Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Analytics 365 Call Recording with Conversation Analytics for Microsoft TeamsTollringCompliance call recording with evaluation, transcription, keyword and sentiment analysis.
+1
Applicable to:
SaaS
1 out of 60
CDW Managed Service for Defender XDR and Microsoft SentinelCDWIn today's evolving threat landscape, safeguarding data is crucial. CDW's Managed Security Services for Defender XDR and Sentinel offer robust threat detection, security insights, and rapid response to enhance your IT risk management strategy.
+1
Applicable to:
Managed Services
2 out of 60
NIST Compliant Red Hat Enterprise Linux 8FoundationThis VM of Red Hat Enterprise Linux 8 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance
+1
Applicable to:
Virtual Machines
3 out of 60
NIST Compliant Rocky Linux 9FoundationThis VM of Rocky Linux 9 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance.
+1
Applicable to:
Virtual Machines
4 out of 60
HIPAA Compliant Red Hat Enterprise Linux 9FoundationThis VM of Red Hat Enterprise Linux 9 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet HIPAA compliance.
+1
Applicable to:
Virtual Machines
5 out of 60
HIPAA Compliant Rocky Linux 9FoundationThis VM of Rocky Linux 9 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet HIPAA compliance.
+1
Applicable to:
Virtual Machines
6 out of 60
Archive360 Unified Data Governance for AzureArchive360, LLC
Modern Archiving & Data Governance at Scale
+1
Applicable to:
SaaS
7 out of 60
FY24_ManagedServices_Security as a Service on AzureIFI TechsolutionsRobust Managed security-as-a-service. Safeguard assets with Azure's native solutions for seamless protection and compliance
+1
Applicable to:
Managed Services
8 out of 60
Auralytik Facial Biometry ValidationPintor ProjectFacial biometrics improve security, reduce fraud, and streamline verification.
+1
Applicable to:
SaaS
9 out of 60
ThreatConnectRQThreatConnectRQ quantifies cyber risk in financial terms to aid in prioritizing security investments by their ROI
+1
Applicable to:
SaaS
10 out of 60
NIST Compliant Red Hat Enterprise Linux 7FoundationThis VM of Red Hat Enterprise Linux 7 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance
+1
Applicable to:
Virtual Machines
11 out of 60
HIPAA Compliant Red Hat Enterprise Linux 8FoundationThis VM of Red Hat Enterprise Linux 8 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet HIPAA compliance.
+1
Applicable to:
Virtual Machines
12 out of 60
Cohesity NetBackup™ - BYOLCohesity IncInstantly access unified Enterprise Data Protection in Microsoft Azure and set it up your way.
+1
Applicable to:
Azure Applications
13 out of 60
HIPAA Compliant Rocky Linux 8FoundationThis VM of Rocky Linux 8 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet HIPAA compliance.
+1
Applicable to:
Virtual Machines
14 out of 60
ACSC Essential Eight Compliant Rocky Linux 8FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
15 out of 60
Sega DefenseSEGA S.A.SEGA Defense is the cloud SOC that helps you to detect, identify and responses on security and threats issues, related to your cloud resources and services.
+1
Applicable to:
Managed Services
16 out of 60
NIST Compliant Rocky Linux 8FoundationThis VM of Rocky Linux 8 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance
+1
Applicable to:
Virtual Machines
17 out of 60
NIST Compliant Red Hat Enterprise Linux 9FoundationThis VM of Red Hat Enterprise Linux 9 is preconfigured and hardened with over 500+ security controls by Foundation Security to meet NIST compliance
+1
Applicable to:
Virtual Machines
18 out of 60
Wipro Sensitive Data Protection with D365 F&OWipro LtdThis solution helps to protect and restrict the access of sensitive data to authorized users.
+3
Applicable to:
Operations
Finance
Human Resources
19 out of 60
Wault PlatformWymsical INCGDPR compliant and speedy remote onboarding for HR with privacy, data control and security.
+1
Applicable to:
SaaS
20 out of 60
Tecala Azure LighthouseTecalaManaged Azure services delivered via Azure Lighthouse, enabling secure delegated access for governance, security, and operational management of customer Azure environments.
+1
Applicable to:
Managed Services
21 out of 60
Lenovo Cyber Resiliency as a Service BAULenovo SoftwareLenovo Cyber Resiliency as a Service (CRaaS) is a cutting-edge solution designed to bolster an organization's cybersecurity posture in this challenging landscape.
+1
Applicable to:
Managed Services
22 out of 60
Cloudtrio Bandit On Windows2019Cloudtrio SolutionsPreconfigured Windows Server 2019 VM with Python and Bandit security scanner for automated code security analysis, vulnerability detection.
+1
Applicable to:
Virtual Machines
23 out of 60
Oracle Linux 9Ntegral Inc.Oracle Linux, Oracle Linux 9, Oracle Linux Server 9 optimized for Azure by Ntegral Inc.
+1
Applicable to:
Virtual Machines
24 out of 60
MyPlatformMyPlatformAccelerate your Azure journey with MyPlatform: rapid, secure, cost-effective and evergreen
+1
Applicable to:
SaaS
25 out of 60
RH CCP Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
+1
Applicable to:
Virtual Machines
26 out of 60
RH CCP Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
+1
Applicable to:
Virtual Machines
27 out of 60
Universal Policy AdministratorOpenTextDelivers the Cloud Gateway and the Web based console for Universal Policy
+1
Applicable to:
SaaS
28 out of 60
Level 1 Hardened Ubuntu 20.04FoundationThis VM of Ubuntu 20.04 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet Level 1 compliance.
+1
Applicable to:
Virtual Machines
29 out of 60
Ubuntu_25_10Sedetos Global Solutions, IncUbuntu 25.10 Hardened for Secure Enterprise and Cloud Workloads
+1
Applicable to:
Virtual Machines
30 out of 60
Isovalent Enterprise for CiliumIsovalent, Inc.This offer is exclusively for private offers only (available via custom pricing).
+1
Applicable to:
SaaS
31 out of 60
Digital Twin Builder for Smart BuildingsTPEX InternationalSmart Building Operations for best in class energy efficiency, tenants safety and ESG compliance
+1
Applicable to:
SaaS
32 out of 60
Hardened Ubuntu 25.10 Desktop Image with GUI|RDP AccessMadarson It, LLCAzure-based desktop featuring the latest Ubuntu 25.10 image, pre-configured with GUI/RDP access and hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
33 out of 60
Smart Bulk SMS EnterpriseImbaliCSEnterprise-grade bulk SMS webapp with AI-powered enhancements, compliance, secure Azure integration
+1
Applicable to:
SaaS
34 out of 60
Feitian Intune Coverage DashboardFEITIAN Technologies US, Inc.Monitor and verify enterprise-wide FIDO2 and Intune compliance coverage
+1
Applicable to:
SaaS
35 out of 60
5nine Smart Firewall for Azure5nine Software, Inc.Smart Firewall management, automation, and configuration
+1
Applicable to:
Virtual Machines
36 out of 60
Exobe Device InsightExobe ABThis report shows your device health over time.
+1
Applicable to:
Power BI apps
37 out of 60
FlyFreely Drone Management PlatformFlyFreelyFlyFreely Drone Management Platform for Operations, Compliance and Fleet Management
+1
Applicable to:
SaaS
38 out of 60
ImbaliCS Smart Bulk SMSImbaliCSEnterprise-grade bulk SMS webapp with AI-powered enhancements, compliance, secure Azure integration
+1
Applicable to:
SaaS
39 out of 60
ACSC Compliant Red Hat Enterprise Linux 7FoundationHardened and preconfigured to meet ACSC compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
40 out of 60
Meeco Personal Vault and Consent EngineMeeco Group Pty LtdInnovative Personal Data Management and Consent Solutions via the API-of-Me Platform
+1
Applicable to:
SaaS
41 out of 60
Netwrix 1Secure Identity Threat Detection and ResponseNetwrix CorporationUnify data security & identity protection across hybrid IT environments and speed incident response.
+1
Applicable to:
SaaS
42 out of 60
DIGITALL 24/7 SOC On AzureDIGITALL Nature Germany GmbHAccelerate Your Response Through Full Coverage, Threat Intelligence And Enhanced Security Service with DIGITALL Managed SOC Service
+1
Applicable to:
Managed Services
43 out of 60
Bitwarden Event LogsBitwarden Inc.Get insights into activity of your Bitwarden organization.
+1
Applicable to:
Azure Applications
44 out of 60
DigiCert ONEDigiCert, Inc.Manage all of your PKI use cases and workflows from a single pane of glass.
+1
Applicable to:
SaaS
45 out of 60
FundingPlusCM Inc.Funds, Grants and Contribution, Compliance and Management System for Public and Private Sectors.
+1
Applicable to:
SaaS
46 out of 60
SharePoint to TeamDrive BackupTeamDrive SystemsAutomatically backup selected Outlook E-Mails and meeting recordings to the secure TeamDrive cloud
+1
Applicable to:
SaaS
Techtron Managed SentinelTechtron Computers (PTY) LTDEffective SIEM and SOAR solutions
+1
Applicable to:
SaaS
48 out of 60
Managed XDR with Microsoft Sentinel SIEM powered by AITAccountabilITCombine our 24x7 US-based Modern Security Operations Center with a Managed XDR service – powered by your own custom instance of Microsoft Sentinel and the world’s most advanced AI platform.
+1
Applicable to:
Managed Services
49 out of 60
Level 2 Hardened Rocky Linux 8FoundationThis VM of Rocky Linux 8 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet Level 2 compliance.
+1
Applicable to:
Virtual Machines
50 out of 60
AI Agent Document AnalyserCompusoft_Stratgyk USAutomate, Analyse, and Assure Compliance with AI-Powered Document Intelligence
+1
Applicable to:
SaaS
51 out of 60
Intapp WallsIntappControl and secure access to critical information
+1
Applicable to:
SaaS
52 out of 60
Thales's Imperva DataSec Stack (for Private Offers Only)Imperva, Inc. (Private Offers)Comprehensive cybersecurity stack protecting data and all paths to it.
+1
Applicable to:
SaaS
53 out of 60
Akamai Guardicore SegmentationAkamai TechnologiesCloud and Data Center Visibility, micro-segmentation and breach detection
+1
Applicable to:
SaaS
54 out of 60
Azure LocalMicrosoftAzure Local extends Azure to your data center and edge, letting you run VMs, Kubernetes, and select Azure services on‑premises with cloud‑consistent management, security, and governance through Azure Arc and the Azure portal.
+1
Applicable to:
Azure Services
55 out of 60
Cloud InsightsInvictus Incident ResponseCloud Insights, provide actionable information on the security status of your Microsoft Cloud
+1
Applicable to:
SaaS
56 out of 60
RADNACcoreMem LimitedThe RADIUS based Network Access Control (RADNAC) service for Azure.
+1
Applicable to:
Azure Applications
57 out of 60
ESET PROTECT CompleteESETMulti-vector protection reducing attack surface
+1
Applicable to:
SaaS
58 out of 60
Enterprise ControlPwCReduce risks, automate controls and lower the cost of compliance
+1
Applicable to:
SaaS
59 out of 60
AutoIQ Report AgentParamount Computer Systems LLCAutoIQ Report Agent for Microsoft Security Copilot Accelerate SOC intelligence
+1
Applicable to:
SaaS
60 out of 60