Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Active Directory DC 2025Cloud Infrastructure ServicesDeploy Active Directory 2025 domain services and DNS to your servers, users & applications in Azure.
+1
Applicable to:
Virtual Machines
1 out of 60
Fellowmind Managed Platform for XDRFellowmind Denmark A/SWith Fellowmind Managed Platform for XDR you can focus on your core business, relying on our managed service to, detect and respond to security incidents in your environments, using Microsoft Sentinel & Microsoft Defender XDR.
+1
Applicable to:
Managed Services
2 out of 60
CentOS 10Ntegral Inc.CentOS, CentOS 10, CentOS Stream 10 – Azure-Optimized Linux VM by Ntegral Inc. | RHEL-Compatible, Hardened & Cloud-Ready
+1
Applicable to:
Virtual Machines
3 out of 60
Socitas TelemetrySocitas GmbH & Co. KGMonitor Business Central performance, security, and system health with SOCITAS Telemetry.
+1
Applicable to:
Business Central
4 out of 60
CrowdSeckCloudHub LLCVersion 1.4.6 + Free Support on Debian 13
+1
Applicable to:
Virtual Machines
5 out of 60
Device Troubleshooterglueckkanja AGDiagnoses and resolves Microsoft Intune configuration issues and device compliance problems.
+1
Applicable to:
SaaS
6 out of 60
Alma Linux-9-level-1Sedetos Global Solutions, IncEnterprise-Hardened Alma Linux-9-level-1 for Mission-Critical Workloads
+1
Applicable to:
Virtual Machines
7 out of 60
CSNode BitcoinCore MainnetCoinsell IncBitcoinCore Mainnet Private Node
+1
Applicable to:
Containers
8 out of 60
CipherTrust Cloud Key Manager v1.10.1Thales eSecurityMulti-Cloud Encryption Key Lifecycle Management
+1
Applicable to:
Virtual Machines
9 out of 60
Node.js LTS on Red Hat Enterprise Linux 10 – Secure Azure Cloud WorkstationMadarson It, LLCNext-generation Node.js LTS environment on Red Hat Enterprise Linux 10, secured and optimized for Azure.
+1
Applicable to:
Virtual Machines
10 out of 60
ClipTrainingClipTrainingOne Platform to build confident, secure and compliant Teams.
+1
Applicable to:
SaaS
11 out of 60
UBIKA WAAP CloudUBIKAWant proactive protection for your web applications and web services?
+1
Applicable to:
Virtual Machines
12 out of 60
DynTek Managed Services - Threat Protection with SIEM and XDRDynTek Inc.Leveraging the power of Microsoft Sentinel and XDR, DynTek's managed service automates security detection and response and provides Advanced Threat Intelligence, Threat Hunting, Analytics, Monitoring and Alerting, and Proactive Threat Response.
+1
Applicable to:
Managed Services
13 out of 60
Ezovion Digital Health CareEzovion Solutions Private LimitedDigitally transform your hospital or clinic with Ezovion’s suite of healthcare software solutions
+1
Applicable to:
Azure Applications
14 out of 60
G DATA Management ServerG DATA Software AGIT Security as a Managed Service: As a service partner, manage your customers’ clients in the cloud.
+1
Applicable to:
Virtual Machines
15 out of 60
Smarter SaaS 365The Business Software CentreSmarter SaaS 365: Optimize, secure, and enhance Microsoft 365 environments
+1
Applicable to:
SaaS
16 out of 60
CipherTrust Cloud Key Manager v1.10.0Thales eSecurityMulti-Cloud Encryption Key Lifecycle Management
+1
Applicable to:
Virtual Machines
17 out of 60
Bluebox Controlled Document Management Solution (Plans - Per User)BlueBox SolutionsThe Premier Solution for Controlled Document Compliance and Quality. It’s time to take control!
+1
Applicable to:
SaaS
18 out of 60
User Specific Field RestrictionsAddend Analytics LLPUser specific field restrictions app allows Admin users to control field access for individual users
+1
Applicable to:
Business Central
19 out of 60
CipherTrust Cloud Key Manager v1.9.0Thales eSecurityMulti-Cloud Encryption Key Lifecycle Management
+1
Applicable to:
Virtual Machines
20 out of 60
CipherTrust Cloud Key Manager v1.10.2Thales eSecurityMulti-Cloud Encryption Key Lifecycle Management
+1
Applicable to:
Virtual Machines
21 out of 60
InDexDexterity DigitalInDex is the easiest way to modernise and extract insights from your business documents.
+1
Applicable to:
SaaS
22 out of 60
Case Management SystemSourceworxTransform Your Case Management with Sourceworx
+1
Applicable to:
SaaS
23 out of 60
Keyfactor Command for IoTKeyfactor, Inc.Command for IoT allows manufacturers to build high-assurance identity throughout a device lifecycle
+1
Applicable to:
SaaS
24 out of 60
ID-REDACT®Data Safeguard IncID-REDACT® is built using hand coded AI models to redact PII data from all data environments.
+1
Applicable to:
SaaS
25 out of 60
HCLTech uMDRHCL America Inc_HCLTHCLTech's uMDR (Unified Managed Detection and Response) is a managed services that leverages our best-in-class CSFC Fusion platform to maximize the value and effectiveness of our customers SIEM investment by augmenting their IT security team
+1
Applicable to:
Managed Services
26 out of 60
Lynis on Ubuntu22.04LTSApps4Rent LLCLynis is an open-source security auditing tool designed for Linux and Unix-based systems.
+1
Applicable to:
Virtual Machines
27 out of 60
Barracuda CloudGen WAF for AzureBarracuda Networks, Inc.The most deployed WAF in public cloud.
+1
Applicable to:
Virtual Machines
28 out of 60
Managed ServicesSourceworxOptimise your business IT with our customized solutions
+1
Applicable to:
SaaS
29 out of 60
AskIAMIBM ConsultingRe-imagining Identity Governance in the Agentic AI World
+1
Applicable to:
SaaS
30 out of 60
Kali Linux 2025 for Cloud-Based Penetration Testing and Red TeamingSedetos Global Solutions, IncPre-configured Kali Linux environment designed for security professionals to conduct penetration testing, and vulnerability assessments
+1
Applicable to:
Virtual Machines
31 out of 60
Acknowledge for Read and Understood for SharePoint Online by SP Additions LtdSP Additions LtdConsolidates acknowledgement requests from Read and Understood for SharePoint Online (WA200007564)
+1
Applicable to:
SharePoint
32 out of 60
CSC Mux for Zscaler with PriCPA (model 4 and 8) ( ex CSC Mux (1.6 or 3.2 Gbps) for Zscaler (ZIA)) using Availability ZonesMaidenhead BridgeThe easiest way to connect to Zscaler (ZIA) and communicate private Cloud Workloads (PriCPA).
+1
Applicable to:
Azure Applications
33 out of 60
Lynis on Debian11Apps4Rent LLCLynis is an open-source security auditing tool designed for Linux and Unix-based systems.
+1
Applicable to:
Virtual Machines
34 out of 60
Sophos Factory RunnerRefactrSophos Factory Runner virtual machine deployment
+1
Applicable to:
Azure Applications
35 out of 60
IT & Cyber Risk ManagementMetricStream, Inc.Helps CISO’s protect against IT and Cyber threats and transform risk into a strategic advantage.
+1
Applicable to:
SaaS
36 out of 60
FastCollect from Archive360Archive360, LLCCompliant, secure, fast migration and onboarding of your data estates to Azure for 80+ data types
+1
Applicable to:
SaaS
37 out of 60
Lynis on OracleLinuxApps4Rent LLCLynis is an open-source security auditing tool designed for Linux and Unix-based systems.
+1
Applicable to:
Virtual Machines
38 out of 60
Onboarding Know-Your-Business (KYB)NEOCHECK S.L.Increase security and conversion rate with an automatic Onboarding Know Your Business (KYB).
+1
Applicable to:
SaaS
39 out of 60
Mega Hopex (per users)MEGA INTLIntegrated software solutions to help drive business and IT transformation
+1
Applicable to:
SaaS
40 out of 60
Rocky Linux 8.10Ntegral Inc.Rocky 8.10, CentOS 8, Rocky Linux 8.10 packaged by Ntegral Inc. optimized for production environments
+1
Applicable to:
Virtual Machines
41 out of 60
Onevinn MDR for IoT/OT as a ServiceOnevinn ABOnevinn MDR for IoT/OT automated incident response
+1
Applicable to:
SaaS
42 out of 60
Comtrade OMS4RMSComtrade System IntegrationOMS4RMS makes Microsoft’s AIP service more as it extends its functionality.
+1
Applicable to:
Azure Applications
43 out of 60
DenokCloudHub LLCVersion 2.5.6 + Free Support on Debian 13
+1
Applicable to:
Virtual Machines
44 out of 60
CSC Mux for Zscaler with PriCPA - (Models 4 and 8) (ex CSC Mux (1.6 or 3.2 Gbps) for Zscaler (ZIA)) using Availability Set.Maidenhead BridgeThe easiest way to connect to Zscaler (ZIA) and communicate private Cloud Workloads (PriCPA).
+1
Applicable to:
Azure Applications
45 out of 60
LinkShadow DSPM vSensorLINKSHADOW LIMITEDTo protect sensitive data, LinkShadow DSPM continuously scans and classifies data in real-time, adapting to ever-changing cloud environments.
+1
Applicable to:
Virtual Machines
46 out of 60
Advanced Hardened SecurePay Red Hat Enterprise Linux 9 Server - PCI DSSArmorbyteAzure-based VM pre-configured with SecurePay Hardened Red Hat Enterprise Linux 8 Server -PCI DSS, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
47 out of 60
Advanced Hardened SecurePay Red Hat Enterprise Linux 9 Server - PCI DSSArmorbyteAzure-based VM pre-configured with SecurePay Hardened Red Hat Enterprise Linux 9 Server -PCI DSS, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
48 out of 60
Advanced Hardened Ultrasecure Ubuntu 24.04 LTS ServerArmorbyteAzure-based VM pre-configured with Ultrasecure Hardened Ubuntu 24.04 LTS Server, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
49 out of 60
Advanced Hardened SecureStart Ubuntu 22.04 LTS ServerArmorbyteAzure-based VM pre-configured with SecureStart Hardened Ubuntu 22.04 LTS Server, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
50 out of 60
UBIKA WAAP Cloud (previous versions)UBIKAWant proactive protection for your web applications and web services?
+1
Applicable to:
Virtual Machines
51 out of 60
Infoblox NIOS 8.6.3 for DDI (BYOL)InfobloxInfoblox DDI for Microsoft Azure and Hybrid Cloud Deployments
+1
Applicable to:
Azure Applications
52 out of 60
DNS Tool for Azure — DNS Monitoring & Health ValidationJust Software ApSMonitor Azure DNS zones and records with 42 automated health and security checks.
+1
Applicable to:
SaaS
53 out of 60
Advanced Hardened SecureStart Red Hat Enterprise Linux 9 ServerArmorbyteAzure-based VM pre-configured with SecureStart Hardened Red Hat Enterprise Linux 9 Server, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
54 out of 60
Advanced Hardened UltraSecure Red Hat Enterprise Linux 10 ServerArmorbyteAzure-based VM pre-configured with UltraSecure Hardened Red Hat Enterprise Linux 10 Server, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
55 out of 60
Secure - Server 2022BISSaN TechnologySecurely built Windows Operating System with applied industry security standards & best practices.
+1
Applicable to:
Virtual Machines
56 out of 60
Lynis on RedHatApps4Rent LLCLynis is an open-source security auditing tool designed for Linux and Unix-based systems.
+1
Applicable to:
Virtual Machines
57 out of 60
Cryptshare ServerPointsharp GmbHCryptshare makes sure your data is protected at all points of risk from sender to recipient.
+1
Applicable to:
Azure Applications
OnyxiaOnyxia Cyber, Inc.Onyxia Cybersecurity Management Platform
+1
Applicable to:
SaaS
59 out of 60
Advanced Hardened UltraSecure Red Hat Enterprise Linux 8 ServerArmorbyteAzure-based VM pre-configured with UltraSecure Hardened Red Hat Enterprise Linux 8 Server, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
60 out of 60