340 results
Why Capterra is free
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Learn more about Perimeter 81 A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
(0 reviews)
Visit Website
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Learn more about AVG Antivirus Business Edition
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure. Its built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With SecOps, you can detect and remediate security vulnerabilities and non-compliant, mis-configured systems keeping your infrastructure securely compliant and up-to-date. Learn more about SaltStack SecOps Harness event-driven automation technology to deliver full-service, closed-loop automation for IT system compliance and vulnerability Learn more about SaltStack SecOps
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Learn more about Flowmon Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics. Learn more about Flowmon
Tired of the same old cybersecurity software repackaged? Meet TOPIA, Vicarius¿ innovative approach to a constantly evolving world of software vulnerabilities. TOPIA protects your company¿s unique profile with an easy to use, efficient, and adaptive cybersecurity platform that covers digital apps and assets patch management. TOPIA is a powerful cybersecurity solution that takes an innovative and comprehensive approach to managing your company¿s security needs. Learn more about TOPIA Innovative Cybersecurity Platform. Protects your software vulnerabilities! Learn more about TOPIA
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats.
DNS Based Web filter and Web security layer for Business and MSPs that blocks malware, ransomware and phishing as well as providing web content control. WebTitan filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. DNS Based web content filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior. Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi. JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER enables organizations to manage risk, compliance, and cyber security. ESM+PERFORM empowers employees to link goals to the organizational strategy. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life. ESM supports beginner and advanced strategy practitioners. Our STRATEGY, OKR, CYBER, and PERFORM modules stand alone or link together.
Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications, offering the widest vulnerability coverage, scan speed and precision. Scan for over 6,500 web, 50,000 network vulnerabilities, and web malware. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Available on Windows, Linux and Online. All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required. Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying your cybersecurity. Choose your frameworks, including PCI, SOC 2, NIST, ISO, GDPR, HIPAA, CCPA & more & manage your program with automated cybersecurity framework crosswalks, real-time compliance scoring, project management, collaboration, budgeting, policy & plan templates, & guidance & support. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult content etc. We only sell via channel partners. Services are delivered over a global ANYCAST network. We tune cyber threat protection and content categories to country specific needs using advanced analytics and AI. Chat with us live NOW and connect direct to the owners and our skilled engineers Industry leading prices AND strong service experience in 100+ countries. We only sell using channel (no direct sales)
CyberGRX has the #1 third-party risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem, and get access to advanced analytics that'll save countless hours of manually assessing risk. Third-party risk management platform that automates self-assessments and their validation for third-party vendors.
Netsparker is the only end-to-end web application security solution that lets you scale and automate your web security program. Boasting a unique combination of enterprise features, including asset discovery, dead accurate scanning, automatic verification with Proof-Based Scanning, comprehensive SDLC integration, and extensive collaboration support, Netsparker was designed with automation in mind for enterprise-class scalability. Automate and scale your web security program with Netsparker - a single platform for all your web security needs.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats. Web-based solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data. Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time. Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Infocyte Finds What Others Miss. Over 50% of breaches are missed by existing cyber defense tools. Infocyte is the only SaaS-based, continuous monitoring, advanced forensics-based security solution that gives you real-time attack detection with the ability to analyze live-memory. With the option for agentless install, you get identification, investigation and response to sophisticated cyber attacks in minutes, so you can contain, remediate and recover quicker. Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with Single Sign-on or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud. Cross-platform encryption solution for the cloud and NAS systems that supports more than 30 cloud providers (e.g. Dropbox, OneDrive).
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business. Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
A Niche Player in 2019 Gartner Magic Quadrant for Security Awareness CBT. MetaPhish is a simulated phishing product that enables organisations to determine how susceptible their company is to fraudulent phishing emails. The portal allows administrators to orchestrate simulated phishing and ransomware attacks to directly target employees. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator with point of need learning experiences. The MetaPhish product helps keep your staff safe from phishing scams through automated training that increases their vigilance.
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without disturbing your current workflow. Perform continuous security in the early stages of your agile development lifecycle and quickly fix vulnerabilities. Get in your issue tracker easy step-by-step instructions on where and how to fix each vulnerability. Start a free trial.100% free. No Credit Card Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK. Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more. Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
AppTrana is a fully managed 24x7 application security solution that identifies application-layer vulnerabilities; protects & accelerates them instantly through a WAF and CDN; monitors traffic through proprietary machine learning algorithms and with its in-house security experts blocking emerging threats and DDoS attacks. We are trusted by over 2000+ global customers. We currently serve the Government, Banking, Finance, E-Commerce and SaaS based sectors. Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs. Managed security platform that includes monitoring and management of security infrastructure around the clock.
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results.
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. Find & fix security and compliance issues in open source libraries in real-time
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities. HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Cybersecurity solution that enables businesses to discover, audit, and monitor privileged accounts of all types.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
DataDome is the #1 SaaS bot protection solution for e-commerce and classifieds businesses. DataDome offers real-time AI protection against all OWASP automated cyber threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping. The solution deploys in minutes on any web infrastructure, without changing the existing architecture. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups. Real-Time Bot protection that deploys in minutes (SaaS) and runs on autopilot.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but, combined with machine learning and excellent customer support, gets users to full protection quickly but sustainably. OnDMARC helps users to implement and maintain DMARC - the email authentication protocol that blocks domain-based phishing attacks.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
DNIF offers solutions to the worlds most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management. DNIF provides real-time threat detection and analytics to the most critical data assets on the Internet.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and media. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Security and compliance solution that enables businesses to control network access and enhance visibility to unauthorized activities.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. For more info, visit www.boolebox.com Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
TOR Browser Private Web + VPN is a unique combo app, giving you the power of an anonymous Tor Browser and the intractability of a VPN connection. TOR Browser Private Web + VPN is built with the simple belief that privacy is everybody's right and should be protected under all circumstances. Using Tor with a VPN gives you an extra layer of privacy because the VPN encryption prevents the Tor entry node from exposing exit node
Born in 2017 from a GCHQ accelerator, CyberSmart was created by a group of forward-thinking security experts, who saw many companies needed security and achieve information security standards, yet found the process too complicated or limited by financial or human resources. CyberSmart offers same-day government-backed certification: Cyber Essentials and IASME Governance/GDPR Readiness, ensuring all devices are continuously compliant through the usage of our mobile and desktop apps. CyberSmart offers same-day government-backed certification: Cyber Essentials & IASME Governance/GDPR Readiness continuous compliance.
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows. Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Integrated risk management platform that helps firms manage regulatory compliance, IT, security, vendors, audits and documentation.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time. Cloud Control automates cloud security and compliance monitoring and management.
Panorays automates third-party security lifecycle management. With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR and NYDFS. Automates third-party security lifecycle management.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land. Policy-driven endpoint security. Add enterprise grade technologies such as application whitelisting, ringfencing and storage control.
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sector. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications. RISK IDENT is a leading software development company that offers anti-fraud solutions with expert knowledge in data analytics and ML.
A SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. D3 Security is a SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
Cloud security software to continuously verify hybrid, multi-cloud networks' security within and between physical, cloud, and software defined environments. with a visual interface to ensure control policies, analyze access, and more. Cloud software to continuously verify network set up and access to ensure compliance with policies and regulations..