50 results
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Focusing on the corporate network, employee & device protection, it is easy to forget the importance of website security. Not secured properly, an exposed website can lead to hacks and reputational damage due to leaked customer data and compromised online company presence. Companies can use NordLayer prevention measures by establishing a dedicated IP to hide the company website from hostile actors to avoid the impact of a taken offline website, malicious code injection, or fraud. Learn more about NordLayer

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Easy to use, fast and reliable web hosting services for everyone who wants to start their online journey.
Start your online journey with fast and secure web hosting that enables you to take the Internet by storm. At Hostinger, you can choose from various web hosting-related services that include Domain Registration, Cloud Hosting, Email Hosting, SSL Certificate, and LiteSpeed Servers. Learn more about Hostinger

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Datadog is a service that helps increase uptime and maximize the performance of services through centralized monitoring and alerting.
Datadog is a SaaS-based monitoring, security, and analytics platform for cloud-scale infrastructure, applications, logs, and more. The platform assists organizations in improving agility, increasing efficiency and providing end-to-end visibility across dynamic or high-scale infrastructures. By collecting metrics and events from 400+ out of the box services and technologies, Datadog enables Dev, Sec, and Ops teams to ensure application uptime and accelerate go-to-market efforts. Learn more about Datadog

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Learn more about DNSFilter

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Kount's Identity Trust Global Network delivers fraud prevention and personalized customer experiences for over 9,000 leading brands.
Powered by its Identity Trust Global Network , Kount, An Equifax Company, links billions of trust and fraud signals to protect every interaction from account creation and login to payments and disputes. Businesses use Kount to increase approval rates, reduce chargebacks, stop bot attacks, prevent account takeover, and manage disputes all within a single platform. With Kount, businesses get both hands-free automation and flexible controls for more accurate decisions. Learn more about Kount

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Orca Security is the industry-leading agentless Cloud Security Platform for AWS, Azure, Google Cloud and Kubernetes that identifies, prioritizes, and remediates risks. Orca saves your time by connecting to your environment in minutes with patent-pending Sidescanning technology to provide complete coverage across vulnerabilities, malware, misconfigurations, lateral movement risks, weak and leaked passwords, and overly-permissive identities. Learn more about Orca Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Learn more about Acunetix

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location. Learn more about Zscaler

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report. Learn more about AppTrana

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Premium managed WordPress hosting, powered by Google Cloud. Lightning-fast load times, 24/7 expert support, and highly scalable.
At Kinsta, we take managed WordPress hosting and performance to the next level. Powered by Google Cloud Platform and their lightning-fast "premium tier" network, WordPress users can choose from 25+ data centers around the globe. We host all types of sites, from small blogs up to Fortune 500 customers. Learn more about Kinsta

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Learn more about SiteLock

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Invicti Enterprise is a comprehensive automated web vulnerability scanning solution.
Invicti is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence. Learn more about Invicti

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.
Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company. A bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities. Learn more about Hackrate Bug Bounty Platform

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
DataDome provides state-of-the-art protection against online fraud and bot attacks for mobile apps, websites and APIs.
DataDome protects mobile apps, websites and APIs from online fraud and bot attacks, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. Our AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time. Learn more about DataDome

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats. Learn more about Wordfence

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
Your users and visitors depend on you to keep their information safe. If you want to be sure of your website security, Security for Everyone is the tool for you. With S4E, you will have: 1- Manual Vulnerability Scanning 2- Automated Vulnerability Scanning 3- Vulnerability Scanning API Additionally, you can check your website security regularly with our web application penetration testing service performed by our highly trained cybersecurity experts who have 35+ years of experience collectively. Learn more about Security for Everyone

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, acquired ShieldSquare in March 2019.
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages Intent-based Deep Behavior Analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, card fraud, content Learn more about Radware Bot Manager

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Software that provides a unified view of service delivery, availability, performance and security of IT applications.
ServicePilot monitoring software enables faster resolution of IT incidents. This intelligent observability platform collects and analyzes metrics, traces and logs to improve application performance and prevent IT failures. It also unifies monitoring and breaks down silos to ensure continuity of services and IT infrastructure. Learn more about ServicePilot

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Cloud-based solution that helps businesses secure websites and track their performance.
Cloud-based solution that helps businesses secure websites and track their performance. Learn more about Jetpack

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Learn more about Netskope Active Platform

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Firewall that provides businesses with tools to protect applications against web threats.
Firewall that provides businesses with tools to protect applications against web threats. Learn more about AWS WAF

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Learn more about Red Sentry

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Protect your equipment from digital threats. Complete security for small and medium businesses.
This cybersecurity solution includes: Online identity protection, antivirus and antispyware, antispam, protection against public networks, remote administration, web access control, USB device control, corporate mobile management and more. It allows combining protection from 5 to 25 computers + 5 smartphones + 1 or 2 file servers; all options include the remote administration tool. Learn more about ESET Home Office Security Pack

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Learn more about Detectify

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots.
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors
NO-COMPROMISE FEATURES FOR ROBUST SECURITY: With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks. Protect unlimited domains and applications using a single instance at no additional cost. Active threat intelligence for real-time protection. Denial of Service (DoS) protection helps safeguard the application from random repetitive attacks. Bot, Crawlers Protection Learn more about Modshield SB

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Full WordPress Management From A Single Easy Dashboard.
Full WordPress Management From A Single Easy Dashboard. Learn more about WPBlazer

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Protect your equipment from digital threats. Complete security for small and medium businesses.
Complete multilayered protection for endpoints, cloud applications & email, the #1 threat vector. Prevent zero-day threats Improved protection against ransomware and new, never-before-seen threat types that uses adaptive scanning, machine learning, cloud sandboxing and in-depth behavioral analysis. Learn more about ESET Protect

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Extends OSSEC with a management console, advanced file integrity management, compliance auditing and reporting, and expert support.
Atomic OSSEC provides a comprehensive FIM at a fraction of the cost of traditional solutions. It meets all your file integrity monitoring requirements, works in any cloud, server or hybrid environment and integrates easily where you need it. Based on OSSECs solid open source foundation, it expands the capabilites to what businesses need. With advanced SIEM log filtering that reduces the noise for security op centers & a light footprint that doesnt break the bank on SOC costs. Learn more about Atomicorp OSSEC

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates.
Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates. Learn more about Arkose Labs

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Kasada detects the presence of malicious automation from the very first request and stops bots before it can do its damage.
Kasada has pioneered an approach to mitigating bots. Instead of letting requests in to look for suspicious behavior that can fly beneath the radar, Kasada is able to identify and stop malicious automation before it’s ever allowed to enter the user's infrastructure. Kasada achieves this by detecting the immutable evidence that presents itself whenever the tools associated with automation interact with online businesses. Learn more about Kasada

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks. Learn more about HTTPShield

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
A comprehensive web security solution that offers advanced bot management, DoS & DDoS protection, API security, and more.
A comprehensive web security solution that offers advanced bot management, DoS & DDoS protection, API security, human behavioral analysis, real-time analytics, automated resource scaling, and more. Learn more about Reblaze

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more.
Website security solution that offers malware scanning, annual site cleanup and remediation, firewall, SSL certificate, and more. Learn more about GoDaddy Website Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments.
NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments. Learn more about F5 BIG-IQ Centralized Management

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
F5's Advanced WAF proactively detects and mitigates threats, secures sensitive data, and defends against application (DoS).
F5's Advanced WAF proactively detects and mitigates threats, secures sensitive data, and defends against application (DoS). Learn more about F5 Advanced Web Application Firewall

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues.
A comprehensive security scanning tool to find breached data, exposed servers, web app/AWS cloud vulnerabilities and compliance issues. This tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more. Learn more about GetSecured

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Web-based network security platform with a Japanese-language user interface that helps protect website applications from cyberattacks.
Guardiax is built to provide Japanese companies in any industry with an online defense system that protects against malware and cyberattacks. It analyzes website vulnerabilities and uses the data to create a security firewall to protect data. The simplified UI allows users to integrate the defense system on any website and manage the site immediately after installing it. The software helps reduce false positives that prevent standard users from accessing websites. It has a dashboard for administrators to track website access and view the security status of the website. It also allows companies to manage on-premise internet security and provide clients with online support. Learn more about GUARDIAX

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Japanese-language security service that prevents cyber-attacks and protects against data leakages, falsification, and service outages.
Attack Blocker is a cloud-based web application firewall (WAF) that supports the Japanese language. It acts as a firewall that blocks cyber threats and protects websites from data leaks or tampering due to unauthorized intrusion, such as cross-site scripting. WAF also handles attacks that conventional means like firewalls cannot prevent. For instance, it analyzes attacks by identifying malicious communications, attack patterns, and future viruses. Since it is installed in the server to deter hackers and prevent viruses from invading the system, the software helps boost the stability and safety of web applications. Users also receive monthly reports on threats and viruses that attempt to invade the system. It also provides real-time commentary and solutions to increase cyber safety. The could-based software collects security information from various networks to identify the latest potential vulnerabilities. Learn more about Attack Blocker

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
It is a cybersecurity tool providing organizations and governments with systems to set defined website operation policies.
i-FILTER is a web security software that enables organizations in numerous industries to control and monitor their business website access protocols. The platform allows website administrators to control web services by function on a group basis. It enables administrators to manage employee browsing and set up flexible web function policies, such as writing only to the human resources department. The platform also provides admins with tools to restrict personal account use and private browsing. The software helps to maximize employee engagement and increase productivity by limiting access to websites like gambling and other entertainment platforms. Businesses can use the software to monitor and manage web access logs, enabling prompt identification of information leakage and the planning of countermeasures. It allows visualization of attacks from infected malware and unauthorized sites using SSL decoding and communication. Learn more about i-FILTER

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Software for protecting businesses against various web-based security risks, blocking threats in the cloud before reaching endpoints.
InterScan Web Security is a platform for blocking threats delivered via HTTP and other protocols. It intercepts security risks in the cloud before employees have a chance to download them. Example safeguards include malicious software protection, URL filters, web reputation, and threat protection. The software can also secure systems against cyberattacks, ransomware, and information leaks. It uses intelligence from the Trend Micro Smart Protection Network to identify security risks. InterScan Web Security includes fine-grained controls for hundreds of protocols and applications. It can integrate with network services, including LDAP, Active Directory, and SNMP. The platform interface includes customizable dashboards with real-time monitoring of web usage. Reports help with reviewing user activities and compliance issues, and it informs them on security policies. The platform uses multiple gateways with failover and redundancy to ensure uninterrupted operations. Learn more about InterScan Web Security

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Phish threat assessment tool used by IT administrators worldwide to test employees’ readiness for phishing campaigns.
Part of the Sophos Central security software suite, Sophos Phish Threat is a tool that enables IT and network administrators to simulate phishing attacks to train corporate professionals to protect themselves against real ones. It comes with 60 training modules in 10 languages, each with customizable templates and tools to create convincing lookalikes from scratch. They can be used to create emails, identity harvesting forms, password harvesters, and other realistic-looking devices. Administrators can then import or sync employee contact lists to distribute these mock-ups across the company, monitoring their response reports to determine their vulnerability to real-world phishing campaigns in real-time. Learn more about Sophos Phish Threat

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Cloud-based website builder that helps businesses create online stores via pre-made templates, drag & drop editing, and custom fields.
Cloud-based website builder that helps businesses create online stores via pre-made templates, drag & drop editing, and custom fields. Learn more about WNPower

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API
Japanese web security system that uses AI technology to assist entities with data protection and management operations.
secuWAF is a cloud-based information management tool for Japanese enterprises. It provides comprehensive website security functionalities, allowing managers to monitor and control who has access to in-house data. The system is customizable and supports professionals in configuring the settings to meet business-specific needs. It also has analysis and diagnostic tools that assist in performing regular database checks, identifying attacks from unauthorized users, and protecting websites from cyber threats, such as SQL injection, DDoS, and data theft. It provides admins with encryption tools to set up role-based data access protocols for users at various administrative levels. Learn more about secuWAF

Features

  • Vulnerability Scanning
  • Firewalls
  • Log Management
  • Endpoint Protection Software
  • API