150 results
Why Capterra is free
SOC Prime TDM is a SaaS platform offering threat detection content that can be used across many platforms including cloud-native SIEMs. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contains SOC ready dashboards, rule packages, threat detection and incident response scenarios that cover the latest attacks, as well as content that can be used across various analytic-based platforms, including cloud-native SIEMs like Microsoft Azure Sentinel and Sumo Logic. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contain...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
100+ cloud assets? Get instant-on, workload-level security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering fil...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
OpsCompass drives true multi-cloud operational control, visibility, and security in addition to SaaS posture management. Learn More. Learn more about OpsCompass
OpsCompass drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Goolge Cloud Platform. Additional services include license management and SaaS posture management. The intuitive UI provides clear data visualization for resource management, remediation, and configuration drift management. Learn More. Learn more about OpsCompass
OpsCompass drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Goolge Cloud Platform. Additional services include license management and SaaS posture mana...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. Price from $49.99 Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Unified Cloud-Native Security Vulnerability Management Platform Learn more about TOPIA
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating systems? No problem. With TOPIA, dynamic and diverse cloud environments are secure. A dynamic, yet light cloud security solution for the modern cloud-native infrastructure. Able to analyze and prioritize risk across a complex web of applications and assets. Learn more about TOPIA
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
365 Total Protection offers two packages for your company's security management developed specifically for Microsoft Office 365. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a wide range of features that ensure email and data security in Office 365. The Enterprise version covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a w...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Stop the most common cause of cloud data breaches with Warden, the integrated cloud security and compliance solution for AWS users. Learn more about Horangi Warden
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous Vulnerability Monitoring: Prevent exploitable vulnerabilities like open AWS S3 Buckets and disabled MFA with automated detection on Storyfier. Built-in Compliance Reporting: Assess your compliance posture against the CIS Benchmark and AWS Well-Architected Framework. Learn more about Horangi Warden
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integrat...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Made by developers for developers, Nightfall DLP is the industry's first cloud-native data loss prevention solution. Via REST API, Nightfall can easily be integrated within any of your applications to ensure they're secure by design. With Nightfall's high accuracy machine learning detectors you can discover, classify, and protect personal information like names and credit card numbers as well as secrets like API keys, and so much more. Learn more about Nightfall DLP
Made by developers for developers, Nightfall DLP is the industry's first cloud-native data loss prevention solution. Via REST API, Nightfall can easily be integrated within any of your applications to ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its con...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Turbot

Turbot

(0 reviews)
Turbots full-stack governance platform discovers and remediates misconfigurations instantly. Learn more about Turbot
Turbot is a full-stack governance tool that instantly discovers resource changes and automates remediation using a consistent and unified policy language across Multi-Cloud, SaaS, Operating Systems and Containers. Turbots real-time CMDB discovers all resource changes which can be visualized and searched immediately. Resources are grouped and categorized in real-time reports to visualize, search, and filter on any configuration detail structured within an organizational hierarchy. Learn more about Turbot
Turbot is a full-stack governance tool that instantly discovers resource changes and automates remediation using a consistent and unified policy language across Multi-Cloud, SaaS, Operating Systems and...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that po...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method.
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zero...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom. Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SI...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protect your business across physical, virtual cloud and container environments with central visibility and control.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard co...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Secure cloud service for secure data exchange & virtual data rooms.
More than 1,200 companies around the world have already put their trust inidgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and simplifies them as well. With the help of idgard, data rooms for projects can be set up in no time. They turn file sharing into an efficient and highly secure process. Users on the go have protected access to their data via app or browser. No one else has access to them.
More than 1,200 companies around the world have already put their trust inidgard. This web service secures digital communication and collaboration with partners and customers at the highest level, and ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future a...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s activity.
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user. It covers any site users visit while authenticated against Google Workspace in Chrome (requires Google Cloud Protect to ensure Chrome is used & Shield is deployed).
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encry...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee d...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the pl...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Manage all of your security and compliance operations from one real-time location.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint complia...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers com...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Real-Time Bot protection that deploys in minutes (SaaS) and runs on autopilot.
DataDome is the #1 SaaS bot protection solution for e-commerce and classifieds businesses. DataDome offers real-time AI protection against all OWASP automated cyber threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping. The solution deploys in minutes on any web infrastructure, without changing the existing architecture. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups.
DataDome is the #1 SaaS bot protection solution for e-commerce and classifieds businesses. DataDome offers real-time AI protection against all OWASP automated cyber threats, including credential stuff...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applicat...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and miti...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Infoblox delivers Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. With 8,000 customers and 350 of the Fortune 500, Infoblox is running the worlds most sophisticated networks.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which i...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software....
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct ...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security management and operations platform with detection, analytics, and response capabilities.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smart...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collect...
  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication