Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Veeam App for Microsoft SentinelVeeamNext level real-time alerts, full visibility, automated security response.
+1
Applicable to:
Azure Applications
1 out of 60
PCI Compliant Rocky Linux 8FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
2 out of 60
PCI Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
3 out of 60
G&S Azure Lighthouse Managed ServicesG&S Gestión y SistemasG&S provides managed Azure services using Azure Lighthouse to monitor, govern, and secure customer environments. The service includes delegated access, proactive monitoring, policy-based governance, and continuous security posture management.
+1
Applicable to:
Managed Services
4 out of 60
JetStream AI Hub - VMJetStream Security IncJetStream Enterprise AI Visibility & Governance Platform
+1
Applicable to:
Virtual Machines
5 out of 60
ACSC Essential Eight Compliant Rocky Linux 9FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
6 out of 60
Manage 365IT Strategy SrlGovernance data and security of Microsoft Teams, SharePoint online, OneDrive
+1
Applicable to:
SaaS
7 out of 60
PCI Compliant Rocky Linux 9FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
8 out of 60
Mattermost, Collaboration for Mission-Critical Work (VM)MattermostStreamline mission-critical defense, security, intelligence, and infrastructure operations.
+1
Applicable to:
Azure Applications
9 out of 60
Expedite! for SAP on Azure Managed ServicesSecure-24Expedite! Secure-24 Managed SAP on Azure for enterprise clients running SAP, servicing all industries with the highest level of regulatory compliance. Secure-24 has over 18 years of experience delivering world-class SAP outsourcing services.
+1
Applicable to:
Managed Services
10 out of 60
Insights Program - PII AcceleratorEncompaaSThe PII Accelerator packages configuration to extend the functionality of EncompaaS
+1
Applicable to:
SaaS
11 out of 60
Managed Identity and Access (Zero Trust)ASAPCLOUDASAPCLOUDs Managed Identity and Access is a managed service of our Intelligent Security Services, providing a secure identity and access and is based on the Zero Trust approach and architecture.
+1
Applicable to:
Managed Services
12 out of 60
RegexFlow Azure Function for Regular ExpressionsEpicycle LimitedRegexFlow is a Regular Expression Azure Function designed to deliver a Regex Action in PowerAutomate
+1
Applicable to:
Azure Applications
13 out of 60
Jatheon ArchiveJatheon Technologies IncCloud archiving software solution for email, social media archiving.
+1
Applicable to:
Outlook
14 out of 60
Datacenter for Windows Server 2025Cloud Infrastructure ServicesDatacenter for Windows Server 2025 for Azure Cloud Server Deployments and Hybrid Server Environments.
+1
Applicable to:
Virtual Machines
15 out of 60
CNAPP as a ServiceCyberOneCyberOne’s CNAPP as a Service delivers 24x7x365 cloud security, compliance and threat protection across Azure, AWS and hybrid environments. Powered by Microsoft Defender for Cloud, it unifies CSPM, CWPP and DevSecOps into a single Managed Service.
+1
Applicable to:
Managed Services
16 out of 60
LeaseQuery for Dynamics 365 FinanceLeaseQuery, LLCEnterprise lease accounting compliance software that simplifies accounting for leases.
+1
Applicable to:
Operations
17 out of 60
CrowdSeckCloudHub LLCVersion 1.7.4 + Free Support on Ubuntu 24.04
+1
Applicable to:
Virtual Machines
18 out of 60
Entitlement Manager for MS Dynamics 365 (Trial)NextLabs, Inc.Policy-driven, granular access control to safeguard Dynamics 365 data and business transaction.
+2
Applicable to:
Sales
Field Service
19 out of 60
PCI Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
20 out of 60
Nessus-On-Ubuntu24-04LTSCloudtrio SolutionsPreconfigured Ubuntu 24.04 LTS VM with Nessus vulnerability scanner running in Docker for security assessment and compliance auditing.
+1
Applicable to:
Virtual Machines
21 out of 60
Ubuntu Pro Minimal 20.04 LTSCanonicalMinimal Ubuntu Pro for automated deployments. Enterprise security (Livepatch, ESM), long-term maintenance; add only what you need.
+1
Applicable to:
Virtual Machines
22 out of 60
DeskproDeskproDeliver exceptional customer support with Deskpro’s flexible and dynamic helpdesk software
+1
Applicable to:
Virtual Machines
23 out of 60
Recovery Vault: Protect Your Azure InfrastructureRecovery VaultBusiness continuity by safeguarding your infra with automated backups and scenario-based recovery
+1
Applicable to:
Azure Applications
24 out of 60
Ubuntu 26.04 Preview - Level 2 Hardened Server (Development Branch)Madarson It, LLCUbuntu 26.04 Resolute Raccoon server (development preview) with Level 2 maximum security hardening for high-compliance cloud infrastructure.
+1
Applicable to:
Virtual Machines
25 out of 60
PCI Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
+1
Applicable to:
Virtual Machines
26 out of 60
Asavie ModaASAVIE TECHNOLOGIES LIMITEDAsavie Moda is a clientless network-based, enterprise mobility service for cellular devices
+1
Applicable to:
SaaS
27 out of 60
STIG Compliant Rocky Linux 9FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
28 out of 60
DefenderINSIGHTTech Mahindra LimitedDefenderINSIGHT is TechM’ s offering for multi-cloud security with a set of security measures designed to protect cloud-based applications from various cyber threats and vulnerabilities based on Microsoft Defender for Cloud (MDC) native capabilities.
+1
Applicable to:
Managed Services
29 out of 60
CJIS Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
+1
Applicable to:
Virtual Machines
30 out of 60
GRC Management SolutionABE Risk SolutionsA modern, comprehensive platform designed to simplify how organisations manage governance initiative
+1
Applicable to:
SaaS
31 out of 60
Transaction Monitoring (TM)NEOCHECK S.L.Compliance with Anti Money Laundering regulations for financial entities
+1
Applicable to:
SaaS
32 out of 60
STIG Compliant Rocky Linux 8FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
33 out of 60
CJIS Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
+1
Applicable to:
Virtual Machines
34 out of 60
OSSEC HIDS AgentkCloudHub LLCVersion 4.0.0 + Free Support on Ubuntu 24.04
+1
Applicable to:
Virtual Machines
35 out of 60
Upstream AutoThreat PROUpstream Security LTDThe first cyber-threat intelligence for the automotive industry
+1
Applicable to:
SaaS
36 out of 60
Red Hat Enterprise Linux (RHEL) 8.10CloudVoultRHEL 8.10 – Enterprise-grade Linux, preloaded on Azure VM for smooth, hassle-free deployment. Packaged by Cloudvoult
+1
Applicable to:
Virtual Machines
37 out of 60
Zivver: Secure Email & File TransferZIVVER B.V.Email Security Made Effortless
+1
Applicable to:
SaaS
38 out of 60
ZL UAZL Technologies, Inc.Enabling the Enterprise to Manage Unstructured Data for Governance Requirements and Analytics
+1
Applicable to:
SaaS
39 out of 60
Gerenciamento Unificado de DispositivosCloud TargetDispositivos Gerenciados e Protegidos 24 horas por dia, 7 dias por semana.
+1
Applicable to:
SaaS
40 out of 60
BlueCat DNS Edge Service PointBlueCat NetworksDeploy any number of BlueCat Edge Service Points sharing the same configuration.
+1
Applicable to:
Virtual Machines
41 out of 60
Fortinet Zero Trust Network Access (ZTNA) Application GatewayFortinetFortinet's Universal Zero Trust Network Access (ZTNA) Application Gateway
+1
Applicable to:
Azure Applications
42 out of 60
Red Hat Enterprise Linux 9.7 Level 2 Hardened for Secure Enterprise and Regulated WorkloadsSedetos Global Solutions, IncPre-hardened RHEL 9.7 aligned with Level 2 baseline security controls, enabling organizations to deploy highly secure and production-ready
+1
Applicable to:
Virtual Machines
43 out of 60
Maturity Model For Event Log Management M2131Microsoft Sentinel, Microsoft CorporationMaturity Model For Event Log Management M2131
+1
Applicable to:
Azure Applications
44 out of 60
PMXChainEagle PMX AGBlockchain Security Encryption
+1
Applicable to:
SaaS
45 out of 60
Selefra CloudSelefra, Inc.AI-Copilot policy-as-code SaaS to empower your Infra Insights.
+1
Applicable to:
SaaS
46 out of 60
STIG Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
+1
Applicable to:
Virtual Machines
47 out of 60
Ubuntu 24.04 LTS Enterprise Container on Azure Kubernetes ServiceDerek Coleman & Associates CorporationDeploy a production-grade, CIS-hardened Ubuntu 24.04 LTS container on AKS. Enterprise security
+1
Applicable to:
Containers
48 out of 60
AlbertRiot IncThe cybersecurity companion that drives better security in your team.
+1
Applicable to:
Teams
49 out of 60
CloudAtlas SupervisorUnifyCloud LLCMonitoring, reporting and management of critical business operations across all Azure subscriptions.
+1
Applicable to:
SaaS
50 out of 60
Hardened Ubuntu 25.04 Desktop Image with GUI|RDPMadarson It, LLCAzure-based desktop featuring the latest Ubuntu 25.04 image, pre-configured with GUI/RDP access and hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
51 out of 60
QualizerLEONARDO S.P.A.devsecops secure by design
+1
Applicable to:
SaaS
52 out of 60
HCLTech Secure Multi Cloud SolutionHCL America Inc_HCLTA comprehensive solution for protecting your business assets across diverse cloud environments
+1
Applicable to:
SaaS
53 out of 60
Netwrix 1SecureNetwrix CorporationNetwrix 1Secure is a SaaS-based, multi-tenant, security, audit and risk assessment solution.
+1
Applicable to:
SaaS
54 out of 60
Quzara MDR for Microsoft SentinelQuzara LLCSIEM co-management service for regulated and compliance-focused industries.
+1
Applicable to:
SaaS
55 out of 60
Bloomberg DataParser17a-4 LLCConnector software to collect Bloomberg terminal chats, IBs and files for archiving or eDiscovery.
+1
Applicable to:
SaaS
56 out of 60
SureCloud - North AmericaSureCloudReceive & respond to SureCloud notifications within Microsoft Teams
+1
Applicable to:
Teams
57 out of 60
FortiEDR as a ServiceFirstNet Technology ServicesFortiEDR: Advanced endpoint security.
+1
Applicable to:
SaaS
58 out of 60
GoAnywhere Gateway for LinuxFortraGoAnywhere MFT’s Gateway helps keep your sensitive files out of the DMZ, while protecting the private network
+1
Applicable to:
Virtual Machines
59 out of 60
Soteria Inspect for 365 (Contact Me)Soteria LLC.Automated SaaS security posture management identifies areas of risk and misconfiguration
+1
Applicable to:
SaaS
60 out of 60