---
description: Page 15 - See the top Cybersecurity Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 15 - Cybersecurity Software - Prices & Reviews - Capterra Ireland
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.capterra.ie/directory/31037/cybersecurity/software) > [Page 15](https://www.capterra.ie/directory/31037/cybersecurity/software?page=15)

# Cybersecurity Software

Canonical: https://www.capterra.ie/directory/31037/cybersecurity/software

Page: 15 / 26\
Prev: [Previous page](https://www.capterra.ie/directory/31037/cybersecurity/software?page=14)\
Next: [Next page](https://www.capterra.ie/directory/31037/cybersecurity/software?page=16)

> Cybersecurity software aims to prevent unauthorized access to data that is stored electronically. This type of software protects businesses from data theft, malicious data, and system usage by third parties.

-----

## Products

1. [Cryptosense](https://www.capterra.ie/software/161628/cryptosense) — 5.0/5 (1 reviews) — Cryptosense Analyzer Platform gives you full control of the cryptography used in your applications.
2. [Fidelis Elevate](https://www.capterra.ie/software/168954/fidelis-elevate) — 5.0/5 (1 reviews) — The \#1 cybersecurity solution for visibility of data in motion and defends against evolving cyber threats 9 times faster\!
3. [HushApp](https://www.capterra.ie/software/173383/hush) — 4.0/5 (1 reviews) — The safest, easy-to-use, all-in-one, multi-devices app for: instant group messaging, large files sharing and protected file storage.
4. [ZeroFOX](https://www.capterra.ie/software/173376/zerofox) — 4.0/5 (1 reviews) — Social media and digital risk management solution which protects firms from fraudulent activity, account hacking and online threats.
5. [Prot-On](https://www.capterra.ie/software/176237/prot-on) — 1.0/5 (1 reviews) — A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
6. [Exigence](https://www.capterra.ie/software/177266/exigence) — 5.0/5 (1 reviews) — Exigence is providing a command and control center software to manage major incidents through the incident life cycle
7. [Zeguro](https://www.capterra.ie/software/180867/zeguro) — 5.0/5 (1 reviews) — Zeguro Cyber Safety: employee security training, customizable pre-built security policies, \&amp; web app monitoring in one easy solution.
8. [ThreatConnect TI Ops Platform](https://www.capterra.ie/software/187140/threatconnect) — 3.0/5 (1 reviews) — TI Ops is the threat intelligence platform built for operations, not just centralization.
9. [Vectra AI Platform](https://www.capterra.ie/software/188000/cognito) — 4.0/5 (1 reviews) — Vectra AI delivers AI-powered threat detection that exposes and stops attacks across network, cloud, and SaaS.
10. [Netacea Bot Management](https://www.capterra.ie/software/188458/https-www-netacea-com) — 5.0/5 (1 reviews) — Netacea provides a revolutionary agentless bot management solution that protects websites, mobile apps and APIs from malicious bots.
11. [Morphisec Guard](https://www.capterra.ie/software/191197/morphisec) — 5.0/5 (1 reviews) — Morphisec provides prevention-first security to prevent the most advanced threats and close security gaps.
12. [Universal SSH Key Manager](https://www.capterra.ie/software/193401/universal-ssh-key-manager) — 5.0/5 (1 reviews) — Universal SSH Key Manager simplifies management of millions of keys. Gain compliance with total visibility.
13. [Staff.Wiki](https://www.capterra.ie/software/193673/staff-wiki) — 5.0/5 (1 reviews) — Staff.Wiki is your Cybersecurity Policies \&amp; Procedures distribution platform, w/ approvals, attestation, training, checklists, and AI\!
14. [Cyber Hawk](https://www.capterra.ie/software/194231/cyber-hawk) — 4.0/5 (1 reviews) — Cyber Hawk detects insider cybersecurity threats and generates alerts of suspicious network changes and anomalous end-user behaviors.
15. [Silent Armor](https://www.capterra.ie/software/196144/quantum-armor) — 5.0/5 (1 reviews) — Silent Armor leverages advanced artificial intelligence to safeguard your digital assets 24/7/365. By analyzing hundreds of security me
16. [Sonrai Public Cloud Security Platform](https://www.capterra.ie/software/198150/sonrai-public-cloud-security-platform) — 5.0/5 (1 reviews) — Sonrai Security empowers organizations to take total control of privileges in their cloud.
17. [Defendify](https://www.capterra.ie/software/199901/defendify) — 5.0/5 (1 reviews) — Defendify streamlines robust cybersecurity for organizations without security teams through an easy-to-use, all-in-one platform.
18. [SuperTokens](https://www.capterra.ie/software/202793/supertokens) — 5.0/5 (1 reviews) — Secure solution for user authentication and session management - enabling robust prevention and detection of attacks.
19. [BhaiFi Core](https://www.capterra.ie/software/203916/bhaifi) — 5.0/5 (1 reviews) — All-In-One Network Security \&amp; Management Solution for CoWorking Spaces, SMEs, Hotels \&amp; Retail.
20. [Keyless](https://www.capterra.ie/software/205753/keyless-authenticator) — 5.0/5 (1 reviews) — Zero-Knowledge Biometric Authentication and Personal Identity Management Platform.
21. [ShadowKat](https://www.capterra.ie/software/206500/the-reconcilor) — 5.0/5 (1 reviews) — ShadowKat is a cloud-based platform designed to manage an organization’s internet facing attack surface.
22. [StackRox](https://www.capterra.ie/software/210440/stackrox) — 4.0/5 (1 reviews) — Container security tool that helps businesses protect native cloud applications via threat detection, vulnerability management \&amp; more.
23. [Synack Platform](https://www.capterra.ie/software/210933/synack-platform) — 3.0/5 (1 reviews) — It is a vulnerability management solution that helps businesses conduct security testing, receive vulnerability reports, and more.
24. [Modshield SB](https://www.capterra.ie/software/211590/modshield-sb) — 5.0/5 (1 reviews) — State of the art application firewall (WAF) acting as your first line of defence against threats and malicious actors
25. [CipherBox](https://www.capterra.ie/software/211686/cipherbox) — 5.0/5 (1 reviews) — 24/7 SOC-as-a-Service capabilities in a turnkey approach.

-----

Page: 15 / 26\
Prev: [Previous page](https://www.capterra.ie/directory/31037/cybersecurity/software?page=14)\
Next: [Next page](https://www.capterra.ie/directory/31037/cybersecurity/software?page=16)

## Related Categories

- [Cloud Security Software](https://www.capterra.ie/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.ie/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.ie/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.ie/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.ie/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.ie/directory/31037/cybersecurity/software)
- [All Categories](https://www.capterra.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"Capterra Ireland helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ie","url":"https://www.capterra.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":"Capterra Ireland","url":"https://www.capterra.ie/","@id":"https://www.capterra.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 15 - See the top Cybersecurity Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.","url":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15","about":{"@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#breadcrumblist"},"@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.ie/#website"},"inLanguage":"en-IE","mainEntity":{"@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#itemlist"},"publisher":{"@id":"https://www.capterra.ie/#organization"}},{"@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.capterra.ie/directory/31037/cybersecurity/software","@type":"ListItem"},{"name":"Page 15","position":3,"item":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 15 - Cybersecurity Software - Prices &amp; Reviews - Capterra Ireland","@context":"https://schema.org","@id":"https://www.capterra.ie/directory/31037/cybersecurity/software?page=15#itemlist","@type":"ItemList","itemListElement":[{"name":"Cryptosense","position":1,"description":"- Use cloud cryptography services without fear of compromising security or compliance. \n- Continuously monitor applications in the cloud. \n- Verify the configuration of the cloud KMS or HSM.\n- Find vulnerabilities in application cryptography.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7095d289-f567-4a02-974f-b239342671aa.png","url":"https://www.capterra.ie/software/161628/cryptosense","@type":"ListItem"},{"name":"Fidelis Elevate","position":2,"description":"Fidelis Elevate, an active XDR platform, fortifies cyber security by automating defense operations across diverse network architectures. It seamlessly extends security controls from traditional networks to the cloud and endpoints, making it the powerhouse of a cyber-resilient environment. As the only purpose-built XDR platform for proactive cyber defense, Fidelis Elevate offers contextual visibility and integrated deception for swift threat detection, hunting, and response. \n\nFidelis Elevate is the only XDR platform that offers: \nComprehensive Active Directory Defense, 300+ Field Contextual Traffic analysis, Integrated Deception Technology, Intelligent Active Threat Detection with MITRE ATT&CK Mapping, AI-driven Sandbox Analysis, In-band Traffic Decryption Network DLP, Risk-Aware Terrain Mapping and more...","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.capterra.ie/software/168954/fidelis-elevate","@type":"ListItem"},{"name":"HushApp","position":3,"description":"With HushApp, let your team be more productive and more secure with this very intuititive and easy-to-use app that lets users seemlesly communicate both internally and with providers and clients, send large files, store and share files in their private or team drives. This all in-one app is available for iPhone, Android, Mac, Windows, Linux and also accessible from any browser.\nAs a manager, you can also better control and protect the company's information, data and communications flow.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/15fdff45-6940-44d1-89b0-bb171fcb1e89.jpeg","url":"https://www.capterra.ie/software/173383/hush","@type":"ListItem"},{"name":"ZeroFOX","position":4,"description":"Social media and digital risk management solution which protects firms from fraudulent activity, account hacking and online threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/40abf336-a70c-49bd-ae5e-3022e199cda4.png","url":"https://www.capterra.ie/software/173376/zerofox","@type":"ListItem"},{"name":"Prot-On","position":5,"description":"A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b088d0ba-b37c-43ce-85ca-15be1b74f7e0.png","url":"https://www.capterra.ie/software/176237/prot-on","@type":"ListItem"},{"name":"Exigence","position":6,"description":"Exigence is  providing a command and control center software to manage major incidents.  \nExigence automates the collaboration among stakeholders within and outside of the organization and structures it around a timeline that records the steps taken to resolve an incident and drives workflows across stakeholders and tools, thus ensuring all stakeholders are working off the same page. The product ties together stakeholders, processes and tools already in use, driving down time to resolution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3620ba32-9374-473b-9082-fab87ae2e196.png","url":"https://www.capterra.ie/software/177266/exigence","@type":"ListItem"},{"name":"Zeguro","position":7,"description":"Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f9d0b4e-27a9-4247-b55b-8d1f17af1262.png","url":"https://www.capterra.ie/software/180867/zeguro","@type":"ListItem"},{"name":"ThreatConnect TI Ops Platform","position":8,"description":"TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intelligence requirements and MITRE ATT&CK gaps. Analysts can instantly operationalize insights across the SOC, IR, hunt, and vulnerability teams — no swivel-chairing required. When combined with Polarity and Risk Quantifier, TI Ops helps teams act on intelligence faster and focus on the threats that truly matter to the business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f7eb908-6285-4519-993f-d450b84a131f.png","url":"https://www.capterra.ie/software/187140/threatconnect","@type":"ListItem"},{"name":"Vectra AI Platform","position":9,"description":"Vectra AI detects and stops advanced cyberattacks that evade traditional security controls. Using AI-driven behavioral detection across hybrid environments, it identifies real attacker activity early, helping organizations reduce risk, prevent data exfiltration, and improve overall security outcomes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a636e443-2215-4f7c-b435-e7042b68ac72.png","url":"https://www.capterra.ie/software/188000/cognito","@type":"ListItem"},{"name":"Netacea Bot Management","position":10,"description":"Netacea’s advanced bot management solution provides industry leading real time bot protection & mitigation against the most sophisticated automated attacks. Ranked #1 for Bot Detection, our AI-powered technology analyzes all website, app and API traffic with a single agentless deployment, revealing malicious intent and autonomously preventing impact to your business without impacting the flow of genuine human traffic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbf81c6-5592-420b-b7a4-1c1069353078.png","url":"https://www.capterra.ie/software/188458/https-www-netacea-com","@type":"ListItem"},{"name":"Morphisec Guard","position":11,"description":"Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Over 7,000 organizations trust Morphisec to protect nine million Windows and Linux servers, workloads, and endpoints. Morphisec stops thousands of advanced attacks daily at Lenovo/Motorola, TruGreen, Covenant Health, Citizens Medical Center, and many more. Learn more at www.morphisec.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87760b32-adef-438b-81fe-2988f382f232.png","url":"https://www.capterra.ie/software/191197/morphisec","@type":"ListItem"},{"name":"Universal SSH Key Manager","position":12,"description":"The only effective strategy is to manage keys as a process, not as a vault, project or patch. Our approach is a closed-loop process with quick wins, starting with a free risk assessment. Gain and retain full control of all trusted access provisioning throughout the key lifecycle. Non-intrusive deployment, no agents to install, and no changes to existing scripts.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a083f38-2fdd-4c8d-9a49-99e04e83665a.png","url":"https://www.capterra.ie/software/193401/universal-ssh-key-manager","@type":"ListItem"},{"name":"Staff.Wiki","position":13,"description":"Staff.Wiki is a platform for managing and distributing cybersecurity Policies, Procedures, Compliance and Risk information. With time-saving AI assistance, it provides your staff and your clients a centralized, intelligent & secure portal for all your policies and procedures, with approval workflow and automated attestation. \n\nBuild your own cybersecurity platform. Add workflow-powered checklists, AI-generated quizzes for training, incident reporting, risk management, compliance, and lots more. \n\nWhite-label for your business. In the cloud or on-premise. \n\nGet Control Of Your Policies & Procedures Today.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/11f8e900-a975-4b2b-8d05-4c8d9f1845b5.png","url":"https://www.capterra.ie/software/193673/staff-wiki","@type":"ListItem"},{"name":"Cyber Hawk","position":14,"description":"Cyber Hawk is a cybersecurity solution that detects insider cybersecurity threats and generates daily alerts of suspicious network changes and anomalous end-user behaviors, allowing you to create affordable, custom cybersecurity services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fa16fe8a-1bfc-42dd-9406-d55ba9a8f12a.png","url":"https://www.capterra.ie/software/194231/cyber-hawk","@type":"ListItem"},{"name":"Silent Armor","position":15,"description":"Silent Armor redefines visibility and speed for modern defenders. By combining predictive analytics with dark web intelligence, it transforms fragmented data into actionable insights.\n\nHarness a generative-AI engine trained on global breach telemetry, attacker TTPs, and live threat feeds to forecast probable attack paths, prioritize vulnerabilities, and intercept campaigns before they target your infrastructure.\n\nAchieve a panoramic view of your hybrid environment by correlating network, endpoint, and cloud data into a single, actionable dashboard that reveals exploitable weak points and provides real-time threat posture analytics.\n\nContinuously discover, classify, and score internet-facing assets without installing agents. Identify new exposures the moment they appear, enabling proactive hardening and visibility into external attack vectors used by advanced adversaries.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3209b8e8-a665-4c35-9dd6-4a4c8ba36f71.png","url":"https://www.capterra.ie/software/196144/quantum-armor","@type":"ListItem"},{"name":"Sonrai Public Cloud Security Platform","position":16,"description":"Sonrai Security is a leading cloud privileged access management (PAM) solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and permissions security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. \nTrusted by leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. Sonrai Security has offices in New York and New Brunswick, Canada and is backed by ISTARI, Menlo Ventures, Polaris Partners, and TenEleven Ventures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d11dd326-962f-47dc-a27d-fcaf0e89e864.png","url":"https://www.capterra.ie/software/198150/sonrai-public-cloud-security-platform","@type":"ListItem"},{"name":"Defendify","position":17,"description":"Defendify streamlines cybersecurity for organizations without security teams by delivering multiple layers of protection in one consolidated and cost-effective cybersecurity solution.\n\nLeveraging cybersecurity expertise, support, and its all-in-one, easy to use platform, organizations rely on Defendify for continuous cybersecurity assessments, testing, policies, training, threat detection and response.\n\nGet a free version at www.defendify.com/essentials.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a2f9a2cc-ba88-49cb-869a-64515ab96424.png","url":"https://www.capterra.ie/software/199901/defendify","@type":"ListItem"},{"name":"SuperTokens","position":18,"description":"SuperTokens is an open source user authentication solution backed by Y-Combinator. \n\nWe're an alternative to Auth0, Firebase Auth and AWS Cognito. Using our SDKs developers around the world can add secure, hassle free authentication to their website or mobile application in less than a day.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48d48f77-4e40-4594-9e60-ea75bf4623aa.png","url":"https://www.capterra.ie/software/202793/supertokens","@type":"ListItem"},{"name":"BhaiFi Core","position":19,"description":"BhaiFi empowers businesses to forge meaningful connections with their customers through Guest WiFi. By harnessing AI technology, we make network security and compliance effortless, democratizing cybersecurity for businesses of all sizes. Our solutions transform WiFi into a powerful tool for growth—delivering actionable insights, simplifying operations, and allowing you to focus on what truly matters: growing your business and delighting your customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0fa7653c-4dd2-4629-bf49-b2efa2a364f2.png","url":"https://www.capterra.ie/software/203916/bhaifi","@type":"ListItem"},{"name":"Keyless","position":20,"description":"Enhance your existing IAM solution with zero-knowledge multi-factor biometric authentication. Bring the convenience of facial recognition to your workforce authentication journeys while leaving behind any related GDPR concerns.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d203cb1-85dd-406e-8e23-4737bdd8eeef.png","url":"https://www.capterra.ie/software/205753/keyless-authenticator","@type":"ListItem"},{"name":"ShadowKat","position":21,"description":"ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.\n\nBenefits include:\nInternet facing asset management\nExpose cybersecurity risks\nFind problems before hackers do\nAutomation of the security testing process\nDetect changes as they occur","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30b04813-70fc-499d-a848-9a0ef4189995.jpeg","url":"https://www.capterra.ie/software/206500/the-reconcilor","@type":"ListItem"},{"name":"StackRox","position":22,"description":"Container security tool that helps businesses protect native cloud applications via threat detection, vulnerability management & more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a6c5ef3-2776-420a-819c-7535b2ace9a0.png","url":"https://www.capterra.ie/software/210440/stackrox","@type":"ListItem"},{"name":"Synack Platform","position":23,"description":"It is a vulnerability management solution that helps businesses conduct security testing, receive vulnerability reports, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/051f3211-6855-43c9-8e0e-cc173400a069.png","url":"https://www.capterra.ie/software/210933/synack-platform","@type":"ListItem"},{"name":"Modshield SB","position":24,"description":"NO-COMPROMISE FEATURES FOR ROBUST SECURITY\nWith Modsecurity and OWASP Core ruleset at its heart, Modshield SB makes it simple and efficient to protect web and mobile applications from OWASP Top 10 application risks\n\nUnlimited domains and applications using a single instance at no additional cost\n\nActive threat intelligence for real-time protection\n\nDenial of Service (DoS) protection helps safeguard the application from random repetitive attacks\n\nBot, Crawlers, Spider Protection","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1e8f00a9-4a57-46da-a8fa-48cf7017ecaa.png","url":"https://www.capterra.ie/software/211590/modshield-sb","@type":"ListItem"},{"name":"CipherBox","position":25,"description":"CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ac5a950-92cf-4446-a3e2-67cc9efe2e12.png","url":"https://www.capterra.ie/software/211686/cipherbox","@type":"ListItem"}],"numberOfItems":25}
</script>
