Featured software
Most reviewed software
Explore the most reviewed products by our users on the Threat Intelligence Software
Filter Results (167)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Ireland
Pricing Options
Product type
167 results
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Learn more about ConnectWise SIEM
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Resolver’s Threat Protection software connects intel from any source, enabling security teams to find data connections & warning signs.
Learn more about Resolver
Resolver’s Threat Protection application connects threat intelligence from any source, enabling security teams to find connections across data sets and spot early warning signs. Our fully integrated case management solution ensures potential threats are evaluated comprehensively to help determine the right course of action. From there, our notifications, workflows, and reports make driving mitigating actions and showcasing the value of your threat program streamlined and easy.
Learn more about Resolver
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
ManageEngine PAM360 Complete privileged access security for enterprise IT
Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security.
Learn more about ManageEngine PAM360
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cybervigilance monitors malicious networks (web, deepweb & darknet) 24/7 and alerts you in real time of cyber threats or leaks.
Learn more about HTTPCS Cyber Vigilance
The automated CTI solution for monitoring malicious networks and anticipating cyber attacks.
Based on the development of virtual agents capable of scanning millions of sources daily, and OSINT teams that integrate the most restricted sources, CyberVigilance infiltrates the clear and the dark web to alert you in case of cyber threats on your organization (attack notification, phishing threat, ransomware...) or information leaks (Data Leak, file leakage, compromised email from an employee).
Learn more about HTTPCS Cyber Vigilance
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets.
Learn more about Holm Security VMP
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view.
Learn more about Holm Security VMP
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
A re-imagined SecOps toolkit equipped with built-in hunting and action capabilities, managed from a single, unified interface.
Learn more about Heimdal Threat-hunting & Action Center
The Heimdal Threat-hunting and Action Center brings a re-imagined SecOps toolkit under one roof.
It provides security teams with an advanced threat and risk-centric view of their entire IT landscape, offering granular telemetry across endpoints and networks for swift decision-making.
Furthermore, the platform is equipped with built-in hunting and action capabilities, which can be easily managed from a single, unified interface straight out of the box.
Learn more about Heimdal Threat-hunting & Action Center
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Learn more about Malwarebytes for Business
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Learn more about Trellix Endpoint Security
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Computer security tool that helps businesses secure networks through encryption, personal IP addresses, browser extensions, and more.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information.
Protect your organization against security breaches.
Secure remote team access.
Simplify business network security.
Access region-specific online content from anywhere in the world
Learn more about NordVPN
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
An award-winning next-gen antivirus with online privacy tools and patch management automation software for small businesses.
Comprehensive cybersecurity and patch automation for growing businesses
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser (cloud-based management console).
Learn more about Avast Ultimate Business Security
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Workforce Analytics for the Modern Workplace
Understand how your team works – from everywhere! Empower your people, hone healthy work
ActivTrak’s workforce analytics provide predictive insights that help leaders, managers, and employees build trust, deepen engagement and boost productivity in the modern, hybrid workplace. This work is supported by the ActivTrak Productivity Lab, a global center for ground-breaking research and expertise that leverages data sourced from more than 9,000 customers and over 550,000 users.
Learn more about ActivTrak
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential info
Keeper’s easy-to-use cybersecurity platform is built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
Learn more about Keeper Security
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice.
Businesses rely on TunnelBear for:
Securing remote and traveling employees
Global quality assurance testing
Gathering competitive intelligence
Stealthfully conducting market research
Accessing geo-restricted business tools
Businesses have access to priority support and a personal account manager.
Learn more about TunnelBear
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control.
WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day.
Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture.
Try a free Trial of WebTitan today, full support included.
Learn more about WebTitan
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Datadog is a service that helps increase uptime and maximize the performance of services through centralized monitoring and alerting.
Datadog is a SaaS-based monitoring, security, and analytics platform for cloud-scale infrastructure, applications, logs, and more. The platform assists organizations in improving agility, increasing efficiency and providing end-to-end visibility across dynamic or high-scale infrastructures. By collecting metrics and events from 400+ out of the box services and technologies, Datadog enables Dev, Sec, and Ops teams to ensure application uptime and accelerate go-to-market efforts.
Learn more about Datadog
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date.
Learn more about Webroot Business Endpoint Protection
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security
services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange
mail servers.
GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public
cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
Learn more about Bitdefender GravityZone
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Threat and anti-spam protection system intended to defend your email from phishing, ransomware, and business email compromise.
Threat and anti-spam protection system intended to defend your email from phishing, ransomware, and business email compromise.
Learn more about Symantec Email Security.cloud
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Gain complete visibility and control over IT infrastructure changes and configurations
Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit.
Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
Learn more about Netwrix Auditor
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Multichannel emergency communication software that provides two-way messaging, integrated threat intelligence, and safety monitoring.
AlertMedia is the world’s leading emergency communication provider. Our award-winning, two-way multichannel messaging system, fully integrated threat intelligence, and employee safety monitoring capabilities helps organizations protect their business and people through all phases of an emergency. Implementation and personalized 24/7 support are included and our intuitive platform takes just 15 minutes to learn.
Learn more about AlertMedia
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Network Monitoring & Management Software for MSPs and IT professionals
Domotz is a Network Monitoring Software on a mission to provide all services providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty and solve problems faster than ever.
Monitor any network and IT infrastructure with our powerful, affordable, user-friendly network monitoring software.
All the features you need to manage your networks proactively.
Only €23/month per site, no contract...simple!
Learn more about Domotz
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Teramind tracks employee behavior, detects threats, and optimizes your business for productivity with advanced employee monitoring.
Discover Teramind - the ultimate tool for businesses looking to optimize productivity, streamline workflows, and protect assets. Our customizable platform ensures regulatory compliance, detects and prevents insider threats, and monitors remote employees. Automated actions keep your business secure and efficient, while real-time alerts and logs provide all-around security. Experience the power of machine-learned behavior analytics to secure your company data. Ready to revolutionize your business?
Learn more about Teramind
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Smart Protection Suites infuse high-fidelity machine learning to a blend of threat protection techniques to eliminate security gaps.
This connected security suite eliminates security gaps across any user activity and any endpoint, anddelivers the best protection across multiple security layers while constantly evolving to find new threats. Minimize impact by keeping users running smoothly and reducing management time with centralized visibility across endpoints, email, web, and SaaS services. Plus you have the flexibility to deploy on-premises, in the cloud, or a mix of both.
Learn more about Trend Micro Smart Protection Complete Suite
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface.
Learn more about SentinelOne
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration.
Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services.
Learn more about Delivery Trust
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Learn more about Automox
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Learn more about BlackBerry CylancePROTECT
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Secure your team's access to business systems, cloud apps, assets and resources in 10 minutes. 14 days full-featured free trial.
GoodAccess creates an encrypted network that hides your services and assets from the internet, controls authorized access, and comes with an automated deployment in just 10 minutes. GoodAccess applies network intelligence that recognizes an infected device. When such a device is detected, its access to the network is automatically blocked. An administrator is notified to check the device. This way, you can complement the antivirus and make sure threats are eliminated in their early stage.
Learn more about GoodAccess
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
A fast and reliable push notification solution with features for interdepartmental communication, multi-device integration, and more.
Regroup Mass Notification empowers better mass communication that keeps people safe and informed at all times. The company's award-winning, cloud-based mass communication platform is what clients around the globe rely on to send both critical and routine communications to millions of people. By enabling one-tap messaging to multiple channels, Regroup helps organizations keep people safe, strengthen operational resilience, mitigate risk, and thrive in an increasingly unpredictable world.
Learn more about Regroup Mass Notification
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
In just one click, secure Microsoft 365, Google Workspaces, Slack, Teams and more against the latest threats.
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for email and cloud collaboration solutions such as Microsoft 365, Google Workspaces, and Slack. The platform deploys in one click via API to prevent Business Email Compromise, phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. No other solution is capable of blocking both external and insider attacks.
Learn more about Avanan
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Perimeter 81 radically simplifies network security by making the internet your corporate network.
Perimeter 81 radically simplifies network security by offering enterprise-grade, secure remote access and network capabilities through the cloud. It can be managed worldwide without being limited by physical infrastructure, allowing remote workers to securely connect to corporate resources.
With features like Firewall as a Service, Zero Trust Network Access, and Secure Web Gateway you can secure your company with a comprehensive and easy-to-use platform in just a few clicks.
Learn more about Perimeter 81
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Online password manager for teams.
Zoho Vault is an online password manager for teams. It helps securely store, share, and manage your passwords from anywhere. With Zoho Vault, you stay organized while your passwords remain secure. Say goodbye to storing your important passwords on spreadsheets or post-it notes.
Learn more about Zoho Vault
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security.
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security (AV/NGAV), endpoint detection and response (EDR), endpoint management capabilities, and 5 mobile device management (MDM) licenses to deliver exploit prevention, enhanced reporting, and endpoint management from a centralized SaaS platform.
Licensed by number of endpoints.
Learn more about Zero Threat Advanced
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
Learn more about VIPRE Antivirus Business
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications.
With Acunetix, security teams can:
- Save time and resources by automating manual security processes
- Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Learn more about Acunetix
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location.
Learn more about Zscaler
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Email security management solution that helps detect & block threats through various tools like firewalls, SCSS & more.
Email security management solution that helps detect & block threats through various tools like firewalls, SCSS & more.
Learn more about Proofpoint Email Protection
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe!
Learn more about Blackpoint MDR
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cloud-based email security designed to help your customers stay in control while safeguarding their inbound and outbound email.
N-able Mail Assure is cloud-based email security designed to provide protection against inbound and outbound email using collective threat intelligence, 24/7 email continuity, and long-term email archiving. Real-time pattern threat recognition and machine learning technology helps protect users against spam, viruses, phishing attacks, ransomware, malware, and other email-borne threats, with near 100% filtering accuracy and over 2 billion spam messages blocked per month.
Learn more about Mail Assure
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
SecPod SanerNow is an Advanced Vulnerability Management Solution that is preventing cynical cyberattacks.
SecPod SanerNow is a continuous and Advanced Vulnerability Management Platform built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterprises use the SanerNow platform to go beyond traditional vulnerability management practices, get complete visibility and control over the organization’s attack surface, and get daily reports.
SanerNow is powered by its homegrown, world’s largest vulnerability intelligence feed with 160,000+ checks.
Learn more about SanerNow
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Learn more about Avira Antivirus for Endpoint
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Apex One is an endpoint detection and response software designed to help businesses investigate threats and protect the system.
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.
Managers can detect the indicators and intent of attackers in real-time and manage threat responses on a unified interface. Apex One allows teams to identify and analyze the impact as we
Learn more about Apex One
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
CrowdStrike is a cybersecurity leader with a cloud-native platform for protecting endpoints, cloud workloads, identities, and data.
CrowdStrike is redefining modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity, and data.
Learn more about Falcon
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Dark Web ID monitors the dark web and instantly alerts you when compromised business or personal credentials are found.
Dark Web ID helps MSPs and internal IT teams protect their organizations and customers from cybersecurity breaches by monitoring the dark web 24/7/365 and issuing alerts when any sensitive company or employee data or passwords are found up on the dark web.
Learn more about Dark Web ID
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees.
Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.
Learn more about AppTrana
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
Netsurion® delivers complete cybersecurity confidence through wider attack surface coverage, deeper threat detection, and faster incident response. Netsurion’s Managed XDR solution combines our 24x7 SOC and our Open XDR platform in a co-managed service that gives you the ultimate flexibility to adapt and grow while maintaining a secure environment. Headquartered in Ft. Lauderdale, FL with a global team of security analysts and engineers, Netsurion is a leader in Managed Extended Detection & Resp
Learn more about Netsurion
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide.
Learn more about SiteLock
...
Read more
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Sophos UTM is a threat intelligence and network monitoring software that helps businesses identify and block threats.
Sophos UTM is a threat intelligence and network monitoring software that helps businesses identify and block threats.
Learn more about Sophos UTM
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware.
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware.
Learn more about Shield Antivirus
Features
- Threat Response
- Prioritisation
- Vulnerability Scanning
- Activity Dashboard
- Data Visualisation
- Monitoring