Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
WitFoo ApplianceWitFoo, Inc.WitFoo Appliance – Unified Security Operations Platform
+1
Applicable to:
Virtual Machines
1 out of 60
Safeguard your Entra ID, Azure and Office 365cionsystems inc.Stay Ahead of Security Threats with CionSystems Auditor, Backup and Recovery for Microsoft Entra ID
+1
Applicable to:
SaaS
2 out of 60
CSC Mux for Zscaler with PriCPA - (Models 1, 2, 4 and 8)Maidenhead BridgeThe easiest way to connect to Zscaler (ZIA) and communicate private Cloud Workloads (PriCPA).
+1
Applicable to:
Azure Applications
3 out of 60
CipherTrust ManagerThales CSPManage encryption keys and policies.
+1
Applicable to:
Virtual Machines
4 out of 60
HyperData Flow EngineSpektra Systems LLCHyperData Flow Engine is a powerful data processing platform designed to manage and optimize data
+1
Applicable to:
SaaS
5 out of 60
Netwrix Identity ManagerNetwrix CorporationSecure your Identities to Secure Your Data
+1
Applicable to:
SaaS
6 out of 60
Synack Human-led Penetration TestingSynack, inc.Synack Platform delivers Penetration Testing as a Service (PTaaS)
+1
Applicable to:
SaaS
7 out of 60
Digital Defense Azure Scanning ApplianceDigital Defense Inc.Digital Defense Frontline.Cloud Scanning Appliance for Azure
+1
Applicable to:
Virtual Machines
8 out of 60
M365 ManageRapid Circle AustraliaStruggling to keep up with Microsoft 365?
+1
Applicable to:
SaaS
9 out of 60
vArmour Application ControllervArmour NetworksGet an Interactive Relationship Map to Secure your Azure Environment in Minutes
+1
Applicable to:
SaaS
10 out of 60
Migrate any incompatible application to Windows 11Legacy Box (LTD)Rapidly transition legacy applications to Windows 11 for enhanced security and compliance.
+1
Applicable to:
SaaS
11 out of 60
NIST Compliant Red Hat Enterprise Linux 9FoundationThis VM of Red Hat Enterprise Linux 9 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance
+1
Applicable to:
Virtual Machines
12 out of 60
SafeticaSafeticaProtect sensitive data with a trusted Data Loss Prevention and Insider Risk Management solution
+1
Applicable to:
SaaS
13 out of 60
Check Point Harmony Email & CollaborationCheck PointPrevent phishing, malware, and more on Microsoft 365, Microsoft Teams, and Microsoft SharePoint
+1
Applicable to:
SaaS
14 out of 60
BAYOOSOFT Themis (IaaS)BAYOONET Service GmbH & Co. KGWe digitize and secure critical infrastructure processes with centralized, audit-proof management.
+1
Applicable to:
Azure Applications
15 out of 60
Unifize Quality Management System (QMS)UnifizeAI-powered, collaborative eQMS for FDA/ISO compliance
+1
Applicable to:
SaaS
16 out of 60
Rocky Linux 9 AMI – Hardened to Level 1 BaselineSedetos Global Solutions, IncRocky Linux 9 – Enterprise Hardened Image for Mission-Critical Workloads
+1
Applicable to:
Virtual Machines
17 out of 60
ACSC ISM Compliant Rocky Linux 8FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
18 out of 60
Thales's Imperva Cybersecurity (used for private offers only)Imperva, Inc. (Private Offers)Comprehensive cybersecurity stack protecting data and all paths to it.
+1
Applicable to:
SaaS
19 out of 60
SendGuard for Outlook (Microsoft 365)Standss (South Pacific) LtdStop confidential information from getting emailed to unintended recipients
+1
Applicable to:
SaaS
20 out of 60
Key VaultMicrosoftSafeguard cryptographic keys and other secrets used by cloud apps and services.
+1
Applicable to:
Azure Services
21 out of 60
ESET PROTECT EnterpriseESETCyber security risk management and XDR
+1
Applicable to:
SaaS
22 out of 60
Heimdal™ Next-Gen Anti-Virus, Firewall & MDMHeimdal SecurityHeimdal™ NGAV, Firewall & MDM - Secure Your Company Endpoints with Impeccable Threat Detection
+1
Applicable to:
SaaS
23 out of 60
TickStream.WFH-inspiring confidence in remote workIntensity AnalyticsTickStream.WFH provides clarity with an authentication, security, compliance and activity bundle
+1
Applicable to:
SaaS
24 out of 60
Lighthouse SpectraLighthouse GlobalSimply powerful ediscovery for Microsoft 365 data and beyond with Lighthouse Spectra
+1
Applicable to:
SaaS
25 out of 60
Illusive and Microsoft 365 E5Illusive NetworksExtend Microsoft 365 E5 Security with Illusive Lateral Threat Management
+1
Applicable to:
SaaS
26 out of 60
Analytics 365 Call Recording with Conversation Analytics for Microsoft TeamsTollringCompliance call recording with evaluation, transcription, keyword and sentiment analysis.
+1
Applicable to:
SaaS
27 out of 60
SIGNL4 - Mobile Alerting & Response for Microsoft Sentinel and Defender for CloudDerdackMobile alerting and incident response for Microsoft Sentinel and Defender for Cloud
+1
Applicable to:
Azure Applications
28 out of 60
Ubuntu Pro 20.04 LTS Minimal with CIS HardeningCanonicalUbuntu Pro is providing additional coverage for production environments running in the cloud.
+1
Applicable to:
Virtual Machines
29 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
30 out of 60
Infoblox Threat DefenseInfobloxPreemptive DNS security for Command & Control (C2), DNS-based data exfiltration, and ransomware
+1
Applicable to:
SaaS
31 out of 60
Secure PracticeSecure Practice ASGet security training from Secure Practice directly into Microsoft Teams chat
+1
Applicable to:
Teams
32 out of 60
Quzara Managed Defender for Cloud AppsQuzara LLCManaged detection and response (MDR) service with cloud app security and 24x7 monitoring.
+1
Applicable to:
SaaS
33 out of 60
Centric Cybersecurity Managed ServiceCentric Netherlands b.v.Centric offers a managed service to increase cyber resilience and reduce security risks, which is available 24*7 hours and is delivered entirely from locations within the European Union, based on Microsoft Security tools and access via Azure Lighthouse.
+1
Applicable to:
Managed Services
34 out of 60
Akamai Secure Internet Access MobileAkamai TechnologiesAkamai SIA Mobile offers network based enterprise-grade security for all SIM-enabled devices
+1
Applicable to:
SaaS
35 out of 60
AI Risk ManagerTTAContinuous AI-assisted security checks for configs & logs with real-time Azure alerts.
+1
Applicable to:
SaaS
36 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
37 out of 60
DEFEND Guardian XDRDEFEND LimitedDEFEND Guardian XDR offers 24x7 managed SOC services powered by Microsoft Security.
+1
Applicable to:
SaaS
38 out of 60
F5 BIG-IP Virtual Edition (BYOL)F5, Inc.The BIG-IP Virtual Edition (VE) is F5's application delivery services platform for the Azure cloud
+1
Applicable to:
Virtual Machines
39 out of 60
ACSC ISM Compliant Rocky Linux 9FoundationHardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
+1
Applicable to:
Virtual Machines
40 out of 60
Policy management software - XoraliaContent Formula LtdXoralia is a user-friendly policy/document management software for SharePoint and Microsoft 365
+1
Applicable to:
SaaS
41 out of 60
Archive One | Document Management SystemPaperless Trail Inc.Compliance and audits made easy
+1
Applicable to:
SaaS
42 out of 60
CoreStack NextGen SecOpsCoreStackCoreStack NextGen Cloud Governance - SecOps module
+1
Applicable to:
SaaS
43 out of 60
CCN Advanced Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet CCN Advanced Level compliance for high-security government and critical infrastructure systems.
+1
Applicable to:
Virtual Machines
44 out of 60
Red Hat Enterprise Linux 10 RAW – DISA STIG-Compliant Hardened ImageMadarson It, LLCAzure-based VM built on the latest Red Hat Enterprise Linux 10 (RAW) image, pre-hardened to meet DISA STIG security benchmarks.
+1
Applicable to:
Virtual Machines
45 out of 60
Sophos FirewallSophosComplete cloud-edge firewall combining IPS, ATP, URL filtering, WAF, rich reporting and more
+1
Applicable to:
Azure Applications
46 out of 60
CCN Basic Level Compliant Red Hat Enterprise Linux (RHEL 9)FoundationHardened and preconfigured to meet CCN Basic Level compliance for public sector and low-sensitivity information systems by Foundation Security.
+1
Applicable to:
Virtual Machines
47 out of 60
Red Hat Enterprise Linux 9.4 AMI – Hardened to Level 1 BenchmarkSedetos Global Solutions, IncDeploy Red Hat Enterprise Linux 9.4 easily on Azure - secure, compliant, and ready to use. Pay-as-you-go pricing with zero commitment.
+1
Applicable to:
Virtual Machines
48 out of 60
HIPAA Hardened Red Hat Enterprise Linux 9.5 AMISedetos Global Solutions, IncRed Hat Enterprise Linux 9.5, pre-configured and hardened to support HIPAA compliance requirements.
+1
Applicable to:
Virtual Machines
49 out of 60
Core for Windows Server 2025Cloud Infrastructure ServicesCore for Windows Server 2025 offers latest security features, minimal OS, less disk space, faster, secure.
+1
Applicable to:
Virtual Machines
50 out of 60
NuHarbor’s MDR for Microsoft DefenderNuharbor Security Inc.24/7 expert-led MDR using Microsoft Defender to cut noise and stop threats faster.
+1
Applicable to:
SaaS
51 out of 60
Clarity Cyber PlatformQuorum CyberLearn why organizations trust Quorum Cyber to help them reduce risk and build cyber resiliency
+1
Applicable to:
SaaS
52 out of 60
CloudMaster Cloud ManagementSoftline TradeCloudMaster Сloud Management Platform
+1
Applicable to:
Azure Applications
53 out of 60
VirtualMetric DataStreamVirtualMetricSecurity Telemetry Pipeline for Microsoft, seamless integration with Sentinel, ADX and Blob Storage
+1
Applicable to:
SaaS
54 out of 60
Progress ChefProgress Software CorporationConfigure, deploy and manage your entire application infrastructure in a secure and compliant way
+1
Applicable to:
SaaS
55 out of 60
Morphisec Threat PreventionMorphisecPrevention-first security that stops the most advanced and disruptive attacks that others don't
+1
Applicable to:
SaaS
56 out of 60
NetApp Intelligent ServicesNetAppGet best-in-class data protection and security for your workloads running on NetApp® ONTAP® storage.
+1
Applicable to:
SaaS
57 out of 60
CMMC Maturity Level 3 Managed ProgramArdalystArdalyst’s CMMC Level 3 Managed Compliance Programs combine a variety of services into a single cost-effective, comprehensive program to help you achieve and maintain regulatory compliance and develop a strong cyber defense for your organization.
+1
Applicable to:
Managed Services
58 out of 60
CCN Intermediate Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet CCN Intermediate Level compliance for government and public sector systems handling sensitive information.
+1
Applicable to:
Virtual Machines
59 out of 60
FortiNAC Secure Network Access ControlFortinetFortiNAC Secure Network Access Control
+1
Applicable to:
Azure Applications
60 out of 60