138 resultaten
Waarom Capterra gratis is
Got more than 100 cloud assets? Orca Security provides workload-level visibility and security for AWS, Azure, and GCP without the gaps in coverage and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Meer informatie over Orca Security 100+ cloud assets? Get instant-on, workload-level security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Meer informatie over Orca Security
SOC Prime TDM (Threat Detection Marketplace®) is een SaaS-contentplatform dat beveiligingsmedewerkers helpt om continu cloudbeveiliging en proactieve misbruikdetectie te bieden. TDM bevat dashboards die geschikt zijn voor SOC, regelpakketten, scenario's voor bedreigingsdetectie en respons op incidenten die betrekking hebben op de nieuwste aanvallen, evenals inhoud die kan worden gebruikt op verschillende analytische platforms, waaronder cloud-native SIEM's zoals Microsoft Azure Sentinel en Sumo Logic. Meer informatie over Threat Detection Marketplace SOC Prime TDM is een SaaS-platform dat inhoud voor bedreigingsdetectie biedt die op veel platforms kan worden gebruikt, waaronder cloud-native SIEM's. Meer informatie over Threat Detection Marketplace
Een cloudgebaseerd platform voor beveiligingsanalyse dat beveiligingsinformatie biedt voor je hybride omgeving. Sumo Logic kan je eerste cloudgebaseerde SIEM zijn, je verouderde SIEM vervangen of samengaan met je bestaande SIEM-oplossing. Sumo Logic levert het enige voor de cloud ontworpen platform voor realtime analyse van machinegegevens dat continue informatie biedt. Meer informatie over Sumo Logic Sumo Logic levert het enige voor de cloud ontworpen platform voor realtime analyse van machinegegevens dat continue informatie biedt. Meer informatie over Sumo Logic
DNS-gebaseerde webcontentfilter en webbeveiligingslaag voor bedrijven die malware, ransomware en phishing blokkeren en controle van webcontent bieden. WebTitan filtert meer dan 2 miljard DNS-verzoeken per dag, identificeert elke dag 300.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter direct je cybersecurity. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Geweldige maandelijkse prijzen beschikbaar. Lokaal gehost. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan
365 Total Protection van Hornetsecurity biedt uitgebreide bescherming voor Microsoft-clouddiensten, speciaal ontwikkeld voor Office 365 en naadloos geïntegreerd. Profiteer van het feit dat het eenvoudig is op te zetten en uiterst intuïtief te gebruiken, waardoor je IT-beveiligingsbeheer vanaf het allereerste begin wordt vereenvoudigd. Meer informatie over 365 Total Protection 365 Total Protection Business biedt je een uitgebreide oplossing voor e-mailbeveiliging met verschillende functies. Meer informatie over 365 Total Protection
Dark Web ID helpt MSP's en interne IT-teams hun organisatie en klanten te beschermen tegen een inbreuk op de cyberbeveiliging door het dark web 24/7/365 te bewaken en te waarschuwen als er gevoelige bedrijfs- of werknemersgegevens of wachtwoorden te koop worden aangeboden op het dark web. Meer informatie over Dark Web ID Dark Web ID bewaakt bedrijfs- en inloggegevens en waarschuwt je als deze te koop worden aangeboden op dark web-markten, zodat je een inbreuk kunt voorkomen. Meer informatie over Dark Web ID
Boxcryptor is flexibele en schaalbare versleutelingssoftware voor de cloud, met ondersteuning voor meer dan 30 providers en NAS-versleuteling op alle platforms. Het biedt functies voor samenwerking, controle en beheer die beveiligde samenwerking in bestanden mogelijk maken en tegelijkertijd voldoen aan de privacyregels. Definieer aangepaste beleidsregels, beheer gebruikers met eenmalige aanmelding of active directory en bescherm je accounts met tweevoudige verificatie (2FA). Kies voor beveiliging die in Duitsland is vervaardigd om veilig en efficiënt te werken in de cloud. Meer informatie over Boxcryptor Platformonafhankelijke versleutelingsoplossing voor de cloud en NAS-systemen die meer dan 30 cloudproviders ondersteunt (bijv. Dropbox, OneDrive). Meer informatie over Boxcryptor
(0 reviews)
Bezoek website
Skybox Vulnerability Control ondersteunt een systematische aanpak voor vulnerability management zoals geen enkele andere leverancier. Deze oplossing is gebaseerd op uitgebreide zichtbaarheid van je aanvalsoppervlak, en maakt gebruik van zijn context voor het snel analyseren, prioriteren en herstellen van je meest risicovolle kwetsbaarheden. Meer informatie over Vulnerability Control Stel de risico's voor je netwerk vast en prioriteer ze met uitgebreide scan- en analyseoplossingen voor kwetsbaarheden. Meer informatie over Vulnerability Control
TOPIA is een innovatief cloudbeveiligingssysteem dat gegevens over je digitale infrastructuur verzamelt om kwetsbaarheden te herkennen en in te perken voordat ze bedreigingen worden. Meerdere talen en besturingssystemen? Geen probleem. Met TOPIA zijn dynamische en diverse cloudomgevingen veilig. Een dynamische, maar toch lichte cloudbeveiligingsoplossing voor de moderne cloud-native infrastructuur. In staat om risico's te analyseren en te prioriteren binnen een complex web van toepassingen en middelen. Meer informatie over TOPIA Uniform cloud-native Vulnerability Management-platform Meer informatie over TOPIA
VaultCore is een oplossing voor het beheer van encryptiesleutels om het levenscyclusproces van sleutels te automatiseren, de capaciteit te leveren om honderden miljoenen sleutels te ondersteunen en naadloze netwerkintegratie te bieden om activa te beschermen tegen aanvallen op apparaten en infrastructuren. VaultCore staat erom bekend de bancaire/financiële sector, gezondheidszorg, gegevensopslag, telecommunicatie, energie, IT en transport te voorzien van schaalbaarheid, interoperabiliteit, krachtige automatisering en gebruiksgemak. Meer informatie over VaultCore Krachtige encryptietool voor sleutelbeheer die volledige controle over en beveiliging van de gehele levenscyclus van sleutels biedt voor elke toepasselijke technologie. Meer informatie over VaultCore
(0 reviews)
Bezoek website
OpsCompass drives true multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Goolge Cloud Platform. Additional services include license management and SaaS posture management. The intuitive UI provides clear data visualization for resource management, remediation, and configuration drift management. Learn More. Meer informatie over OpsCompass OpsCompass drives true multi-cloud operational control, visibility, and security in addition to SaaS posture management. Learn More. Meer informatie over OpsCompass
(0 reviews)
Bezoek website
Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors. Meer informatie over Prophaze WAF Zero-Configuration Web Application, API Protection, and Bot Mitigation for Kubernetes. Meer informatie over Prophaze WAF
Avast Business Antivirus Pro Plus 2019 is een alles-in-één pakket met krachtige bescherming van endpoint, e-mail, server en netwerk voor kleine en middelgrote bedrijven (met name geschikt voor bedrijven met 1 tot 500 werknemers). Werkt op pc's, Macs en Windows-servers. Het is verrijkt met 18 geavanceerde functies om je bedrijf volledig veilig te houden. Bevat krachtige antivirus-, server-, e-mail- en netwerkbeveiliging, CyberCapture, firewall, wachtwoordmanager, VPN en nog veel meer. Het kan zowel met als zonder cloudconsole worden gebruikt. Bekroonde alles-in-één antivirusoplossing om elk onderdeel van je bedrijf te beschermen. Beschikbaar voor pc's, Macs en servers.
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebruik van meerlagige technologieën die de vaardigheden van standaard antivirusprogramma's ruimschoots overtreffen. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
De missie van dit platform is om jouw missie te beschermen. Duo Security maakt beveiliging pijnloos, zodat jij je kunt concentreren op wat er echt belangrijk is. Deze schaalbare, cloudgebaseerde oplossing voor vertrouwde toegang beschermt de toegang tot alle toepassingen voor elke gebruiker en elk apparaat, vanaf elke locatie. De oplossing van Duo voor meervoudige verificatie (multi-factor authentication, MFA) is gemakkelijk te gebruiken, te beheren en in te zetten, terwijl het volledige zichtbaarheid en controle over het eindpunt biedt. Deze combinatie van toegangsbeheer voor gebruikers en apparaten legt de basis voor een zero-trust beveiligingsmodel. De meervoudige verificatie van Duo Security geeft je gebruikers via één tik gemakkelijke toegang tot toepassingen, met beveiliging tegen diefstal van inloggegevens.
Cloudflare Inc. is een toonaangevend bedrijf op het gebied van webprestaties en beveiliging dat bijdraagt aan een beter internet. Tegenwoordig beheert het bedrijf een van de grootste internationale netwerken (meer dan 100 datacenters) die maandelijks meer dan 10 biljoen aanvragen verwerkt. Dit is bijna 10% van alle internetaanvragen en treft mondiaal meer dan 2,5 miljard mensen. Cloudflare Inc. is een bedrijf op het gebied van webprestaties en beveiliging dat streeft naar een beter internet.
Bescherm je e-mail tegen ransomware, spearphishing en alle andere bedreigingen. ZEROSPAM is een zeer effectieve en gebruiksvriendelijke cloudgebaseerde oplossing voor e-mailbeveiliging met een bewezen succespercentage van 99,9% tegen alle vormen van e-mailbedreigingen. Het is volledig compatibel met Office 365, en biedt superieure bescherming tegen ransomware en phishing, uitstekende bescherming tegen spearphishing en een zeer laag vals-positief percentage. Dit platform heeft een servicegericht team met een complete en zeer nauwkeurige spambestrijdingsfunctie. Een echt cloudgebaseerde anti-spamoplossing die uitstekende bescherming biedt tegen e-mailbedreigingen zoals ransomware en spearphishing.
Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden. Onderzoek, controleer en handel om operationele informatie te verkrijgen en de bedrijfsresultaten te verbeteren. Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden.
Deep Security biedt meerdere XGen-technieken om fysieke, virtuele en cloudworkloads en containers te beschermen tegen bedreigingen. Eén dashboard vermindert het aantal benodigde beveiligingstools en combineert mogelijkheden met volledig inzicht in toonaangevende omgevingen zoals VMware en AWS. Deep Security verlaagt de kosten en complexiteit van het beveiligen van workloads in meerdere omgevingen die servers virtueel beschermen tegen de nieuwste geavanceerde bedreigingen zoals ransomware en netwerkgebaseerde kwetsbaarheden. Bescherm je bedrijf in fysieke, virtuele cloud- en containeromgevingen met centrale zichtbaarheid en controle.
PBX-oplossing waarmee kleine tot middelgrote ondernemingen gesprekken kunnen voeren met een zakelijk telefoonnummer op externe locaties, waardoor oproeproutering, audioconferenties, gespreksroutering, oproepdoorschakeling en meer mogelijk is. PBX-oplossing waarmee kleine tot middelgrote ondernemingen gesprekken kunnen voeren met een zakelijk telefoonnummer op externe locaties.
Rubrik biedt directe beschikbaarheid van toepassingen aan hybride cloudgebaseerde bedrijven voor herstel, zoeken, cloud en ontwikkeling. Door gebruik te maken van dit toonaangevende cloudgebaseerde gegevensbeheerplatform kunnen klanten op één platform toepassingen mobiliseren, het beschermingsbeleid automatiseren, herstellen van ransomware en toepassingsgegevens op schaal zoeken en analyseren. Van dagen tot seconden. Oplossing voor gegevensbeheer en back-up waarmee bedrijven gegevens in cloudomgevingen kunnen beheren met behulp van geautomatiseerd beveiligingsbeleid.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure. Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities. HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
DataDome is gespecialiseerd in het beschermen en versnellen van digitale bedrijven. Dankzij de AI-gestuurde botbeheeroplossing kunnen bedrijven de prestaties verbeteren van websites die worden belast door intensieve scraping, gebruikersgegevens beschermen tegen hackers en betere marketing- en zakelijke beslissingen nemen dankzij analytische gegevens die niet zijn aangetast door botverkeer. Ontwikkel je botbeheerstrategie en voer deze uit met behulp van het dashboard, rapporten en realtime waarschuwingen. AI-gestuurde botbeheeroplossing om al je kwetsbaarheidspunten (websites, apps) te beschermen en je digitale zaken te versnellen.
Protection and Performance for the Cloud Era Protection and Performance for the Cloud Era
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious. Manage all of your security and compliance operations from one real-time location.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection. Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. For more info, visit www.boolebox.com Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP. The result is a significant decrease in errors and the sheer amount of tasks required to keep networks available, flexible and secure. IP address management solution that assists users with data organization, network allocation, configuration tasks, and more
Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software. Web-based solution that helps monitor the performance of containers based on services down to underlying hardware and software.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. InsightIDR verzamelt native gegevens van je eindpunten, beveiligingslogboeken en cloud-diensten. Pas gedragsanalyses van gebruikers en aanvallers toe op je gegevens om activiteiten van indringers te vinden bij elke stap van de aanvalsketen. Verenig je beveiligingsgegevens. Detecteer problemen voordat ze ernstig worden. Reageer 20x sneller met visuele onderzoeken en automatisering. InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control. VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time. Cloud Control automates cloud security and compliance monitoring and management.
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies. Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection. Quixxi is also a monitoring tool with Licensing, Analytics & Diagnostics SDK. Allowing developers to identify illegal use & help recover associated lost revenue, detailed insights into customer engagement & advanced debugging files. Quixxi is an end-to-end mobile app security solution for developers to protect and monitor any mobile app in minutes.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Cloudaware is a SaaS multi-cloud management platform with such modules as: CMDB, Change Management, Cost Management, Vulnerability Scanning, Monitoring, Intrusion Detection, Patch Management, Compliance Engine, Log Management and Backups & Replication. Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products. Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner. Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation. Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
A data security product that allows users to detect, protect, and correct data in the cloud. A data security product that allows users to detect, protect, and correct data in the cloud.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it. Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. The iboss cloud provides fast and secure Internet access on any device, from any location, in the cloud.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec. Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Netacea beschermt bedrijven tegen kwaadaardige bots. Intent Analytics, aangedreven door machine learning, onderscheidt bots snel en nauwkeurig van mensen om websites, mobiele apps en API's te beschermen tegen geavanceerde bedreigingen en prioriteit te geven aan echte gebruikers. Dankzij de bruikbare intelligence met gegevensrijke visualisaties kun je weloverwogen beslissingen nemen over je verkeer. Netacea biedt een revolutionaire oplossing voor botbeheer die websites, mobiele apps en API's beschermt tegen kwaadaardige bots.
DisruptOps provides a SaaS-based cloud management platform to implement automated control and security of cloud infrastructure. We are helping organizations enforce cloud security best practices with automated guardrails, for multi-cloud environments. Rather than erecting barriers to cloud adoption, DisruptOps enforces guardrails that empowers DevOps and Security teams to remain agile and innovative while helping avoid security and operational pitfalls. DisruptOps is a multi-cloud management platform that is helping organizations assess and automate cloud security best practices.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organizations public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security. Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous Vulnerability Monitoring: Prevent exploitable vulnerabilities like open AWS S3 Buckets and disabled MFA with automated detection on Storyfier. Built-in Compliance Reporting: Assess your compliance posture against the CIS Benchmark and AWS Well-Architected Framework. Stop the most common cause of cloud data breaches with Warden, the integrated cloud security and compliance solution for AWS users.
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads. PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
Record and evaluate configurations of your AWS resources Record and evaluate configurations of your AWS resources
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We can help you set up, manage, secure, and optimize IT performance for your remote workforce using VMware solutions. Explore how solutions like VMware Horizon 7 and Workspace ONE can make your IT staff more efficient, save your company money, and maximize your companys end user experience. Make it easy for employees to work remotely from any location or device in a secure environment with solutions from VMware & Softchoice
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more. Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
(0 reviews)
Bekijk profiel
All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance. All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance.
(0 reviews)
Bekijk profiel
AWS cloud logs analysis & management tool - get insights into your end user content consumption. AWS cloud logs analysis & management tool - get insights into your end user content consumption.
(0 reviews)
Bekijk profiel
Cloud Raxak automates the delivery of cloud security compliance across the enterprise. Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
(0 reviews)
Bekijk profiel
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. Threat Stack provides cloud security & compliance for infrastructure and applications.
(0 reviews)
Bekijk profiel
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Op de Secure DevOps Toolchain van SANS. Amazon Partner. Geautomatiseerde AWS-beveiliging en configuratiebewaking om een veilige en compatibele cloudinfrastructuuromgeving te handhaven. Open source.
(0 reviews)
Bekijk profiel
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
(0 reviews)
Bekijk profiel
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data. PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

IOA

(0 reviews)
Bekijk profiel
Cloud management solution that helps businesses with data management, media migration and information security. Cloud management solution that helps businesses with data management, media migration and information security.
(0 reviews)
Bekijk profiel
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills. R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support
(0 reviews)
Bekijk profiel
De Cato Cloud verbindt alle bedrijfslocaties, mensen en toepassingen op een veilige manier. Cato verlaagt de MPLS-kosten, elimineert gedistribueerde apparaten, biedt veilige internettoegang en breidt het WAN wereldwijd uit naar mobiele gebruikers en clouddatacenters. Cato biedt een wereldwijd SD-WAN met ingebouwde netwerkbeveiliging, geleverd als een clouddienst.

NCP

(0 reviews)
Bekijk profiel
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
(0 reviews)
Bekijk profiel
Forcepoint Edge Protection helps modernize enterprise networks for cloud adoption. Gain visibility and control over SaaS apps and web use while protecting your users wherever they are. Converged solutions like SD-WAN and NGFW combined with behavior-centric, risk-adaptive capabilities provide outside-in security for on-premise and in the cloud. Reduce the cost and complexity of connecting remote locations with cloud-delivered, zero-footprint security services. Cloud-first, hybrid-ready solution delivering behavior-centric, risk-adaptive security across environments via a converged platform.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.
Provides HIPAA Cloud automation for AWS applications and workloads. Plan, enforce, and demonstrate HIPAA compliance internally and externally. Create and enforce organizational and administrative policies with the Policy Navigator then automate DevOps and Security Operations with continuous compliance monitoring. Continuous Compliance Monitoring for AWS. Automate HIPAA compliance and DevOps tasks for AWS. Generate organizational policies.
(0 reviews)
Bekijk profiel
ThreatX protects web applications and APIs from cyber threats across cloud and on-prem environments. By combining behavior profiling and collective threat intelligence with deep analytics, ThreatX delivers precise protection and complete threat visibility. ThreatXs AppSec-as-a-Service combines threat hunting with 24/7 access to security experts along with operational management, virtually eliminating costs associated with legacy WAFs. ThreatX protects modern web applications and APIs from complex cyber threats combining intelligent defense with 24/7 AppSec expertise.
(0 reviews)
Bekijk profiel
Elastic Workload Protector is a Cloud analytics solution which integrates a vulnerability scanner. This way, customers infrastructure are protected all the time because they know every new vulnerability or other potential risk and have detailed reports with adapted remediation solutions. EWP protects every infrastructure (traditional, Cloud, virtualized, hybrid) and containers. Its patented Clone & Scan feature allows customers to make precise analysis without impacting the production. Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously.
(0 reviews)
Bekijk profiel
Solution for secure application connectivity for the cloud-native world. Solution for secure application connectivity for the cloud-native world.
(0 reviews)
Bekijk profiel
A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report.
(0 reviews)
Bekijk profiel
CloudGuard Dome9 is a comprehensive software platform for public cloud security and compliance orchestration. Using Dome9, organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud. Dome9 delivers security capabilities across Amazon Web Services, Microsoft Azure, and Google Cloud Platform (GCP). CloudGuard Dome9 provides cloud security solutions to keep enterprise data, assets and apps free from sophisticated attacks.
(0 reviews)
Bekijk profiel
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
(0 reviews)
Bekijk profiel
A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices.
(0 reviews)
Bekijk profiel
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.
(0 reviews)
Bekijk profiel
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.
TokenEx is een tokenisatieplatform voor grote ondernemingen dat vrijwel onbeperkte flexibiliteit biedt in hoe klanten toegang hebben tot gegevens, deze kunnen opslaan en beveiligen. Dit platform werkt met meerdere kanalen voor gegevensacceptatie met behulp van een processor-onafhankelijke aanpak, wat betekent dat deze software bijna elk gegevenstype kan tokeniseren en beveiligen, inclusief PCI, PII, PHI en zelfs ongestructureerde gegevensindelingen, en kan worden geïntegreerd met vrijwel elke processor of elk eindpunt. Cloudgebaseerd platform voor gegevensbeveiliging dat tokenisatie en veilige bewaking van cloudgegevens biedt voor alle soorten gevoelige gegevens.
(0 reviews)
Bekijk profiel
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks.
(0 reviews)
Bekijk profiel
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.
(0 reviews)
Bekijk profiel
Acra is a single tool for data breach prevention in cloud apps, it covers 9 data security controls: transparent data encryption, searchable encryption, data masking, tokenization, authentication, IDS, SQL firewall, etc. Acra provides defense in depth across the whole data lifespan within the application. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.