FiltryWyczyść wszystko
Polecane aplikacje
Wyniki (Aplikacje) dla Zabezpieczenia
Pokazywanie wyników w aplikacje.
BeamSec Email EncrpytionBEAM TEKNOLOJİ A.Ş.Beamsec Emcrpt ensures a robust defense against data breaches, securing email communication.
+1
Applicable to:
SaaS
1 out of 60
Hardened Red Hat Enterprise Linux 8 – Security Optimized EditionMadarson It, LLCAzure-based VM pre-configured with Red Hat Enterprise Linux 8 image, hardened and security-optimized to enhance compliance and reduce cyber risk.
+1
Applicable to:
Virtual Machines
2 out of 60
Hardened Red Hat Enterprise Linux 8 – Advanced Security Optimization (Level 2)Madarson It, LLCAzure-based VM pre-configured with RHEL 8 image, hardened to Level 2 standards for advanced security and compliance in high-assurance environments.
+1
Applicable to:
Virtual Machines
3 out of 60
IDENTOS OIDC RSA (SaaS)Identos IncEfficient integration of OIDC and OAuth-protected resource servers to join UMA 2.0 ecosystem.
+1
Applicable to:
SaaS
4 out of 60
Gauntlet - Cyber Security Exercise PlatformRetrospect Labs Pty LtdGauntlet enables organisations to design and deliver meaningful cyber security exercises on demand
+1
Applicable to:
SaaS
5 out of 60
MaxiCyber - National/Enterprise Threat IntelligenceMaximum Group DigitalMaxiCyber - National/Enterprise Threat Intelligence - Proactive Cyber Threat Management
+1
Applicable to:
SaaS
6 out of 60
Security Guardian for Microsoft 365Sentinel Technologies Inc.Improve Security Analysis & Posture Management of Microsoft 365 today!
+1
Applicable to:
SaaS
7 out of 60
Seconize DeRisk Center - Compliance Audit AutomationSeconizeStreamline and automate your cybersecurity compliance audits
+1
Applicable to:
SaaS
8 out of 60
Managed Vulnerability IntelligenceOrange Cyberdefense GlobalStay on top of vulnerabilities to patch them before attackers exploit them
+1
Applicable to:
SaaS
9 out of 60
Azure-based Hardened Red Hat Enterprise Linux 9 – Foundational Security BaselineMadarson It, LLCAzure-based VM pre-configured with Red Hat Enterprise Linux 9 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
10 out of 60
Azure-based Hardened Red Hat Enterprise Linux 9 – Advanced Security Baseline (Level 2)Madarson It, LLCAzure-based VM pre-configured with RHEL 9 image, hardened to Level 2 standards for enhanced protection and compliance in regulated environments.
+1
Applicable to:
Virtual Machines
11 out of 60
Titan ICAP Server for WindowsSouth River TechnologiesICAP server that detects Trojans, malware, viruses and other threats
+1
Applicable to:
Virtual Machines
12 out of 60
eScan Anti-Virus (Cyber Vaccine Edition)Microworld Technologies, Inc.Safeguarding home-based users with antivirus protection.
+1
Applicable to:
SaaS
13 out of 60
eScan Enterprise Data Leak Prevention (DLP)Microworld Technologies, Inc.eScan Enterprise DLP: Safeguard sensitive data, and enforce security policies effectively.
+1
Applicable to:
SaaS
14 out of 60
eScan Internet Security Suite for BusinessMicroworld Technologies, Inc.Advance protection for SMB (Small and Medium-sized Business)
+1
Applicable to:
SaaS
15 out of 60
eScan Total Security Suite (Cyber Vaccine Edition)Microworld Technologies, Inc.Securing home-based users with comprehensive antivirus protection.
+1
Applicable to:
SaaS
16 out of 60
eScan Total Security Suite for BusinessMicroworld Technologies, Inc.Cutting-edge security tailored to the unique needs of SMBs, Enhancing protection against threats.
+1
Applicable to:
SaaS
17 out of 60
eScan Elite for BusinessMicroworld Technologies, Inc.Advanced cybersecurity solutions designed for SMBs to protect against emerging threats.
+1
Applicable to:
SaaS
18 out of 60
eScan Ultra Security for EnterpriseMicroworld Technologies, Inc.Advanced protection for enterprises and SMBs (Small and Medium-sized Businesses).
+1
Applicable to:
SaaS
19 out of 60
eScan Enterprise Endpoint Detection & Response (EDR)Microworld Technologies, Inc.eScan EDR: Layered endpoint protection with real-time visibility and remediation for endpoints.
+1
Applicable to:
SaaS
20 out of 60
Linux 8.6 Minimal with VPN Server (RHEL® - based)Virtual Pulse S. R. O.Useful open-source VPN protocol
+1
Applicable to:
Virtual Machines
21 out of 60
Red Hat Enterprise Linux 9 DesktopMadarson It, LLCAzure-based Red Hat Enterprise Linux 9 Virtual Desktop pre-configured with GUI/RDP access.
+1
Applicable to:
Virtual Machines
22 out of 60
Red Hat Enterprise Linux 9 Compliance-Aligned Secure DesktopMadarson It, LLCSecurity-hardened Red Hat Enterprise Linux 9 desktop with GUI and RDP access, optimized for Azure cloud workloads.
+1
Applicable to:
Virtual Machines
23 out of 60
Debian 10 Minimal with VPN ServerVirtual Pulse S. R. O.Secure and private networking with Debian 10 Minimal with VPN Server
+1
Applicable to:
Virtual Machines
24 out of 60
HackGATE Professional versionHACKRATEThe industry's first comprehensive solution for controlling and monitoring pentest projects.
+1
Applicable to:
SaaS
25 out of 60
eScan Internet Security Suite (Cyber Vaccine Edition)Microworld Technologies, Inc.Ensuring home-based users safety with powerful antivirus protection.
+1
Applicable to:
SaaS
26 out of 60
Security Risk and Compliance AssessmentMaximum Group DigitalSecurity Risk and Compliance Assessment, a thorough evaluation of the company's compliance stance
+1
Applicable to:
SaaS
27 out of 60
Hardened Red Hat Enterprise Linux 8 Server with GUI and RDP AccessMadarson It, LLCHardened Red Hat Enterprise Linux 8 VM with GUI & RDP access on Azure
+1
Applicable to:
Virtual Machines
28 out of 60
Linux 7.9 Minimal with VPN ServerVirtual Pulse S. R. O.Establish a secure and private network environment with Linux 7.9 Minimal with VPN Server
+1
Applicable to:
Virtual Machines
29 out of 60
Oracle Linux 9 – Level 2 Hardened (Enterprise Compliance Build)Madarson It, LLCEnterprise-grade Oracle Linux 9 VM hardened to Level 2 for compliance-first cloud deployments and audit-ready infrastructure.
+1
Applicable to:
Virtual Machines
30 out of 60
Advanced Hardened Oracle Linux 8 image - Level 2 SecurityMadarson It, LLCAzure-based VM pre-configured with the latest Oracle Linux 8 image, hardened and optimized for level 2 security and compliance.
+1
Applicable to:
Virtual Machines
31 out of 60
Hardened Oracle Linux 8 Server with GUI and RDP AccessMadarson It, LLCHardened Oracle Linux 8 VM with GUI & RDP access on Azure
+1
Applicable to:
Virtual Machines
32 out of 60
Hardened Oracle Linux 9 Server with GUI and RDP AccessMadarson It, LLCHardened Oracle Linux 9 VM with GUI & RDP access on Azure
+1
Applicable to:
Virtual Machines
33 out of 60
TechHouse's Aware for Microsoft 365 - Professional ServicesTechHouseMake Security Simple with Aware for Microsoft 365
+1
Applicable to:
SaaS
34 out of 60
Security-Hardened Image for Windows Server 2019 – Level 1 ComplianceMadarson It, LLCAzure-based VM pre-configured with the latest Microsoft Windows Server 2019 image, hardened and optimized for security and regulatory compliance.
+1
Applicable to:
Virtual Machines
35 out of 60
Kali Linux (ARM64)NuvemnestDebian-based OS, specializes in advanced penetration testing.
+1
Applicable to:
Virtual Machines
36 out of 60
Microsoft Security Managed ServicesParamount Computer Systems LLCManaged Services for Microsoft Security offers a multitude of benefits, including enhanced security operations, optimized cloud resource usage, improved performance, and compliance adherence from our expert cyber security professionals round the clock.
+1
Applicable to:
Managed Services
37 out of 60
Debian 11 Minimal with VPN ServerVirtual Pulse S. R. O.Enhance your network security and privacy with Debian 11 Minimal with VPN Server
+1
Applicable to:
Virtual Machines
38 out of 60
Ubuntu 20.04 Minimal with VPN ServerVirtual Pulse S. R. O.Handy open-source VPN tool
+1
Applicable to:
Virtual Machines
39 out of 60
Hardened Red Hat Enterprise Linux 10 with Cockpit, Podman & Security ToolsMadarson It, LLCAzure-based VM pre-configured with RHEL 10, Cockpit, Podman, Buildah, Skopeo, and key security tools — now hardened for enhanced security compliance.
+1
Applicable to:
Virtual Machines
40 out of 60
Advanced Hardened Red Hat Enterprise Linux 9.7Madarson It, LLCAzure-based VM pre-configured with Red Hat Enterprise Linux 9.7, hardened for enhanced security and compliance.
+1
Applicable to:
Virtual Machines
41 out of 60
Hardened Red Hat Enterprise Linux 9.7 – Core Compliance ImageMadarson It, LLCAzure-based VM running RHEL 9.7, pre-configured with baseline security hardening for general-purpose secure deployments.
+1
Applicable to:
Virtual Machines
42 out of 60
PAN Private Offers for Cloud NGFW CreditsTD SYNNEX CorporationLooking for a managed service that can help secure your applications and protect against threats?
+1
Applicable to:
SaaS
43 out of 60
Hardened Debian Linux 12 image - Level 1: FoundationalMadarson It, LLCAzure-based VM with the latest Debian Linux 12 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
44 out of 60
Hardened Debian GNU/Linux 12 DesktopMadarson It, LLCAzure-based virtual desktop with the latest Debian GNU/Linux 12 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
45 out of 60
Debian GNU/Linux 11 Hardened Image – Level 1: Foundational SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 11 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
46 out of 60
Debian GNU/Linux 11 Hardened Image – Level 2: Advanced SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 11 image, hardened and optimized for advanced security and compliance.
+1
Applicable to:
Virtual Machines
47 out of 60
Debian GNU/Linux 12 Hardened Image – Level 2: Advanced SecurityMadarson It, LLCAzure-based VM with the latest Debian Linux 12 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
48 out of 60
Transmit Security Data Connector for Microsoft SentinelTransmit Security LTDTransmit Security Data Connector for Microsoft Sentinel
+1
Applicable to:
Azure Applications
49 out of 60
PAN VM Series FLEX Private OfferTD SYNNEX CorporationLooking to secure your applications in Azure, protect against threats and prevent data exfiltration?
+1
Applicable to:
SaaS
50 out of 60
AlmaLinux 8 DesktopMadarson It, LLCAzure-based AlmaLinux 8 Virtual Desktop pre-configured with GUI/RDP access.
+1
Applicable to:
Virtual Machines
51 out of 60
Hardened Alma Linux 8 Desktop with GUI AccessMadarson It, LLCAzure-based virtual desktop with the latest AlmaLinux 8 image pre-configured with GUI/RDP access, optimized, and hardened for security.
+1
Applicable to:
Virtual Machines
52 out of 60
Trustwave Advanced Phishing ScannerTrustwave Holdings, Inc.Free phishing scanner that identifies potential threats which have bypassed your SEG
+1
Applicable to:
SaaS
53 out of 60
Performanta Azure Lighthouse ConnectionsPerformantaA specialized implementation of Azure Lighthouse designed for Performanta, a Managed Security Service Provider (MSSP). This service enables Performanta to manage and oversee their customers' Azure environments with enhanced precision and efficiency.
+1
Applicable to:
Managed Services
54 out of 60
Hardened AlmaLinux 10 with Cockpit & Local AI System Assistant – Security CompliantMadarson It, LLCHardened Alma Linux 10 with Cockpit and a local AI assistant for secure, AI-assisted Linux management.
+1
Applicable to:
Virtual Machines
55 out of 60
Advanced Hardened ALMA Linux 8 image - Level 2 SecurityMadarson It, LLCAzure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for level 2 security and compliance.
+1
Applicable to:
Virtual Machines
56 out of 60
Madarson IT Hardened AlmaLinux 8 – Secure and Optimized for AzureMadarson It, LLCAzure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for security and compliance.
+1
Applicable to:
Virtual Machines
57 out of 60
BreachRisk™ CoPilot for SecurityBreachBItsRed Team attack surface management and accurate risk scoring from the hackers perspective.
+1
Applicable to:
SaaS
58 out of 60
DashMagiqVidyatech Solutions Private LimitedDashMagiq® DLP Workflow incident remidiation automation with automatic audit trail for compliance.
+1
Applicable to:
SaaS
59 out of 60
Linux Stream 9 Minimal with VPN ServerVirtual Pulse S. R. O.Securely access your network from anywhere with Linux Stream 9 Minimal with VPN Server
+1
Applicable to:
Virtual Machines
60 out of 60