372 results
Why Capterra is free
IronNet enables cybersecurity teams with shared interests to work together in near-real-time to collaboratively defend against attacks. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps enterprises to increase visibility into the threat landscape, to reduce the impact of an attack and to improve the overall effectiveness of their cybersecurity investments. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps enterpris...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business se...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
100+ cloud assets? Get instant-on, workload-level security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering fil...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Exein

Exein

(0 reviews)
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for clo...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everyt...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-layered defense delivering smart endpoint protection through AI-powered technology. Learn more about Malwarebytes
Malwarebytes Endpoint Protection is a complete malware protection and remediation solution with predictive threat detection, proactive threat blocking, and integrated end-to-end protection. Comprehensive protection built for speed. Quickly deploy, improve end user productivity Precision detection at the point of attack. Innovative advanced endpoint protection. Scales to combat growing threats. Simple to use protection from a single pane of glass. Learn more about Malwarebytes
Malwarebytes Endpoint Protection is a complete malware protection and remediation solution with predictive threat detection, proactive threat blocking, and integrated end-to-end protection. Comprehensi...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive file...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits,...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics. Learn more about Flowmon
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Learn more about Flowmon
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal w...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Innovative Cybersecurity Platform. Protects your software vulnerabilities! Learn more about TOPIA
Tired of the same old cybersecurity software repackaged? Meet TOPIA, Vicarius¿ innovative approach to a constantly evolving world of software vulnerabilities. TOPIA protects your company¿s unique profile with an easy to use, efficient, and adaptive cybersecurity platform that covers digital apps and assets patch management. TOPIA is a powerful cybersecurity solution that takes an innovative and comprehensive approach to managing your company¿s security needs. Learn more about TOPIA
Tired of the same old cybersecurity software repackaged? Meet TOPIA, Vicarius¿ innovative approach to a constantly evolving world of software vulnerabilities. TOPIA protects your company¿s unique profi...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situation...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. T...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integrat...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Harness event-driven automation technology to deliver full-service, closed-loop automation for IT system compliance and vulnerability Learn more about SaltStack SecOps
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure. Its built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With SecOps, you can detect and remediate security vulnerabilities and non-compliant, mis-configured systems keeping your infrastructure securely compliant and up-to-date. Learn more about SaltStack SecOps
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure. Its built on a unique and powerful event-driven automation engine that detects events in any...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL fil...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time.
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices.
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications....
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that po...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our pr...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Astra Security serves all PHP-based websites. It is highly compatible with websites built on CMS like WordPress, Magento, Joomla, etc.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. This means you can get rid of multiple security solutions & let Astra take care of it all.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet thr...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages us...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that elimina...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyz...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time....
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing....
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces co...
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications, offering the widest vulnerability coverage, scan speed and precision. Scan for over 6,500 web, 50,000 network vulnerabilities, and web malware. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Available on Windows, Linux and Online.
Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications, offering the widest vulnerabi...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ESM supports beginner and advanced strategy practitioners. Our STRATEGY, OKR, CYBER, and PERFORM modules stand alone or link together.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER enables organizations to manage risk, compliance, and cyber security. ESM+PERFORM empowers employees to link goals to the organizational strategy. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER enables...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, execu...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integri...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying your cybersecurity. Choose your frameworks, including PCI, SOC 2, NIST, ISO, GDPR, HIPAA, CCPA & more & manage your program with automated cybersecurity framework crosswalks, real-time compliance scoring, project management, collaboration, budgeting, policy & plan templates, & guidance & support.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying your...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Industry leading prices AND strong service experience in 100+ countries. We only sell using channel (no direct sales)
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult content etc. We only sell via channel partners. Services are delivered over a global ANYCAST network. We tune cyber threat protection and content categories to country specific needs using advanced analytics and AI. Chat with us live NOW and connect direct to the owners and our skilled engineers
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult c...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Automate and scale your web security program with Netsparker - a single platform for all your web security needs.
Netsparker is the only end-to-end web application security solution that lets you scale and automate your web security program. Boasting a unique combination of enterprise features, including asset discovery, dead accurate scanning, automatic verification with Proof-Based Scanning, comprehensive SDLC integration, and extensive collaboration support, Netsparker was designed with automation in mind for enterprise-class scalability.
Netsparker is the only end-to-end web application security solution that lets you scale and automate your web security program. Boasting a unique combination of enterprise features, including asset dis...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web-based solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats....
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future a...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time.
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
The MetaPhish product helps keep your staff safe from phishing scams through automated training that increases their vigilance.
A Niche Player in 2019 Gartner Magic Quadrant for Security Awareness CBT. MetaPhish is a simulated phishing product that enables organisations to determine how susceptible their company is to fraudulent phishing emails. The portal allows administrators to orchestrate simulated phishing and ransomware attacks to directly target employees. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator with point of need learning experiences.
A Niche Player in 2019 Gartner Magic Quadrant for Security Awareness CBT. MetaPhish is a simulated phishing product that enables organisations to determine how susceptible their company is to fraudule...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of br...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encry...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without disturbing your current workflow. Perform continuous security in the early stages of your agile development lifecycle and quickly fix vulnerabilities. Get in your issue tracker easy step-by-step instructions on where and how to fix each vulnerability. Start a free trial.100% free. No Credit Card
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines. Smoothly and automatically integrate security testing into your agile development lifecycle, without ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Alert Logics purpose-built security technology & a team of 24/7 MDR security experts empowers companies to resolve any threat.
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services.
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environm...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and licen...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting