409 results
Why Capterra is free
A cloud-based and DNS-based web filtering solutions that prevent web-based threats to take control of your IT and human assets.
Unpatched security vulnerabilities, inadequate IT security management, unidentified email attachment source, or unknown assets connected to your network are a few flaws that undermine several companies, network security, costing them millions of dollars. SafeDNS provides a robust web filtering solution that prevents web-based threats. Get your free trial today for 15 days.
Unpatched security vulnerabilities, inadequate IT security management, unidentified email attachment source, or unknown assets connected to your network are a few flaws that undermine several...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.
Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL.
Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in software composition analysis (SCA) by Forrester, Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your business? To be covered today, you have to prevent, detect, and respond to active threats and even predict future attacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You need to run fast and lean but cannot afford to risk gaps in cybersecurity.
Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today. What does this mean to you and your...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization &...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.)
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Industry leading prices AND strong service experience in 100+ countries. We only sell using channel (no direct sales)
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult content etc. We only sell via channel partners. Services are delivered over a global ANYCAST network. We tune cyber threat protection and content categories to country specific needs using advanced analytics and AI. Chat with us live NOW and connect direct to the owners and our skilled engineers
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Automated proximity-based 2FA authentication into computers and websites. Passwordless login and auto-lock PCs, Macs, and websites.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly with password autofill. No more locked out accounts. When the token moves out of range, GateKeeper automatically locks the computer. Be preventative against expensive and disruptive data breaches. Your password caddie for a password-free experience. Never go back to memorizing and typing passwords.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Make it easy for employees to work remotely from any location or device in a secure environment with solutions from VMware & Softchoice
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We can help you set up, manage, secure, and optimize IT performance for your remote workforce using VMware solutions. Explore how solutions like VMware Horizon 7 and Workspace ONE can make your IT staff more efficient, save your company money, and maximize your companys end user experience.
Make it easy for employees to access all their files and applications and work remotely from any location or device in a secure and scalable environment with solutions from VMware and Softchoice. We...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
An ITO solution that offers DNS traffic management with integrated network monitoring services.
An ITO solution that offers DNS traffic management with integrated network monitoring services.
An ITO solution that offers DNS traffic management with integrated network monitoring services.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Anti-spam solution that enables small to medium businesses to detect and block spyware, malware, phishing frauds and more.
Anti-spam solution that enables small to medium businesses to detect and block spyware, malware, phishing frauds and more.
Anti-spam solution that enables small to medium businesses to detect and block spyware, malware, phishing frauds and more.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports.
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more.
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Sophos XG Firewall provides next-generation firewall protection that blocks threats, automatically responds, and exposes hidden risks.
Sophos XG Firewall provides comprehensive next-generation firewall protection powered by deep learning and Synchronized Security. Offering unmatched insights, XG Firewall exposes hidden user, application, and threat risks on the network and is unique in its ability to respond automatically to security incidents by isolating compromised systems with Security Heartbeat.
Sophos XG Firewall provides comprehensive next-generation firewall protection powered by deep learning and Synchronized Security. Offering unmatched insights, XG Firewall exposes hidden user,...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Web filtering software. Blocks websites based on URLs and categories. Restrictions can be customized based on user, computer, or OU.
BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler.
BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based solution that includes network security, user management, content filtering, and performance optimization tools.
Cloud-based solution that includes network security, user management, content filtering, and performance optimization tools.
Cloud-based solution that includes network security, user management, content filtering, and performance optimization tools.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
WatchGuard offers advanced network & endpoint security, secure Wi-Fi, and multi-factor authentication.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology & delivered it as easy-to-deploy and easy-to-manage solutions. With advanced network & endpoint security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables small and midsize enterprises around the globe to protect their business.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology & delivered it as easy-to-deploy and easy-to-manage solutions. With advanced network & endpoint security, secure...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Simplified Vulnerability Remediation
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more. TOPIA enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more. TOPIA enables companies to analyze,...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support, data leak protection and time management. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 6 modules and is free for up to 10 workstations with no time limits.
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring,...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Reduce the time required to manage critical changes and repetitive tasks across complex, multi-vendor networks.
SolarWinds Network Configuration Manager (NCM) delivers powerful network configuration and compliance management. Automate config backups, so you can quickly roll back a blown configuration or provision a replacement device. Continuously audit configs and get alerted if a device is out of compliance, then remediate vulnerabilities rapidly through bulk config deployment. Prevent unauthorized network changes through change delegation, monitoring, and alerting.
SolarWinds Network Configuration Manager (NCM) delivers powerful network configuration and compliance management. Automate config backups, so you can quickly roll back a blown configuration or...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security. You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal. Make IT Easy with RG System!
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses.
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum speed. Based on AI & Machine Learning, our cybersecurity solution detects & blocks in real-time the most advanced bot attacks, including automated OWASP. - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Alert Logic is the industry's first SaaS-enabled managed detection and response provider, delivering unrivaled security value.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
One-stop platform for managing machine digital IDs by discovering, organizing, and tracking digital certificates on autopilot.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It provides deep subdomain and internal network scans, in-dashboard system health overview, easy-to-navigate inventory, expiration reporting and many more.
Keyhub is a one-stop platform for certificate lifecycle management. It is designed to manage machine digital IDs through detecting, organizing, and tracking digital certificates on autopilot. It...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
One click network security solution/SASE for in-office, distributed work, & remote work.
Privatise is a cloud firewall, DNS filter & secure remote access tool that can be deployed on any device with no hardware needed. No matter what location, all devices share the same, highly secure cloud network that go out to the public internet through the same dedicated gateway IP.
Privatise is a cloud firewall, DNS filter & secure remote access tool that can be deployed on any device with no hardware needed. No matter what location, all devices share the same, highly secure...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
LogPoint's SIEM platform helps businesses protect data from intrusions & respond on cyberattacks in compliance with regulatory norms.
LogPoint provides easy to use, accurate, high-speed analysis of your data to detect and respond to threats securely with real-time application of correlation rules and fewer false positives. Detect advanced threats and reduce investigation time with UEBA for all data sources. Rich reporting provides the actionable intelligence you need to make the right choices, faster.
LogPoint provides easy to use, accurate, high-speed analysis of your data to detect and respond to threats securely with real-time application of correlation rules and fewer false positives. Detect...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Our Active Directory Audit Tool is free and runs on Windows Server 2008 & later. The audit results are provided in a clickable report.
FREE tool that scans your Active Directory, and detects security-related weaknesses, specifically related to password policies. Collect and display interactive reports containing user and password policy information. This includes checking user account passwords against a list of vulnerable passwords obtained from data breach leaks. The audit can also help you identify which accounts may be violating your security policy by using the same password across multiple accounts.
FREE tool that scans your Active Directory, and detects security-related weaknesses, specifically related to password policies. Collect and display interactive reports containing user and password...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Setup your SSH Jump Server, Bastion Host in 30 minutes. Setup centralized access to your Linux hosts and meet security compliances.
Setup a self hosted Jump server (also called Bastion Host or Jump host) quickly to manage SSH access to your Linux servers, AWS instances or other cloud services. Our jumpbox software has features like 2 factor authentication, SAML Authentication, SSH session recording,Identity and Access management (IAM), RBAC, Privileged Access management (PAM),SSH key rotation, root password management, and much more. It would help you meet security compliances such as PCI,NIST,ISO 27001 and more.
Setup a self hosted Jump server (also called Bastion Host or Jump host) quickly to manage SSH access to your Linux servers, AWS instances or other cloud services. Our jumpbox software has features...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications.
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based filtering for every device with Smart Agent technology to protect your students.
Web filtering in today's schools is about more than blocking websites; it's about keeping students safe and devices CIPA compliant. Whether its protecting take-home devices or keeping parents informed, we've got you covered. Lightspeed Filter patent-pending Smart Agents give you protection and SSL decryption on all devices, on your network and off, all in the cloud.
Web filtering in today's schools is about more than blocking websites; it's about keeping students safe and devices CIPA compliant. Whether its protecting take-home devices or keeping parents...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Ensure your infrastructure has true end-to-end security, including SD-WAN, to improve network security at a fraction of the cost.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Protect & manage your organizations devices wherever they are & wherever you are. With HiddenApp, peace of mind is fitted as standard.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Filter online threats off your network effortlessly. Use Whalebone to protect yourself and your network from all cyber threats.
Whalebone is a highly customizable & easy to use cybersecurity product built for telecommunications companies, internet service providers, corporates and all their users with the fastest time-to-market. You can white-label Whalebone to your liking and users on your networks don't need to install anything to be protected at all times on all devices. Staying protected in the online world with Whalebone means zero disruption for you and every single person in your community.
Whalebone is a highly customizable & easy to use cybersecurity product built for telecommunications companies, internet service providers, corporates and all their users with the fastest...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Comprehensive, automated IT services via AI - designed for small to midsized business.
Comprehensive, automated IT services via AI - designed for small to midsized business. Providing real-time IT support to 25,000 users and centralized IT management to over 400 customers, Electric offers companies a 70% reduction in IT spend and standardized security across devices, apps, and networks, whether you're on-site or remote.
Comprehensive, automated IT services via AI - designed for small to midsized business. Providing real-time IT support to 25,000 users and centralized IT management to over 400 customers, Electric...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively.
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, acquired ShieldSquare in March 2019.
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages Intent-based Deep Behavior Analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, card fraud, content
Radware Bot Manager (formerly ShieldSquare) is a non-intrusive API-based Bot Management solution to detect, eliminate, and manage bot traffic from websites, mobile apps, and APIs in real-time. Our...

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls