248 results
Why Capterra is free
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
The 1st zero-trust environment for Google Workspace
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user. It covers any site users visit while authenticated against Google Workspace in Chrome (requires Google Cloud Protect to ensure Chrome is used & Shield is deployed).
GAT Labs offers the 1st zero-trust environment for Google Workspace with ActiveID which continuously monitors every user¿s typing style, actively verifying that the right user is the one logged in....

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Unified Cloud-Native Security Vulnerability Management Platform
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and operating systems? No problem. With TOPIA, dynamic and diverse cloud environments are secure. A dynamic, yet light cloud security solution for the modern cloud-native infrastructure. Able to analyze and prioritize risk across a complex web of applications and assets.
TOPIA is an innovative cloud security system that collects data across your digital-infrastructure to recognize and mitigate vulnerabilities before they become threats. Multiple languages and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud.
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
BetterCloud is the mission control center for discovering, managing, and securing SaaS applications, data, and users.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our work is to ensure organizations get the transformative value and benefits of adopting SaaS applications, while ensuring IT has complete control over their environment and can serve as an enabler for the business.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Employee Onboarding and Engagement App. The easiest way to increase employee engagement and simplify your onboarding process.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in touch. Share and discuss updates. Introduce the team and what it stands for to a new member. Provide quick access to members' contact details. Any group of people united by a common idea and purpose, who don't meet up on a daily basis, will find WISP extremely helpful.
WISP is a simple SaaS service for HR managers that helps to create customizable employee apps. All the changes made with the web admin panel sync to members' phones. WISP helps your team to stay in...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
A total HIPAA solution built for Covered Entities and Business Associates to help simplify and automate your HIPAA compliance.
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you confidence in your compliance plan to reduce risk, increase patient loyalty, and profitability of your organization. Why Compliancy Group? -HIPAA Audit Support, no client has ever failed an audit! -HIPAA Seal of Compliance -Dedicated Compliance Coaches -Total HIPAA Solution
HIPAA should be simple. That's why Compliancy Group is the only HIPAA software with expert Compliance Coaches holding your hand to simplify compliance. Built by auditors, Compliancy Group gives you...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses.
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum speed. Based on AI & Machine Learning, our cybersecurity solution detects & blocks in real-time the most advanced bot attacks, including automated OWASP. - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
DataDome is a leading bot protection vendor, based in New York, Paris, and Singapore. We beat illegitimate traffic, so that sensitive data remains safe and online platforms can perform at optimum...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Gain unified cloud security posture management and market-leading breach protection for cloud workloads and containers.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for speed, scale and reliability. CrowdStrike Cloud Security goes beyond ad-hoc approaches by unifying everything you need for cloud security in a single platform to deliver comprehensive protection from the host to the cloud and everywhere in between.
Stopping breaches using cloud-scale data and analytics requires a tightly integrated platform. Each function plays a crucial part in detecting modern threats, and must be designed and built for...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
Alert Logic MDR is ideally suited for companies of 50-5,000 employees in any industry located in the US, Canada, and the UK. Alert Logic is the industry's first SaaS-enabled managed detection and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Scalable cloud-based log management.
Get powerful searching on huge volumes of log data for fast MTTR with SolarWinds Loggly. Enjoy scalable, cloud-based log management for fast searching and troubleshooting. Move from reactive to proactive real-time log monitoring, and view app performance, system behavior, and unusual activity across the stack. Trace issues down to their root cause by analyzing them in the context of the entire stack. Analyze and visualize your data to help answer key questions and track SLA compliance.
Get powerful searching on huge volumes of log data for fast MTTR with SolarWinds Loggly. Enjoy scalable, cloud-based log management for fast searching and troubleshooting. Move from reactive to...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting &...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
We Enable Customers to Efficiently Manage Digital Identities, Securely and Confidently
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and devices to create an identity-enabled enterprise. From on-premises and cloud-based access management software, to identity analytics and protecting unstructured data, SailPoint can solve your most complex identity and access management challenges.
SailPoint's identity governance solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web.
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era
Protection and Performance for the Cloud Era

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
The strongest authentication on the planet.
Beyond Identity is the most secure authentication solution on earth. An innovator in passwordless, the Beyond Identity Passwordless Identity Platform uses real-time access controls to verify identities with devices, and checks granular risk signals for continuous authentication. Breaking down the barriers between cybersecurity, identity, and device management, Beyond Identity fundamentally changes the way the world logs in, enabling teams to continue to work in a zero trust world.
Beyond Identity is the most secure authentication solution on earth. An innovator in passwordless, the Beyond Identity Passwordless Identity Platform uses real-time access controls to verify...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Advanced preventive protection for cloud email, collaboration and storage.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your company communication, collaboration and cloud storage. Our easy-to-use cloud console gives you an overview of quarantined items and immediately notifies you when detection occurs.
ESET Cloud Office Security provides advanced preventive protection for Microsoft 365 applications. The combination of spam filtering, anti-malware scanning and anti-phishing helps to protect your...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Perimeter 81 provides secure access to local network, applications and cloud infrastructures with one unified platform.
our innovative platform allows businesses to maintain and protect their private cloud resources. With Perimeter 81, you can encrypt network traffic, deploy private servers, manage network activity, distribute global IP addresses and conduct geo-targeting and quality assurance.
our innovative platform allows businesses to maintain and protect their private cloud resources. With Perimeter 81, you can encrypt network traffic, deploy private servers, manage network activity,...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Effortlessly backup and restore ExchangeOnline, OneDrive, SharePoint, and Teams including all files, folders, and document libraries.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud supports cloud-to-cloud backup directly from Microsoft 365 to the Axcient Cloud. Given the critical nature of business data, companies need a secure second cloud option so they are not 100% dependent on Microsoft for their data security. The Axcient Cloud supports HIPAA, SOC-2, and GDPR.
Axcient x360Cloud is cloud software that backs up and protects Microsoft 365 data. x360Cloud provides complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams. x360Cloud...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
GorillaStack is cloud automation software for reducing cloud bills, managing backup lifecycles, and real time security remediation.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably.
GorillaStack is cloud automation software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily....

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.
Prisma is the industrys most comprehensive cloud security suite.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
JupiterOne is a cloud-native security platform providing visibility security and governance to your entire cyber asset environment.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and much more are collected, graphed, and analyzed automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relationships as the single source of truth for an organization’s security and infrastructure operations.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java,...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.
Suite of advanced privacy protection tools that increases website speed, stops trackers and blocks ads.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code. GitGuardian solutions monitor public...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources
Record and evaluate configurations of your AWS resources

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
ThisData prevents account takeover by using machine learning & contextual information to verify the identity of a user as they login.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.
ThisData prevents account takeover by using machine learning alorithms and contextual information to verify the identity of a user logging in to your app.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through industry-leading technology and expertise, an unrivaled global data network of 35 billion events per month, and a commitment to long-term customer partnerships. Global brands such as Twitter, Airbnb and Twilio rely on Sift to gain competitive advantage in their markets.
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud-based security solution that helps businesses of all sizes secure emails against spam, viruses, ransomware, scams and phishing.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas mode helps protect businesses, associations and local communities unwanted messages: spam, viruses, phishing, ransomware, advertising.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Cloud Control automates cloud security and compliance monitoring and management.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.
It allows businesses to backup data online to maintain the security and confidentiality of private corporate information.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
SOC Prime TDM is a SaaS platform offering threat detection content that can be used across many platforms including cloud-native SIEMs.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM contains SOC ready dashboards, rule packages, threat detection and incident response scenarios that cover the latest attacks, as well as content that can be used across various analytic-based platforms, including cloud-native SIEMs like Microsoft Azure Sentinel and Sumo Logic.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that helps security practitioners to continuously provide cloud security monitoring and proactive exploit detection. TDM...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Infoblox delivers Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which includes Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI. With 8,000 customers and 350 of the Fortune 500, Infoblox is running the worlds most sophisticated networks.
Infoblox delivers Secure Cloud-Managed Network Services, bringing next-level security, reliability and automation to cloud and hybrid systems. Recognized as the leader in core network services, which...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.
Online access, identity and privacy management tool with user provisioning, group-based control, monitoring and compliance reports.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and compliance. Maximize performance and availability by monitoring and troubleshooting infrastructure and services. Sysdig is a SaaS platform, built on an open-source stack.
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud. Secure the build, detect and respond to threats, and continuously validate cloud posture and...

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.
Monitoring platform that provides warning and error thresholds, reporting, and management through network protocols.

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Application Security
  • Intrusion Detection System
  • Endpoint Management
  • Two-Factor Authentication