248 resultaten
Waarom Capterra gratis is
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties.
Netsparker Security Scanner is een accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Met de unieke scanning-technologie op basis van bewijs van Netsparker kun je meer tijd besteden aan het verhelpen van de gemelde fouten door de geïdentificeerde kwetsbaarheden automatisch op een "alleen-lezen" en veilige manier te bekijken. De software produceert ook een bewijs van exploitatie. Daarom kun je meteen de impact van kwetsbaarheid zien en hoef je het niet handmatig te verifiëren.
Netsparker Security Scanner is een accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Met de unieke scanning-technologie op basis van...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
The 1st zero-trust environment for Google Workspace
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user. It covers any site users visit while authenticated against Google Workspace in Chrome (requires Google Cloud Protect to ensure Chrome is used & Shield is deployed).
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in....

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Uniform cloud-native Vulnerability Management-platform
TOPIA is een innovatief cloudbeveiligingssysteem dat gegevens over je digitale infrastructuur verzamelt om kwetsbaarheden te herkennen en in te perken voordat ze bedreigingen worden. Meerdere talen en besturingssystemen? Geen probleem. Met TOPIA zijn dynamische en diverse cloudomgevingen veilig. Een dynamische, maar toch lichte cloudbeveiligingsoplossing voor de moderne cloud-native infrastructuur. In staat om risico's te analyseren en te prioriteren binnen een complex web van toepassingen en middelen.
TOPIA is een innovatief cloudbeveiligingssysteem dat gegevens over je digitale infrastructuur verzamelt om kwetsbaarheden te herkennen en in te perken voordat ze bedreigingen worden. Meerdere talen...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
BetterCloud is the mission control center for discovering, managing, and securing SaaS applications, data, and users.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our work is to ensure organizations get the transformative value and benefits of adopting SaaS applications, while ensuring IT has complete control over their environment and can serve as an enabler for the business.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Employee Onboarding and Engagement App. The easiest way to increase employee engagement and simplify your onboarding process.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in touch. Share and discuss updates. Introduce the team and what it stands for to a new member. Provide quick access to members' contact details. Any group of people united by a common idea and purpose, who don't meet up on a daily basis, will find WISP extremely helpful.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
A total HIPAA solution built for Covered Entities and Business Associates to help simplify and automate your HIPAA compliance.
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you confidence in your compliance plan to reduce risk, increase patient loyalty, and profitability of your organization. Why Compliancy Group? -HIPAA Audit Support, no client has ever failed an audit! -HIPAA Seal of Compliance -Dedicated Compliance Coaches -Total HIPAA Solution
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Profiteer van geïntegreerd beheer van cloudbeveiligingsposities en toonaangevende bescherming tegen inbreuken voor cloudworkloads en -containers.
Om inbreuken te stoppen met behulp van gegevens en analyses op cloudschaal heb je een nauw geïntegreerd platform nodig. Elke functie speelt een cruciale rol bij het detecteren van moderne bedreigingen en moet zijn ontworpen en gebouwd voor snelheid, schaal en betrouwbaarheid. De cloudbeveiliging van CrowdStrike gaat verder dan ad-hocbenaderingen door alles wat je nodig hebt voor cloudbeveiliging te combineren in één platform. Dit biedt je uitgebreide bescherming van de host tot de cloud en alles daartussenin.
Om inbreuken te stoppen met behulp van gegevens en analyses op cloudschaal heb je een nauw geïntegreerd platform nodig. Elke functie speelt een cruciale rol bij het detecteren van moderne...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Schaalbaar cloudgebaseerd logboekbeheer.
Zoek krachtig op grote hoeveelheden logboekgegevens voor snelle gemiddelde tijd tot reparatie met SolarWinds Loggly. Geniet van schaalbaar, cloudgebaseerd logboekbeheer voor snel zoeken en probleemoplossing. Ga van reactieve naar proactieve realtime logboekcontrole en bekijk app-prestaties, systeemgedrag en ongebruikelijke activiteiten over de hele stack. Spoor problemen op tot hun hoofdoorzaak door ze te analyseren in de context van de hele stack. Analyseer en visualiseer je gegevens om belangrijke vragen te beantwoorden en SLA-naleving te volgen.
Zoek krachtig op grote hoeveelheden logboekgegevens voor snelle gemiddelde tijd tot reparatie met SolarWinds Loggly. Geniet van schaalbaar, cloudgebaseerd logboekbeheer voor snel zoeken en...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting &...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Het platform stelt klanten in staat om digitale identiteiten op een efficiënte manier, veilig en vol vertrouwen te beheren.
De identiteitsbeheeroplossingen van SailPoint bieden volledig inzicht in wie wat doet en wat voor soort risico's dit creëert en stellen je in staat actie te ondernemen. Het koppelt mensen, toepassingen, gegevens en apparaten om een identiteitsgestuurde onderneming te creëren. Van lokale en cloudgebaseerde toegangsbeheersoftware tot identiteitsanalyse en bescherming van ongestructureerde gegevens, SailPoint kan je meest complexe uitdagingen op het gebied van identiteits- en toegangsbeheer oplossen.
De identiteitsbeheeroplossingen van SailPoint bieden volledig inzicht in wie wat doet en wat voor soort risico's dit creëert en stellen je in staat actie te ondernemen. Het koppelt mensen,...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Sterke wachtwoordloze authenticatie om aanvallen op inloggegevens uit te sluiten en de identiteit van personeel en klanten te beveiligen.
Beyond Identity is een zeer veilig authenticatieplatform. Het wachtwoordloze identiteitsplatform van Beyond Identity, een innovator op het gebied van wachtwoordloosheid, maakt gebruik van realtime toegangscontroles om identiteiten te verifiëren met apparaten en controleert gedetailleerde risicosignalen voor continue verificatie. Beyond Identity doorbreekt de barrières tussen cyberbeveiliging, identiteit en apparaatbeheer en verandert fundamenteel de manier waarop de wereld inlogt, waardoor teams kunnen blijven werken in een wereld zonder vertrouwen.
Beyond Identity is een zeer veilig authenticatieplatform. Het wachtwoordloze identiteitsplatform van Beyond Identity, een innovator op het gebied van wachtwoordloosheid, maakt gebruik van realtime...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Advanced preventive protection for cloud email, collaboration and storage.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your company communication, collaboration and cloud storage. Our easy-to-use cloud console gives you an overview of quarantined items and immediately notifies you when detection occurs.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Effortlessly backup and restore ExchangeOnline, OneDrive, SharePoint, and Teams including all files, folders, and document libraries.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud supports cloud-to-cloud backup directly from Microsoft 365 to the Axcient Cloud. Given the critical nature of business data, companies need a secure second cloud option so they are not 100% dependent on Microsoft for their data security. The Axcient Cloud supports HIPAA, SOC-2, and GDPR.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
GorillaStack is cloud automation software for reducing cloud bills, managing backup lifecycles, and real time security remediation.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily....

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
JupiterOne is a cloud-native security platform providing visibility security and governance to your entire cyber asset environment.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and much more are collected, graphed, and analyzed automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relationships as the single source of truth for an organization’s security and infrastructure operations.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java,...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
ThisData prevents account takeover by using machine learning & contextual information to verify the identity of a user as they login.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Sift is de leider in digitaal vertrouwen en veiligheid, en biedt zowel digitale disruptors als Fortune 500-bedrijven de mogelijkheid om zonder risico nieuwe inkomsten aan te boren.
Sift is de leider in digitaal vertrouwen en veiligheid, en biedt zowel digitale disruptors als Fortune 500-bedrijven de mogelijkheid om zonder risico nieuwe inkomsten aan te boren. Sift voorkomt op een dynamische manier fraude en misbruik door middel van toonaangevende technologie en expertise, een ongeëvenaard wereldwijd datanetwerk van 35 miljard events per maand en toewijding aan langdurige klantrelaties. Wereldwijde merken zoals Twitter, Airbnb en Twilio vertrouwen op Sift om concurrentievoordeel te behalen in hun markten.
Sift is de leider in digitaal vertrouwen en veiligheid, en biedt zowel digitale disruptors als Fortune 500-bedrijven de mogelijkheid om zonder risico nieuwe inkomsten aan te boren. Sift voorkomt op...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud Control automates cloud security and compliance monitoring and management.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
SOC Prime TDM is een SaaS-platform dat inhoud voor bedreigingsdetectie biedt die op veel platforms kan worden gebruikt, waaronder cloud-native SIEM's.
SOC Prime TDM (Threat Detection Marketplace®) is een SaaS-contentplatform dat beveiligingsmedewerkers helpt om continu cloudbeveiliging en proactieve misbruikdetectie te bieden. TDM bevat dashboards die geschikt zijn voor SOC, regelpakketten, scenario's voor bedreigingsdetectie en respons op incidenten die betrekking hebben op de nieuwste aanvallen, evenals inhoud die kan worden gebruikt op verschillende analytische platforms, waaronder cloud-native SIEM's zoals Microsoft Azure Sentinel en Sumo Logic.
SOC Prime TDM (Threat Detection Marketplace®) is een SaaS-contentplatform dat beveiligingsmedewerkers helpt om continu cloudbeveiliging en proactieve misbruikdetectie te bieden. TDM bevat dashboards...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Infoblox delivers Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. With 8,000 customers and 350 of the Fortune 500, Infoblox is running the worlds most sophisticated networks.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and compliance. Maximize performance and availability by monitoring and troubleshooting infrastructure and services. Sysdig is a SaaS platform, built on an open-source stack.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen