Filters
Search results for “security compliance”
Showing results in apps.
Sort By:
SAP Certified SAP Sales Cloud to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring with Microsoft Sentinel as a SIEM for SAP Sales Cloud
+1
Applicable to:
Virtual Machines
1 out of 60
SAP Certified SAP RISE to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP RISE
+1
Applicable to:
Virtual Machines
2 out of 60
SAP Certified SAP Web Dispatcher to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP Web Dispatcher
+1
Applicable to:
Virtual Machines
3 out of 60
DrataDrata, Inc.Get notifications about your compliance readiness.
+1
Applicable to:
Teams
4 out of 60
Tehama Cybersecurity PlatformTehama TechnologiesAll-in-one platform for enterprise data and app security, compliance, and governance
+1
Applicable to:
SaaS
5 out of 60
Dubber Unified Call Recording and AnalyticsDubber Corp#1 Compliance recording solution, fully certified for Microsoft Teams, with AI powered insights.
+1
Applicable to:
SaaS
6 out of 60
Portalbi.net - Embedded Portal For PowerBI Reports With Security And Compliance Without PRO Licenceportalbi.netPortalbi.net - Embedded Portal For PowerBI Reports With Cost Reduction And Secure Access
+1
Applicable to:
SaaS
7 out of 60
SAP Certified SAP Cloud Connector to Sentinel Connector and ContentSwiss Security Hub AGEffortless SAP Security Monitoring & Threat Detection with Microsoft Sentinel as a SIEM for SAP Cloud Connector
+1
Applicable to:
Virtual Machines
8 out of 60
Davyn Social Security Citizen EngagementDavyn LimitedPlatform offering 360° management of Persons, Employers and Service Providers
+1
Applicable to:
SaaS
9 out of 60
Rocky Linux 8.10 Security HardenedSolve DevOpsRocky Linux is a stable, production-grade enterprise operating system designed to be 100% bug-for-bug compatible with RHEL®.
+1
Applicable to:
Virtual Machines
10 out of 60
Bay Dynamics Risk Fabric Security AnalyticsBAY DYNAMICS INCRisk Fabric analytics allow organizations to rapidly identify and address their leading cyber risks.
+1
Applicable to:
SaaS
11 out of 60
Mphasis Managed Security Services: Managed ServiceMphasisComprehensive MSSP framework built on AI-powered Microsoft technologies (Sentinel, Defender, Purview, Entra and Intune), designed to proactively protect, detect, investigate, and respond to threats across your digital estate.
+1
Applicable to:
Managed Services
12 out of 60
MXDR Services Powered by Microsoft SecurityOxford Computer Group LLCOxford Computer Group's MXDR Services bring together Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender to manage threat detection and response across your enterprise platforms.
+1
Applicable to:
Managed Services
13 out of 60
Calamu Protect - Storage and backup securityCalamu Technologies Corp.Detect, block, and recover from attacks automatically with 5X greater resilience.
+1
Applicable to:
SaaS
14 out of 60
Opsgility SC-400 Workshop Administering Information Protection and Compliance in Microsoft 365 Hosted on OneVenue Virtual or In-personOpsgility, LLC5-day workshop with OneVenue and Cloud Sandbox focused on Information Protection and Compliance
+1
Applicable to:
SaaS
15 out of 60
Thales's Imperva Data Security (for use with Private Offers)ImpervaProtecting data and all paths to it
+1
Applicable to:
SaaS
16 out of 60
LogLocker for Microsoft SentinelByzGenThe cost-effective, long-term data archiving app that augments security logs for compliance
+1
Applicable to:
SaaS
17 out of 60
Swif.aiSwifSwif.ai is a device compliance and security platform for Mac, Windows, and Linux
+1
Applicable to:
SaaS
18 out of 60
GitHub on Azure as Managed ServiceEficode OyMove from DevOps software maintenance to delivering customer value. Enjoy security, compliance, and flexible deployment with the ease of cloud. Kickstart DevOps transformation and keep improving your DevOps software and practices.
+1
Applicable to:
Managed Services
19 out of 60
D'AmoPenta Security Systems Inc.Data Encryption Platform
+1
Applicable to:
SaaS
20 out of 60
SIEM using WazuhCloud Infrastructure ServicesOpen Source Security Information and Event Management. Real-time security monitoring, log analysis, threat detection, & compliance.
+1
Applicable to:
Virtual Machines
21 out of 60
Security Solutions supported by Microsoft PurviewEY GlobalHelping you manage and protect data throughout the data lifecycle
+1
Applicable to:
SaaS
22 out of 60
Mimecast Email Security for Azure SentinelMimecast North AmericaAn off-the-shelf Open API integration to consolidate logs, threats and audit data in Sentinel.
+1
Applicable to:
SaaS
23 out of 60
Senserva SiemservaSenserva, LLCAssures your Microsoft security products are running in compliance with your needs.
+1
Applicable to:
SaaS
24 out of 60
Kawach.AI - DPDP, ISO 27001, GDPR, SOC2, HIPAA ComplianceKawach.AIAutomate, monitor and stay compliant confidently with Kawach.AI
+1
Applicable to:
SaaS
25 out of 60
CISO Advisor (solution for cyber- and information security)Legal IT ApSCISO Advisor is a solution for cyber- and information security created by Legal IT.
+1
Applicable to:
SaaS
26 out of 60
AvePoint Cloud Archiving for Microsoft 365AvePoint Inc.Improve data quality, records and information compliance in Microsoft 365
+1
Applicable to:
SaaS
27 out of 60
Ubuntu Pro 18.04 LTSCanonicalUbuntu Pro is providing additional coverage for production environments running in the cloud.
+1
Applicable to:
Virtual Machines
28 out of 60
GCT SaaS ZeroTrust Managed ServicesGlobal Computing and Telecoms LLCGCT SaaS ZeroTrust Managed Services – Secure, monitor, and enforce Zero Trust Security
+1
Applicable to:
SaaS
29 out of 60
Ubuntu Pro 20.04 LTSCanonicalUbuntu Pro is providing additional coverage for production environments running in the cloud.
+1
Applicable to:
Virtual Machines
30 out of 60
Managed Extended Detection & Response (MXDR) Managed Service for Microsoft SecurityProArch Technologies, IncManaged Extended Detection and Response (MXDR) managed services from ProArch provide end-to-end, 24x7 monitoring, detection, and response to security threats to prevent account, system, and data compromise.
+1
Applicable to:
Managed Services
31 out of 60
FairWarning User Monitoring for Office 365FairWarningFairWarning helps you establish a culture of security, privacy, and compliance.
+1
Applicable to:
SaaS
32 out of 60
Recorded Future Intelligence PlatformRecorded FutureRecorded Future is the world’s largest provider of intelligence for enterprise security.
+1
Applicable to:
SaaS
33 out of 60
Cloud-Optimized Security-Hardened Image for Microsoft Windows Server 2025 Datacenter – Azure Edition (Level 1)Madarson It, LLCAzure VM pre-configured with the latest Microsoft Windows Server 2025 Datacenter: Azure Edition, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
34 out of 60
Splunk Asset and Risk IntelligenceSplunkProactive risk mitigation through continuous asset discovery and compliance monitoring.
+1
Applicable to:
SaaS
35 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 7 (RHEL 7)FoundationHardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
+1
Applicable to:
Virtual Machines
36 out of 60
FortiAnalyzer Centralized Log AnalyticsFortinetFortinet FortiAnalyzer delivers centralized network logging, analytics, and reporting
+1
Applicable to:
Azure Applications
37 out of 60
Fortanix Data Security Manager SaaS (DSM SaaS)FortanixFortanix DSM SaaS offers Key Management, Encryption, HSM, Secrets Management & Tokenization
+1
Applicable to:
SaaS
38 out of 60
Ubuntu Pro 16.04 LTSCanonicalUbuntu Pro is providing additional coverage for production environments running in the cloud.
+1
Applicable to:
Virtual Machines
39 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 8 (RHEL 8)FoundationHardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
+1
Applicable to:
Virtual Machines
40 out of 60
Agent ZeroTrust – Identity-Driven Zero Trust SecurityQ SERVICES INCAgent ZeroTrust enforces secure access with real-time identity validation.
+1
Applicable to:
SaaS
41 out of 60
OnID Transactional Biometric Security PlatformOnboarding & Identification SLOnID ensures secure transactions with biometric verification, complying with KYC and age regulations
+1
Applicable to:
SaaS
42 out of 60
Drop Table PulseDrop TableAutomated checks for Azure DevOps to enhance security, compliance, maturity and save cost quickly.
+1
Applicable to:
SaaS
43 out of 60
Secure Entry Server®: Advanced WAF & Identity FederationUnited Security Providers AGProvides robust Web Application Firewall (WAF) and seamless Identity Federation for secure and efficient authentication.
+1
Applicable to:
Virtual Machines
44 out of 60
MitigantResility GmbHMitigant builds security, compliance, and cyber-resilience for Azure cloud infrastructures
+1
Applicable to:
SaaS
45 out of 60
Hardened Red Hat Enterprise Linux 10 with Cockpit, Podman & Security ToolsMadarson It, LLCAzure-based VM pre-configured with RHEL 10, Cockpit, Podman, Buildah, Skopeo, and key security tools — now hardened for enhanced security compliance.
+1
Applicable to:
Virtual Machines
46 out of 60
Managed Cyber Security for New Zealand LawfirmsKINETICS GROUP LIMITEDBusy law firms need IT that works - reliable and easy to use, wherever you are. Even more importantly, you need it to be as cyber secure as reasonably possible because of the nature of the information you hold. Use our experience to make your IT work!
+1
Applicable to:
Managed Services
47 out of 60
Hardened Red Hat Enterprise Linux 10 image - Level 2: Advanced SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Red Hat Enterprise Linux 10, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
48 out of 60
Implorasky made simpleMicrosoft 365 security platform. Monitor, assess, secure, and document
+1
Applicable to:
SaaS
49 out of 60
CSPM Enablement with Microsoft Defender for CloudEY GlobalImproving your organization’s security with cloud security posture management (CSPM)
+1
Applicable to:
SaaS
50 out of 60
Check Point CloudGuard CNAPPCheck PointAutomate security, compliance, risk management and more—across your cloud environments
+1
Applicable to:
SaaS
51 out of 60
HyperComply BotHyperComply IncCollaborate on security questionnaires with HyperComply
+1
Applicable to:
SaaS
52 out of 60
IntuneAuditorOnline Azure Consulting LimitedEnsure security and compliance across devices with IntuneAuditor's intuitive platform.
+1
Applicable to:
SaaS
53 out of 60
CyberCoach Training and Support for EmployeesCult SecurityCyberCoach is an app that trains and supports employees to stay safe online at work and beyond work.
+1
Applicable to:
SaaS
54 out of 60
ComplianceCowContiNube IncMinimalistic workflows for Security GRC and Assurance
+1
Applicable to:
Teams
55 out of 60
SafeOpsSAFEOPS LLCCloud security for Azure, featuring threat detection, compliance automation, and vulnerability scans
+1
Applicable to:
SaaS
56 out of 60
Heimdal® Privilege Elevation and Delegation ManagementHeimdal SecurityPEDM provides control and flexibility in managing user privileges safely.
+1
Applicable to:
SaaS
57 out of 60
Sprinto_licenseSPRINTO TECHNOLOGY PRIVATE LIMITED10% off 15+ compliance frameworks for new customers, enterprises, startups, enabling quick audits.
+1
Applicable to:
SaaS
58 out of 60
Protect Patient Data: CyproSecure 360° AI Security Dashboard Powered by Microsoft SentinelCYPROTECK IncStreamline workflows and ensure data security with CyproSecure 360° advanced features.
+1
Applicable to:
SaaS
59 out of 60
Cloud Application Penetration TestingAppSec Application SecurityCloud Application Security Tests for CISOs and QA teams
+1
Applicable to:
SaaS
60 out of 60