about security incidents and mo...Read more about Managed Detection and Response (MDR)
DataDome
DataDome
DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobi...Read more about DataDome
Trend Micro Cloud One
Trend Micro Cloud One
Trend Micro Cloud One is a compliance and computer security solution that helps businesses streamline processes related to threat monitoring, vulnerability scanning, behavioral analysis, file integrity monitoring, and more on a ce...Read more about Trend Micro Cloud One
Beyond DLP
Beyond DLP
Due to increased risk and HIPAA regulation demands for DLP and file tracking, PharmScript, provider of long-term care pharmacy services to healthcare facilities across 10 states was required to implement a regulatory compliant dat...Read more about Beyond DLP
Defense.com
Defense.com
Defense.com is a cybersecurity platform that helps enterprises ensure compliance with security policies and manage detection/protection of data and applications from online threats. The solution enables businesses to create user p...Read more about Defense.com
SYSVOOT Antivirus Pro
SYSVOOT Antivirus Pro
SYSVOOT Antivirus Pro comes with the best features bundled in a single software and that to with unmatched price. Download now and shield your PC/Laptop against latest internet threats....Read more about SYSVOOT Antivirus Pro
Zscaler
Zscaler
Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious...Read more about Zscaler
Trava
Trava
Trava is a cybersecurity solution, which enables investors, managed service providers and businesses to identify threats, secure financial assets and assess risks. Trava's automated assessments let organizations can scan technic...Read more about Trava
GetSecured
GetSecured
GetSecured is a comprehensive security scanning solution, which helps businesses find breached data, exposed servers, web app/AWS cloud vulnerabilities, and compliance issues. This platform can be easily understood by a non-tech...Read more about GetSecured
CODA Footprint
CODA Footprint
CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimizes both discovery and evaluation of active software vulnerabilities. The CODA Footprint platform offers a compreh...Read more about CODA Footprint
NordLayer
NordLayer
NordLayer is a remote network access solution for modern companies, particularly suitable for SMBs searching for an effective and agile way to update legacy infrastructure and implement profound Secure Service Edge (SSE) practices...Read more about NordLayer
SpamTitan Plus
SpamTitan Plus
SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspicious or malicious links. The main features of SpamTitan Plus include time-of-click analysis, malicious link neutr...Read more about SpamTitan Plus
SecureONE
SecureONE
SecureONE is a tool designed for privileged access management. It helps manage user access across departments, branches, and hierarchies. IT administrators can access an overview of system statuses, active sessions, and user ident...Read more about SecureONE
Resecurity Risk
Resecurity Risk
Resecurity Risk allows carriers, drivers and logistics corporations to monitor and tracks the movement of goods, services and information across global supply chains. It helps companies in managing risks, with modules that include...Read more about Resecurity Risk
SOAR Tools
SOAR Tools
As organizations around the world face a constant and dynamic barrage of cybersecurity threats, the development of Security Orchestration tools to accelerate security operations, automation and response have rapidly increased. Th...Read more about SOAR Tools
Heimdal XDR
Heimdal XDR
Heimdal eXtended Detection and Response is managed XDR solution that adds expert analysis and input from a team of cybersecurity assets to everyday endpoint detection and response approach. Heimdal XDR offers a genuinely unique ...Read more about Heimdal XDR
Versio.io
Versio.io
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT servi...Read more about Versio.io
Fortra's Agari DMARC Protection
Fortra's Agari DMARC Protection
Agari Brand Protection allows organizations to ensure security from email spoofing, phishing, and other online threats. A cloud-based solution, Agari provides DMARC email authentication, enterprise-grade SPF and DKIM that help pr...Read more about Fortra's Agari DMARC Protection
Agari Phishing Defense
Agari Phishing Defense
Agari Phishing Defense is a cloud-based software that helps protect businesses from online attacks — whether that be social engineering, spearphishing and other forms of identity theft. The solution combines behavioral analysis wi...Read more about Agari Phishing Defense
Agari Secure Email Cloud
Agari Secure Email Cloud
Secure Email Cloud is an on-premises email security solution that is built on next-generation architecture. It integrates seamlessly with cloud-only on-premises and hybrid email configurations without risk of disruption to email o...Read more about Agari Secure Email Cloud
Huntress
Huntress
Huntress is a cloud-based cybersecurity solution, designed to help small to midsize businesses determine and respond to threats and vulnerabilities. Security teams can use the dashboard to track active incidents and investigatio...Read more about Huntress
Elastic Security
Elastic Security
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of data, automating key processes, and bringing native endpoint security to every host. Elastic S...Read more about Elastic Security
Malwarebytes for Business
Malwarebytes for Business
Malwarebytes for Business is a cloud-based cybersecurity suite comprising Malwarebytes Endpoint Protection and Malwarebytes Endpoint Detection and Response. The platform provides enterprise-class threat detection, isolation, and ...Read more about Malwarebytes for Business
CTM360
CTM360
CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities across the Surface, Deep & Dark web. Subscribers of the CTM360 platform get access to external attack surface manageme...Read more about CTM360
tbIAM
tbIAM
Designed for businesses in HR, IT, finance, retail, manufacturing, and other industries, tbIAM is a cloud-based identity access management (IAM) software that helps maintain data integrity and safety from a centralized platform. I...Read more about tbIAM
ESET PROTECT MDR
ESET PROTECT MDR
Organizations now need increased visibility into their computers and networks to ensure that emerging threats, careless behavior by employees or unwanted applications do not put their profits or reputations at risk. The answer is ...Read more about ESET PROTECT MDR
Pareto Security
Pareto Security
Pareto Security helps businesses avoid common security mistakes on Mac. The app regularly checks Mac's security configuration and it helps businesses take care of security tasks that prevent problems. ...Read more about Pareto Security
Specops Secure Service Desk
Specops Secure Service Desk
Secure Service Desk provides multi-factor authentication for your service desk, allowing businesses to verify the accounts of users with existing data in an active Directory. Users can send a one-time code to the mobile number as...Read more about Specops Secure Service Desk
Specops uReset
Specops uReset
Specops uReset is a self-service password reset solution that enables users to reset their password using an authentication engine. It also updates locally cached credentials, even when users are off VPN. The platform allows organ...Read more about Specops uReset
Specops Password Policy
Specops Password Policy
Specops Password Policy password management tools and services to prevent attacks and breaches. The platform supports multiple identity and access management systems, including Active Directory, LDAP, OpenLDAP and NIS and offers i...Read more about Specops Password Policy
ESET Home Office Security Pack
ESET Home Office Security Pack
ESET Home Office Security Pack is a cloud console that provides visibility, administration and detailed information in a centralized way. ESET Home Office Security Pack includes 4 advanced cybersecurity technology products: - ESE...Read more about ESET Home Office Security Pack
Rzilient
Rzilient
Managing iT park is not easy. Doing it while respecting the environment is even less so. However, it is now essential to reconcile IT and eco-responsibility. This is precisely the mission set up at the Rzilient club, to facilitate...Read more about Rzilient
CAST Highlight
CAST Highlight
CAST Highlight is a SaaS software intelligence product for performing smarter application portfolio governance. It automatically understands source code of hundreds of applications in hours for Cloud Readiness, Software Compositio...Read more about CAST Highlight
Securden
Securden
Securden is an identity management software designed to help businesses of all sizes handle privileged accounts and passwords. The platform enables managers to consolidate details of servers and endpoints and manage approval workf...Read more about Securden
AlertMedia
AlertMedia
AlertMedia helps organizations protect their people and business through all phases of an emergency. Our award-winning threat intelligence, emergency communication, and travel risk management solutions help companies of all sizes ...Read more about AlertMedia
LogMeIn Pro
LogMeIn Pro
LogMeIn Pro by GoTo is a remote access solution that helps organizations connect, monitor and control desktops across multiple locations. It enables professionals to access desktop applications, files, folders and business informa...Read more about LogMeIn Pro
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution prov...Read more about ManageEngine EventLog Analyzer
Flowmon
Flowmon
Flowmon is a cloud-based monitoring and analytics solution that collects, analyzes, and stores network flow data from physical, virtual, or cloud infrastructure. Unique capabilities include the ability to monitor application perfo...Read more about Flowmon
EndPoint Privilege Manager
EndPoint Privilege Manager
Windows Privilege Manager helps remove administrative privileges from endpoints without bringing the productivity of the workforce down. WPM helps in curbing ransomware and malware propagation in an organization’s network while ke...Read more about EndPoint Privilege Manager
ThreatKey
ThreatKey
ThreatKey is a security solution that helps businesses manage their cloud and SaaS security posture. When setting up cloud or SaaS environments, the smallest misconfiguration can be a potential loophole for business data leaks. Ou...Read more about ThreatKey
Armor
Armor
Minerva Armor is the industry's first multi-layered anti-ransomware solution, built to completely prevent ransomware at the earliest stage of the attack, often months before other solutions can even detect them. Minerva Armor wor...Read more about Armor
Hitachi ID Bravura Identity
Hitachi ID Bravura Identity
Revolutionize your digital identity program with Hitachi ID Bravura Identity. Implement this best-in-class solution to easily enforce security and cross-platform access policies, while upholding the principles of least privilege. ...Read more about Hitachi ID Bravura Identity
Hitachi ID Bravura Privilege
Hitachi ID Bravura Privilege
After careful consideration, your organization has decided to streamline its access management process and upgrade its legacy systems with a privileged access management (PAM) solution. It’s a significant step that will reshape an...Read more about Hitachi ID Bravura Privilege
Hitachi ID Bravura Pass
Hitachi ID Bravura Pass
Users have too many passwords used to sign into different systems and applications. Users respond to this complexity by: - Avoiding password changes, - choosing simple passwords, - writing down their passwords or - forgetting pas...Read more about Hitachi ID Bravura Pass
Holm Security VMP
Holm Security VMP
The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one inte...Read more about Holm Security VMP
Teleport
Teleport
Teleport is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications. Teleport provides access control for all your cloud resources in one place. It simplifies the management of SSH keys...Read more about Teleport
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensive logon auditing, detailed change monitoring, real-time risk alerting, and streamlined compliance reporting for A...Read more about ManageEngine ADAudit Plus
ManageEngine DataSecurity Plus
ManageEngine DataSecurity Plus
ManageEngine DataSecurity Plus is a comprehensive software that enables businesses to manage data visibility and security. With this powerful tool, you can effortlessly audit and monitor file server activities, receiving real-time...Read more about ManageEngine DataSecurity Plus
ManageEngine Vulnerability Manager Plus
ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus is an on-premise cyber security solution that empowers IT administrators and security teams with an integrated console to perform vulnerability assessment, security configuration management, patch manage...Read more about ManageEngine Vulnerability Manager Plus
ManageEngine PAM360
ManageEngine PAM360
PAM360 is a web-based privileged access management (PAM) solution that defends enterprises against privilege misuse by regulating access to sensitive company information. Through powerful privileged access governance, smoother wor...Read more about ManageEngine PAM360
Isi-APP
Isi-APP
Isi-APP is an IT service management (ITSM) software that provides comprehensive IT asset management and data analytics for organizations. The software allows companies to inventory and manage all IT assets including hardware, soft...Read more about Isi-APP
Delivery Trust
Delivery Trust
Delivery Trust offers users total control over emails throughout their entire lifecycle. Messages are secured with the click of a button and empower senders to maintain control of their messages by restricting recipients’ printing...Read more about Delivery Trust
Safetica
Safetica
Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations of all sizes worldwide. Whether deployed on-premise or in the cloud, our solution is designed to prote...Read more about Safetica
NACVIEW
NACVIEW
NACVIEW is a network access control solution that provides visibility and control over all devices connecting to an organization's network. NACVIEW is designed for mid-size to large enterprises across industries such as healthcare...Read more about NACVIEW
ESOF VMDR
ESOF VMDR
ESOF (Enterprise Security in One Framework) VMDR is the product launched by TAC Security in 2018. The product quickly assesses the risk and addresses prime concerns. ESOF VMDR is a risk-based vulnerability management platform for...Read more about ESOF VMDR
HackerOne
HackerOne
HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. Hac...Read more about HackerOne
heylogin
heylogin
heylogin is the password solution for your business. A smartphone swipe instead of a master password makes your everyday life passwordless and two-factor secure. You don't need IT knowledge to use heylogin. heylogins simple stru...Read more about heylogin
KACE
KACE
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your net...Read more about KACE
6clicks
6clicks
6clicks is an easy way to implement your risk & compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate t...Read more about 6clicks
iBoostUp
iBoostUp
iBoostUp is a Mac optimization and security suite for protecting your privacy and Mac system. With iBoostUp, you can also scan all installed apps on your hard drive and determine whether even previously unseen apps might exhibit m...Read more about iBoostUp
TypingDNA ActiveLock
TypingDNA ActiveLock
To secure devices in work-from-anywhere environments, Cybersecurity teams (big and small) rely on TypingDNA ActiveLock to ensure only authorized users are accessing company equipment. By continuously authenticating the employee’s ...Read more about TypingDNA ActiveLock
Conecta Suite
Conecta Suite
Control access to Google Workspace (G Suite) in a few clicks. Create user groups with custom login and logout rules. Block the use of the corporate account by time and location. Control the accesses made by the browser, cell phon...Read more about Conecta Suite
ActiveFence
ActiveFence
ActiveFence is a threat intelligence tool stack designed to help trust and safety teams protect online platforms from malicious behavior and content. This solution is suitable for global teams in various industries including onlin...Read more about ActiveFence
CyberArk Privileged Access Manager
CyberArk Privileged Access Manager
Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information ...Read more about CyberArk Privileged Access Manager
Deep Freeze Cloud
Deep Freeze Cloud
Deep Freeze Cloud is the best way to keep your system protected and up to date. It makes it easy to update your software and Windows while keeping your computer safe and secure. It's like having a one-click restore button at your ...Read more about Deep Freeze Cloud
CPTRAX for Windows
CPTRAX for Windows
CPTRAX for Windows is a powerful alerting and auditing solution for the Microsoft Windows environment. It provides real-time enterprise-wide alerts and facilitates auditing of Windows and Active Directory environments and monitors...Read more about CPTRAX for Windows
Regroup Mass Notification
Regroup Mass Notification
Regroup is a mass notification solution that helps businesses in education, healthcare, hospitality and other industries send and receive alerts via multiple communication channels. The GeoFence messaging functionality enables use...Read more about Regroup Mass Notification
CyLock Anti-Hacker
CyLock Anti-Hacker
CyLock Anti-Hacker is a software designed to protect systems from hacker attacks by identifying weaknesses across the network and websites and providing information to address vulnerabilities. The dashboard allows managers to moni...Read more about CyLock Anti-Hacker
BLACKbox
BLACKbox
BLACKbox provides a cloud-based data loss prevention and data theft prevention solution that prevents data leakage, protects intellectual property, and safeguards information assets. It becomes difficult to maintain continuity if...Read more about BLACKbox
Shieldoo
Shieldoo
Shieldoo is a new way of secure connection, no matter where you are, designed to make it easier than ever for individuals and businesses, regardless of their technical knowledge or experience level. It's as simple as opening the a...Read more about Shieldoo
Avanan
Avanan
Avanan is an email security platform designed to help businesses track and monitor applications including Microsoft Office 365, G Suite, Slack and Microsoft Teams. The artificial intelligence (AI)-enabled solution allows organizat...Read more about Avanan
Lens
Lens
Correlate threat intelligence with digital content quickly. Anomali Lens uses Natural Language Processing (NLP) to automatically scan and identify threat data in any web-based content, Office 365 (Outlook, Word, Excel) and PDFs –...Read more about Lens
ThreatStream
ThreatStream
Anomali ThreatStream automates the threat intelligence collection and management lifecycle to speed detection, streamline investigations and increase analyst productivity. ThreatStream easily integrates into existing security infr...Read more about ThreatStream
Integrite
Integrite
Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI and ML. The data gathered is used to derive actionable intelligence, and is presented on an insightful dashboard ...Read more about Integrite
Resolver
Resolver
Resolver’s risk management software is a cloud-based solution for midsize to larger enterprises that serves customers across a variety of industries and business needs. These industries include banking and financial services, heal...Read more about Resolver
ManageEngine Log360
ManageEngine Log360
Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. ...Read more about ManageEngine Log360
ManageEngine Key Manager Plus
ManageEngine Key Manager Plus
Today's complicated IT infrastructure encompasses a lot of machine to machine interactions, using digital identities like SSH keys, SSL/TLS certificates, and PGP keys. Compromised or stolen digital identities pose a huge security ...Read more about ManageEngine Key Manager Plus
HTTPCS Cyber Vigilance
HTTPCS Cyber Vigilance
Data leaks monitoring and cyber threats detection solution. Your real-time malicious network monitoring solution (web, deepweb and darknet) to protect your company from cyberattacks. Based on the development of virtual agents c...Read more about HTTPCS Cyber Vigilance
Heimdal Threat Prevention
Heimdal Threat Prevention
Heimdal Threat Prevention is an advanced DNS security solution that adds hunting on top of traditional endpoint detection and response. It achieves this by filtering traffic at the levels of the DNS, HTTP, and HTTPS on both your e...Read more about Heimdal Threat Prevention
Network Detection and Response
Network Detection and Response
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. This service accelerates the ability of organizations to respond to and identify future attacks before th...Read more about Network Detection and Response
Keeper Security
Keeper Security
Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a "zero-knowledge" security feature, which allows users only with access to the information being s...Read more about Keeper Security
ThreatAdvice Cybersecurity Education
ThreatAdvice Cybersecurity Education
ThreatAdvice Cybersecurity Education is a software-as-a-service (SaaS) platform that provides cybersecurity training and awareness for businesses. It provides on-demand access to courses, certifications, and training materials req...Read more about ThreatAdvice Cybersecurity Education
ManageEngine Password Manager Pro
ManageEngine Password Manager Pro
ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager P...Read more about ManageEngine Password Manager Pro
Netacea Bot Management
Netacea Bot Management
Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicious bots, respond to attacks, and adapt to evolving threats. Netacea provides real-time threat data and can build ...Read more about Netacea Bot Management
Lookout
Lookout
Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, ...Read more about Lookout
Field Effect
Field Effect
Field Effect provides businesses of all sizes with powerful cybersecurity solutions to protect them. It delivers complete protection across the entire IT environment, all from one portal. Get visibility into clients’ security pos...Read more about Field Effect
Skurio
Skurio
Skurio is a Digital Risk Protection platform that helps Security and IT leaders plug a critical gap in traditional security practices. It comprises Dark Web Monitoring, Data Breach Detection and Cyber Threat Intelligence solutions...Read more about Skurio
condignum
condignum
condignum is a SaaS solution, which enables businesses to manage compliance, risks and security requirements from within a unified platform. Supervisors can add widgets and track the status of iterations using a centralized dashbo...Read more about condignum
Kloudle
Kloudle
Kloudle is a cloud security solution that helps automates critical aspects of cloud security. Kloudle customers see gains of about 20% per engineer as all the security janitorial work is handled by it. Critical tasks that are ...Read more about Kloudle
Comodo
Comodo
Comodo offers endpoint protection and threat prevention solutions that provide both layered security and a mobile-first approach. The products are designed to protect both desktops and the latest smartphones, tablets, Chromebooks ...Read more about Comodo
Sense Defence AI
Sense Defence AI
Sense Defence AI WAF is a Web Application Firewall (WAF) solution that leverages the power of artificial intelligence to provide robust protection for web applications. It offers real-time threat detection and intelligent traffic ...Read more about Sense Defence AI
Ace Managed Security Services
Ace Managed Security Services
ACE Managed Security Services is a managed cybersecurity offering with a suite of next-generation security solutions. It includes Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment solutions. Businesses...Read more about Ace Managed Security Services
INLYSE Malware.AI
INLYSE Malware.AI
INLYSE Malware.AI is a visual AI-based malware detection solution that uses cutting-edge technology to detect malware. It offers plugins for specific needs and provides an added layer of security beyond traditional anti-virus solu...Read more about INLYSE Malware.AI
Ryn VPN
Ryn VPN
Designed for Android phones or iOS devices, Ryn VPN is a VPN solution that helps users securely browse the internet. It allows users to connect to public Wi-Fi hotspots and browse the internet anonymously without exposing their id...Read more about Ryn VPN
Flare
Flare
Flare is a digital footprint monitoring platform that scans the internet to identify exposed or leaked enterprise assets. It is designed to help companies protect their sensitive data and financial resources. Using AI technology, ...Read more about Flare
WatchGuard Endpoint Security
WatchGuard Endpoint Security
WatchGuard Endpoint Security is a cloud-based endpoint protection, detection, and response solution that helps organizations monitor threat prevention and detection across devices, applications, and networks. It provides behavio...Read more about WatchGuard Endpoint Security
Cerberus
Cerberus
Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, arms, ransomware, and CSEA. Trusted globally by law enforcement and government agencies, Cerberus uses proprietary...Read more about Cerberus
EmpowerID
EmpowerID
EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing and other sectors to securely access cloud and on-premise applications. Professionals can automatically create, ...Read more about EmpowerID
ArcSight
ArcSight
ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate and respond to threats and anomalies from within a unified platform. It lets team members utilize machine learning ...Read more about ArcSight
Zoho Vault
Zoho Vault
Zoho Vault is a cloud-based security solution that helps teams manage their online passwords. Users can store and organize passwords in the database and Zoho Vault encrypts them using AES-256. Teams can share passwords with each o...Read more about Zoho Vault
Citrix Web Firewall
Citrix Web Firewall
Citrix Web Application Firewall (WAF) is a cloud-based threat defense solution that can be deployed quickly and easily at any scale, from a single website to thousands of applications. Web Application Firewall defends against OWAS...Read more about Citrix Web Firewall
SAS Fraud, AML & Security Intelligence
SAS Fraud, AML & Security Intelligence
SAS Fraud, Anti-Money Laundering & Security Intelligence is a comprehensive solution designed to proactively protect businesses from fraud, compliance breaches, and security threats. SAS combines advanced analytics, AI, and machin...Read more about SAS Fraud, AML & Security Intelligence
Vade
Vade
Vade is an email security solution powered by AI and enhanced by people. Its proprietary neural network automatically classifies emails into more than 10,000 different categories (Blockers, Phishing, Spam), then assigns a risk sco...Read more about Vade
Nfina Technologies
Nfina Technologies
Since 2012, Nfina Technologies has provided products and solutions to IT departments who seek the most up-to-date technology to satisfy their expanding compute and storage needs and make the most of their IT infrastructure budgets...Read more about Nfina Technologies
Radiant Security
Radiant Security
Radiant Security is a computer security solution that leverages artificial intelligence (AI) technology to streamline and automate the workflows of security analysts. It provides a gen AI assistant that helps administrators detect...Read more about Radiant Security
Heimdal Threat-hunting & Action Center
Heimdal Threat-hunting & Action Center
The Heimdal Threat-Hunting and Action Center is threat intelligence solution that is designed to manage and respond to cyber threats. It offers real-time visibility across the entire digital landscape, helping security teams stay ...Read more about Heimdal Threat-hunting & Action Center
Cisco Secure Cloud Analytics
Cisco Secure Cloud Analytics
Cisco Secure Cloud Analytics is a network security solution, which helps businesses of all sizes automatically detect threats across on-premises and cloud environments. The application lets users track abnormal behavior or malic...Read more about Cisco Secure Cloud Analytics
Clearswift SECURE Email Gateway
Clearswift SECURE Email Gateway
Clearswift SECURE Email Gateway is a computer security solution that helps businesses streamline processes related to spam monitoring, policy administration, threat protection, and more on a centralized platform. It enables team m...Read more about Clearswift SECURE Email Gateway
IBM Security MDR
IBM Security MDR
IBM Security MDR is a managed detection and response service solution that helps IT professionals identify and mitigate endpoint threats across networks. IBM's threat analysts can monitor the root cause of issues, configure securi...Read more about IBM Security MDR
IBM Cloud Pak for Security
IBM Cloud Pak for Security
IBM Cloud Pak for Security is an AI-powered platform designed specifically for data security professionals and incident response teams. To streamline threat detection and response time, the platform can automate workflows and brea...Read more about IBM Cloud Pak for Security
Gradient Cyber
Gradient Cyber
Gradient Cyber is the only SOCaaS company working to improve your security with 24/7 cybersecurity expertise, a SecOps platform for threat detection across all your IT infrastructure ‘swim lanes’, and continuous diagnostics to str...Read more about Gradient Cyber
CyberRes Galaxy
CyberRes Galaxy
CyberRes Galaxy is a threat intelligence and cybersecurity platform that provides organizations with the ability to protect sensitive data from unauthorized access and theft. It includes features such as data encryption, tokenizat...Read more about CyberRes Galaxy
Virtual Desktops
Virtual Desktops
ComputerVault Virtual Desktops are an on-premises virtual desktop infrastructure (VDI) solution that provides users with a secure, scalable, and accessible computing environment. It allows organizations to centralize their desktop...Read more about Virtual Desktops
Mitiga
Mitiga
Mitiga was created by a team of cloud and SaaS incident response experts to accelerate and simplify breach investigations and modernize incident response for organizations. Our IR2 platform is a next-gen approach to cloud incide...Read more about Mitiga
Interset
Interset
Interset is a cybersecurity solution that uses advanced algorithms to analyze user and entity behavior and detect anomalies and unusual activity. It can be used to monitor activity across multiple data sources, including network t...Read more about Interset
ReversingLabs Titanium Platform
ReversingLabs Titanium Platform
ReversingLabs Titanium Platform is an advanced malware analysis solution that leverages machine learning technology to provide threat analysis and identification. With support for a vast array of file formats and types, the platfo...Read more about ReversingLabs Titanium Platform
Symantec Email Security.cloud
Symantec Email Security.cloud
Email Security.cloud is a cloud-based solution designed to help businesses prevent email and malware threats across built-in on-premise and cloud systems. Key features include spam defense, link protection, impersonation control, ...Read more about Symantec Email Security.cloud
Security Event Manager
Security Event Manager
Security & Event Manager by SolarWinds is a log management solution that caters to businesses across various industries. Key features include compliance reporting, real-time event correlation, file-integrity monitoring, USB device...Read more about Security Event Manager
Lockwell
Lockwell
Lockwell is a cybersecurity suite designed to offer protection in a digital landscape of businesses. Users can import or manually add account details in an encrypted format. Integrated 2FA ensures security while custom fields allo...Read more about Lockwell
Webroot Business Endpoint Protection
Webroot Business Endpoint Protection
Webroot is a cloud-based endpoint security solution that helps small to large enterprises perform antivirus scans and prevent cyber threats across networks. It comes with an admin console, which enables users to configure system s...Read more about Webroot Business Endpoint Protection
WIZ
WIZ
Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company...Read more about WIZ
Cyabra
Cyabra
Integrating seamlessly into your systems, Cyabra uncovers threats to companies, products, people and places on social platforms, and detects attacks such as impersonation, data leakage and online executive perils as they occur. ...Read more about Cyabra
IPQS
IPQS
IPQS is a leading fraud prevention solution tailored for businesses like yours. Powered by the most up-to-date and comprehensive data, our advanced APIs and datasets specialize in real-time fraud prevention with unparalleled accur...Read more about IPQS
Cyware
Cyware
Cyware provides virtual cyber fusion centers built to enable end-to-end threat intelligence automation, sharing, and unprecedented threat response for global organizations....Read more about Cyware
Netwrix StealthINTERCEPT
Netwrix StealthINTERCEPT
Netwrix StealthINTERCEPT helps businesses promptly uncover and prevent attempts to compromise AD security such as unauthorized LSASS injection, NTDS.dit database extraction, and modification of AdminSDHolder container rights. Depl...Read more about Netwrix StealthINTERCEPT
Uptycs
Uptycs
The Uptycs CNAPP + XDR Platform is a comprehensive security solution designed for modern attack surfaces. Uptycs enables organizations to reduce risk and respond to threats with a single, unified platform that covers the entire mo...Read more about Uptycs
Microsoft 365 Defender
Microsoft 365 Defender
Microsoft 365 Defender is an artificial intelligence (AI) powered, cross-directory threat protection solution for Automatic threat detection, investigation and response alongside the single dashboard designed to reduce confusion, ...Read more about Microsoft 365 Defender
Quadrant XDR
Quadrant XDR
Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. With intelligent action and rapid response, XDR's proprietary technology is operated by sea...Read more about Quadrant XDR
FYEO DI
FYEO DI
FYEO Domain Intelligence is a cyber security platform that leverages one of the largest databases of leaked credentials, cracked passwords, and phone numbers to notify your organization of 3rd party data breaches impacting your em...Read more about FYEO DI
ISS
ISS
INSSIDE Security Suite is a leading platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes....Read more about ISS
Cyberelements
Cyberelements
Designed for businesses of all sizes, Cyberelements is a cloud-based access management solution that helps analyze user behavior, enable multi-factor authentication, and detect suspicious activities. The platform lets administrato...Read more about Cyberelements
PDQ Deploy & Inventory
PDQ Deploy & Inventory
PDQ Deploy is specifically designed to automate system patches and application updates. Choose from our Package Library of over 200 applications to make updates within minutes. Select the software you want to deploy, specify which...Read more about PDQ Deploy & Inventory
UnderDefense MAXI
UnderDefense MAXI
UnderDefense MAXI is a holistic security-as-a-service platform allowing you to consolidate, orchestrate, and manage all your security tools within one interface. The SECaaS platform is specially developed for teams of one or hundr...Read more about UnderDefense MAXI
RoboShadow
RoboShadow
RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vulnerability Assessment Capabilities. RoboShadow allows any organisation, anywhere on the planet, to get an Interna...Read more about RoboShadow
Guardz
Guardz
Guardz was specifically built to empower MSPs with the tools to holistically secure and insure SMEs against ever-evolving threats such as phishing, ransomware attacks, data loss, and user risks by leveraging AI and a multilayered ...Read more about Guardz
Dark Atlas
Dark Atlas
Dark Atlas is a state-of-the-art dark web monitoring platform that has been designed to safeguard users against potential data leakage on the dark web. With its cutting-edge technology and advanced algorithms, Dark Atlas constantl...Read more about Dark Atlas
EcoTrust
EcoTrust
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced ...Read more about EcoTrust
Versa SASE
Versa SASE
At Versa, our focus is to help simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime. Protect – Every asset (device, user, site, workload) in the organization. Connect – E...Read more about Versa SASE
TEHTRIS XDR Platform
TEHTRIS XDR Platform
Create your playbooks and interconnect your cyber solutions: Orchestrate all your cyber tools from a single console and get quicker responses to attacks. Automate your processes, create on-call scenarios, and group your alerts i...Read more about TEHTRIS XDR Platform
Arkose Labs Bot Manager
Arkose Labs Bot Manager
Arkose Labs Bot Manager stands as a bot detection solution, combining transparent detection with precise attack response to identify potential fraudulent activities early in the customer journey without causing disruption to legit...Read more about Arkose Labs Bot Manager
Aruba SD-WAN
Aruba SD-WAN
Aruba SD-WAN is a software-defined wide area network that allows companies to control their network traffic across any type of connection. It combines the benefits of cloud with the power and flexibility of on-premises technologie...Read more about Aruba SD-WAN
Aruba AirWave
Aruba AirWave
Aruba AirWave provides complete visibility into your wireless network, including information on every device connected to it and the ability to locate a mobile device with GPS. The platform also tracks performance metrics such as ...Read more about Aruba AirWave
JOUO
JOUO
JOUO is a threat intelligence tool developed in Germany. The platform has been developed with decades of knowledge in development and implementation of software projects. With the expertise of creating complex algorithms for AI ba...Read more about JOUO
Dark Web ID
Dark Web ID
Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about ...Read more about Dark Web ID
Visiativ Cyber
Visiativ Cyber
Visiativ Cyber is a threat intelligence software that helps businesses ensure the security of a company's web applications. The platform enables administrators to audit multiple security checkpoints to analyze vulnerabilities base...Read more about Visiativ Cyber
Arkose Labs
Arkose Labs
Large enterprises and medium-sized businesses enhance the security and user experience of their online platforms with Arkose Labs' innovative cybersecurity solutions. The Arkose Bot Manager comprehensive bot detection and mitigati...Read more about Arkose Labs
FileTAC
FileTAC
FileTAC scans deeper and uncovers more file-borne vulnerabilities than any other tool. FileTAC leverages machine learning and advanced analytic algorithms to go beyond known-only threat hunting, keeping you ahead of the curve. Our...Read more about FileTAC
Seerist
Seerist
Seerist is an integrated risk management solution that offers real-time stability calculations and in-depth analysis. Seerist ensures businesses can confidently navigate a wide range of global challenges, from strategic complexiti...Read more about Seerist
Commvault Cloud
Commvault Cloud
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid enterprise at the lowest TCO, in the face of ransomware and other cyber threats. Commvault Cloud unifies the best dat...Read more about Commvault Cloud
MixMode
MixMode
MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. We deliver a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to...Read more about MixMode
Carbon Black Endpoint
Carbon Black Endpoint
Carbon Black Endpoint is an on-premise and cloud-based consolidated security platform, which uses data analytics to protect endpoints and workloads from even advanced threats. Additionally, it enables users to forecast, evaluate,...Read more about Carbon Black Endpoint
Cyber Hawk
Cyber Hawk
Cyber Hawk open-source software is based on SUSE Linux Enterprise and contains a reliable and secure codebase that implements a collection of tools needed for analysis and threat intelligence. Cyber Hawk offers a unique solution...Read more about Cyber Hawk
Workspace ONE Intelligence
Workspace ONE Intelligence
Workspace ONE Intelligence forms the core data platform for the anywhere workspace. It aggregates, correlates, and analyzes data from multiple sources to support reporting, dashboards, automation, alerts, and Machine Learning acro...Read more about Workspace ONE Intelligence
Carbon Black EDR
Carbon Black EDR
Carbon Black ER is a continuous, real-time EDR solution that delivers continuous visibility into offline, air-gapped and disconnected environments. Carbon Black ER integrates directly with the Carbon Black User Interface to create...Read more about Carbon Black EDR
NetTAC
NetTAC
InQuests' cutting-edge Network Threat Analytics product, NetTAC, is purpose-built to help your SOC team operate at peak efficiency by giving them tools to see network activity clearly while staying ahead of the curve. With advance...Read more about NetTAC
Insights
Insights
With InQuest Insights, you gain access to the most complete dataset anywhere, aggregated and curated from an array of public, private, and internal sources. With our platform, you'll receive the earliest possible threat indicators...Read more about Insights
Quick Heal Total Security
Quick Heal Total Security
Quick Heal Total Security is an antivirus solution that offers complete protection for the online world and helps users ensure device and data safety. One of the key features of Quick Heal Total Security is its ability to provide...Read more about Quick Heal Total Security
Seqrite Endpoint Security
Seqrite Endpoint Security
Seqrite Endpoint Security is an endpoint protection solution that helps businesses detect and manage threats. It offers detailed insights into every connected endpoint for uniform asset regulation. It provides protection against ...Read more about Seqrite Endpoint Security
Duo Security
Duo Security
Duo Security is a cloud-based identity management and data security platform. It helps protect the data of organizations at scale. It also helps users reduce management overheads, enabling organizations to handle agility, reduce r...Read more about Duo Security
Orca Security
Orca Security
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an a...Read more about Orca Security
Cisco Secure Endpoint
Cisco Secure Endpoint
Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic and endpoints. The solution prevents threats at point of entry and continuously tracks files to detect and remove f...Read more about Cisco Secure Endpoint
Cisco AnyConnect
Cisco AnyConnect
Cisco AnyConnect is a cloud-based software, which helps businesses offer remote employees secure VPN access to an enterprise network from any device or location. Administrators can track and identify users and devices accessing th...Read more about Cisco AnyConnect
Cisco Umbrella
Cisco Umbrella
Cisco Umbrella is a cloud-based solution that helps businesses detect cybersecurity threats and remotely manage the usage of cloud applications on a centralized platform. Using Umbrella Investigate, professionals can monitor and g...Read more about Cisco Umbrella
Cisco Secure Network Analytics
Cisco Secure Network Analytics
Cisco Secure Network Analytics is a cloud-based and on-premise solution, designed to help small to large enterprises determine, manage, and respond to threats. IT teams can conduct network traffic analysis and protect critical inf...Read more about Cisco Secure Network Analytics
Cisco Secure Firewall
Cisco Secure Firewall
Cisco Secure Firewall is a cloud-based firewall system that provides security across hybrid and multi-cloud environments. Cisco provides multiple types of firewall security depending on business size with solutions for small to m...Read more about Cisco Secure Firewall
Enginsight
Enginsight
Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the plat...Read more about Enginsight
Digital Armor
Digital Armor
Digital Armor is a cybersecurity platform that allows businesses to secure mobile applications. The shielding process starts by uploading a mobile application package such as APK, AAB, or IPA to the platform, selecting the securit...Read more about Digital Armor
ThreatLocker
ThreatLocker
Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlis...Read more about ThreatLocker
Wiperapp
Wiperapp
WiperApp is certified and secure data erasure software for permanently deleting data from HDD, SSD, NVMe, PC, and laptop drives. It provides solutions for businesses and individuals who need to dispose of digital assets and hardwa...Read more about Wiperapp
ManageEngine Endpoint Central
ManageEngine Endpoint Central
ManageEngine Desktop Central is a mobile device management (MDM) solution designed to help businesses automate, secure, audit, standardize and manage operations across servers, desktops, smartphones, and more. Features include sof...Read more about ManageEngine Endpoint Central
ManageEngine Endpoint DLP Plus
ManageEngine Endpoint DLP Plus
ManageEngine's Endpoint DLP Plus is an enterprise-ready solution that helps IT administrators set up DLP policies that closely monitor the three important types of data, which are Data-in-motion, Data-at-rest, and Data-in-use, fro...Read more about ManageEngine Endpoint DLP Plus
ManageEngine Log360 Cloud
ManageEngine Log360 Cloud
Secure your network from cyber threats with ManageEngine's Log360 Cloud, a comprehensive cloud SIEM tool integrated with advanced CASB functionalities. It offers security analytics, threat intelligence, and incident management, em...Read more about ManageEngine Log360 Cloud
ManageEngine M365 Security Plus
ManageEngine M365 Security Plus
ManageEngine M365 Security Plus is a data loss prevention software that helps businesses identify potential threats, maintain data integrity, and ensure regulatory compliance. The platform enables managers to track mailbox owners,...Read more about ManageEngine M365 Security Plus
FileAnalysis
FileAnalysis
Designed for small to large businesses, FileAnalysis by ManageEngine is a cloud-based vulnerability management solution for storage and security insights. The platform provides various features such as junk data purging, duplicate...Read more about FileAnalysis
Brandefense
Brandefense
Brandefense is a cloud-based digital risk protection suite designed to assist organizations in tracking and managing cyber threats via a unified portal. This platform provides protection for systems by identifying threats, deliver...Read more about Brandefense
Fidelis Elevate
Fidelis Elevate
Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and use...Read more about Fidelis Elevate
Vortex
Vortex
Engineered to elevate existing frameworks, tools, and techniques, Vortex integrates simulation intelligence and signature-less detection capabilities to bridge gaps and surpass limitations present in contemporary solutions. At it...Read more about Vortex
Keepnet Labs
Keepnet Labs
At Keepnet Labs, we are dedicated to addressing three critical challenges that businesses face in the ever-evolving cybersecurity landscape. Our comprehensive approach focuses on providing effective solutions to these challenges, ...Read more about Keepnet Labs
UTunnel VPN
UTunnel VPN
UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This enables businesses to establish secure remote access for employees while ensuring encrypted sit...Read more about UTunnel VPN
ControTask
ControTask
ControTask is more than just a software; it's a partner in enhancing your team's productivity and efficiency. Designed for ease of use, it's perfect for those who may not be tech experts but still want the powerful benefits of mod...Read more about ControTask
blacklens.io
blacklens.io
Blacklens serves as a cybersecurity platform and an extended attack surface monitor. Its purpose is to assist businesses in minimizing security vulnerabilities and actively monitoring potential threats. This platform employs adv...Read more about blacklens.io
Predictive
Predictive
Predictive is a cloud-based application designed to fortify organizations against cyber threats, empowering them with informed insights for decisive action. Key features of Predictive' s robust offering include: 1. Security Audi...Read more about Predictive
Secomea
Secomea
Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage the...Read more about Secomea
DarkSight
DarkSight
Darksight is a comprehensive vulnerability assessment and patch management solution that aids organizations in identifying and eliminating critical vulnerabilities in a seamless and automated manner. By focusing on addressing thir...Read more about DarkSight
VIPER MASS
VIPER MASS
VIPER MASS is an advanced emergency alert and communication system engineered to offer organizations a robust solution for managing crisis situations and ensuring the safety of their employees. This state-of-the-art platform is de...Read more about VIPER MASS
OnSolve Platform
OnSolve Platform
OnSolve is a leading critical event management software provider that proactively mitigates physical threats, allowing organizations to remain agile when a crisis strikes. Using the most trusted expertise and reliable AI-powered r...Read more about OnSolve Platform
Protect360
Protect360
Protect360 is at the forefront of cybersecurity education, offering a gamified platform that transforms training into an engaging and effective experience. By integrating gamification elements such as leaderboards, badges, and rew...Read more about Protect360
BIMA
BIMA
BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart integration ensures a proactive shield against cyber threats, boosting organizational resilience. With streamline...Read more about BIMA
IR Collaborate
IR Collaborate
IR Collaborate is a unified communications monitoring platform designed to help businesses predict disruptions and optimize performance across on-premise, cloud, or hybrid audio, voice, and other collaboration systems. Managers ca...Read more about IR Collaborate
Defense In Depth
Defense In Depth
Defense In Depth is a cybersecurity solution designed to assist organizations in protecting their digital assets. It is particularly suitable for businesses handling sensitive data, such as healthcare providers, insurance companie...Read more about Defense In Depth
VMware AppDefense
VMware AppDefense
VMware AppDefense is a workload protection solution that provides advanced security to workloads running on premises and in the cloud. By modeling intended application behavior and identifying anomalous activity early, AppDefense ...Read more about VMware AppDefense
Carbon Black Cloud Workload
Carbon Black Cloud Workload
The Carbon Black Cloud Workload helps protect the most common serverless workloads such as AWS Lambda, Azure Functions, and GCP Functions. The solution monitors vulnerabilities in cloud-native applications and automatically applie...Read more about Carbon Black Cloud Workload
Moat360
Moat360
Moat360 is a cybersecurity tool that helps organizations evaluate their cyber resilience practices. It leverages the NIST cybersecurity framework and a distinctive methodology to help teams assess the effectiveness of their cybers...Read more about Moat360