168 results
Why Capterra is free
Protect any application API. In any clouds, AWS, GCP, Azure, Kubernetes. Against OWASP Top-10 and comprehensive threats. Learn more about Wallarm WAF
Cloud native applications need more than just perimeter security. In AWS, GCP, Azure, or local Kubernetes clusters, Wallarm protects containerized applications, microservices, and APIs in private and public clouds. Wallarm inspects both north-south and east-west traffic to protect your cloud-native architectures. Wallarm is connects Dev, Sec, and Ops teams choose to build cloud-native applications securely, monitor them for modern threats, and get alerted when threats arise. It's WAF+DAST Learn more about Wallarm WAF
Cloud native applications need more than just perimeter security. In AWS, GCP, Azure, or local Kubernetes clusters, Wallarm protects containerized applications, microservices, and APIs in private and p...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering fil...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
OpsCompass drives true multi-cloud operational control, visibility, and security in addition to SaaS posture management. Learn More. Learn more about OpsCompass
OpsCompass is an enterprise-ready cloud security management software that drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Google Cloud Platform. OpsCompass utilizes CIS SecureSuite benchmarks as industry-accepted system hardening standards, and are used by organizations in meeting compliance requirements for FISMA, PCI DSS, HIPAA, and other security requirements. Learn More. Learn more about OpsCompass
OpsCompass is an enterprise-ready cloud security management software that drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Google Cloud Platform. OpsCo...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs fro...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
365 Total Protection offers two packages for your company's security management developed specifically for Microsoft Office 365. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a wide range of features that ensure email and data security in Office 365. The Enterprise version covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a w...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
An award-winning solution that delivers comprehensive security for small and medium businesses devices, data, and employees. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus is an award-winning, enterprise-grade solution that delivers comprehensive protection for small and medium businesses devices, data, and employees. Fully equipped with next-gen endpoint, server, and identity protection, our advanced solution is designed to block advanced cyberthreats from entering your network. With options to deploy as a standalone antivirus or within the Business Hub, our solution is designed to fit your specific needs. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus is an award-winning, enterprise-grade solution that delivers comprehensive protection for small and medium businesses devices, data, and employees. Fully equipped with...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
We Enable Customers to Efficiently Manage Digital Identities, Securely and Confidently Learn more about SailPoint
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and devices to create an identity-enabled enterprise. From on-premises and cloud-based access management software, to identity analytics and protecting unstructured data, SailPoint can solve your most complex identity and access management challenges. Learn more about SailPoint
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and d...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integrat...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Made by developers for developers, Nightfall DLP is the industry's first cloud-native data loss prevention solution. Via REST API, Nightfall can easily be integrated within any of your applications to ensure they're secure by design. With Nightfall's high accuracy machine learning detectors you can discover, classify, and protect personal information like names and credit card numbers as well as secrets like API keys, and so much more. Learn more about Nightfall DLP
Made by developers for developers, Nightfall DLP is the industry's first cloud-native data loss prevention solution. Via REST API, Nightfall can easily be integrated within any of your applications to ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Skybox Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Skybox Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its con...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
ZeroOutages is an SD-WAN and SASE company. ZeroOutages has been named a top ten service provider over the past five years. Learn more about FlexPrem SD-WAN Cloud Firewall
ZeroOutages is an SD-WAN and SASE company providing cloud connectivity and cloud firewall services. Our products include our SD-WAN FlexPrem services and SASE cloud firewall services called ORION. Our cloud firewall services include best of breed SD-WAN and Network Security Services in a single combined solution. ZeroOutages is an evolutionary disruptor in the SD-WAN space and has received multiple awards as a top ten provider. SDN News called ZeroOutages "the standard" in SD-WAN. Learn more about FlexPrem SD-WAN Cloud Firewall
ZeroOutages is an SD-WAN and SASE company providing cloud connectivity and cloud firewall services. Our products include our SD-WAN FlexPrem services and SASE cloud firewall services called ORION. Ou...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Limited time 20% off.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that po...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method.
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zero...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom. Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
A cloud-based web filter protecting business and non-business users 24/7 and remotely against online menaces.
More than 90% of organizations are slightly to highly concerned about cloud security. Insecure Interfaces/APIs, remote working, cyber-attacks are a few of the many threats lurking around cloud security resources to compromise business and enterprise networks. SafeDNS provides a robust web filtering solution that prevents web-based threats to infiltrate corporate networks. Get your free trial today for 15 days.
More than 90% of organizations are slightly to highly concerned about cloud security. Insecure Interfaces/APIs, remote working, cyber-attacks are a few of the many threats lurking around cloud security...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
AppDynamics' cloud monitoring gives you the tools to ensure the performance and security of the most complex cloud environments.
AppDynamics' cloud performance management helps you simplify how you monitor and manage complex cloud environments. Gain a complete view of all the cloud components of your distributed infrastructure to quickly pinpoint and resolve any security issues. With AppDynamics you can execute a seamless migration strategy using key metrics to guide resource allocation and prove business value.
AppDynamics' cloud performance management helps you simplify how you monitor and manage complex cloud environments. Gain a complete view of all the cloud components of your distributed infrastructure t...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SI...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Make it easy for employees to work remotely from any location or device in a secure environment with solutions from VMware & Softchoice
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We can help you set up, manage, secure, and optimize IT performance for your remote workforce using VMware solutions. Explore how solutions like VMware Horizon 7 and Workspace ONE can make your IT staff more efficient, save your company money, and maximize your companys end user experience.
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We ca...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protect your business across physical, virtual cloud and container environments with central visibility and control.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard co...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With O...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future a...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Unified Cloud-Native Security Vulnerability Management Platform
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating systems? No problem. With TOPIA, dynamic and diverse cloud environments are secure. A dynamic, yet light cloud security solution for the modern cloud-native infrastructure. Able to analyze and prioritize risk across a complex web of applications and assets.
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Secure cloud service for secure data exchange & virtual data rooms.
More than 1,200 companies around the world have already put their trust inidgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and simplifies them as well. With the help of idgard, data rooms for projects can be set up in no time. They turn file sharing into an efficient and highly secure process. Users on the go have protected access to their data via app or browser. No one else has access to them.
More than 1,200 companies around the world have already put their trust inidgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encry...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
The 1st zero-trust environment for Google Workspace
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user. It covers any site users visit while authenticated against Google Workspace in Chrome (requires Google Cloud Protect to ensure Chrome is used & Shield is deployed).
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and respo...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Gain unified cloud security posture management and market-leading breach protection for cloud workloads and containers.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for speed, scale and reliability. CrowdStrike Cloud Security goes beyond ad-hoc approaches by unifying everything you need for cloud security in a single platform to deliver comprehensive protection from the host to the cloud and everywhere in between.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for speed, ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses.
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum speed. Based on AI & Machine Learning, our cybersecurity solution detects & blocks in real-time the most advanced bot attacks, including automated OWASP. - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum speed...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee d...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
GorillaStack is cloud automation software for reducing cloud bills, managing backup lifecycles, and real time security remediation.
GorillaStack is cloud automation software to reduce their cloud bills, manage their backups reliably, get real time alerts and remediation for security and cost, and achieve compliance and governance across AWS and Azure Cloud.
GorillaStack is cloud automation software to reduce their cloud bills, manage their backups reliably, get real time alerts and remediation for security and cost, and achieve compliance and governance a...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Manage all of your security and compliance operations from one real-time location.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint complia...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers com...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applicat...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and miti...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication