IragazkiakGarbitu guztiak
Aplikazio aipagarriak
Aplikazioak emaitza (Security)
emaitza erakusten dira hemen: aplikazioak.
Pently SOCaaSPently GmbHThe Pently Security Operations Center (SOC) guarantees comprehensive and continuous monitoring of your IT infrastructure and Azure resources. 24x7, our Microsoft certified SOC team is ready not only to detect and assess attacks but also to prevent them.
+1
Applicable to:
Managed Services
1 out of 60
Google Cloud Platform IDSMicrosoft Sentinel, Microsoft CorporationGoogle Cloud Platform IDS
+1
Applicable to:
Azure Applications
2 out of 60
SaporoSaporoProactively protect AD and Entra identities by fixing misconfigurations and blocking attack paths
+1
Applicable to:
SaaS
3 out of 60
Integration: ESET and Stellar CyberESETEndpoint and email security and threat intelligence with AI-driven Security Operations
+1
Applicable to:
SaaS
4 out of 60
CeTu - Data Management for the Modern SOCCeTuCeTu empowers your data stack with AI-based filtering,enrichment&routing to SIEMs no scripts needed
+1
Applicable to:
SaaS
5 out of 60
BitLyft AIR® for Microsoft EnvironmentsBitLyft CybersecurityEnterprise-grade no-code automated incident response for faster, smarter security operations
+1
Applicable to:
SaaS
6 out of 60
PDS for Outlook Password Recovery softwarePerfect Data SolutionsRecover lost Outlook passwords quickly and securely with PDS software.
+1
Applicable to:
SaaS
7 out of 60
PDS for Access Password Recovery SoftwarePerfect Data SolutionsRecover lost Microsoft Access database passwords quickly and securely.
+1
Applicable to:
SaaS
8 out of 60
PDS ZIP Password RemoverPerfect Data SolutionsUnlock password-protected ZIP files quickly and efficiently with PDS ZIP Password Remover.
+1
Applicable to:
SaaS
9 out of 60
Remove NSF Local SecurityPerfect Data SolutionsEfficiently remove local security from NSF files for unrestricted access.
+1
Applicable to:
SaaS
10 out of 60
secure_access_360Coforge LimitedAdopt Zero Trust Security, that provides secure access to the internet, SaaS & Private Apps
+1
Applicable to:
SaaS
11 out of 60
PDS FOR Excel Password RecoveryPerfect Data SolutionsPerfect Data Solutions provides a reliable way to restore access to protected Excel files.
+1
Applicable to:
SaaS
12 out of 60
DeepTempoDeepTempo AI, USADeep-Learning based incident detection
Deep-Learning based incident detection
+1
Applicable to:
SaaS
13 out of 60
Squid Proxy Server on CentOS Stream 9NuvemnestVersion : 5.5 - Squid caching proxy server for web traffic.
+1
Applicable to:
Virtual Machines
14 out of 60
CLUTCH By St. FoxSt. Fox ServicesCLUTCH By St. Fox Secure Access - Cross-platform Secure Access Automation Solution
+1
Applicable to:
SaaS
15 out of 60
Integration: ESET and wazuh.ESETESET's security incidents and telemetry seamlessly consolidated by Wazuh into a single pane of glass
+1
Applicable to:
SaaS
16 out of 60
Squid Proxy Server on Debian 12NuvemnestVersion : 5.7 - Squid caching proxy server for web traffic.
+1
Applicable to:
Virtual Machines
17 out of 60
Onevinn Cybersecurity as a ServiceOnevinn ABExpert-driven cybersecurity solutions designed to ensure business continuity and resilience.
+1
Applicable to:
SaaS
18 out of 60
Cohesity Cloud Services for Microsoft 365Cohesity IncCohesity Cloud Services make Microsoft 365 protection easy and keep your data safe.
+1
Applicable to:
SaaS
19 out of 60
Onevinn Data Security as a ServiceOnevinn ABStrategic data security services designed to ensure control, compliance, and clarity.
+1
Applicable to:
SaaS
20 out of 60
Squid Proxy Server on Debian 11NuvemnestSquid caching proxy server for web traffic.
+1
Applicable to:
Virtual Machines
21 out of 60
Safeguard your Entra ID, Azure and Office 365cionsystems inc.Stay Ahead of Security Threats with CionSystems Auditor, Backup and Recovery for Microsoft Entra ID
+1
Applicable to:
SaaS
22 out of 60
Cohesity Cloud Services for Microsoft 365Cohesity IncCohesity Cloud Services make Microsoft 365 protection easy and keep your data safe.
+1
Applicable to:
SaaS
23 out of 60
CionSystems Entra ID Protection Preview Offercionsystems inc.Protect Entra ID, Microsoft Azure and Microsoft 365
+1
Applicable to:
SaaS
24 out of 60
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+1
Applicable to:
Managed Services
25 out of 60
AppSec with GitHub Advanced Security for Azure DevOpsBalwurkWe offer Vulnerability Management with GitHub Advanced Security for Azure DevOps.
+1
Applicable to:
SaaS
26 out of 60
Bitvanze Data ProtectAdvanze FZCOSecure, encrypted data protection with configurable policies and granular access permissions.
+1
Applicable to:
Azure Applications
27 out of 60
Fortinet Lacework FortiCNAPPFortinetLacework FortiCNAPP offers unmatched visibility and context to simplify and strengthen security
+1
Applicable to:
SaaS
28 out of 60
NexusTek DevOps On-DemandNexus Technologies LLCNexusTek DevOps On-Demand is a fully managed, subscription-based service designed to fast-track your CI/CD, Infrastructure as Code (IaC), and DevSecOps initiatives.
+1
Applicable to:
Managed Services
29 out of 60
JDR 7Z Password RecoveryVARTIKA SOFTWARE PRIVATE LIMITEDRecover lost or forgotten passwords for 7Z archive files quickly and efficiently.
+1
Applicable to:
SaaS
30 out of 60
JDR RAR Password RecoveryVARTIKA SOFTWARE PRIVATE LIMITEDRecover lost RAR archive passwords quickly and efficiently with advanced decryption tools.
+1
Applicable to:
SaaS
31 out of 60
ScrutinyCyberstancAll in one security platform with file simulation, AI-powered threat prevention & file sanitization.
+1
Applicable to:
SaaS
32 out of 60
Palo Alto Cloud NGFW Private OfferData#3 LimitedLooking for a managed service that can help secure your applications and protect against threats?
+1
Applicable to:
SaaS
33 out of 60
Palo Alto VM Series Flex Private OfferData#3 LimitedLooking to secure your application in Azure, protect against threats and prevent data exfiltration?
+1
Applicable to:
SaaS
34 out of 60
Docker Compose Hardened Ubuntu 24.04 Minimal Server (Extended Security)Madarson It, LLCSecurely run Docker apps on a hardened Ubuntu 24.04 LTS Minimal with Docker, Compose, firewall, Fail2Ban, and auto-updates pre-configured.
+1
Applicable to:
Virtual Machines
35 out of 60
ITAC SecureFile Agent: Transferencia Segura y CumplimientoITACProtege datos sensibles y automatiza transferencias con cifrado, cumplimiento e integración con SharePoint.
+1
Applicable to:
Virtual Machines
36 out of 60
At-Bay Stance™At-Bay Inc.Your Unified Security Solution for Cyber Risk
+1
Applicable to:
SaaS
37 out of 60
Entra Verified ID Credentials- Biometric Identity VerificationIdRamp, Inc.Entra Verified ID - from basic verifiable credentials to enterprise class identity verification.
+1
Applicable to:
SaaS
38 out of 60
Cambrient AI Phishing ProtectionCambrient AIProtect your business from phishing attacks with AI-powered detection and prevention.
+1
Applicable to:
SaaS
39 out of 60
Entra Account Recovery - Biometric Identity VerificationIdRamp, Inc.Biometric verification for Entra self-service account recovery
+1
Applicable to:
SaaS
40 out of 60
SoftActivity Work: Employee Productivity & Activity Analytics SaaSDeep Software Inc.Employee monitoring SaaS for hybrid teams with detailed productivity and time analytics
+1
Applicable to:
SaaS
41 out of 60
Agent SREXenonStackAutonomous AI-powered observability and incident management for hybrid cloud infrastructure
+1
Applicable to:
SaaS
42 out of 60
Entra Verified ID: ServiceNow Identity VerificationIdRamp, Inc.Automatically secure ServiceNow with MS Entra Verified ID credentials.
+1
Applicable to:
SaaS
43 out of 60
NexusTek Hybrid Cloud Managed ServicesNexus Technologies LLCNexusTek’s Hybrid Cloud Managed Services offer 24/7/365 monitoring, management, and optimization for Azure and hybrid cloud environments, enabling mid-sized enterprises to focus on innovation.
+1
Applicable to:
Managed Services
44 out of 60
Assessment de Seguridad Microsoft 365Global Soc OÜEvalúa ciberseguridad, riesgos y cumplimiento con reportes accionables y estratégicos.
+1
Applicable to:
SaaS
45 out of 60
Integration: ESET and Elastic SIEMESETESET enriches Elastic SIEM with highly curated, low false positive threat intelligence feeds.
+1
Applicable to:
SaaS
46 out of 60
Grip SecurityCyber Rescue LimitedSaaS Identity Risk Assessment, Discover the Gaps in Your SaaS Security Controls
+1
Applicable to:
SaaS
47 out of 60
Google Cloud Platform SQLMicrosoft Sentinel, Microsoft CorporationGoogle Cloud Platform SQL
+1
Applicable to:
Azure Applications
48 out of 60
Google Cloud Platform Cloud RunMicrosoft Sentinel, Microsoft CorporationGoogle Cloud Platform Cloud Run
+1
Applicable to:
Azure Applications
49 out of 60
HashiCorp Vault Enterprise KMIPCarahsoft Technology CorporationLeverage Carahsoft's contract vehicles to obtain HashiCorp technology via private marketplace offers
+1
Applicable to:
SaaS
50 out of 60
Google Cloud Platform NATMicrosoft Sentinel, Microsoft CorporationGoogle Cloud Platform NAT
+1
Applicable to:
Azure Applications
51 out of 60
IdentacleTMDiStreamline Identity and Access Management with Indentacle's innovative SaaS solution.
+1
Applicable to:
SaaS
52 out of 60
RENTAL OFFER - Software Add-On for Printers: Productivity Bundle with Authentication ManagerDATASEC SOLUTIONS PTY LTDStreamline workflows with passwordless printing and Microsoft 365 integration on HP MFPs.
+1
Applicable to:
SaaS
53 out of 60
Prophaze Cloud WAAP - Web Application API ProtectionProphaze Technologies Pvt LtdProphaze WAAP secures web apps and APIs with WAF, bot control, and real-time threat detection.
+1
Applicable to:
SaaS
54 out of 60
CyberPrism - Digital Resilience PlatformCRI - Cyber Risk International - CyberPrismAI-powered platform for cyber resilience, aligned with DORA, NIS2, and NIST CSF 2.0
+1
Applicable to:
SaaS
55 out of 60
Atmosera MXDR Enables Zero Trust with 24x7x365 Continuous Monitoring from Endpoint Protection to Full-stack MXDR with Managed GRCAtmoseraPowered by Microsoft. Accelerated by automation. 24x7x365 Managed Services.
+1
Applicable to:
Managed Services
56 out of 60
SafeLine on CentOS Stream 9HANWEI SOFTWARE TECHNOLOGY(HONG KONG) CO.,LIMITEDA ready-to-deploy SafeLine WAF on CentOS Stream 9, ideal for protecting web services against common security threats.
+1
Applicable to:
Virtual Machines
57 out of 60
EY CyberDefense SystemEY GlobalNext generation detection and response platform
+1
Applicable to:
SaaS
58 out of 60
MBC Technology Group Managed Detection and Response (MDR)MBC Technology Group Inc24x7 monitoring to detect, respond to, and recover from cyber threats.
+1
Applicable to:
SaaS
59 out of 60
CyberGuard.aiSigma Technology Partners LLCAll-in-one platform for managing cybersecurity compliance, audits, and policy documentation
+1
Applicable to:
Azure Applications
60 out of 60