Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
Hardened Ubuntu 24.04 LTS image - Level 2: Advanced SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Ubuntu 24.04 LTS image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
1 out of 60
Predica Managed Security Operations CentrePredicaBy our offer of managed service for an Azure environment, you get the enterprise grade security service, supported by our security consultants and analysts. Others may build your defenses. We fortify them. Stay secure 24/7.
+1
Applicable to:
Managed Services
2 out of 60
Vormetric Data Security Manager v6.4.2Thales eSecurityThe center point for multi-cloud advanced encryption. You control encryption keys and policies.
+1
Applicable to:
Virtual Machines
3 out of 60
Security Observability with Ennetix xTend in LinuxEnnetix, Inc.Ennetix xTend provides enhanced observability for endpoint threat analytics and insights.
+1
Applicable to:
Virtual Machines
4 out of 60
Coverity Static Application Security TestingBlack Duck Software, IncCoverity® is a SAST tool that helps development teams identify and fix security and quality issues, manage risk across applications, and ensure compliance with embedded and security standards.
+1
Applicable to:
Entra ID Apps
5 out of 60
Red Hat Enterprise Linux 10 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based virtual machine with Red Hat Enterprise Linux 10 (LVM), pre-hardened to support HIPAA security and compliance requirements.
+1
Applicable to:
Virtual Machines
6 out of 60
Advanced Hardened ALMA Linux 8 image - Level 2 SecurityMadarson It, LLCAzure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for level 2 security and compliance.
+1
Applicable to:
Virtual Machines
7 out of 60
Forescout for OT Security CoreForescoutContinuous, automated OT security, asset management, risk compliance, and threat detection through non-intrusive OT/ICS network monitoring.
+1
Applicable to:
Virtual Machines
8 out of 60
PERFORM+ Connect - FHIR Enablement & CMS ComplianceCitiusTechAccelerate convergence and FHIR® deployment
+1
Applicable to:
SaaS
9 out of 60
SAP Certified SAP SuccessFactors to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP SuccessFactors
+1
Applicable to:
Virtual Machines
10 out of 60
CaseMail.AI | Certified Communications and AI-Driven SecurityCaseMailU.S. Courts and USPS-Approved | Streamline Certified Email and Postal Communications
+1
Applicable to:
SaaS
11 out of 60
Advanced Hardened Oracle Linux 8 image - Level 2 SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Oracle Linux 8 image, hardened and optimized for level 2 security and compliance.
+1
Applicable to:
Virtual Machines
12 out of 60
Oracle Linux 9 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based VM with the latest Oracle Linux 9 image pre-configured and hardened to HIPAA benchmarks.
+1
Applicable to:
Virtual Machines
13 out of 60
Red Hat Enterprise Linux 9 Compliance-Aligned Secure DesktopMadarson It, LLCSecurity-hardened Red Hat Enterprise Linux 9 desktop with GUI and RDP access, optimized for Azure cloud workloads.
+1
Applicable to:
Virtual Machines
14 out of 60
Sentra's Multi-Cloud Data Security PlatformSentraSentra’s cloud-native DSPM platform discovers, classifies, prioritizes sensitive data across clouds
+1
Applicable to:
SaaS
15 out of 60
Alma Linux 8 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based VM with the latest Alma Linux 8 image pre-configured and hardened to HIPAA benchmarks.
+1
Applicable to:
Virtual Machines
16 out of 60
Field Security PlusFenwickImprove control and accuracy with field-level security and management tools
+1
Applicable to:
Business Central
17 out of 60
Fastpath Assure for D365FastpathSecurity, Audit, and Compliance Solutions for Microsoft Dynamics
+1
Applicable to:
Operations
18 out of 60
Red Hat Enterprise Linux 9 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based VM with the latest RHEL 9 (LVM) image pre-configured and hardened to HIPAA benchmarks.
+1
Applicable to:
Virtual Machines
19 out of 60
Red Hat Enterprise Linux 8 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based VM with the latest Red Hat Enterprise Linux 8 (LVM) image pre-configured and hardened to HIPAA benchmarks.
+1
Applicable to:
Virtual Machines
20 out of 60
Hardened Red Hat Enterprise Linux 8 – Foundational Security BaselineMadarson It, LLCAzure-based VM pre-configured with Red Hat Enterprise Linux 8 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
21 out of 60
Cyber Security Awareness Training & PlatformKnowledge AcceleratorsComplete Cybersecurity Awareness & Training Platform with microlearning courses, interactive...
+1
Applicable to:
SaaS
22 out of 60
Hardened Red Hat Enterprise Linux 8 – Security Optimized EditionMadarson It, LLCAzure-based VM pre-configured with Red Hat Enterprise Linux 8 image, hardened and security-optimized to enhance compliance and reduce cyber risk.
+1
Applicable to:
Virtual Machines
23 out of 60
Black Duck Licensing – 1-Year & 2-Year Plans AvailableSpire SolutionsSecure your software with open-source security, software compliance, and risk management solutions.
+1
Applicable to:
SaaS
24 out of 60
MDS Managed Modern SOC & Security Advisory ServiceMaureen Data SystemsMDS' Managed SOC providing customers with rapid complete deployment of Managed Security Service & consistent management of the tool including 24x7x365 security monitoring and proactive response, security posture management, and much more!
+1
Applicable to:
Managed Services
25 out of 60
Red Hat Enterprise Linux 9 Image -- Hardened for PCI DSS ComplianceMadarson It, LLCAzure-based VM with the latest Red Hat Enterprise Linux 9 (LVM) image pre-configured and hardened to PCI DSS benchmark.
+1
Applicable to:
Virtual Machines
26 out of 60
Oracle Linux 8 Image -- Hardened for HIPAA ComplianceMadarson It, LLCAzure-based VM with the latest Oracle Linux 8 image pre-configured and hardened to HIPAA benchmarks.
+1
Applicable to:
Virtual Machines
27 out of 60
Oracle Linux 9 (LVM) - Hardened for DISA STIG ComplianceMadarson It, LLCAzure VM with Oracle Linux 9 (LVM), pre-hardened to meet DISA STIG compliance requirements.
+1
Applicable to:
Virtual Machines
28 out of 60
Red Hat Enterprise Linux 10 -- Hardened for DISA STIG ComplianceMadarson It, LLCAzure VM with Red Hat Enterprise Linux 10 (LVM), pre-hardened to meet DISA STIG compliance requirements.
+1
Applicable to:
Virtual Machines
29 out of 60
Red Hat Enterprise Linux 10 Image -- Hardened for PCI DSS ComplianceMadarson It, LLCAzure-based VM with Red Hat Enterprise Linux 10 (LVM), pre-hardened to support PCI DSS compliance requirements.
+1
Applicable to:
Virtual Machines
30 out of 60
Hardened Red Hat Enterprise Linux 10 – Core Compliance ImageMadarson It, LLCAzure-based VM with Red Hat Enterprise Linux 10, pre-hardened to support core security best practices and compliance frameworks.
+1
Applicable to:
Virtual Machines
31 out of 60
Zero Trust Cyber Security Framework – Implementation & Readiness EngagementGolden Five LLCEnhance your security posture with Golden Five Consulting’s
Zero Trust Cyber Security Framework implementation. This Managed services engagement helps organizations strengthen identity, data, endpoint, and network protection while aligning with CMMC
+1
Applicable to:
Managed Services
32 out of 60
AppOmni SaaS Security Platform : Prevent SaaS BreachesAppOmni IncIdentify SaaS data exposure and misconfigurations, detect threats, and map compliance requirements
+1
Applicable to:
SaaS
33 out of 60
Rixon Vaultless Tokenization PlatformPB Analytics Inc. DBA Rixon TechnologyData Security As A Service. Providing Tokenization, Data Access Controls, Auditing, and Compliance
+1
Applicable to:
SaaS
34 out of 60
WALLIX BastionWallixWALLIX Bastion offers robust security and comprehensive regulatory compliance
+1
Applicable to:
Virtual Machines
35 out of 60
Hardened ROCKY Linux 9 image – Level 2: Advanced SecurityMadarson It, LLCAzure-based VM pre-configured with the latest ROCKY Linux 9 image, advanced hardened and optimized for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
36 out of 60
Standss Outbound Email Security for Outlook (M365)Standss (South Pacific) LtdStop confidential information from getting emailed to unintended recipients
+1
Applicable to:
SaaS
37 out of 60
Praxis Navigator: Turn Invisible Security Behaviors Into Visible Risk Data - betaPraxis Security Labs ASSee the security patterns Microsoft 365 isn't showing you — in 15 minutes
+1
Applicable to:
SaaS
SUNSPOTS Governance Mapping & Security ManagementSUNSPOTS.cloud LtdGovernance & Security Multi-Cloud info-graphics Mapping & Management AI Platform
+1
Applicable to:
SaaS
39 out of 60
Databricks Security Posture Management by PointGuard AIAppSOCProvides comprehensive security and governance for Databricks environments
+1
Applicable to:
SaaS
40 out of 60
SonicWall-Network Security Manager -BYOLSonicWall IncSonicWall firewall manager centrally manage all SonicWall firewall
+1
Applicable to:
Virtual Machines
41 out of 60
Qualys Virtual Scanner ApplianceQualys, Inc.Qualys Security Cloud Platform Virtual Scanner Appliance
+1
Applicable to:
Virtual Machines
42 out of 60
Hardened Red Hat Enterprise Linux 9.7 – Core Compliance ImageMadarson It, LLCAzure-based VM running RHEL 9.7, pre-configured with baseline security hardening for general-purpose secure deployments.
+1
Applicable to:
Virtual Machines
43 out of 60
Trisus Supply for Automated Charge Integrity & ComplianceThe Craneware GroupImprove Supplies Reimbursement
+1
Applicable to:
SaaS
44 out of 60
CODA Footprint Proactive Managed Security for MSPsCODA IntelligenceStart delivering proactive managed security services in minutes with our AI-driven SaaS platform
+1
Applicable to:
SaaS
45 out of 60
Unified Security OperationsKiZAN TechnologiesThis plan covers all tiers of KiZAN's SOC services, from MDR to XDR and beyond.
+1
Applicable to:
Managed Services
46 out of 60
Riscosity AI Data Security, Privacy and GovernanceRiscosityRiscosity discovers, classifies and remediates all data flows to AI tools and third parties
+1
Applicable to:
SaaS
47 out of 60
VantaVantaGet updates on your organization's security posture & compliance tasks
+1
Applicable to:
Teams
48 out of 60
Click Armor Enterprise Security Awareness TrainingClick ArmorThe interactive security training platform for Human Risk Management
+1
Applicable to:
SaaS
49 out of 60
HCL BigFix Compliance (Private Offer Only)HCL SoftwareStreamline IT management with BigFix's unified solution, enabling faster, more secure endpoints.
+1
Applicable to:
SaaS
50 out of 60
Forescout for Network Security Automation & Control PlusForescoutNetwork and OT security posture management with automated orchestration and policy enforcement.
+1
Applicable to:
SaaS
51 out of 60
Sysdig Cloud Security and ObservabilitySysdigSecure and accelerate innovation on Azure with the power of runtime insights
+1
Applicable to:
SaaS
52 out of 60
Wandera Mobile Security SuiteWandera Inc.A single cloud solution to protect against the broadest range of cyber threats & access-based risks.
+1
Applicable to:
SaaS
53 out of 60
GovernSafeGovernSafeAI-native platform for unified Microsoft 365 & multi-cloud governance, security, and compliance
+1
Applicable to:
SaaS
54 out of 60
Xops360AXIOMIO-XOPSFinOps, Cybersecurity, Cloud Security, Governance & Compliance, CloudOps, AWS WAR, Azure WAF
+1
Applicable to:
SaaS
55 out of 60
Security Incident Management SystemHOSHO DIGITALHOSHO DIGITAL SIMS enables organizations to log, track, and resolve incidents in a structured manner
+2
Applicable to:
Power Automate
Power Apps
56 out of 60
Ubuntu 24.04 LTS Security-Hardened Desktop with RDP for AzureMadarson It, LLCSecurity-hardened Ubuntu 24.04 LTS desktop with GUI/RDP access, optimized for Azure cloud workloads.
+1
Applicable to:
Virtual Machines
57 out of 60
Microsoft Azure Managed Services & Compliance for Regulated Workloads with 24x7 Support from CSIComputer Systems Integration LtdAs a Microsoft CSP, CSI delivers cloud modernisation solutions and managed services to highly regulated industries, delivering scalability and agility, managing costs, and maintaining maximum levels of security and compliance.
+1
Applicable to:
Managed Services
58 out of 60
Onapsis Platform for Cybersecurity and ComplianceOnapsisSecuring the World’s Business-Critical Applications
+1
Applicable to:
SaaS
59 out of 60
Level 2 Hardened Ubuntu 22.04 LTS Desktop - Maximum Security with RDPMadarson It, LLCAdvanced security-hardened Ubuntu 22.04 LTS desktop with strict controls, RDP access for high-risk environments.
+1
Applicable to:
Virtual Machines
60 out of 60