ФилтриИзчистване на всички
Актуални приложения
Приложения резултата за Security
Показват се резултати след приложения.
AlmaLinux 8 DesktopMadarson It, LLCAzure-based AlmaLinux 8 Virtual Desktop pre-configured with GUI/RDP access.
+1
Applicable to:
Virtual Machines
1 out of 60
Trustwave Advanced Phishing ScannerTrustwave Holdings, Inc.Free phishing scanner that identifies potential threats which have bypassed your SEG
+1
Applicable to:
SaaS
2 out of 60
Performanta Azure Lighthouse ConnectionsPerformantaA specialized implementation of Azure Lighthouse designed for Performanta, a Managed Security Service Provider (MSSP). This service enables Performanta to manage and oversee their customers' Azure environments with enhanced precision and efficiency.
+1
Applicable to:
Managed Services
3 out of 60
Hardened AlmaLinux 10 with Cockpit & Local AI System Assistant – Security CompliantMadarson It, LLCHardened Alma Linux 10 with Cockpit and a local AI assistant for secure, AI-assisted Linux management.
+1
Applicable to:
Virtual Machines
4 out of 60
Advanced Hardened ALMA Linux 8 image - Level 2 SecurityMadarson It, LLCAzure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for level 2 security and compliance.
+1
Applicable to:
Virtual Machines
5 out of 60
Madarson IT Hardened AlmaLinux 8 – Secure and Optimized for AzureMadarson It, LLCAzure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
6 out of 60
BreachRisk™ CoPilot for SecurityBreachBItsRed Team attack surface management and accurate risk scoring from the hackers perspective.
+1
Applicable to:
SaaS
7 out of 60
DashMagiqVidyatech Solutions Private LimitedDashMagiq® DLP Workflow incident remidiation automation with automatic audit trail for compliance.
+1
Applicable to:
SaaS
8 out of 60
Linux Stream 9 Minimal with VPN ServerVirtual Pulse S. R. O.Securely access your network from anywhere with Linux Stream 9 Minimal with VPN Server
+1
Applicable to:
Virtual Machines
9 out of 60
ACSC Compliant Red Hat Enterprise Linux 7FoundationHardened and preconfigured to meet ACSC compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
10 out of 60
ACSC ISM Compliant Rocky Linux 8FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
11 out of 60
ACSC Essential Eight Compliant Rocky Linux 8FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
12 out of 60
ACSC Essential Eight Compliant Rocky Linux 9FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
13 out of 60
ACSC ISM Compliant Rocky Linux 9FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
14 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
15 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
16 out of 60
HCLTech's Cloud Security Foundation (CsaaS) for AzureHCL America Inc_HCLTAdopt Azure cloud securely with azure native security
+1
Applicable to:
SaaS
17 out of 60
PCI Compliant Rocky Linux 9FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
18 out of 60
PCI Compliant Rocky Linux 8FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
19 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
+1
Applicable to:
Virtual Machines
20 out of 60
OSPP Compliant Rocky Linux 9FoundationHardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
+1
Applicable to:
Virtual Machines
21 out of 60
PCI Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
22 out of 60
PCI Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
23 out of 60
STIG Compliant Rocky Linux 9FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
24 out of 60
RH CCP Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
+1
Applicable to:
Virtual Machines
25 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
+1
Applicable to:
Virtual Machines
26 out of 60
STIG Compliant Rocky Linux 8FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
27 out of 60
OSPP Compliant Rocky Linux 8FoundationHardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
+1
Applicable to:
Virtual Machines
28 out of 60
OSPP Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
+1
Applicable to:
Virtual Machines
29 out of 60
RH CCP Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
+1
Applicable to:
Virtual Machines
30 out of 60
CJIS Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
+1
Applicable to:
Virtual Machines
31 out of 60
CJIS Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
+1
Applicable to:
Virtual Machines
32 out of 60
CCN Basic Level Compliant Red Hat Enterprise Linux (RHEL 9)FoundationHardened and preconfigured to meet CCN Basic Level compliance for public sector and low-sensitivity information systems by Foundation Security.
+1
Applicable to:
Virtual Machines
33 out of 60
OSPP Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
+1
Applicable to:
Virtual Machines
34 out of 60
CCN Advanced Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet CCN Advanced Level compliance for high-security government and critical infrastructure systems.
+1
Applicable to:
Virtual Machines
35 out of 60
CCN Intermediate Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet CCN Intermediate Level compliance for government and public sector systems handling sensitive information.
+1
Applicable to:
Virtual Machines
36 out of 60
STIG Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
37 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
38 out of 60
PCI Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
39 out of 60
OSPP Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
+1
Applicable to:
Virtual Machines
40 out of 60
GravityZone Small Business SecurityBitDefender SRLEnterprise-Grade Security, Simplified for Small Businesses
+1
Applicable to:
SaaS
41 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
42 out of 60
STIG Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
43 out of 60
Infisical secured and supported by HOSSTEDHOSSTEDInfisical is a secure platform for managing and sharing sensitive data such as API keys, environment variables, and other secret credentials.
+1
Applicable to:
Virtual Machines
44 out of 60
DISARM Content Security for EmailSecuLetterMake Microsoft 365 More Secure with Innovative Malware Prevention Technology
+1
Applicable to:
SaaS
45 out of 60
Managed Platform Services for Azure Government CloudsOxford Computer Group LLCOCG’s Managed Platform Services enables both government agencies and Independent Software Vendors (ISVs) to combine the benefits of a Software as a Service (SaaS) model with the enhanced security of Azure Government Clouds.
+1
Applicable to:
Managed Services
46 out of 60
Digicentre Azure MSP Service雲力橘子數位股份有限公司-Gamania Digital EntertainmentDigicentre provides expertise and support in MSP service and offers a comprehensive range of services for Microsoft Azure.
+1
Applicable to:
Managed Services
47 out of 60
Eviden's Vyze School Safety SolutionEviden International France - SASDesigned to enhance school safety through advanced AI computer vision and detection capabilities.
+1
Applicable to:
SaaS
48 out of 60
Security-Hardened Image for Windows Server 2022 – Level 2 ComplianceMadarson It, LLCAzure-based VM pre-configured with Microsoft Windows Server 2022, hardened to Level 2 for advanced security and regulatory compliance.
+1
Applicable to:
Virtual Machines
49 out of 60
Security-Hardened Image for Windows Server 2022 – Level 1 ComplianceMadarson It, LLCAzure-based VM pre-configured with Microsoft Windows Server 2022, hardened for foundational security and regulatory compliance.
+1
Applicable to:
Virtual Machines
50 out of 60
Security-Hardened Image for Windows Server 2019 – Level 2 ComplianceMadarson It, LLCAzure-based VM pre-configured with Microsoft Windows Server 2019, hardened to Level 2 for advanced security and regulatory compliance.
+1
Applicable to:
Virtual Machines
51 out of 60
ReversingLabs Scanner for Microsoft DefenderReversingLabsEnrich security incidents in Microsoft Defender with file-based threat intelligence
+1
Applicable to:
Azure Applications
52 out of 60
HAProxy on Ubuntu 20.04 LTSNuvemnestThe Reliable, High Performance TCP/HTTP Load Balancer.
+1
Applicable to:
Virtual Machines
53 out of 60
FirstComm Direct Routing CompleteFirstCommFirstComm Direct Routing for Microsoft Teams
+1
Applicable to:
SaaS
54 out of 60
GauntletDeep Armor Technologies Pvt LtdUnified Solution for Automating Your Cloud Security & Compliance
+1
Applicable to:
SaaS
55 out of 60
Entra ID Backup for Microsoft 365VIRTUAL DATA CENTRE SERVICES LTDFull-fidelity Backup for Microsoft 365, including Entra ID protection
+1
Applicable to:
SaaS
56 out of 60
CodeCybear (for Office Macros and PS Scripts)IdahysCodeCybear secures your endpoints by analyzing and signing Office Macros and PowerShell scripts
+1
Applicable to:
SaaS
57 out of 60
Meraki Security & Monitoring Products And ServicesBahama Group Llc/dba/Transtechnology CorporationSecure building premises with security analytics and industrial sensor for monitoring environment
+1
Applicable to:
SaaS
58 out of 60
HAProxy on CentOS Linux 7NuvemnestThe Reliable, High Performance TCP/HTTP Load Balancer
+1
Applicable to:
Virtual Machines
59 out of 60
Linux 7.9 with VPN ServerVirtual Pulse S. R. O.Securely connect and manage your network with Linux 7.9 with VPN Server
+1
Applicable to:
Virtual Machines
60 out of 60