464 results
Why Capterra is free
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing. Learn more about AppTrana
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise. Learn more about AppTrana
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Exein

Exein

(0 reviews)
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
IronNet enables cybersecurity teams with shared interests to work together in near-real-time to collaboratively defend against attacks. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps enterprises to increase visibility into the threat landscape, to reduce the impact of an attack and to improve the overall effectiveness of their cybersecurity investments. Learn more about IronDome
At IronNet, we help companies, sectors and nations defend against advanced cyber threats with behavior-based network traffic analysis and a collective approach to threat detection. This helps...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SpamTitan Email Security for business email that helps control mail flow, clean it, and protect against unwanted email spam and malware Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and outbound scanning. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business and msp without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats. Learn more about Malwarebytes for Teams
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage....
Robust security for small offices that want real-time protection against ransomware and advanced threats, for all business devices. Learn more about Avast Small Office Protection
Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all business devices. Get multi-OS support for up to 10 devices - including PCs, Macs, iPads, iPhones, and Android mobile devices. Small Office Protection works effortlessly with your business existing hardware and devices, and theres no IT experience required to manage it. Learn more about Avast Small Office Protection
Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all business devices. Get multi-OS support for up to 10 devices -...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports....
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
.IDentity based digital signatures based on your true identity, secured by the toughest cryptography and identity verification. Learn more about .ID Signatures
.ID Digital Signature platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a click of your pin code or just a thumbprint. The .ID identity based electronic signatures are different from other digital signature solutions on the market. The .ID is not based on a scribbled drawing of your signature placed on a PDF, but the signature is sealed with encrypted code. Learn more about .ID Signatures
.ID Digital Signature platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors Learn more about Modshield SB
NO-COMPROMISE FEATURES FOR ROBUST SECURITY With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks Unlimited domains and applications using a single instance at no additional cost Active threat intelligence for real-time protection Denial of Service (DoS) protection helps safeguard the application from random repetitive attacks Bot, Crawlers, Spider Protection Learn more about Modshield SB
NO-COMPROMISE FEATURES FOR ROBUST SECURITY With Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
CybelAngel is the world leading Digital Risk Protection Platform to detect & resolve threats before they cause harm. Learn more about CybelAngel
CybelAngel is the world leading Digital Risk Protection Platform that detects and resolves threats before they cause harm. We combine comprehensive IP scanning with Machine Learning and professional remediation services for end to end protection. We find leaks others don't, no false positives, always actionable intelligence. Avoid breaches, fraud, ransomware, compliance failures and loss of reputation with CybelAngel. Learn more about CybelAngel
CybelAngel is the world leading Digital Risk Protection Platform that detects and resolves threats before they cause harm. We combine comprehensive IP scanning with Machine Learning and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against attack. Learn more about Atomic ModSecurity Rules
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - and more More info: https://www.atomicorp.com/atomic-modsecurity-rules/ Learn more about Atomic ModSecurity Rules
Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
All-In-One Software-Based Network Security & Management Solution for Coworking Spaces, SMEs, Hotels & Retail. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes and disasters while keeping you 100% DoT compliance. BhaiFi is very simple to use & doesn't require extra technical skill to operate, leveraging Machine Learning & Artificial Intelligence to do the tough job itself. Being software-based, it is scalable, cost-effective & integrates with your other software. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition.
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices.
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that...
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors,...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Astra Security serves all PHP-based websites. It is highly compatible with websites built on CMS like WordPress, Magento, Joomla, etc.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. This means you can get rid of multiple security solutions & let Astra take care of it all.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load...
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and...
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces...
ESM supports beginner and advanced strategy practitioners. Our STRATEGY, OKR, CYBER, and PERFORM modules stand alone or link together.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER enables organizations to manage risk, compliance, and cyber security. ESM+PERFORM empowers employees to link goals to the organizational strategy. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life.
ESM+STRATEGY empowers teams to formulate, track, and communicate their strategic plan. ESM+OKR leverages Objectives and Key Results to help organizations tactically get work done. ESM+CYBER...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results,...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Policy management software that allows you to easily automate, deliver and maintain your organisation's policy management life cycle.
Our policy management software automates your policy management life cycle and provides the “evidential weight” required to protect organisations from brand degradation and reputational threats. From creation and management to publishing and delivery, our cloud-based policy management software enables organisations to measure and demonstrate the continuing improvements in awareness, and highlight areas that require attention before they pose a risk to security and compliance.
Our policy management software automates your policy management life cycle and provides the “evidential weight” required to protect organisations from brand degradation and reputational...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web security solutions to prevent data theft, phishing, botnets, and other malware to harm your business and resources.
Ransomware, botnets, phishing, and cryptojacking are a few among the daily threats millions of organizations are exposed to worldwide. SafeDNS blocks such threats at the Domain Name Server (DNS) Level before they jeopardize your entire network and harm your staff and image. Get your free trial today for 15 days.
Ransomware, botnets, phishing, and cryptojacking are a few among the daily threats millions of organizations are exposed to worldwide. SafeDNS blocks such threats at the Domain Name Server (DNS)...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.
Network security tool that enables blocking of web attacks through application firewall, leakage protection, SSL certificate and more.
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts,...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web-based solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
Web-based & on-premise solution that enables businesses to predict, detect, analyze, prevent, and respond to cybersecurity threats.
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Industry leading prices AND strong service experience in 100+ countries. We only sell using channel (no direct sales)
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult content etc. We only sell via channel partners. Services are delivered over a global ANYCAST network. We tune cyber threat protection and content categories to country specific needs using advanced analytics and AI. Chat with us live NOW and connect direct to the owners and our skilled engineers
FlashStart is owned and run by Franz and David who are passionate about Internet Safety. We believe internet freedom does not contradict with filtering malware, stopping cyberbullying, removing adult...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying your cybersecurity. Choose your frameworks, including CMMC, NIST, ISO, PCI, SOC 2, HIPAA, & more & manage your program with automated cybersecurity framework crosswalks, real-time compliance scoring, project management, collaboration, budgeting, policy & plan templates, & guidance & support.
Making Cybersecurity & Compliance Easy... Apptega helps businesses of all sizes accelerate & automate compliance efforts, monitor program performance, & always be audit-read, all while fortifying...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of...
  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting