Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Oracle Linux 9 – Level 2 Hardened (Enterprise Compliance Build)Madarson It, LLCEnterprise-grade Oracle Linux 9 VM hardened to Level 2 for compliance-first cloud deployments and audit-ready infrastructure.
+1
Applicable to:
Virtual Machines
1 out of 60
GauntletDeep Armor Technologies Pvt LtdUnified Solution for Automating Your Cloud Security & Compliance
+1
Applicable to:
SaaS
2 out of 60
eDig365 | Purview + eDiscovery ReportingFive Star Legal and Compliance Systems, Inc.Unrivaled Observability for Microsoft Purview eDiscovery
+1
Applicable to:
Azure Applications
3 out of 60
TrendAI™ Deep Security™ for Microsoft SentinelTrend MicroTrendAI™ Deep Security™ connector allows you to connect Deep Security logs with Microsoft Sentinel
+1
Applicable to:
Azure Applications
4 out of 60
AttackIQ Continuous Security Validation PlatformAttackIQ IncAutomated security control validation with the leading Breach and Attack Simulation (BAS) platform.
+1
Applicable to:
SaaS
5 out of 60
DIGITALL iQ.Suite E-Mail Compliance - Enhanced GDPR Messaging O365Digitall A specially packed E-Mail compliance bundle, that complements the built-in office 365 features.
+1
Applicable to:
SaaS
6 out of 60
eCyLabs ASPM - Application Security Posture ManagementeCylabsApplication Security Posture Assessment
+1
Applicable to:
SaaS
7 out of 60
DX360 Security ARMOR FedRAMPNetImpact Strategies Inc.Increase and improve your Enterprise or Agency's FedRAMP Certification and Authorizations Management
+3
Applicable to:
Customer Service
Power Automate
Power Apps
8 out of 60
Forescout for Security Automation & ControlForescoutNetwork and OT security posture management with automated orchestration and policy enforcement.
+1
Applicable to:
SaaS
9 out of 60
Websoft9 Solution for Network and SecurityWebsoft9Pre-configured, customizable, secure, one-click to deploy Websoft9 Network and Security Solution on Azure
+1
Applicable to:
Virtual Machines
10 out of 60
Cloud-Optimized Advanced-Hardened Image for Microsoft Windows11 Pro, 25H2 – Level 2 ComplianceMadarson It, LLCAzure-based VM pre-configured with the latest Microsoft Windows 11 Pro, 25H2 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
11 out of 60
Cloud-Optimized Hardened Image for Microsoft Windows Server 2019: Core ComplianceMadarson It, LLCAzure-based VM pre-configured with the latest Microsoft Windows Server 2019 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
12 out of 60
Compliance Island for CMMC & NIST 800-171Island Systems, LLCReady to use private Azure Virtual Desktop enclaves in hours. Save up to 70%. Compliant in weeks.
+1
Applicable to:
SaaS
13 out of 60
Secure Red Hat Enterprise Linux 8 – Level 2 Hardened for Compliance-Driven WorkloadsMadarson It, LLCAzure-based VM pre-configured with the latest Red Hat Enterprise Linux 8 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
14 out of 60
DADAON Security Platform for Microsoft 365DADAONAdvanced security deployment and management for Microsoft 365 powered by Defender, Intune Entra ID
+1
Applicable to:
SaaS
15 out of 60
Enterprise-Hardened ROCKY Linux 8 – Advanced Security TierMadarson It, LLCAzure-ready VM based on ROCKY Linux 8, pre-hardened and security-optimized to support enterprise compliance and risk reduction.
+1
Applicable to:
Virtual Machines
16 out of 60
Stream SecurityStreamSecurityCloud Detection & Response
+1
Applicable to:
SaaS
17 out of 60
Azure Security Review - managed serviceDanoffice IT ApSThe Azure Security Review is a comprehensive solution designed exclusively for our CSP customers. Powered by Azure Lighthouse, this innovative tool provides unparalleled visibility into your organization's security landscape. Stay ahead of threats
+1
Applicable to:
Managed Services
18 out of 60
Oracle Linux 8 Hardened Edition – Foundational Security BuildMadarson It, LLCAzure-based VM pre-configured with the latest Oracle Linux 8 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
19 out of 60
Cloud-Optimized Hardened Image for Microsoft Windows Server 2022: Core ComplianceMadarson It, LLCAzure-based VM pre-configured with the latest Microsoft Windows Server 2022 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
20 out of 60
Ubuntu 22.04 LTS Enterprise Desktop | Security-First DesignSedetos Global Solutions, IncUbuntu 22.04 LTS Enterprise Desktop VM for Azure, pre-configured with GUI and secure RDP access. Hardened to level 1 baseline.
+1
Applicable to:
Virtual Machines
21 out of 60
CaseMail.AI | Certified Communications and AI-Driven SecurityCaseMailU.S. Courts and USPS-Approved | Streamline Certified Email and Postal Communications
+1
Applicable to:
SaaS
22 out of 60
Levo.ai API security platformLevo.aiLevo.ai is a full lifecycle API Observability and API security platform.
+1
Applicable to:
SaaS
23 out of 60
42Crunch #1 for API Security Testing and Runtime Threat Protection42CrunchUsed by Global Enterprises and 1.7M+ API developers to never let unsecure APIs reach production
+1
Applicable to:
SaaS
24 out of 60
Imperva Data SecurityImpervaAll-in-one platform that rapidly delivers comprehensive security and compliance for any database system, across any on-premise or cloud environment.
+1
Applicable to:
Entra ID Apps
25 out of 60
Debian GNU/Linux 11 Hardened Image – Level 2: Advanced SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 11 image, hardened and optimized for advanced security and compliance.
+1
Applicable to:
Virtual Machines
26 out of 60
Debian GNU/Linux 12 Hardened Image – Level 2: Advanced SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 12 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
27 out of 60
Connected Products Platform for Traceability and ComplianceRockwell Automation, Inc.Enabling Digital Product Traceability, Value Chain Visibility, Product Authenticity and Compliance.
+1
Applicable to:
SaaS
28 out of 60
Heimdal Privileged Account and Session Management (PASM)Heimdal SecurityMonitor and Control All Privileged Access Activities within Your Organization Through a Single, Integrated Dashboard.
+1
Applicable to:
Virtual Machines
29 out of 60
Managed Azure Security as a ServiceAKAVEIL TECHNOLOGIES INCAKAVEIL’s Managed Security Services deliver round-the-clock monitoring, incident reporting, and expert guidance to enhance your organization’s security and compliance posture.
+1
Applicable to:
Managed Services
30 out of 60
GravityZone Business SecurityBitDefender SRLResource-efficient solution that provides high performance & protection
+1
Applicable to:
SaaS
31 out of 60
Coverity Static Application Security TestingBlack Duck Software, IncCoverity® is a SAST tool that helps development teams identify and fix security and quality issues, manage risk across applications, and ensure compliance with embedded and security standards.
+1
Applicable to:
Entra ID Apps
32 out of 60
Vormetric Data Security Manager v6.2.0Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
33 out of 60
GravityZone Business Security EnterpriseBitDefender SRLUnified Prevention, Extended Detection, Response And Risk Analytics For Every Organization
+1
Applicable to:
SaaS
34 out of 60
Opsbeacon Security Hyperautomation PlatformOPSBEACON YAZILIM VE TEKNOLOJİ ANONİM ŞİRKETİCybersecurity hyper-automation platform that enables secure, efficient, and compliant operations.
+1
Applicable to:
SaaS
35 out of 60
Debian GNU/Linux 11 Hardened Image – Level 1: Foundational SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 11 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
36 out of 60
ATOM ONE Security Operations as a ServiceKPCS CZ, s.r.o.ATOM ONE - Security Operations as a Service
+1
Applicable to:
SaaS
37 out of 60
HCLTech's Cloud Security Foundation (CsaaS) for AzureHCL America Inc_HCLTAdopt Azure cloud securely with azure native security
+1
Applicable to:
SaaS
38 out of 60
Sentinel SOC – Managed Security Operations CenterGijimaReal-time threat detection and response with a fully managed Security Operations Center
+1
Applicable to:
SaaS
39 out of 60
Epiq Data Security Managed ServiceEpiq GlobalProtect sensitive company data while prioritizing employee privacy with Microsoft Purview
+1
Applicable to:
SaaS
40 out of 60
DX360 Security ARMORNetImpact Strategies Inc.Increase and improve your Agency's Accreditation Portfolio Management
+3
Applicable to:
Customer Service
Power Automate
Power Apps
41 out of 60
Veriphy AML Onboarding and Compliance ChecksDavies GroupSolution for UK regulated entities to run AML (anti money laundering) compliance checks
+1
Applicable to:
SaaS
42 out of 60
Hardened Red Hat Enterprise Linux 10 RAW – Core Compliance ImageMadarson It, LLCAzure-based VM with Red Hat Enterprise Linux 10 RAW, pre-hardened to core standards for improved baseline security and compliance.
+1
Applicable to:
Virtual Machines
43 out of 60
SAP Certified SAP Datasphere to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP Datasphere
+1
Applicable to:
Virtual Machines
44 out of 60
duploclouddevopsDuploCloudDevOps, Platform Engineering, Security & Compliance
+1
Applicable to:
SaaS
45 out of 60
Vormetric Data Security Manager v6.4.0Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
46 out of 60
Hardened Ubuntu 22.04 LTS image - Level 1: Foundational SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Ubuntu 22.04 LTS image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
47 out of 60
Vormetric Data Security Manager v6.4.8Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
48 out of 60
Vormetric Data Security Manager v6.0.2Thales eSecurityThe centerpoint for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
49 out of 60
SAP Certified SAP SuccessFactors to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP SuccessFactors
+1
Applicable to:
Virtual Machines
50 out of 60
Security Assessment for Microsoft 365 - POA SolutionsPOA SOLUTIONSComprehensive security assessment for Microsoft 365 environments to identify vulnerabilities.
+1
Applicable to:
SaaS
51 out of 60
Hardened Ubuntu 24.04 LTS image - Level 1: Foundational SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Ubuntu 24.04 LTS image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
52 out of 60
Vormetric Data Security Manager v6.4.6Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
53 out of 60
ORACLE Linux 9 Image -- Hardened for NIST ComplianceMadarson It, LLCAzure-based VM with the latest ORACLE Linux 9 image pre-configured and hardened to NIST benchmarks.
+1
Applicable to:
Virtual Machines
54 out of 60
ALMA Linux 8 Image -- Hardened for NIST 800-171 ComplianceMadarson It, LLCAzure-based VM with the latest ALMA Linux 8 image pre-configured and hardened to NIST 800-171 benchmarks.
+1
Applicable to:
Virtual Machines
55 out of 60
24x7 Security Managed XDR ServicesNOVENTIQThe service provides end-to-end 24x7 Security (XDR) Managed Services for Cloud & Hybrid Infrastructures. Noventiq MXDR leverages industry best practices, processes based on Microsoft’s Cloud Adoption Framework and Microsoft Sentinel SIEM tool.
+1
Applicable to:
Managed Services
56 out of 60
Predica Managed Security Operations CentrePredicaBy our offer of managed service for an Azure environment, you get the enterprise grade security service, supported by our security consultants and analysts. Others may build your defenses. We fortify them. Stay secure 24/7.
+1
Applicable to:
Managed Services
57 out of 60
Cyber Security Posture - an assessmentSource Code ControlAssess your infrastructure's Cyber Security Posture. Compare with NIST and ZTF.
+1
Applicable to:
SaaS
58 out of 60
Vormetric Data Security Manager v6.4.3Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
59 out of 60
Vormetric Data Security Manager v6.4.4Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
60 out of 60