Ireland Show local products
365 results
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Datadog's Cloud Security Platform enables you to get full-stack security for your production environment. Get set up in minutes. Learn more about Datadog
Datadog Cloud Security Platform offers full-stack security for your production environment. With real-time threat detection, continuous configuration audits, and context-rich security signals, you can easily bring speed and scale to your security organization. Secure your environment by correlating security threats with metrics or logs from across your environment. Get started quickly with Datadog's turn-key detection rules, dashboards, and support for 500+ technologies. Learn more about Datadog

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Learn more about SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Learn more about SpectralOps

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Push is a SaaS security platform that equips your employees to use their chosen SaaS tools securely. Learn more about Push Security
The Push SaaS security platform identifies security issues that arise from your employees’ use of cloud apps and guides them to self remediate - freeing up your security team. - Get visibility of the SaaS employees are using and third-party app integrations. - Identify security issues such as weak and reused passwords, no MFA, malicious mail rules and risky app integrations. - Guide employees to self-remediate security issues, delete abandoned SaaS accounts and remove obsolete integrations. Learn more about Push Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management. Learn more about JumpCloud Directory Platform
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. Learn more about JumpCloud Directory Platform

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure. Learn more about SailPoint
Stop the #1 cloud threat: Unauthorized access. SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure and workloads, detect potential anomalies, and better enforce access policies across all users. Learn more about SailPoint

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Tricent identifies potential exposures and revokes external access to your company's shared files. Ask for a free demo today! Learn more about Tricent
Tricent makes sure your data sharing is secure by identifying potential exposures and revoking external access to your shared files. How it works: 1. Set up automated compliance policies in less than 30 minutes 2. Tricent notifies users when their externally shared files need to be reviewed. If no action is taken by the user, Tricent will remove external access to the files. 3. Administrators get a full overview of the organization's shared data allowing for audits and bulk actions. Learn more about Tricent

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Proactive Best Practice & Security Analysis for AWS, Azure, Kubernetes, VMware & Windows & Linux OS. Learn more about Runecast Analyzer
An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere. Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. Runecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance. Learn more about Runecast Analyzer

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Simplify security operations with a single SaaS cloud security platform. Data protection, CSPM, and compliance made easier with Orca. Learn more about Orca Security
Move at cloud speed with Orca's Cloud Security Platform. Agentless efficiency and accuracy means no impact to your workloads, no performance hits and no organizational friction. In less than 24 hours of deployment, Orca's SideScanningTM technology detects and categorizes threats in proper context for your unique environment. Orca Security even provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. Learn more about Orca Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
An award-winning solution that delivers comprehensive security for small and medium business devices, data, and employees. Learn more about Avast Ultimate Business Security
Avast Ultimate Business Security is the best cybersecurity and privacy protection to secure your users, devices, and applications from malware, phishing, ransomware, and advanced cyberattacks. - It provides powerful online protection and automation, keeping devices and applications updated and secure. - Delivers Mobile Protection, Password & Webcam Protection, USB Protection, and VPN. - Includes Patch Management to automate the patching process, keeping devices secure. Learn more about Avast Ultimate Business Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
365 Total Protection offers two packages for your company's security management developed specifically for Microsoft Office 365. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a wide range of features that ensure email and data security in Office 365. The Enterprise version covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms. Learn more about 365 Total Protection

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secure Your Cloud. Identity-First. Comprehensive cloud security platform for AWS, Azure and GCP. Learn more about Ermetic
Ermetic is a comprehensive cloud security platform for AWS, Azure and GCP that enables you to proactively reduce your attack surface, detect threats and reduce your blast radius in case of a breach. Ermetic’s holistic cloud security solution enables comprehensive risk assessment across the entire security stack – from full asset discovery and deep risk visualization, prioritization and guided remediation to anomaly detection and compliance audit. Learn more about Ermetic

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Nordcloud Klarity helps midsize & large businesses handle multi-cloud forecasting, reporting, cost allocation, and more. Learn more about Nordcloud Klarity Core
Nordcloud Klarity is an innovative set of cloud management tools giving you complete control over your public cloud estates while maintaining stakeholder alignment. Thanks to the user-friendly dashboards and automation capabilities, you have full control of your cloud estates and costs across Azure, AWS, GCP and VMware. Designed to automate cloud operations, optimize spend, and improve security, Nordcloud Klarity has something for everyone – from devs to compliance to finance to the C-suite. Learn more about Nordcloud Klarity Core

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Teleport (OSS & Enterprise) is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications. Learn more about Teleport
Teleport is a secure access solution that consolidates infrastructure access into a single platform. With Teleport, engineers and security teams get unified access to Linux and Windows servers, Kubernetes clusters, databases, and DevOps applications like CI/CD, version control, and monitoring dashboards across all environments. Teleport replaces VPNs, shared credentials, and legacy privileged access management technologies to improve security and engineering productivity. Learn more about Teleport

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets. Learn more about Holm Security VMP
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Learn more about Holm Security VMP

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SmallID is a cloud-native solution, purpose-built to find, classify, and protect sensitive data. Try for free today. Learn more about SmallID
Automatically discover and classify sensitive, personal, and regulated data with SmallID – get up and running with a cloud-hosted solution in minutes. Protect your data across the multi-cloud and stay compliant with regulations. - Actionable security, privacy, and discovery findings - Classify by regulation, type, and sensitivity - Out-of-the-box and custom data classifiers - Risk mitigation and policy management - One click deployment, cloud-hosted Try SmallID for free today. Learn more about SmallID

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
A comprehensive web security solution that includes WAF, bot management, DDoS protection, API security, ATO prevention, and much more. Learn more about Reblaze
A cloud-native security solution for sites, web apps, and APIs. Reblaze includes next-gen WAF, DDoS protection, API security, bot mitigation, ATO (Account Takeover) prevention, real-time traffic analysis, Machine Learning, and more. As a fully managed solution, Reblaze is always up-to-date, and is hardened immediately against new threats as they arise. It is fully integrated with AWS, Azure, and GCP. Flexible deployment options include single-cloud, multi-cloud, hybrid, and service meshes. Learn more about Reblaze

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
LastPass provides secure password management without compromising ease of use and employee productivity.
Improve your business’ password hygiene and security, without compromising ease of use. LastPass empowers employees to generate, store, and share credentials seamlessly, while providing valuable insight and control to Admins through security policies and advanced reporting. LastPass ensures data protection and privacy through LastPass’ zero-knowledge security infrastructure. Learn more about LastPass

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
1Password’s industry-leading security brings private, secure, and user-friendly secrets management to more than 115,000 businesses.
1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly secrets management to more than 115,000 businesses. Store anything from logins and secure notes to SSH keys and sensitive documents. Get your secrets out of spreadsheets and emails and into 1Password for secure sharing and a single source of truth. You can even monitor and mitigate security risks like potential breaches, password health, and team usage from your insights dashboard. Learn more about 1Password

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Ireland Local product
SpamTitan Email Security prevents unwanted email spam, phishing attacks, malware, ransomware, Spoofing, BEC and other email threats
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all application s for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Ireland Local product
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications.
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about ManageEngine Patch Manager Plus

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method. Learn more about Zerospam

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secure and resizable compute capacity in the cloud. Launch applications when needed without upfront commitments.
Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of operating systems, load them with your custom application environment, manage your network’s access permissions, and run your image using as many or few systems as you desire. Learn more about Amazon EC2

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity. Learn more about OneLogin

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Learn more about Delivery Trust

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more. Learn more about Business VoiceEdge

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe.
uniscon GmbH is a Munich-based provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe. uniscon’s products work hand in hand: uniscon’s business cloud idgard® secures and simplifies digital communication and data exchange with partners, customers and colleagues at the highest level. More than 1,200 companies already rely on the web-based data room and file sharing service. Learn more about idgard

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
ADManager Plus is a unified Active Directory, Exchange, Teams, Google Workspace, and Microsoft 365 management and reporting solution.
ADManager Plus is a unified AD, Exchange, Teams, Google Workspace, and Microsoft 365 management solution to simplify tasks such as provisioning users, cleaning up stale accounts, and managing NTFS and share permissions. It offers 200 built-in reports, including reports on inactive user accounts, Microsoft 365 licenses, and users' last logon times. You can build a custom workflow for ticketing and compliance, delegate tasks to technicians, automate AD tasks such as restore and backup AD objects. Learn more about ManageEngine ADManager Plus

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Learn more about Incapsula

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
ADSelfService Plus is an integrated self-service password management and MFA solution for AD and cloud apps.
ADSelfService Plus offers self-service password resets and account unlocks, MFA for endpoint and cloud app logins, password expiration reminders, a password policy enforcer, a self-service directory updater, a multiplatform password synchronizer, and SSO for cloud apps. It supports IT help desks by reducing password reset tickets and spares end users the frustration of downtime. Use the Android and iPhone mobile apps to provide self-service for end users anywhere, anytime. Learn more about ManageEngine ADSelfService Plus

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment. Learn more about Guardio

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom. Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior. Learn more about Rubrik

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Online password manager for teams.
Zoho Vault is an online password manager for teams. It helps securely store, share, and manage your passwords from anywhere. With Zoho Vault, you stay organized while your passwords remain secure. Say goodbye to storing your important passwords on spreadsheets or post-it notes. Learn more about Zoho Vault

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
ADAudit Plus is Active Directory, Azure AD, Windows Server, file server (including NAS devices), and workstation auditing software.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides complete visibility into all the activities across your Active Directory (AD), Azure AD, file servers (Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations. ADAudit Plus helps you track user logon and logoff activity; analyze account lockouts; audit ADFS, ADLDS, and printers; monitor privileged user activities; and do much more. Learn more about ManageEngine ADAudit Plus

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Workato is a next-gen iPaaS with 1,000+ pre-built connectors to help automate the most complex workflows across your organization
Workato is the recognized Enterprise Automation Platform Leader. Workato empowers business and IT teams to integrate their apps and automate business workflows without compromising on security and governance. Built on a cloud-native architecture that is designed for scale and speed to significantly reduce operational footprint and overall costs. Our low-code/no-code platform enables teams to build integrations 5X faster than traditional platforms. Contact us for a free trial now! Learn more about Workato

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce. Learn more about Panda Cloud Office Protection

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Learn more about Cato Networks Suite

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours? Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others. Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS). Apply multi email signatures and send bulk vacation messages. Join thousands of users and improve your company's security and control. Learn more about Conecta Suite

Features

  • Threat Intelligence
  • Behavioural Analytics
  • Incident Management
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics