76 results
Filter Results (76)
Pricing Options
Deployment
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Zero-Configuration Web Application, API Protection, and Bot Mitigation for Kubernetes.
Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
ThreatSTOP DNS Defense turns your existing DNS into true Protective DNS (PDNS) with continuous updates from 900+ feeds.
DNS Defense Outbound Threat Protection
ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.
DNS Defense turns your existing DNS into true Protective DNS (PDNS). DNS Defense provides granular, proactive DNS threat protection, and includes everything you need in a simple service
DNS Defense Outbound Threat Protection
ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Secure access to Internet and corporate resources with a single solution.
Fyde Enterprise is the Zero Trust security solution for modern business, helping organizations mitigate risks while adapting to the new nature of work and IT. Fyde eliminates security risks associated with traditional VPN access, enabling secure, reliable and fast access to authorized apps and workloads in your network from any device, network, and location. Fyde also protects user identities from account takeover attacks.
Fyde Enterprise is the Zero Trust security solution for modern business, helping organizations mitigate risks while adapting to the new nature of work and IT. Fyde eliminates security risks...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs).
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
BluKrypt
(0)
Secure Cloud Storage Gateway
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt also protects data at rest within the secure storage container it creates within the cloud storage target.
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Check Points Next Generation Firewalls (NGFWs) are trusted by customers for their highest security effectiveness.
Check Point maintains it's ability to keep organizations protected from sophisticated fifth generation cyber-attacks. Offered via the Check Point Infinity architecture, Check Points NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.
Check Point maintains it's ability to keep organizations protected from sophisticated fifth generation cyber-attacks. Offered via the Check Point Infinity architecture, Check Points NGFW includes 23...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Paladion
(0)
Next-generation managed detection and response (MDR) powered by patented AI technology, for proactive threat detection and response.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform, AI.saac, powers their services to enhance detection and response against complex, targeted, and unknown attacks. Paladion helps organizations ensure robust security by staying proactive in their efforts with advanced software and expert consulting services.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform,...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Strobes
(0)
Strobes is a risk-based Vulnerability Management Platform for Enterprises with 25+ open-source vulnerability assessment scanners!
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization.
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Crowdsec
(0)
CrowdSec is a security automation engine, using local IP behavior detection & leveraging our community-driven IP reputation database.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds of attacks. The solution also enables users to protect each other. Each time an IP is blocked, all community members are informed so they can also block it. The solution is being used in 100+ countries across all 6 continents.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency.
The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
Inquest
(0)
Endpoint security software for threat prevention and detection
Endpoint security software for threat prevention and detection
Endpoint security software for threat prevention and detection
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
eThalamus SOAR unifies and automates all Cybersecurity applications with a simple, easy-to-use interface.
eThalamus' modular design integrates the tools needed to centralize Cybersecurity management and streamline monitoring, alert, support, operation, reporting, and incident management tasks.
- Ticketing System catalogs and manages security alerts. Applying use cases and specialized care guides by threat, platform and environment, reduce response time.
- Dashboard provides online visibility to address a continuous improvement process.
eThalamus' modular design integrates the tools needed to centralize Cybersecurity management and streamline monitoring, alert, support, operation, reporting, and incident management tasks.
-...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring
DIARIO
(0)
DIARIO is a malware detection software that scans attachments without compromising privacy or sharing content
DIARIO is a document malware detection tool that analyzes and scans documents for malware. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. For users that do not want to upload entire documents, they are given the choice to use the special client feature which would allow them to only upload certain parts.
DIARIO is a document malware detection tool that analyzes and scans documents for malware. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. For users that...
Features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization
- Monitoring