FiltryWyczyść wszystko
Polecane aplikacje
Wyniki (Aplikacje) dla Zabezpieczenia
Pokazywanie wyników w aplikacje.
NinjaOne Automated Endpoint ManagementNinjaOne, LLCNinjaOne automates the hardest parts of IT
+1
Applicable to:
SaaS
1 out of 60
FY25 Private Offer ListingElisityElisity Private Offer Vehicle
+1
Applicable to:
SaaS
2 out of 60
ParrotOSNtegral Inc.Parrot OS, ParrotOS Linux packaged by Ntegral Inc, optimized cloud-based virtual desktop
+1
Applicable to:
Virtual Machines
3 out of 60
Red Canary Connector for Microsoft SentinelRed CanaryThe Red Canary Sentinel Connector enables integration of Red Canary services with Microsoft Sentinel
+1
Applicable to:
Azure Applications
4 out of 60
A10 Lab - System Administration 5 (SYSADM)A10 NetworksA10 Lab - System Administration 5 (SYSADM)
+1
Applicable to:
Azure Applications
5 out of 60
Endpoint Threat Protection EssentialsMicrosoft Sentinel, Microsoft CorporationEndpoint Threat Protection Essentials
+1
Applicable to:
Azure Applications
6 out of 60
Cayosoft GuardianCayosoft Inc.Hybrid AD security, threat detection, and recovery, all in one solution
+1
Applicable to:
Azure Applications
7 out of 60
Cisco Multicloud DefenseCisco Systems, Inc.Connect, protect, and unify security at cloud speed and scale
+1
Applicable to:
Virtual Machines
8 out of 60
6.0 WAPPLES SA (VM)Penta Security Systems Inc.The Logical Web Application Firewall for protecting web applications hosted on Azure
+1
Applicable to:
Virtual Machines
9 out of 60
DNS Essentials Solution for Microsoft Sentinel (Preview)Microsoft Sentinel, Microsoft CorporationDNS Essentials Solution for Microsoft Sentinel
+1
Applicable to:
Azure Applications
10 out of 60
Topicus KeyHubTopicus BVYour complete access management solution for SSO, realtime provisioning and password management
+1
Applicable to:
Virtual Machines
11 out of 60
Avanan Office 365 Email SecurityAvanan Inc.Advanced Anti-Phishing, Malware Protection, Account Compromise Detection, and Data Loss Prevention.
+1
Applicable to:
SaaS
12 out of 60
Symantec VIPMicrosoft Sentinel, Microsoft CorporationEnable ingestion of Symantec VIP's authentication logs into Microsoft Sentinel.
+1
Applicable to:
Azure Applications
13 out of 60
SHI Cloud Governance FrameworkSHI International CorpSHI Cloud Governance Framework is our approach for how we help customers, both new to cloud and existing cloud customers, regardless of their maturity, achieve improved cloud governance and accelerate their Azure usage in a controlled but secure way.
+1
Applicable to:
Managed Services
14 out of 60
Ivanti Neurons for Secure AccessIvantiIvanti Neurons Secure Access helps customers with VPN deployments by centralizing VPN & zero trust
+1
Applicable to:
SaaS
15 out of 60
TrendAI Vision One™ for Microsoft SentinelTrend MicroThe Vision One connector provides the ability to ingest workbench alerts to Microsoft Sentinel.
+1
Applicable to:
Azure Applications
16 out of 60
ReversingLabs Enrichment APIs For SentinelReversingLabsANY FILE. ANY LOCATION. ANY THREAT.
+1
Applicable to:
SaaS
17 out of 60
Airia Enterprise AI PlatformAiria LLCEnterprise AI Orchestration & Governance Platform
+1
Applicable to:
SaaS
18 out of 60
ActiveIdM: Identity Solution AcceleratorActiveIdMAzure Cloud Identity, Entra ID, Identity Access, Identity Governance, and Identity Lifecycle
+1
Applicable to:
SaaS
19 out of 60
Commvault Cloud for SentinelCommvaultBring Commvault security signals into sentinel for faster detection and automated response
+1
Applicable to:
Azure Applications
20 out of 60
Red Canary Sentinel Access IntegrationRed CanaryThis plan offers Red Canary customers the ability to have their Microsoft Sentinel environment accessed by Red Canary, as a managed services provider.
+1
Applicable to:
Managed Services
21 out of 60
senhasegura Virtual Appliancesenhasegurasenhasegura is a global leading Privileged Access Management solution.
+1
Applicable to:
Virtual Machines
22 out of 60
Phoenix Lighthouse - Managed ServicesPHOENIX SOFTWARE LTDManaging your Azure environment can be a time-consuming task our Cloud Managed Service can give you peace of mind. Our team of experienced Cloud Consultants will deliver ongoing management, configuration & security assessments alongside cost analysis.
+1
Applicable to:
Managed Services
23 out of 60
Proxy Server using Squid Proxy CacheCloud Infrastructure ServicesHigh performance Proxy Server using Squid Proxy Cache. Optimised for speed on Windows Server 2025
+1
Applicable to:
Virtual Machines
24 out of 60
GCT SaaS ZeroTrust Managed ServicesGlobal Computing and Telecoms LLCGCT SaaS ZeroTrust Managed Services – Secure, monitor, and enforce Zero Trust Security
+1
Applicable to:
SaaS
25 out of 60
VNS3 PeopleVPN (6.2.x)Cohesive NetworksYour work may be remote, but with PeopleVPN you are not.
+1
Applicable to:
Virtual Machines
26 out of 60
WEBFRONT-KS(WAF-BYOL)PIOLINK,Inc.Web Application Firewall High performance web security. Quick and smart with dual detection engines.
+1
Applicable to:
Virtual Machines
27 out of 60
CyberArk Privilege Access Management for Microsoft SentinelCyberArkCyberArk Privilege Access Management for Microsoft Sentinel
+1
Applicable to:
Azure Applications
28 out of 60
NiaShield AI Control PlaneHeavisideaiZero-persistence AI prevents data privacy violations and regulatory exposure.
+1
Applicable to:
Azure Applications
29 out of 60
Datawiza - No-code/Low-code Platform for Modern AuthDatawizaMFA, SSO, and Passwordless integration for your web applications and APIs
+1
Applicable to:
SaaS
30 out of 60
SIGNL4 - Mobile Alerting & Response for Microsoft Sentinel and Defender for CloudDerdackMobile alerting and incident response for Microsoft Sentinel and Defender for Cloud
+1
Applicable to:
Azure Applications
31 out of 60
VPN Server IKEv2-MSCHAPv2ADEO Imaging OÜVPN Server IKEv2-MSCHAPv2 on Linux for Internet Access with User Management Web Panel.
+1
Applicable to:
Virtual Machines
32 out of 60
Squid Proxy ServerCloud Infrastructure ServicesDeploy a Squid Proxy Cache Server on Ubuntu 22.04. Fully-featured HTTP/1.1 proxy. 1 Click Install.
+1
Applicable to:
Virtual Machines
33 out of 60
Acunetix on Windows Server 2019Apps4Rent LLCAcunetix Manual Tools are free for private and commercial use but they are not an open-source project.
+1
Applicable to:
Virtual Machines
34 out of 60
Varonis for Purview DSPMVaronisVaronis signals into Purview, data security teams gain unified visibility into sensitive data across
+1
Applicable to:
Azure Applications
35 out of 60
Exabeam Advanced AnalyticsMicrosoft Sentinel, Microsoft CorporationExabeam Advanced Analytics
+1
Applicable to:
Azure Applications
36 out of 60
Tetrate Istio Distro (TID)TetrateSimple, safe enterprise-grade Istio distro - Easiest way of installing, operating, and upgrading.
+1
Applicable to:
Containers
37 out of 60
Guacamole-On-Ubuntu24-04LTSCloudtrio SolutionsPreconfigured Ubuntu 24.04 LTS VM with Guacamole for secure, clientless remote desktop access to Windows, Linux, and servers through any web browser.
+1
Applicable to:
Virtual Machines
38 out of 60
Cribl.Cloud on Azure GovernmentCriblCribl.Cloud gives control over IT and security data without the hassle of running infrastructure.
+1
Applicable to:
SaaS
39 out of 60
Tenable Cloud SecurityTenableTenable Cloud Security is a holistic, cloud native application protection platform
+1
Applicable to:
SaaS
40 out of 60
Foxpass Cloud RADIUSSplashtopSecure cloud-based RADIUS for certificate-based Wi-Fi access. Compatible with Microsoft Cloud PKI.
+1
Applicable to:
SaaS
41 out of 60
IBM Hybrid Cloud, Connect IBM Power w/AzureConnectria, A LightEdge CompanyConnectria's fully managed hybrid cloud provides the ideal platform for IBM Power workload augmentation and modernization.
+1
Applicable to:
Managed Services
42 out of 60
ITQS | Manage Services Custom ClientsIT Quest SolutionsThis solution will provide the benefit of consulting services from ITQS as an MSP Partner. ITQS will provide support to customer in matters of monitoring, support, application of good practices and deployment of their infrastructure on Azure.
+1
Applicable to:
Managed Services
43 out of 60
Genetec Security Center(TM)Genetec Inc.Comprehensive unified security
+1
Applicable to:
SaaS
44 out of 60
Ivanti Unified Endpoint ManagementMicrosoft Sentinel, Microsoft CorporationIvantiUEM gives you the ability to enforce policy and privileges everywhere in a few clicks.
+1
Applicable to:
Azure Applications
45 out of 60
New Era Azure Managed ServicesNew Era TechnologyNew Era Azure Managed and Deployment Services. We can migrate, deploy and manage your Azure workloads. Our best practices include a strategic plan for migration to best utilize your Azure workloads
+1
Applicable to:
Managed Services
46 out of 60
MONITORAPP AIWAAP-VE for Azure (PAYG)MonitorappAIWAAP-VE (Application Insight Web Application & API Protection Virtual Edition) is a WAAP solution that offers blocking web attacks and API Security.
+1
Applicable to:
Virtual Machines
47 out of 60
IRONSCALESIronScalesIRONSCALES - A Simple, Fast, Affordable and Incredibly Powerful Anti-phishing Solution
+1
Applicable to:
SaaS
48 out of 60
OPSWAT MetaDefender Core LinuxOPSWAT, Inc.MetaDefender Core protects web applications and enterprise storage from malicious file content
+1
Applicable to:
Virtual Machines
49 out of 60
Command SaaS: Certificate Lifecycle AutomationKeyfactor, Inc.Prevent disruptive certificate outages and take back control with Command SaaS
+1
Applicable to:
SaaS
50 out of 60
Issabel-Ip-Pbx-On-Debian12Cloudtrio SolutionsIssabel IP PBX on Linux is a powerful, open-source unified communications solution designed for secure and scalable business telephony.
+1
Applicable to:
Virtual Machines
51 out of 60
A10 Lab - System Administration (SYSADM)A10 NetworksA10 Lab - System Administration (SYSADM)
+1
Applicable to:
Azure Applications
52 out of 60
Akeyless Secrets ManagementAKEYLESS SECURITY LTDA vault to manage and prevent secrets from being exposed in source code, configuration files
+1
Applicable to:
SaaS
53 out of 60
Managed Identity and Access (Zero Trust)ASAPCLOUDASAPCLOUDs Managed Identity and Access is a managed service of our Intelligent Security Services, providing a secure identity and access and is based on the Zero Trust approach and architecture.
+1
Applicable to:
Managed Services
54 out of 60
We OPTIMISE Your InfrastructureASAPCLOUDWe OPTIMISE Your Infrastructure is a managed service of our Intelligent Services. ASAPCLOUDs OPTIMISE Your Infrastructure manages a variety of advanced Azure solutions e.g. Azure Monitor, Azure Security Center, Azure Automation, Azure Arc, etc.
+1
Applicable to:
Managed Services
55 out of 60
CheckPhish by BolsterMicrosoft Sentinel, Microsoft CorporationCheckPhish by Bolster
+1
Applicable to:
Azure Applications
56 out of 60
Symantec Endpoint Protection SolutionMicrosoft Sentinel, Microsoft CorporationPrevent unapproved program execution and apply firewall policies to network traffic.
+1
Applicable to:
Azure Applications
57 out of 60
Silverfort Inc.Identity Security PlatformSilverfort Inc.Detect and prevent account takeover, privilege escalation, and lateral movement
+1
Applicable to:
SaaS
58 out of 60
EventTracker SIEMEventTracker SecurityEventTracker Security Centre
+1
Applicable to:
Virtual Machines
59 out of 60
Xray VLESS VPN-like Private Proxy ServerADEO Imaging OÜProxy server for secure, censorship-resistant traffic tunneling (VPN-like) using the VLESS protocol with TLS-encrypted REALITY obfuscation.
+1
Applicable to:
Virtual Machines
60 out of 60