FiltryWyczyść wszystko
Polecane aplikacje
Wyniki (Aplikacje) dla Zabezpieczenia
Pokazywanie wyników w aplikacje.
Ontinue ION MXDR LighthouseOntinue AGOntinue ION MXDR combines human experts with AI automation to ensure every incident is detected, investigated, and resolved with minimal involvement from your team.
+1
Applicable to:
Managed Services
1 out of 60
FY25 Private Offer ListingElisityElisity Private Offer Vehicle
+1
Applicable to:
SaaS
2 out of 60
WireGuard® on Windows Server 2022Belinda CZ s.r.o.Fast and secure VPN server
+1
Applicable to:
Virtual Machines
3 out of 60
Legacy IOC based Threat ProtectionMicrosoft Sentinel, Microsoft CorporationLegacy IOC based Threat Protection
+1
Applicable to:
Azure Applications
4 out of 60
Endpoint Threat Protection EssentialsMicrosoft Sentinel, Microsoft CorporationEndpoint Threat Protection Essentials
+1
Applicable to:
Azure Applications
5 out of 60
Cayosoft GuardianCayosoft Inc.Hybrid AD security, threat detection, and recovery, all in one solution
+1
Applicable to:
Azure Applications
6 out of 60
Web Application Attack TooledgeNEXUSWeb Application Attack Tool is a vulnerability scanner based on OWASP ZAP
+1
Applicable to:
Virtual Machines
7 out of 60
DNS Essentials Solution for Microsoft Sentinel (Preview)Microsoft Sentinel, Microsoft CorporationDNS Essentials Solution for Microsoft Sentinel
+1
Applicable to:
Azure Applications
8 out of 60
GigaVUE Cloud Suite for Azure (Past Releases)Gigamon, IncGigaVUE Cloud Suite for Azure delivers actionable network-derived intelligence to your security and observability tools
+1
Applicable to:
Virtual Machines
9 out of 60
Zero Trust Cyber Security Framework – Implementation & Readiness EngagementGolden Five LLCEnhance your security posture with Golden Five Consulting’s
Zero Trust Cyber Security Framework implementation. This Managed services engagement helps organizations strengthen identity, data, endpoint, and network protection while aligning with CMMC
+1
Applicable to:
Managed Services
10 out of 60
Crayon Fortinet Fortigate NGFW SolutionCrayonFortiGate Next-Generation Firewall delivers complete content and network protection.
+1
Applicable to:
Azure Applications
11 out of 60
Avanan Office 365 Email SecurityAvanan Inc.Advanced Anti-Phishing, Malware Protection, Account Compromise Detection, and Data Loss Prevention.
+1
Applicable to:
SaaS
12 out of 60
Symantec VIPMicrosoft Sentinel, Microsoft CorporationEnable ingestion of Symantec VIP's authentication logs into Microsoft Sentinel.
+1
Applicable to:
Azure Applications
13 out of 60
Ivanti Neurons for Secure AccessIvantiIvanti Neurons Secure Access helps customers with VPN deployments by centralizing VPN & zero trust
+1
Applicable to:
SaaS
14 out of 60
Morphisec | Anti-RansomwareMorphisecMorphisec | Anti-Ransomware for Microsoft Sentinel
+1
Applicable to:
Azure Applications
15 out of 60
Symantec ProxySG SolutionMicrosoft Sentinel, Microsoft CorporationMonitor, control, and secure traffic to ensure a safe web and cloud experience.
+1
Applicable to:
Azure Applications
16 out of 60
ReversingLabs Enrichment APIs For SentinelReversingLabsANY FILE. ANY LOCATION. ANY THREAT.
+1
Applicable to:
SaaS
17 out of 60
Airia Enterprise AI PlatformAiria LLCEnterprise AI Orchestration & Governance Platform
+1
Applicable to:
SaaS
18 out of 60
GoAccess Log AnalyzerATH InfosystemsVersion 1.10.2 + Free Support on Ubuntu 24.04
+1
Applicable to:
Virtual Machines
19 out of 60
Rubrik Integration with Sentinel for Ransomware ProtectionRubrik, Inc.Ensure your critical data is secure, discoverable, and always recoverable with Rubrik
+1
Applicable to:
Azure Applications
20 out of 60
ActiveIdM: Identity Solution AcceleratorActiveIdMAzure Cloud Identity, Entra ID, Identity Access, Identity Governance, and Identity Lifecycle
+1
Applicable to:
SaaS
21 out of 60
Cyren SentinelOne IOC AutomationData443Cyren IP reputation threat intelligence for Microsoft Sentinel with SentinelOne IOC automation.
+1
Applicable to:
Azure Applications
22 out of 60
vSEC:CMSVersasec ABCredential Management. Manage Smart Cards, USB-Tokens, Virtual Smart Cards, WHfB with PIV/PKI, FIDO2 and RFID.
+1
Applicable to:
Virtual Machines
23 out of 60
Proxy Server using Squid Proxy CacheCloud Infrastructure ServicesHigh performance Proxy Server using Squid Proxy Cache. Optimised for speed on Windows Server 2025
+1
Applicable to:
Virtual Machines
24 out of 60
GCT SaaS ZeroTrust Managed ServicesGlobal Computing and Telecoms LLCGCT SaaS ZeroTrust Managed Services – Secure, monitor, and enforce Zero Trust Security
+1
Applicable to:
SaaS
25 out of 60
ClamAVNiles Partners Inc.ClamAV refers to an open-source antivirus engine to detect Trojans, malware, viruses.
+1
Applicable to:
Virtual Machines
26 out of 60
12Port Privileged Access Management12Port IncAgentless privileged access management: secure credentials, broker sessions, and automate rotation. Deploy in minutes.
+1
Applicable to:
Virtual Machines
27 out of 60
Squid Proxy on Debian 13Cloud Infrastructure ServicesCloud Caching Proxy. Secure Your Azure Network Traffic. Reverse Proxy, Load Balancer, Content Filtering & Bandwidth Optimization.
+1
Applicable to:
Virtual Machines
28 out of 60
CyberArk Privilege Access Management for Microsoft SentinelCyberArkCyberArk Privilege Access Management for Microsoft Sentinel
+1
Applicable to:
Azure Applications
29 out of 60
Datawiza - No-code/Low-code Platform for Modern AuthDatawizaMFA, SSO, and Passwordless integration for your web applications and APIs
+1
Applicable to:
SaaS
30 out of 60
SIGNL4 - Mobile Alerting & Response for Microsoft Sentinel and Defender for CloudDerdackMobile alerting and incident response for Microsoft Sentinel and Defender for Cloud
+1
Applicable to:
Azure Applications
31 out of 60
VIAcode Azure Assist ServicesVIAcodeSuccess in Azure requires a comprehensive approach to managing and maintaining cloud infrastructure. Azure Assist provides the expertise, time, tools and discipline required to properly manage and optimize Azure cost, security, backup and other operations.
+1
Applicable to:
Managed Services
32 out of 60
NoSpamProxyNet at Work GmbHSecure E-Mail Gateway NoSpamProxy
+1
Applicable to:
Virtual Machines
33 out of 60
VPN Server IKEv2-MSCHAPv2ADEO Imaging OÜVPN Server IKEv2-MSCHAPv2 on Linux for Internet Access with User Management Web Panel.
+1
Applicable to:
Virtual Machines
34 out of 60
Squid Proxy ServerCloud Infrastructure ServicesDeploy a Squid Proxy Cache Server on Ubuntu 22.04. Fully-featured HTTP/1.1 proxy. 1 Click Install.
+1
Applicable to:
Virtual Machines
35 out of 60
RSA Authentication Manager 8.8.0.0.0RSA SecurityMulti-Factor Authentication and Identity Assurance
+1
Applicable to:
Azure Applications
36 out of 60
Putty-on-windows11proApps4Rent LLCPutty on windows is trending open-source popular and widely used open-source terminal emulator and serial console for Windows.
+1
Applicable to:
Virtual Machines
37 out of 60
VPN Server with Web Administration InterfaceElm ComputingVPN Server with Web GUI Admin provides a secure and user-friendly environment.
+1
Applicable to:
Virtual Machines
38 out of 60
Cribl.Cloud on Azure GovernmentCriblCribl.Cloud gives control over IT and security data without the hassle of running infrastructure.
+1
Applicable to:
SaaS
39 out of 60
Oracle Database Audit SolutionMicrosoft Sentinel, Microsoft CorporationEnable selective and effective auditing inside the Oracle database using policies and conditions.
+1
Applicable to:
Azure Applications
40 out of 60
Tenable Cloud SecurityTenableTenable Cloud Security is a holistic, cloud native application protection platform
+1
Applicable to:
SaaS
41 out of 60
Foxpass Cloud RADIUSSplashtopSecure cloud-based RADIUS for certificate-based Wi-Fi access. Compatible with Microsoft Cloud PKI.
+1
Applicable to:
SaaS
42 out of 60
IBM Hybrid Cloud, Connect IBM Power w/AzureConnectria, A LightEdge CompanyConnectria's fully managed hybrid cloud provides the ideal platform for IBM Power workload augmentation and modernization.
+1
Applicable to:
Managed Services
43 out of 60
GravityZone Security Virtual Appliance (SVA) Multi-PlatformBitDefender SRLGravityZone Security Virtual Appliance (SVA) Multi-Platform allows endpoints to offload endpoint security scanning and threat intelligence.
+1
Applicable to:
Virtual Machines
44 out of 60
SQL Advanced Threat ProtectionMicrosoftMonitor SQL Server activity to detect threats and receive action-oriented alerts to your Azure Security Center.
+1
Applicable to:
Azure Services
45 out of 60
ITQS | Manage Services Custom ClientsIT Quest SolutionsThis solution will provide the benefit of consulting services from ITQS as an MSP Partner. ITQS will provide support to customer in matters of monitoring, support, application of good practices and deployment of their infrastructure on Azure.
+1
Applicable to:
Managed Services
46 out of 60
Genetec Security Center(TM)Genetec Inc.Comprehensive unified security
+1
Applicable to:
SaaS
47 out of 60
ParrotOSNtegral Inc.Parrot OS, ParrotOS Linux packaged by Ntegral Inc, optimized cloud-based virtual desktop
+1
Applicable to:
Virtual Machines
48 out of 60
IRONSCALESIronScalesIRONSCALES - A Simple, Fast, Affordable and Incredibly Powerful Anti-phishing Solution
+1
Applicable to:
SaaS
49 out of 60
Ncat-on-windows11proApps4Rent LLCNcat on windows are trending open-source versatile networking tool that can be used for a variety of purposes.
+1
Applicable to:
Virtual Machines
50 out of 60
Command SaaS: Certificate Lifecycle AutomationKeyfactor, Inc.Prevent disruptive certificate outages and take back control with Command SaaS
+1
Applicable to:
SaaS
51 out of 60
Issabel-Ip-Pbx-On-Debian12Cloudtrio SolutionsIssabel IP PBX on Linux is a powerful, open-source unified communications solution designed for secure and scalable business telephony.
+1
Applicable to:
Virtual Machines
52 out of 60
Topicus KeyHubTopicus BVYour complete access management solution for SSO, realtime provisioning and password management
+1
Applicable to:
Virtual Machines
53 out of 60
OnedevpcloudhostingVersion 11.7.2 + Free Support on Debian 12
+1
Applicable to:
Virtual Machines
54 out of 60
Aviatrix Secure Networking Platform BYOLAviatrix Systems, Inc.Aviatrix BYOL controller manages multi-cloud networking, security, and user access.
+1
Applicable to:
Virtual Machines
55 out of 60
Forcepoint Email Security V8.5ForcepointAnalyzes and protects inbound and outbound Microsoft Exchange Online email.
+1
Applicable to:
Azure Applications
56 out of 60
SHI Cloud Governance FrameworkSHI International CorpSHI Cloud Governance Framework is our approach for how we help customers, both new to cloud and existing cloud customers, regardless of their maturity, achieve improved cloud governance and accelerate their Azure usage in a controlled but secure way.
+1
Applicable to:
Managed Services
57 out of 60
Akeyless Secrets ManagementAKEYLESS SECURITY LTDA vault to manage and prevent secrets from being exposed in source code, configuration files
+1
Applicable to:
SaaS
58 out of 60
Phoenix Lighthouse - Managed ServicesPHOENIX SOFTWARE LTDManaging your Azure environment can be a time-consuming task our Cloud Managed Service can give you peace of mind. Our team of experienced Cloud Consultants will deliver ongoing management, configuration & security assessments alongside cost analysis.
+1
Applicable to:
Managed Services
59 out of 60
CheckPhish by BolsterMicrosoft Sentinel, Microsoft CorporationCheckPhish by Bolster
+1
Applicable to:
Azure Applications
60 out of 60