Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Check Point Security SolutionsCheck PointProtect your enterprise IT with a true AI-powered, cloud-delivered platform
+1
Applicable to:
SaaS
1 out of 60
Enterprise Generative AI Security HubAdd Value MachineMeet your compliance and security needs with AddValueMachine’s Enterprise Generative AI Security Hub
+1
Applicable to:
SaaS
2 out of 60
Cloud-Optimized Security-Hardened Image for Microsoft Windows Server 2022 – Level 2 ComplianceMadarson It, LLCAzure-based VM pre-configured with Microsoft Windows Server 2022 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
3 out of 60
Audit and Security ManagerArgano LLCEnsure compliance standards, reduce management complexity and increase the security of your systems
+3
Applicable to:
Supply Chain Management
Operations
Finance
4 out of 60
Cloud-Optimized Security-Hardened Image for Microsoft Windows Server 2019 – Level 2 ComplianceMadarson It, LLCAzure-based VM pre-configured with the latest Microsoft Windows Server 2019 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
5 out of 60
OPSWAT MetaDefender Storage SecurityOPSWAT, Inc.MetaDefender Storage Security offers a robust layer of protection for On-Prem and Cloud Storage.
+1
Applicable to:
Virtual Machines
6 out of 60
Security Guardian AuditQuestReal-time identity auditing and compliance for Active Directory and Entra ID.
+1
Applicable to:
SaaS
7 out of 60
Ubuntu 22.04 LTS Security HardenedSolve DevOpsEnterprise-grade Ubuntu 22.04 with pre-configured CIS Level 2 security controls. Deploy secure infrastructure in minutes, not days.
+1
Applicable to:
Virtual Machines
8 out of 60
Hardened Oracle Linux 10 VM optimized for advanced security and compliance.Madarson It, LLCAzure-based VM with Oracle Linux 10 Level 2 advanced hardening for high-security workloads.
+1
Applicable to:
Virtual Machines
9 out of 60
Entrust Cryptographic Security Platform Key & Secrets Vault BYOL (KeyControl)HyTrustkey lifecycle management with centralized visibility & decentralized storage to support applications across Azure
+1
Applicable to:
Virtual Machines
10 out of 60
Equixly API SecurityEquixly - API SecurityEquixly is an AI-Powered Hacker to Secure your API
+1
Applicable to:
SaaS
11 out of 60
Advanced Cybersecurity & ComplianceVirtuworksVirtuWorks delivers a managed cybersecurity service built for Azure. This offer includes advanced threat detection, real-time monitoring, compliance alignment, and proactive patching to protect your infrastructure.
+1
Applicable to:
Managed Services
12 out of 60
Synergist AFFIRM - AI Governance & ComplianceSynergist TechnologyWe are a leader in AI governance and compliance with cybersecurity, leveraging Zero Trust.
+1
Applicable to:
Virtual Machines
13 out of 60
CallCabinet Compliance Call Recording and AnalyticsCall Cabinet CorporationCallCabinet app for compliant video & call recording, analytics & automated QA
+1
Applicable to:
Teams
14 out of 60
Lepide Data Security PlatformLepide Software Pvt LtdData protection and compliance solution for visibility over key security states and changes in your critical data in on-premise and cloud environment
+1
Applicable to:
Virtual Machines
15 out of 60
Seconize DeRisk Center - Compliance Audit AutomationSeconizeStreamline and automate your cybersecurity compliance audits
+1
Applicable to:
SaaS
16 out of 60
Caldicot ComplianceSCG.WORLDCreate pre-configured meetings that comply with Caldicott security requirements
+1
Applicable to:
Teams
17 out of 60
FSProtect - Active Directory Security AssessmentForestall SecurityReveal Active Directory security posture before the attackers
+1
Applicable to:
SaaS
18 out of 60
Security Vulnerability Management SystemAppSec Application SecurityA centralized platform for management of security vulnerabilities from discovery to mitigation
+1
Applicable to:
SaaS
19 out of 60
Microsoft Security Operations CentreProvidence Software Solutions Pty LtdComprehensive tools for monitoring, detecting, and mitigating security risks.
+1
Applicable to:
SaaS
20 out of 60
App Compliance Automation Tool for Microsoft 365MicrosoftApp Compliance Automation Tool for Microsoft 365 is an application-centric compliance automation tool that helps you complete Microsoft 365 certification with greater ease and convenience.
+1
Applicable to:
Azure Services
21 out of 60
K2M Unified Security Center DashboardK2M Soluções Ltda.Unified Security Center provides a common place among Microsoft Security Products
+1
Applicable to:
Power BI apps
22 out of 60
E-Audit Compliance by AGIT Development CenterPT Astra Graphia Information TechnologyA system built to monitor risk management in compliance with government or internal regulations.
+1
Applicable to:
SaaS
23 out of 60
Clover SecurityClover Security Inc.Clover Security enables fast collaboration and timely replies to streamline your security reviews
+1
Applicable to:
Teams
24 out of 60
CloudGuard Code SecurityCheck PointCloudGuard Code Security is for detecting secrets,CVEs, and compliance violations.
+1
Applicable to:
SaaS
25 out of 60
SucceedLEARN Security Awareness TrainingSucceed Technologies Private LimitedSecurity Behaviour and Culture Suite part of SucceedLEARN’s broader compliance training platform.
+1
Applicable to:
SaaS
26 out of 60
Compliance Drift And Configuration DeviationPeople Tech Group IncDetects and prioritizes deviations from baseline configurations across Azure and managed endpoints.
+1
Applicable to:
SaaS
27 out of 60
Access Control Security TestsAppSec Application SecurityAccess Control Tests for QA teams and CISOs seeking targeted security testing for their products
+1
Applicable to:
SaaS
28 out of 60
tiogasecurity_autonomouscompliance_pciTioga SecurityTioga Security helps customers automate security controls for their cloud implementations.
+1
Applicable to:
SaaS
29 out of 60
SonicWall NSv (Firewall/Security/VPN/Router)-BYOLSonicWall IncNext-generation Virtual Firewall Series for Public Cloud Environments
+1
Applicable to:
Azure Applications
30 out of 60
IBM Security Guardium Data Protection and Vulnerability AssessmentIBM SoftwareMonitor data activity and accelerate compliance auditing and reporting for your data stored anywhere
+1
Applicable to:
SaaS
31 out of 60
Avanan Office 365 Email SecurityAvanan Inc.Advanced Anti-Phishing, Malware Protection, Account Compromise Detection, and Data Loss Prevention.
+1
Applicable to:
SaaS
32 out of 60
Cloud Security Assessment ToolCloud Infrastructure ServicesCSPM for Azure. Run Cloud Security Assessments, Monitoring & Compliance for CIS Benchmarks, ISO 27001, PCI 4.0, MITRE Attack
+1
Applicable to:
Virtual Machines
33 out of 60
EY Security Baseline DefinitionEY GlobalBroad security monitoring solution for industries
+1
Applicable to:
SaaS
34 out of 60
Managed Security 365 (SecAAS) for M365 and O365QualityHosting AGManaged Security 365 strengthens the security and compliance of your Microsoft cloud fully automated
+1
Applicable to:
SaaS
35 out of 60
Aiimi AI-Powered Privacy & ComplianceAiimiAutomated privacy and compliance software, powered by AI.
+1
Applicable to:
Azure Applications
36 out of 60
ARGOS Cloud Security for Azure, M365 & Entra ID AssessmentsARGOS Cloud Security Pty LtdCloud security for consultants: assess Azure, M365 & Entra ID in minutes with executive ready report
+1
Applicable to:
SaaS
37 out of 60
Modern cloud security assessments with ARGOSARGOS Cloud Security Pty LtdAssessing complex, cloud environments in minutes, not days
+1
Applicable to:
SaaS
38 out of 60
Velyana AI Security & GovernanceINNOBAYT SOLUTIONSSecurity and governance control plane for Enterprise AI
+1
Applicable to:
SaaS
39 out of 60
Healthcare Compliance - Book of EvidenceUS Medical ITProduce and track your HIPPA compliance efforts
+1
Applicable to:
SharePoint
40 out of 60
Guardicore Centra Security PlatformGuardiCoreCloud and Data Center Visibility, micro-segmentation and breach detection
+1
Applicable to:
Virtual Machines
41 out of 60
Transmit Security Data Connector for Microsoft SentinelTransmit Security LTDTransmit Security Data Connector for Microsoft Sentinel
+1
Applicable to:
Azure Applications
42 out of 60
Theta Lake Compliance Recording for Teams MeetingsTheta LakeRecording, archiving, compliance, and risk mitigation for Microsoft Teams audio and video meetings
+1
Applicable to:
SaaS
43 out of 60
Ubuntu 25.10 -- Hardened for DISA STIG ComplianceMadarson It, LLCAzure-based virtual machine featuring the latest Ubuntu 25.10 image, pre-configured and hardened to align with DISA STIG security benchmarks.
+1
Applicable to:
Virtual Machines
44 out of 60
Ubuntu 25.04 -- Hardened for DISA STIG ComplianceMadarson It, LLCAzure-based virtual machine featuring the latest Ubuntu 25.04 image, pre-configured and hardened to align with DISA STIG security benchmarks.
+1
Applicable to:
Virtual Machines
45 out of 60
Kali Linux - Cyber-security Penetration Testing ReadyALSOURI LLCGet Kali Linux 2025.4 Server and advanced cyber-security tools, perfect for penetration testing and ethical hacking.
+1
Applicable to:
Virtual Machines
46 out of 60
Prancer Cloud Security SolutionPrancer EnterprisePrancer provides end-to-end cloud security with AI-powered offensive and defensive testing
+1
Applicable to:
SaaS
47 out of 60
Sepia - Security SuiteSepia-PKSepia Solutions Security Suite is a one-stop Solution for your Cloud Environment
+1
Applicable to:
SaaS
48 out of 60
Cequence Security Unified API ProtectionCequence SecurityCequence Unified API Protection discovers, assesses and protects against API attacks.
+1
Applicable to:
SaaS
49 out of 60
NeuVector Container Security PlatformNeuVectorNeuVector Container Security Platform for Azure - Vulnerability management and run-time security
+1
Applicable to:
SaaS
50 out of 60
NIST 800-171 Managed Compliance ProgramArdalystArdalyst’s NIST 800-171 Managed Compliance Programs combine a variety of services into a single cost-effective, comprehensive program to help you achieve and maintain regulatory compliance and develop a strong cyber defense for your organization.
+1
Applicable to:
Managed Services
51 out of 60
CMMC Level 1 Managed Compliance ProgramArdalystArdalyst’s CMMC Level 1 Managed Compliance Programs combine a variety of services into a single cost-effective, comprehensive program to help you achieve and maintain regulatory compliance and develop a strong cyber defense for your organization.
+1
Applicable to:
Managed Services
52 out of 60
delaware smart securitydelawareaccelerate, manage and optimize security.
+5
Applicable to:
Commerce
Supply Chain Management
Operations
Project Operations
Human Resources
53 out of 60
Onevinn Data Security as a ServiceOnevinn ABStrategic data security services designed to ensure control, compliance, and clarity.
+1
Applicable to:
SaaS
54 out of 60
Forcepoint Email Security V8.5.7Forcepoint LLCAnalyzes and protects inbound and outbound Microsoft Exchange Online email.
+1
Applicable to:
Azure Applications
55 out of 60
CLAPS SecurityMidway TechnologiesManaging local administrator privileges on your corporate endpoints and servers
+1
Applicable to:
SaaS
56 out of 60
i-agree – Informed Consent e-Signature & Contract ComplianceNook Holdings LimitedNew e-signature compliance tool- providing informed consent using video, voice, and biometrics.
+1
Applicable to:
SaaS
57 out of 60
ZATCA E-invoicing Compliance for Dynamics 365DynamicsCenter Software Solutions LLCZATCA E-invoicing Compliance for Dynamics 365
+4
Applicable to:
Commerce
Supply Chain Management
Operations
Finance
58 out of 60
Rocky Linux 10 Security HardenedSolve DevOpsEnterprise-grade Rocky Linux 10 with CIS Level 2 hardening. RHEL-compatible security without the cost. Deploy compliant infrastructure instantly.
+1
Applicable to:
Virtual Machines
59 out of 60
M365 Security Monitoring, Automated and SimpleInsider Security Pte LtdAutomatically monitors data security in Microsoft 365. Discover the internal threat very early.
+1
Applicable to:
SaaS
60 out of 60