15 years helping Irish businesses
choose better software
Cloud Security Software
Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.
Featured software
Most reviewed software
Explore the most reviewed products by our users on the Cloud Security Software
Filter Results (435)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Ireland
Pricing Options
Product type
435 results
Datadog's Cloud Security Platform enables you to get full-stack security for your production environment. Get set up in minutes.
Learn more about Datadog
Datadog Cloud Security Platform offers full-stack security for your production environment. With real-time threat detection, continuous configuration audits, and context-rich security signals, you can easily bring speed and scale to your security organization. Secure your environment by correlating security threats with metrics or logs from across your environment. Get started quickly with Datadog's turn-key detection rules, dashboards, and support for 500+ technologies.
Learn more about Datadog
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Learn more about ConnectWise SIEM
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Ermetic’s identity-first cloud infrastructure security platform unifies asset management, threat detection, remediation & compliance.
Learn more about Ermetic
Ermetic’s holistic cybersecurity platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate them immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Ermetic automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Ermetic dramatically reduces the cloud attack surface and enforces least privilege at scale.
Learn more about Ermetic
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Safetica protects your data against insider threats and helps you to be compliant with regulations.
Learn more about Safetica
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance.
Safetica is a global software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions.
Safetica NXT (cloud-native)
Safetica ONE (on-prem)
Learn more about Safetica
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Proactive Best Practice & Security Analysis for AWS, Azure, GCP, Kubernetes, VMware, Windows and Linux OS.
Learn more about Runecast
An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere. Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving.
Runecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance.
Learn more about Runecast
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Designed to adapt — secure network access solutions tailored to evolving business needs.
Learn more about NordLayer
Cloud security is essential for protecting company data and applications from exposure to potential risks. Unauthorized access might lead to data breaches and leaks, resulting in reputational and financial damage. NordLayer enables security measures to company cloud environments, ensuring remote login and access controls. It allows them to operate securely even on a public network encrypting and hiding all business-related data traffic.
Learn more about NordLayer
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Continuously Monitor.
Identify Vulnerabilities.
Remediate Misconfigurations.
Secure Your Cloud Native Environment
with Cloud Scanning
Learn more about Holm Security VMP
Identify and remediate vulnerabilities across your cloud services and resources with Cloud Security Posture Management (CSPM) and vulnerability management all-in-one. Secure your Cloud Native environment with Cloud Scanning.
Agentless Cloud Security allows you to:
Take Control of Cloud Misconfigurations;
Detect & Respond to Threats Faster;
Multi-Cloud Visibility & Asset Management;
Cloud Identity & Access Management.
Learn more about Holm Security VMP
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cloud-based solution that allows businesses to manage secure access, IT monitoring, restrictions, audit logs, onboarding, and more.
Learn more about Uniqkey
Uniqkey is Europe's preferred Business Password Manager solution. As it's just not a password manager but a full suit for business access security.
European businesses use Uniqkey to simplify password management, reclaim IT control and reduce password-based cyber risk. All in one super easy-to-use tool.
With Uniqkey, businesses can address the risk easily. Get more IT control. Create safer, faster workflows. All by simplifying how your business manages access and passwords.
Learn more about Uniqkey
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
AccuKnox is your Cloud Security partner to prevent advanced Zero-Day Attacks. Agentless CSPM + eBPF, LSM powered CWPP.
Learn more about AccuKnox
AccuKnox provides a Zero Trust Cloud Native Application Security (CNAPP) platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of: Container Security, Anomaly Detection and Data Provenance. AccuKnox can be deployed in Public and Private Cloud environments.
Learn more about AccuKnox
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
LastPass provides secure password management without compromising ease of use and employee productivity.
Improve your business’ password hygiene and security, without compromising ease of use. LastPass empowers employees to generate, store, and share credentials seamlessly, while providing valuable insight and control to Admins through security policies and advanced reporting. LastPass ensures data protection and privacy through LastPass’ zero-knowledge security infrastructure.
Learn more about LastPass
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Secure your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.
Learn more about 1Password
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
An award-winning next-gen antivirus with online privacy tools and patch management automation software for small businesses.
Comprehensive cybersecurity and patch automation for growing businesses
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser (cloud-based management console).
Learn more about Avast Ultimate Business Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Learn more about Symantec Endpoint Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
SpamTitan is a cloud based Anti Spam email filter. Easy to use and very effective blocking Email-Spam, malware and phishing attacks.
SpamTitan is a cloud based Anti Spam email filter. It is an easy to use, effective, multi-award winning Anti-Spam, malware blocking and phishing prevention solution .
Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated.
Try a FREE 14 day Trial of SpamTitan Email Security today, full support included during trial.
Learn more about SpamTitan
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model.
Learn more about Duo Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential info
Keeper’s easy-to-use cybersecurity platform is built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
Learn more about Keeper Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Learn more about Cloudflare
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 850+ third-party applications.
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 850+ third-party applications.
You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports.
Patch Manager Plus is available both on the cloud and on-premises.
Learn more about ManageEngine Patch Manager Plus
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control.
We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network & computer security now.
Try a free Trial of WebTitan today, support included.
Learn more about WebTitan
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
Learn more about JumpCloud Directory Platform
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Search, analyze, and visualize data from your entire data ecosystem. Monitor, alert, and report on your operations to drive resilience.
Are you ready to take control of your data? Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one unified security and observability platform.
Learn more about Splunk Enterprise
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Secure and resizable compute capacity in the cloud. Launch applications when needed without upfront commitments.
Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of operating systems, load them with your custom application environment, manage your network’s access permissions, and run your image using as many or few systems as you desire.
Learn more about Amazon EC2
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method.
Learn more about Zerospam
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity.
Learn more about OneLogin
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface.
Learn more about SentinelOne
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Phoenix Security (AppSec Phoenix) next-gen Vulnerability & Posture management correlating Application Security, Cloud Security.
Vulnerability Management: we help organizations get in control of their vulnerabilities regardless of the source. We cover
- Cloud Security (Vuln, Misconfig, VM, Containers)
- Application Security (SAST, DAST, SCA)
Pentesting/Red Team Consolidation: Pentest Results, Red Team, Burpsuite Results
As a cross-domain Vulnerability management solution, We help scaling security and 10X devsecops professionals
We help engineer focus on what's matter most
We empower executives to set risk-based
Learn more about Phoenix Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration.
Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services.
Learn more about Delivery Trust
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform.
Learn more about Lookout
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cloud-based security solution that helps businesses of all sizes secure emails against spam, viruses, ransomware, scams and phishing.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas mode helps protect businesses, associations and local communities unwanted messages: spam, viruses, phishing, ransomware, advertising.
Learn more about ALTOSPAM
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
With a cloud-based VPN infrastructure, Perimeter 81 provides secure remote access to employees worldwide.
Perimeter 81 is a leading network cybersecurity platform, delivering a cloud-based network infrastructure that provides globally secure access.
With its comprehensive and easy-to-use platform, Perimeter 81 allows your employees around the world to connect securely.
Learn more about Perimeter 81
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Simplify security operations with a single SaaS cloud security platform. Data protection, CSPM, and compliance made easier with Orca.
Move at cloud speed with Orca's Cloud Security Platform. Agentless efficiency and accuracy means no impact to your workloads, no performance hits and no organizational friction. In less than 24 hours of deployment, Orca's SideScanningTM technology detects and categorizes threats in proper context for your unique environment. Orca Security even provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents.
Learn more about Orca Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe.
idgard is a brand of uniscon GmbH, a TÜV SÜD Group company based in Munich. Founded in 2009, uniscon has been part of TÜV SÜD's digitalization strategy since 2017 and is one of Europe's leading secure cloud providers. With idgard, the company offers solutions for highly secure data exchange and virtual datarooms for legally compliant collaboration in the cloud.
Idgard's vision is to become the most trusted global platform for secure content collaboration to instantly enable everyone, across all
Learn more about idgard
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.
Learn more about Business VoiceEdge
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Workato is a next-gen iPaaS with 1,000+ pre-built connectors to help automate the most complex workflows across your organization
Workato is the recognized Enterprise Automation Platform Leader. Workato empowers business and IT teams to integrate their apps and automate business workflows without compromising on security and governance. Built on a cloud-native architecture that is designed for scale and speed to significantly reduce operational footprint and overall costs. Our low-code/no-code platform enables teams to build integrations 5X faster than traditional platforms. Contact us for a free trial now!
Learn more about Workato
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact.
The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase.
Learn more about Beagle Security
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Create and monitor users across Exchange, Microsoft 365, Google Workspace, and Microsoft Teams.
Create and monitor users across Exchange, Microsoft 365, Google Workspace, and Microsoft Teams.
Learn more about ManageEngine ADManager Plus
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cohesity ushers in a new era in data management, making it easier than ever to back up, manage and easily extract insights from data.
Cohesity ushers in a new era in data management that solves a critical challenge facing businesses today: mass data fragmentation. The vast majority of enterprise data backups, archives, file shares, object stores, and data used for test/dev and analytics sits in fragmented infrastructure silos that makes it hard to protect, expensive to manage, and difficult to analyze. Cohesity consolidates silos onto one web-scale platform, spanning on-premises, cloud, and the edge.
Learn more about Cohesity
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution.
Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB).
Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Learn more about Incapsula
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
ADSelfService Plus is an identity security solution with MFA, SSO, and SSPR capabilities.
ADSelfService Plus is an identity security solution providing adaptive multi-factor authentication (MFA), single sign-on (SSO), password self-service, a password policy enhancer, remote work enablement, and workforce self-service. It helps keep identity-based threats out, fast-tracks application onboarding, boosts password security, reduces help desk tickets, and empowers remote workforces. ADSelfService Plus ensures that your employees enjoy secure and seamless access to enterprise resources.
Learn more about ManageEngine ADSelfService Plus
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention.
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom.
Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior.
Learn more about Rubrik
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Learn more about Guardio
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Online password manager for teams.
Zoho Vault is an online password manager for teams. It helps securely store, share, and manage your passwords from anywhere. With Zoho Vault, you stay organized while your passwords remain secure. Say goodbye to storing your important passwords on spreadsheets or post-it notes.
Learn more about Zoho Vault
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
ADAudit Plus is Active Directory, Azure AD, Windows Server, file server (including NAS devices), and workstation auditing software.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides complete visibility into all the activities across your Active Directory (AD), Azure AD, file servers (Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations. ADAudit Plus helps you track user logon and logoff activity; analyze account lockouts; audit ADFS, ADLDS, and printers; monitor privileged user activities; and do much more.
Learn more about ManageEngine ADAudit Plus
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours?
Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others.
Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS).
Apply multi email signatures and send bulk vacation messages.
Join thousands of users and improve your company's security and control.
Learn more about Conecta Suite
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service.
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe.
Learn more about Cato Networks Suite
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
A cloud-based web filter protecting business and non-business users 24/7 and remotely against online menaces.
More than 90% of organizations are slightly to highly concerned about cloud security. Insecure Interfaces/APIs, remote working, cyber-attacks are a few of the many threats lurking around cloud security resources to compromise business and enterprise networks. SafeDNS provides a robust web filtering solution that prevents web-based threats to infiltrate corporate networks. Get your free trial today for 15 days.
Learn more about SafeDNS
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location.
Learn more about Zscaler
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation.
GitGuardian is focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries.
GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems.
GitGuardian solutions monitor public and private repositories in real-time.
Learn more about GitGuardian
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics
Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
Boolebox is a data security platform that maintains integrity and confidentiality of information from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to a military level encryption and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability inside and outside company's perimeter.
Learn more about BooleBox
...
Read more
Features
- Threat Intelligence
- Behavioural Analytics
- Incident Management
- Access Controls/Permissions
- Real Time Monitoring
- Compliance Management
- Alerts/Notifications
- Reporting/Analytics