Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Caju AICaju AICaju AI enables engagement for unified communications, compliance and insights.
+1
Applicable to:
Teams
1 out of 60
Check Point CloudGuard CNAPP (Microsoft Entra ID)Check PointAutomate security, compliance, and risk management across your cloud environments. CloudGuard Cloud-Native Application Protection Platform (CNAPP), offers comprehensive end-to-end security solution.
+1
Applicable to:
Entra ID Apps
2 out of 60
Secure Score Optimiser for Microsoft365GijimaAssess, improve, and maintain Microsoft 365 Secure Score with a tiered commercial model
+1
Applicable to:
SaaS
3 out of 60
Mattermost, Collaboration for Mission-Critical WorkMattermostStreamline mission-critical defense, security, intelligence, and infrastructure operations.
+1
Applicable to:
Containers
4 out of 60
XQ Zero Trust Data VaultXQ Message, Inc.Cloud-based zero trust data access that encapsulates your data and delivers object level security
+1
Applicable to:
SaaS
5 out of 60
SaaS Dataguise Data Discovery + ProtectionDataguise Inc.Personal data discovery and protection – OnDemand SaaS for all of your Cloud Data.
+1
Applicable to:
SaaS
6 out of 60
F5 BIG-IQ Virtual Edition (BYOL)F5, Inc.Dedicated, right-sized, and secure application services, with per-app manageability and analytics.
+1
Applicable to:
Virtual Machines
7 out of 60
Agent Autonomous OpsXenonStackAutomate Azure operations with AI agents for FinOps, SRE, Compliance, and DevOps.
+1
Applicable to:
SaaS
8 out of 60
Accenture Adaptive MxDR for MicrosoftAccentureMicrosoft native adaptive MxDR with Accenture expertise, threat intel, and automation.
+1
Applicable to:
SaaS
9 out of 60
HP MFD with Microsoft Universal PrintDATASEC SOLUTIONS PTY LTDUniversal Print: Where Security Meets Scalability
+1
Applicable to:
SaaS
10 out of 60
HIPAA Compliant Red Hat Enterprise Linux 7FoundationHardened and preconfigured to meet HIPAA compliance for healthcare organizations and their business associates by Foundation Security.
+1
Applicable to:
Virtual Machines
11 out of 60
Secure Ubuntu 24 Wazuh SIEM Server (Hardened & Auto-Protected)DESERTBYTE LTD.Secure Ubuntu 24 with Wazuh SIEM pre-installed, hardened with firewall, fail2ban, and auto-updates. Ready for enterprise security monitoring.
+1
Applicable to:
Virtual Machines
12 out of 60
OptaFi-EMR on AzureOptafi LLC,.Healthcare Cloud Security Framework - Zero Trust, Micro segmented infrastructure as Code
+1
Applicable to:
SaaS
13 out of 60
CIS Level 2 Hardened Ubuntu 20.04FoundationThis VM of Ubuntu 20.04 is preconfigured and hardened with over 200+ security controls by Foundation Security to meet CIS Level 2 compliance.
+1
Applicable to:
Virtual Machines
14 out of 60
DTX MXDR op basis van Microsoft Defender en Microsoft SentinelDTXDTX MXDR op basis van Microsoft Defender en Microsoft Sentinel is een volledig Nederlandse Managed Service op basis van de laatste stand van de techniek. Maakt gebruik van de nieuwe Microsoft data lake architectuur om Azure kosten te beteugelen.
+1
Applicable to:
Managed Services
15 out of 60
SATT PLATFORM: Track & Trace Solution for PharmaSoftGroupEnterprise-Grade Serialization, Aggregation and Compliance powered by Microsoft Azure
+1
Applicable to:
SaaS
16 out of 60
Cloud4Cs MDR for Microsoft Defender for Endpoint OfferingCloud4C Services Pte LtdCloud4C’s MDR for Microsoft Defender for Endpoint strengthens device security with 24x7 monitoring, rapid threat response, and automated recovery to reduce risks and ensure business continuity
+1
Applicable to:
Managed Services
17 out of 60
Kosai Secure Open Source SoftwareKosaiKosai provides secure, curated open-source software dependencies with long-term support and security
+1
Applicable to:
SaaS
18 out of 60
Application Access GovernancePathlock, Inc.IT and security teams can make use of AAG’s automation and analysis to guard against risks
+1
Applicable to:
SaaS
19 out of 60
Advanced User ManagementRUX SoftwareA More Granular Approach to Business Central Security and Permissions
+1
Applicable to:
Business Central
20 out of 60
Digital Factory | Digital LogbookSupply Chain WizardDigitize paper-based logbooks and forms while complying to GMP.
+1
Applicable to:
SaaS
21 out of 60
LAMP Stack On Hardened Ubuntu 24.04 LTS - Production Ready Web ServerSedetos Global Solutions, IncPre-configured LAMP stack (Linux, Apache, MySQL, PHP) on Hardened Ubuntu 24.04 LTS with optimized settings.
+1
Applicable to:
Virtual Machines
22 out of 60
XBOW Pentest Analysis AgentXBOWAnalyze XBOW penetration test results and identify detection gaps using Microsoft Sentinel telemetry
+1
Applicable to:
SaaS
23 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 9 (RHEL 9)FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
24 out of 60
ANSSI Intermediary Level Compliant Rocky Linux 9FoundationThis VM of Rocky Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI Intermediary Level compliance.
+1
Applicable to:
Virtual Machines
25 out of 60
Abacode 24/7 Monitoring in GovernmentAbacode Inc.Elevate government security with Abacode's Government-Centric 24/7/365 SOC Managed Service. Our dedicated team of US-based cybersecurity experts, fueled by Microsoft Azure Sentinel's cutting-edge technology, provide real-time threat visibility.
+1
Applicable to:
Managed Services
26 out of 60
Tehama Data EnclaveTehama TechnologiesAll-in-one data enclave and cyber platform for security, data and AI governance
+1
Applicable to:
SaaS
27 out of 60
nLyze® Trustworthy Ai Hub - InternalnLyzeRHost your nLyze® Ai services for internal users with maximum privacy and compliance
+1
Applicable to:
SaaS
28 out of 60
Advanced User Management (USA/CAN)RUX SoftwareA More Granular Approach to Business Central Security and Permissions
+1
Applicable to:
Business Central
29 out of 60
AI-Based Automated Threat Modeling - AribotAristiun B.V.Perform Automated threat modeling based on AI to create traceable security requirements
+1
Applicable to:
SaaS
30 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
+1
Applicable to:
Virtual Machines
31 out of 60
ANSSI High Level Compliant Red Hat Enterprise Linux 9FoundationThis VM of Red Hat Enterprise Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI High Level compliance.
+1
Applicable to:
Virtual Machines
32 out of 60
ANSSI High Level Compliant Rocky Linux 9FoundationThis VM of Rocky Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI High Level compliance.
+1
Applicable to:
Virtual Machines
33 out of 60
ANSSI Enhanced Level Compliant Oracle Linux 9FoundationThis VM of Oracle Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI Enhanced Level compliance.
+1
Applicable to:
Virtual Machines
34 out of 60
Artemis Intelligence AI, Can!Artemis IndustriesAzure Managed Application that deploys secure, MCP-aligned, production-grade AI agent infrastructure
+1
Applicable to:
Azure Applications
35 out of 60
ANSSI Enhanced Level Compliant Red Hat Enterprise Linux 9FoundationThis VM of Red Hat Enterprise Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI Enhanced Level compliance
+1
Applicable to:
Virtual Machines
36 out of 60
ANSSI Intermediary Level Compliant Oracle Linux 9FoundationThis VM of Oracle Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI Intermediary Level compliance.
+1
Applicable to:
Virtual Machines
37 out of 60
Credo AI - Enterprise AI GovernanceCredo AIEliminate friction and embed AI governance directly into developer workflows
+1
Applicable to:
SaaS
38 out of 60
Tanium Inc Cloud ApplianceTanium IncAutonomous Endpoint Management: Real-time visibility, control, and remediation of endpoints
+1
Applicable to:
Virtual Machines
39 out of 60
24X7 Managed SIEM & XDRCanon Business Services ANZProtect Your Business with Microsoft’s AI-Powered Cybersecurity Defense. Modern cyber threats persistently exploit vulnerabilities across endpoints, networks, identities, and cloud
environments, making proactive, continuous defense essential.
+1
Applicable to:
Managed Services
40 out of 60
SentinelTrailsLogSentinelAll your logs, data and documents - protected by blockchain technology
+1
Applicable to:
SaaS
41 out of 60
eperi Cloud Data Protection for Office 365eperi GmbHEncrypt O365 eMails, calendars, chats, channels & files while retaining business functionalities
+1
Applicable to:
SaaS
42 out of 60
ANSSI Minimal Level Compliant Rocky Linux 9FoundationThis VM of Rocky Linux 9 is preconfigured with over 100+ security controls by Foundation Security to meet ANSSI Minimal Level compliance.
+1
Applicable to:
Virtual Machines
43 out of 60
Developmenthub ICT AuditDevelopmenthubA comprehensive ICT audit that assesses software, systems, and processes to ensure compliance, security, efficiency, and operational excellence.
+1
Applicable to:
Virtual Machines
44 out of 60
Secure - Server 2019BISSaN TechnologySecurely built Windows Operating System with applied industry security standards & best practices.
+1
Applicable to:
Virtual Machines
45 out of 60
Torro.AI OneDataGlobal Technology Integrator Ltd.Advanced Automated Data Governance Solution
+1
Applicable to:
SaaS
46 out of 60
Kali LinuxNtegral Inc.Kali Linux formerly referred to as BackTrack Linux cloud-based desktop experience optimized for Azure by Ntegral Inc.
+1
Applicable to:
Virtual Machines
47 out of 60
Access ManagerXtbcInformation Security made simple in Microsoft Dynamics 365 Business Central
+1
Applicable to:
Business Central
48 out of 60
Enterprise for Windows 11ALSOURI LLCEnterprise for Windows 11 VM offers advanced security, efficient device management, and basic multi-user functionality for small to medium businesses.
+1
Applicable to:
Virtual Machines
49 out of 60
Paramount SOCGenie AI - SOCaaSParamount Computer Systems LLCParamount SOCGenie AI – 24×7 managed security operations powered by Microsoft Sentinel, XDR, and Security Copilot. Silver, Gold, and Platinum tiers scale from SMBs to enterprises with 25 GB to unlimited ingestion.
+1
Applicable to:
Managed Services
50 out of 60
Confidential Computing: Encrypted Azure Virtual Machines with enclaive Virtual HSM and Utimaco GP HSM (Azure HYOK)Utimaco IS GmbHProtect sensitive data using encrypted VMs and robust hardware security modules.
+1
Applicable to:
SaaS
51 out of 60
HIPAA Hardened Red Hat Enterprise Linux 9.6 AMISedetos Global Solutions, IncRed Hat Enterprise Linux 9.6, pre-configured and hardened to support HIPAA compliance requirements.
+1
Applicable to:
Virtual Machines
52 out of 60
Tripwire EnterpriseTripwireTripwire® Enterprise is the leading compliance monitoring solution, using file integrity monitoring (FIM) and security configuration management (SCM).
+1
Applicable to:
Entra ID Apps
53 out of 60
Sophos Factory RunnerRefactrSophos Factory Runner virtual machine deployment
+1
Applicable to:
Azure Applications
54 out of 60
RexCommandRecordPointRexCommand helps organizations govern and discover AI systems throughout their lifecycle
+1
Applicable to:
SaaS
55 out of 60
AI-Powered Enterprise Reporting with Immutable Audit TrailsDynamicLedger SolutionsAzure-native compliance reporting with verifiable data provenance
+1
Applicable to:
SaaS
56 out of 60
Onevinn Cybersecurity as a ServiceOnevinn ABExpert-driven cybersecurity solutions designed to ensure business continuity and resilience.
+1
Applicable to:
SaaS
57 out of 60
Ubuntu 25.10 for Enterprise, Development, and Cloud EnvironmentsSedetos Global Solutions, IncPre-configured Ubuntu image enabling fast and efficient deployment of modern Linux workloads across cloud environments.
+1
Applicable to:
Virtual Machines
58 out of 60
DataBridgeBAE Systems Digital Intelligence LtdDataBridge delivers high performance lawful intercept (LI) capability to fixed, mobile and satellite
+1
Applicable to:
SaaS
59 out of 60
Ubuntu 26.04 Preview - Level 1 Hardened Server (Development Branch)Madarson It, LLCUbuntu 26.04 Resolute Raccoon server (development preview) with Level 1 security hardening for cloud workloads and infrastructure.
+1
Applicable to:
Virtual Machines
60 out of 60