71 results
Filter Results (71)
Pricing Options
Deployment
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Secure access to Internet and corporate resources with a single solution.
Fyde Enterprise is the Zero Trust security solution for modern business, helping organizations mitigate risks while adapting to the new nature of work and IT. Fyde eliminates security risks associated with traditional VPN access, enabling secure, reliable and fast access to authorized apps and workloads in your network from any device, network, and location. Fyde also protects user identities from account takeover attacks.
Fyde Enterprise is the Zero Trust security solution for modern business, helping organizations mitigate risks while adapting to the new nature of work and IT. Fyde eliminates security risks...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs).
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
ThreatSTOP DNS Defense turns your existing DNS into true Protective DNS (PDNS) with continuous updates from 900+ feeds.
DNS Defense Outbound Threat Protection
ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.
DNS Defense turns your existing DNS into true Protective DNS (PDNS). DNS Defense provides granular, proactive DNS threat protection, and includes everything you need in a simple service
DNS Defense Outbound Threat Protection
ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
BluKrypt
(0)
Secure Cloud Storage Gateway
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt also protects data at rest within the secure storage container it creates within the cloud storage target.
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Check Points Next Generation Firewalls (NGFWs) are trusted by customers for their highest security effectiveness.
Check Point maintains it's ability to keep organizations protected from sophisticated fifth generation cyber-attacks. Offered via the Check Point Infinity architecture, Check Points NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.
Check Point maintains it's ability to keep organizations protected from sophisticated fifth generation cyber-attacks. Offered via the Check Point Infinity architecture, Check Points NGFW includes 23...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Paladion
(0)
Next-generation managed detection and response (MDR) powered by patented AI technology, for proactive threat detection and response.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform, AI.saac, powers their services to enhance detection and response against complex, targeted, and unknown attacks. Paladion helps organizations ensure robust security by staying proactive in their efforts with advanced software and expert consulting services.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform,...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Strobes
(0)
Strobes is a risk-based Vulnerability Management Platform for Enterprises with 25+ open-source vulnerability assessment scanners!
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization.
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe!
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency.
The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid...
Top features
- Threat Response
- Prioritization
- Vulnerability Scanning
- Activity Dashboard
- Data Visualization Software
- Monitoring