15 years helping Singaporean businesses
choose better software

Cybersecurity Software

Cybersecurity software aims to prevent unauthorized access to data that is stored electronically. This type of software protects businesses from data theft, malicious data, and system usage by third parties.

Featured software

Singapore Show local products
853 results
Secure and Reliable VPN for Businesses and Remote Teams. Increase network security of your business and remote teams within minutes. Learn more about PureDome
PureDome empowers businesses with robust cybersecurity solutions, ensuring the protection of sensitive data and critical operations. It establishes secure encrypted connections, shielding communications from potential threats and unauthorized access. With dedicated IPs for individuals and teams businesses can enhance access controls and fortify their network security. It empowers businesses with comprehensive cybersecurity tools safeguarding their digital assets and operations from cyberattacks. Learn more about PureDome

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. Learn more about Endpoint Detection and Response
N-able Endpoint Detection and Response (EDR) helps MSPs prevent, detect, and respond to ever-changing cyberthreats. Powered by SentinelOne, N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. As an integrated feature of N-able N-central and N-able RMM, N-able EDR lets you gain full monitoring and management of your endpoint security, all from a single dashboard. Learn more about Endpoint Detection and Response

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Service providers solution that unifies backup, disaster recovery, EDR, DLP, anti-malware, antivirus, and endpoint protection Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is a single solution that combines backup, anti-malware, antivirus, and endpoint protection for service providers. Control through the single management console significantly reduces complexity, while strengthening security offerings, improving SLAs, decreasing churn risks, and generating additional recurring revenue. Learn more about Acronis Cyber Protect Cloud

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Peace of mind for your phone. Protecting your mobile device with Cyber Security Solution gives you one less thing to worry about. Learn more about Web.com
Securing your device is good for business. Some of your biggest decisions happen on a small screen. Protect your business and the people who rely on it by securing the devices you use every day. With 24/7 access to a team of world-class cyber security experts, you'll have everything you need to fix, prevent, and investigate potential security issues. Includes: *Identity Protection *Device Monitoring *Theft Prevention *Safe Browsing *Contact Backup *Stores photos and call history online Learn more about Web.com

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Acronis Cyber Protect provides a combined solution of data protection and cybersecurity. Learn more about Acronis Cyber Protect
Acronis Cyber Protect is a revolutionary approach to cyber protection that integrates backups and advanced cyber security tools. This method eliminates complexity while delivering better protection and maximizing efficiency by saving money and time. Such a combined solution with a unique integration of security technologies protects against cyberattacks while simplifying daily IT operations, management, and reporting. Learn more about Acronis Cyber Protect

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
We help you identify vulnerabilities in your cyber security defenses, automatically. Cover technical and human assets in one platform. Learn more about Holm Security VMP
Holm Security's Next-Gen Vulnerability Management Platform helps our customers to identify and remediate vulnerabilities in their IT environment. The platform provides complete coverage, and comprehensive insight in order to automatically detect vulnerabilities, assess risk and prioritize remediation for every asset in your organization, including humans. Secure your cyber security posture through complete asset coverage and unified vulnerability management, all in one platform. Learn more about Holm Security VMP

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Risk Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers Learn more about Resecurity Risk
Resecurity Risk is Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers for real time analysis for all business and technical users. Tracking security posture changes depending on the identified security events, Dark/Web/Surface Web, and other malicious activity. Identifying and eliminating potential blind spots and security gaps throughout your network infrastructure and exposed digital footprint. Learn more about Resecurity Risk

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
ManageEngine PAM360 Complete privileged access security for enterprise IT Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security. Learn more about ManageEngine PAM360

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Learn more about ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Learn more about ManageEngine Key Manager Plus

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
CTM360 is a global digital risk protection platform which provides detection and response to vulnerabilities and threats in cyberspace Learn more about CTM360
CTM360 is a Digital Risk Protection platform. It includes External Attack Surface Management, Security Ratings, Third-Party Risk Monitoring, Cyber Threat Intelligence, Surface Deep and Dark web monitoring, and Unlimited Takedowns. Fully configured from day 1, and no installations/inputs need from the end-user Learn more about CTM360

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
A comprehensive web security solution that includes WAF, bot management, DDoS protection, API security, ATO prevention, and much more. Learn more about Reblaze
A cloud-native security solution for sites, web apps, and APIs. Reblaze includes next-gen WAF, DDoS protection, API security, bot mitigation, ATO (Account Takeover) prevention, real-time traffic analysis, Machine Learning, and more. As a fully managed solution, Reblaze is always up-to-date, and is hardened immediately against new threats as they arise. It is fully integrated with AWS, Azure, and GCP. Flexible deployment options include single-cloud, multi-cloud, hybrid, and service meshes. Learn more about Reblaze

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Resecurity Context is a cyber threat intelligence platform that enables enterprises to accelerate cybersecurity workflows. Learn more about Resecurity Context
Resecurity Context is a cyber threat intelligence platform that enables enterprises to accelerate cybersecurity workflows. Learn more about Resecurity Context

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform. Learn more about Malwarebytes for Business

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition.
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more. New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products. Learn more about Google Cloud

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
SpamTitan is a cloud based Anti Spam email filter. Easy to use and very effective blocking Email-Spam, malware and phishing attacks.
SpamTitan is a cloud based Anti Spam email filter. It is an easy to use, effective, multi-award winning Anti-Spam, malware blocking and phishing prevention solution . Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a FREE 14 day Trial of SpamTitan Email Security today, full support included during trial. Learn more about SpamTitan

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential info
Keeper’s easy-to-use cybersecurity platform is built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com. Learn more about Keeper Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Learn more about Webroot Business Endpoint Protection

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Learn more about Bitdefender GravityZone

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Build a cybersecurity strategy that works for your organization by enabling MFA or SSO to protect your users and devices from unwarranted access. Create the foundation for a Zero Trust security framework with conditional access policies. Learn more about JumpCloud Directory Platform

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Search, analyze, and visualize data from your entire data ecosystem. Monitor, alert, and report on your operations to drive resilience.
The world's leading organizations trust Splunk. Splunk is a unified cybersecurity and observability platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the key to enterprise resilience that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all Learn more about Splunk Enterprise

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
RMM, remote support and access and ticketing functionality, making it the fastest and easiest IT management solution to deploy.
GoTo Resolve is an all-in-one IT management and support software built for today's small-to-medium-sized businesses. It combines game-changing remote monitoring and management capabilities with remote access and support, conversational ticketing, and zero trust architecture into a single consolidated platform. Looking for GoToAssist? GoTo Resolve includes the same remote support functionality and more. Learn more about GoTo Resolve

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enable them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior. Learn more about Netwrix Auditor

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Safetica identifies security risks and notifies you in case of data leaks, e.g., when an employee falls for a phishing campaign.
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance. Safetica is a European software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions. Safetica NXT (cloud-native) Safetica ONE (on-prem) Learn more about Safetica

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security.
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Astra Security serves all PHP-based websites. It is highly compatible with websites built on CMS like WordPress, Magento, Joomla, etc.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. This means you can get rid of multiple security solutions & let Astra take care of it all. Astra Security Suite offers a website firewall, malware scanner, automated vulnerability scanning, security boosters and many more features. Learn more about Astra Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Learn more about DNSFilter

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. Learn more about Xeams

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. Learn more about SentinelOne

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Distributed only by authorized retailers in more than 150 countries, FlashStart provides multi-language support, including via chat.
FlashStart is a global, cloud-based cyber security platform that specializes in DNS filtering with the support of artificial intelligence. It protects against malware and unwanted contents by classifying domains into eighty-five categories, using machine learning with high predictive capability and incorporating government blacklists and warnings for high-risk sites. It offers global coverage, thanks to Anycast Network, which is among the fastest and most stable in the world. It presents advance Learn more about Flashstart

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Learn more about Delivery Trust

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform. Learn more about Lookout

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Learn more about BlackBerry CylancePROTECT

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Exchange sensitive information over email using end-to-end encryption and multi-factor recipient authentication.
Exchange confidential information with customers using your existing email setup. Encrypt messages and attachments, and authenticate your recipients. Features include: AES-256 email encryption, multi-factor recipient authentication, Outlook/M365/Unipass ID integrations, automated bulk encrypted email delivery, desktop/on-premise/cloud solutions, compliance with ICO/FCA guidance, message audit and revoke capability. Start a free trial or book a one-to-one demo, today! Learn more about Mailock

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Web filtering software. Blocks websites based on URLs and categories. Restrictions can be customized based on user, computer, or OU.
BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. Learn more about BrowseControl

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Transform employees into a cybersecurity asset through automated Human Risk Management (HRM).
usecure enables businesses to analyse their employee security posture against evolving cyber threats, reduce security incidents caused by human error and demonstrate compliance with core security standards. By combining user-tailored security awareness training programs, custom phishing simulations, ongoing dark web monitoring and simplified policy management processes into one easy-to-manage solution for transforming staff into a cyber security asset. Learn more about usecure

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes.
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG. With its groundbreaking ease-of-use and global network of PoPs, Perimeter 81 allows you to manage your network and scale as you grow. Learn more about Perimeter 81

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Orca's dynamic tech analyzes three factors to prioritize risk and shut down threats—severity, accessibility, and business impact.
Cyberattacks are increasingly more sophisticated, but Orca makes it easy to remediate at-risk sensitive data in the cloud. Agentless statistical scanning reduces the noise, while contextual analysis helps prioritize risk so security teams can focus on what truly matters. Orca's context-aware engine separates the 1% of alerts that demand quick action from the 99% that don’t, enabling security teams to avoid alert fatigue and fix the truly critical security issues before attackers exploit them. Learn more about Orca Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Learn more about Trend Micro

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Protects your websites, mobile apps, and APIs from bad bot attacks with zero user friction.
GeeTest, a CAPTCHA and bot management provider, protects websites, mobile apps, and APIs from automated bot-driven attacks, like ATO, credential stuffing, web scalping, etc. GeeTest has been developing human-bot verification technology since 2012. Now it processes 2.9 billion CAPTCHA requests daily and serves 320,000+ companies in sectors like blockchain, online games, e-commerce, etc. GeeTest CAPTCHA has been recognized by Gartner and Forrester in market reports for the third year since 2020. Learn more about GeeTest CAPTCHA

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Learn more about Incapsula

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment. Learn more about Guardio

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
WP Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
WP Cerber offers robust security for WordPress sites, shielding against hackers, spam, and malware while maintaining speed and reliability. The plugin employs specialized algorithms and advanced bot detection to combat spam. It also verifies IPs against a real-time database to block malicious traffic. With an integrated malware scanner and integrity checker, WP Cerber automatically removes malware, monitors files, and alerts admins to potential risks. Learn more about WP Cerber Security

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
  • Real Time Monitoring
  • Risk Analysis
  • Anti Virus
  • Alerts/Notifications
  • Activity Dashboard
  • Data Security
  • Firewalls