Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Software Composition Analysis By Revenera Code InsightSource Code ControlIdentify and mitigate open-source licensing and security risks in your application code.
+1
Applicable to:
SaaS
1 out of 60
Hardened Debian GNU/Linux 12 DesktopMadarson It, LLCAzure-based virtual desktop with the latest Debian GNU/Linux 12 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
2 out of 60
Synack Human-led Penetration TestingSynack, inc.Synack Platform delivers Penetration Testing as a Service (PTaaS)
+1
Applicable to:
SaaS
3 out of 60
Data#3 Managed Services for AzureData#3 LimitedData#3's Azure Managed Service supports clients Azure environments by providing Cloud Operations, Cost Management, Security & Compliance, Identity, Performance, Backup & DR, Governance & Compliance underpinned by DevOps and our onshore team
+1
Applicable to:
Managed Services
4 out of 60
Quzara Managed Detection and Response (MDR)Quzara LLCManaged detection and response (MDR) for regulated and compliance-focused industries.
+1
Applicable to:
SaaS
5 out of 60
Cybersecurity Management SetupViCyber Pty LtdAutomated cybermonitoring,compliance & affordable cyber insurance in one platform for all businesses
+1
Applicable to:
SaaS
6 out of 60
HCL AppScan on CloudHCL SoftwareSecure your applications with HCL ASoC's cloud-based solution featuring SAST, DAST, IAST, and SCA.
+1
Applicable to:
SaaS
7 out of 60
SinergIA PlatformHiQ Solutions S.r.l.All purpose AI Agent platform for Business Governance, Risk and Compliance
+1
Applicable to:
SaaS
8 out of 60
Microsoft Defender for IOT - Operational Technology (OT) Insights and Managed ServicesProArch Technologies, IncEnhance OT network visibility to speed root cause analysis.
Improve Operational Efficiencies and Reduce Risks
Maintain Operations even in time of disruption.
OT Managed Services
Security Managed Services
Energy and CMMC compliance
+1
Applicable to:
Managed Services
9 out of 60
Safeguard Your Entra ID, Microsoft Azure and Microsoft 365 Environmentcionsystems inc.Stay Ahead of Security Threats with CionSystems Auditor, Backup and Recovery for Microsoft Entra ID
+1
Applicable to:
SaaS
10 out of 60
Jamf for Mac - Standard PricingJamf Software, LLCSimplify Mac at Work: Unifying Mac Management & Security for IT Admins
+1
Applicable to:
SaaS
11 out of 60
Labrador OSS SaaSLabrador Labs Streamline open-source security with Labrador OSS for comprehensive vulnerability scans.
+1
Applicable to:
SaaS
12 out of 60
Confidential Data ProtectionApportunixProtect your sensitive and confidential Dynamics 365 Business Central data from unauthorized access.
+1
Applicable to:
Business Central
13 out of 60
Intune Secure EdgeGijimaSecure and manage devices across your organization with Microsoft Intune
+1
Applicable to:
SaaS
14 out of 60
HCLTech Secure OT/IoTHCL America Inc_HCLTHCLTech’s Security for OT & IoT services provide a comprehensive cyber monitoring of OT assets
+1
Applicable to:
SaaS
15 out of 60
InsureByteLebon ConsultingInsureByte simplifies insurance management with advanced tools and analytics.
+1
Applicable to:
SaaS
16 out of 60
EBLA - FortiGate Next-Generation FirewallEBLA Computer Consultancy Co.EBLA's FortiGate Next-Generation Firewall
+1
Applicable to:
SaaS
17 out of 60
Entra Verified ID Implementation & Managed Identity ServicesSimplicity IT Inc.Build a secure, privacy-first digital identity ecosystem with Entra Verified ID. Issue trusted credentials, automate verification, ensure compliance, and gain 24/7 managed identity support through Azure Lighthouse.
+1
Applicable to:
Managed Services
18 out of 60
vBox CloudVIAcodeOptimize cost, strengthen security and improve operational performance in Azure – with one tool
+1
Applicable to:
SaaS
19 out of 60
Syba IdentitySyba LLCIdentity governance and SaaS optimization for multi-tenant Okta environments.
+1
Applicable to:
Azure Applications
20 out of 60
DigiGSTEY GlobalGST Compliance Solution
+1
Applicable to:
SaaS
21 out of 60
Red Hat 9.6Sedetos Global Solutions, IncDeploy Red Hat Enterprise Linux 9.6 easily on Azure - secure, compliant, and ready to use. Pay-as-you-go pricing with zero commitment.
+1
Applicable to:
Virtual Machines
22 out of 60
PROCESOSaxon Infosystems Private LimitedAutomate Manual Processes to Drive Revenue, Employee Productivity, Timely Compliance, & Save Costs
+1
Applicable to:
SaaS
23 out of 60
FileOrbis Governance for Microsoft 365FileOrbis LLCEnhance your Microsoft 365 experience with FileOrbis Governance Office 365 for secure collaboration.
+1
Applicable to:
SaaS
24 out of 60
E-VigilantSynergy Advisors LLCE-Vigilant provides end user alerts, notifications, and response to security and productivity events
+1
Applicable to:
SaaS
25 out of 60
X.CELERATE eKYC SolutionXoriant Solutions Pvt. Ltd.Xoriant KYC Web App
+1
Applicable to:
Azure Applications
26 out of 60
On Demand AuditQuestStreamline security, compliance & change auditing for hybrid Microsoft environments.
+1
Applicable to:
SaaS
27 out of 60
Rocky Linux 10 DISA STIG Hardened for Federal and DoD Cloud EnvironmentsSedetos Global Solutions, IncDeploy a secure, pre-hardened Rocky Linux environment aligned with DISA STIG standards to support government and defense cloud workloads.
+1
Applicable to:
Virtual Machines
28 out of 60
Endor LabsEndor LabsReduce security noise with a single platform for SCA, CI/CD security, compliance, and more.
+1
Applicable to:
SaaS
29 out of 60
Zimperium Mobile Application Protection for AzureZimperium, Inc.Security DevOps tools to secure Mobile apps from development through protection at runtime
+1
Applicable to:
SaaS
30 out of 60
Quzara MDR for Microsoft Defender for CloudQuzara LLCMicrosoft Defender for Cloud co-management service for regulated and compliance-focused industries.
+1
Applicable to:
SaaS
31 out of 60
DenouncefyDENOUNCEFY CANAL DE MANIFESTACAO LTDAYour 100% Digital Whistleblowing Channel Solution
+1
Applicable to:
SaaS
32 out of 60
VIPRE SafeSendVIPRE Security GroupReduces data breaches by stopping misaddressed emails and sensitive data leakages.
+1
Applicable to:
SaaS
33 out of 60
Trustkey t110TrustKeyUSB Security Key for Microsoft Entra ID and Intune
+1
Applicable to:
SaaS
34 out of 60
Rocky Linux 9 AMI – Hardened to Level 1 BaselineSedetos Global Solutions, IncRocky Linux 9 – Enterprise Hardened Image for Mission-Critical Workloads
+1
Applicable to:
Virtual Machines
35 out of 60
Varonis for Purview DSPMVaronisVaronis signals into Purview, data security teams gain unified visibility into sensitive data across
+1
Applicable to:
Azure Applications
36 out of 60
SpinSPM for Microsoft 365Spin.AISpinOne is an all-in-one SaaS security platform for Microsoft 365
+1
Applicable to:
SaaS
37 out of 60
Imperva WAF Gateway (On Prem WAF) v14 LTSThales CPLProtects your business critical web applications hosted on Azure from advanced cyber attacks
+1
Applicable to:
Virtual Machines
38 out of 60
AKA IdentityAKA IdentityAKA Identity identifies and remediates the actual risks hidden in your identity infrastructure.
+1
Applicable to:
SaaS
39 out of 60
VendorappVendorappVendor risk management and compliance in one click. No spreadsheets. No 1,600-question assessments.
+1
Applicable to:
SaaS
40 out of 60
Teams User Secure ScoreEmpiredNative Teams app where Users get a score on how they are tracking on Cyber Security.
+1
Applicable to:
SaaS
41 out of 60
Skypher EUSkypher - INCAnswer security questions and automate trust center workflows
+1
Applicable to:
Teams
42 out of 60
Integration: ESET and Arctic WolfESETIntegrates ESET XDR with Arctic Wolf’s Security Operations Cloud to deliver detection & response
+1
Applicable to:
SaaS
43 out of 60
EBLA PaloAlto Networks Cloud NGFWEBLA Computer Consultancy Co.EBLA's PaloAlto Networks Cloud NGFW
+1
Applicable to:
SaaS
44 out of 60
SkypherSkypher - INCAutomate your security questionnaires and trust center workflows, directly inside Microsoft Teams.
+1
Applicable to:
Teams
45 out of 60
Hardened Ubuntu 22.04 LTS Desktop with GUI|RDP AccessMadarson It, LLCAzure-based virtual desktop with latest Ubuntu 22.04 LTS image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
46 out of 60
Hardened Ubuntu 24.04 LTS Desktop with GUI|RDP AccessMadarson It, LLCAzure-based virtual desktop with latest Ubuntu 24.04 LTS image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
47 out of 60
Microsoft Purview Information Protection (Preview)Microsoft Sentinel, Microsoft CorporationMicrosoft Purview Information Protection
+1
Applicable to:
Azure Applications
48 out of 60
Empowsec Report Emailempowsec CorporationReport suspicious emails directly from Outlook to your organization's security team via the Empowsec
+1
Applicable to:
SaaS
49 out of 60
rescanaRescanaRescana delivers an agentic platform that simplifies and automates vendor risk assessments
+1
Applicable to:
SaaS
50 out of 60
Hardened Red Hat Enterprise Linux 8 Desktop with GUI|RDP AccessMadarson It, LLCAzure-based virtual desktop with Red Hat Enterprise Linux 8 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
51 out of 60
CSC Mux for Zscaler with PriCPA - (Models 1, 2, 4 and 8)Maidenhead BridgeThe easiest way to connect to Zscaler (ZIA) and communicate private Cloud Workloads (PriCPA).
+1
Applicable to:
Azure Applications
52 out of 60
Safeguard your Entra ID, Azure and Office 365cionsystems inc.Stay Ahead of Security Threats with CionSystems Auditor, Backup and Recovery for Microsoft Entra ID
+1
Applicable to:
SaaS
53 out of 60
Hardened Red Hat Enterprise Linux 9 Desktop with GUI|RDP AccessMadarson It, LLCAzure-based virtual desktop with latest Red Hat Enterprise Linux 9 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
54 out of 60
Hardened Alma Linux 8 Desktop with GUI AccessMadarson It, LLCAzure-based virtual desktop with the latest AlmaLinux 8 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
55 out of 60
Red Hat Enterprise Linux 9.4 AMI – Hardened to Level 1 BenchmarkSedetos Global Solutions, IncDeploy Red Hat Enterprise Linux 9.4 easily on Azure - secure, compliant, and ready to use. Pay-as-you-go pricing with zero commitment.
+1
Applicable to:
Virtual Machines
56 out of 60
HyperData Flow EngineSpektra Systems LLCHyperData Flow Engine is a powerful data processing platform designed to manage and optimize data
+1
Applicable to:
SaaS
57 out of 60
Netwrix Identity ManagerNetwrix CorporationSecure your Identities to Secure Your Data
+1
Applicable to:
SaaS
58 out of 60
Cloud DefenseLightstreamLightstream Cloud Defense creates a Zero-Trust resilient, secure and compliant Azure environment via Continuous Security Monitoring, Detection, Management, Incident Response and Incident Remediation Managed Services
+1
Applicable to:
Managed Services
59 out of 60
GigaVUE Cloud Suite for Azure (Latest Releases)Gigamon, IncGigaVUE Cloud Suite for Azure delivers actionable network-derived intelligence to your security and observability tools
+1
Applicable to:
Virtual Machines
60 out of 60