FiltryWyczyść wszystko
Polecane aplikacje
Wyniki (Aplikacje) dla Zabezpieczenia
Pokazywanie wyników w aplikacje.
Fraud Risk SuiteThreatFabric B.V.Fraud Prevention Built on Actionable Threat Intelligence
+1
Applicable to:
SaaS
1 out of 60
dwitchTAE SEOK LEESaaS-type API service that identifies and anonymizes sensitive information within unstructured-data.
+1
Applicable to:
SaaS
2 out of 60
E-Visor for Microsoft Defender for CloudSynergy Advisors LLCE-Visor enhances Microsoft Defender for Cloud with advanced analytics in cloud environments
+1
Applicable to:
Azure Applications
3 out of 60
Secure Access MPO + REOCisco Systems, Inc.Cisco Secure Access resource connectors securely forward authorized remote user traffic to resources on your network using Zero Trust Network Access.
+1
Applicable to:
Virtual Machines
4 out of 60
Digital Security Operations Center (DSOC)IntrostatProtect your business with the advanced Digital Security Operations Center.
+1
Applicable to:
SaaS
5 out of 60
tgdata.io – Telegram API SearchCorvus Intelligence LLCExplore and analyze public Telegram messages with powerful search and data correlation tools.
+1
Applicable to:
SaaS
6 out of 60
360 Security Operations CenterUrbanise TechnologyEnhance your cybersecurity with 360 Security Operations Center's reliable and efficient solutions.
+1
Applicable to:
SaaS
7 out of 60
RSA ID Plus Admin Logs ConnectorRSA SecurityRSA ID Plus Admin Connector monitors administrator activity within the customer’s ID Plus tenant
+1
Applicable to:
Azure Applications
8 out of 60
Netskope Cloud Exchange V6.0.0Netskopeioc, log management, data protection, cyber risk, ticketing, threat protection, zero trust, sse, sase
+1
Applicable to:
Virtual Machines
9 out of 60
Managed Attack Surface Reduction (ASR) Automation - for Azure, EntraID and Microsoft Defender & IntuneAdnovum AGEnsure proactive security with an AI-based maturity level tool
+1
Applicable to:
SaaS
10 out of 60
PresideTech Partner PortalPreside Inc.Partner Portal plus Azure Active Directory and Hybrid Azure Directory Backup and Recovery
+1
Applicable to:
SaaS
11 out of 60
BaseelRiskManagementDeeshaa LimitedBaseel Risk Tool
+1
Applicable to:
SaaS
12 out of 60
TacitRed by Data443Data443Fully actionable threat findings within your external attack surface with just a domain.
+1
Applicable to:
SaaS
13 out of 60
Red Teaming AgentsXenonStackSimulate real-world attacks with AI Red Team agents to harden cloud, SOC, and AI systems.
+1
Applicable to:
SaaS
14 out of 60
eSHARE GoverneSHAREEnsure users comply with least privilege link sharing policies without breaking business workflows
+1
Applicable to:
SaaS
stepsecurity-platformStep Security, Inc.StepSecurity mitigates risks, prevents security incidents, and secures CI/CD software supply chain
+1
Applicable to:
SaaS
16 out of 60
LinkShadow ITDR vSensorLINKSHADOW LIMITEDLinkShadow Identity Threat Detection & Response (ITDR) Protect against identity-based threats with proactive detection & response.
+1
Applicable to:
Virtual Machines
17 out of 60
DevUP Helium Health CheckDevUP Solutions ABIntelligent security analytics for actionable insights into your Azure environment configuration.
+1
Applicable to:
SaaS
18 out of 60
Paramount SOCGenie AI - SOCaaSParamount Computer Systems LLCParamount SOCGenie AI – 24×7 managed security operations powered by Microsoft Sentinel, XDR, and Security Copilot. Silver, Gold, and Platinum tiers scale from SMBs to enterprises with 25 GB to unlimited ingestion.
+1
Applicable to:
Managed Services
19 out of 60
CISO Score EnterpriseCYBER AUTOMATION PTY LTDCyber Automation Pty Ltd
+1
Applicable to:
SaaS
20 out of 60
easyCMMCCloudFit SoftwareeasyCMMC by CloudFit Software - Simplifying CMMC Compliance for Small and Mid-Sized Businesses
+1
Applicable to:
SaaS
21 out of 60
LinkShadow CMX vSensorLINKSHADOW LIMITEDLinkShadow CyberMeshX Platform is a next-generation AI-driven cybersecurity platform built on a modular Cyber Mesh Architecture.
+1
Applicable to:
Virtual Machines
22 out of 60
VMRay Connector to Microsoft SentinelVMRay GmbHYour own TI feed created by VMRay
+1
Applicable to:
Azure Applications
23 out of 60
CyberArk Privileged Access Manager 3 and 4 yrCyberArkAchieve the highest level of security for cloud by implementing the CyberArk PAM solution.
+1
Applicable to:
SaaS
24 out of 60
CyberArk Core PAS 4yrsCyberArkAchieve the highest level of security for cloud by implementing the CyberArk PAM solution.
+1
Applicable to:
SaaS
25 out of 60
One Identity Starling ConnectQuestSCIM Connectors for user account synchronization and provisioning to Cloud Applications
+1
Applicable to:
SaaS
26 out of 60
BoundarypcloudhostingVersion 0.20.0 + Free Support on Ubuntu 24.04
+1
Applicable to:
Virtual Machines
27 out of 60
Accelerate SaaS Threat Detection and ResponseObsidian SecuritySecure critical SaaS apps end-to-end with real-time threat detection and complete event visibility.
+1
Applicable to:
Azure Applications
28 out of 60
MongoDB Atlas Solution for Microsoft SentinelMongoDB, Inc.Bring your MongoDB Atlas Database logs to Microsoft Sentinel to manage Atlas Security from Sentinel
+1
Applicable to:
Azure Applications
29 out of 60
Ascend Defend GuardianAscend Technologies, LLCManaged security suite backed by Microsoft-certified experts who configure, manage, and monitor your systems 24/7—providing real-time threat detection and response across identities, email, endpoints, and apps, with integrated SIEM (Microsoft Sentinel)
+1
Applicable to:
Managed Services
30 out of 60
Paramount SOCGenie AIParamount Computer Systems LLCParamount SOCGenie AI - SOCaaS
+1
Applicable to:
SaaS
31 out of 60
Snare Central BYOLProphecy International Pty LtdSnare Central - Central Log Management Solution
+1
Applicable to:
Virtual Machines
32 out of 60
RSA Advisor for Admin ThreatsRSA SecurityAnalyzes ID Plus admin events to detect suspicious or compromised account activity.
+1
Applicable to:
SaaS
33 out of 60
Splunk MCP ServerSplunkSplunk MCP Server
+1
Applicable to:
SaaS
34 out of 60
Worry Free Endpoint SecurityData ProsProtects devices from threats with advanced security features and easy management.
+1
Applicable to:
SaaS
35 out of 60
Zscaler Incident ReceiverZscaler, Inc.The Zscaler Incident Receiver is a tool to securely receive DLP policy violation details via ICAP.
+1
Applicable to:
Virtual Machines
36 out of 60
Data Leak AgentadaQuestInvestigates Sentinel incidents for data leaks and delivers a clear verdict with evidence and action
+1
Applicable to:
SaaS
37 out of 60
Attack Mapping Agentglueckkanja AGAutomatically validates and optimizes MITRE ATT&CK mappings for Microsoft Sentinel analytic rules
+1
Applicable to:
SaaS
38 out of 60
Platinum Technology – Azure Billing & Operations (Managed Service)Platinum Technology Managed ServicesDelegate access to Platinum Technology for billing and infrastructure operations using Azure Lighthouse.
+1
Applicable to:
Managed Services
39 out of 60
Identity Security Posture by BlueVoyantBlueVoyantAI agent built to deliver health + trends assessments for Microsoft Entra environments.
+1
Applicable to:
SaaS
40 out of 60
XDR Security Posture by BlueVoyantBlueVoyantAI agent built to deliver XDR Security Posture assessments for Microsoft Defender XDR environments.
+1
Applicable to:
SaaS
41 out of 60
SIEM Optimizer by BlueVoyantBlueVoyantAI agent built to deliver SIEM Optimization recommendations for Microsoft Sentinel environments.
+1
Applicable to:
SaaS
42 out of 60
Digitrustec Visitor Management SystemDIYAR UNITED TRAD. & CONT. CO.Scalable, secure check‑ins, multi‑site control, and ID verification
+1
Applicable to:
Azure Applications
43 out of 60
Skysecure Infinity-Shield Managed XDRSkysecure Technologies Pvt. Ltd.Skysecure Managed XDR is a turnkey XDR service built on the Microsoft Defender XDR platform. It seamlessly protects endpoints, identities, email, SaaS apps and cloud workloads using AI‑driven incident correlation automatic threat detection and healing.
+1
Applicable to:
Managed Services
44 out of 60
Managed XDR SOC Service with Incident ResponseTRUESEC ABWorld class monitoring, detection and response of endpoints, identities and cloud to stop attacks
+1
Applicable to:
SaaS
45 out of 60
Cyber Security Awareness Training & PlatformKnowledge AcceleratorsComplete Cybersecurity Awareness & Training Platform with microlearning courses, interactive...
+1
Applicable to:
SaaS
46 out of 60
BlueVoyant MXDR for MicrosoftBlueVoyant UKCombine Microsoft SIEM and XDR with 24x7 monitoring and SOC operations
+1
Applicable to:
SaaS
47 out of 60
ContraForce Workspace LicenseContraForceAdd-on Workspace License
+1
Applicable to:
SaaS
48 out of 60
Security Solutions PackageDIYAR UNITED TRAD. & CONT. CO.Diyar offers Security Solutions for Identity Data and Endpoint Security managed from Azure
+1
Applicable to:
SaaS
49 out of 60
Zero Trust PosturePeople Tech Group IncAutomatically scans identity, device, and cloud configurations to find and prioritize Zero-Trust gap
+1
Applicable to:
SaaS
50 out of 60
Insider Risk Profilerglueckkanja AGPrioritizes insider risk alerts by integrating signals from Defender, Purview, and Microsoft Entra.
+1
Applicable to:
SaaS
51 out of 60
Pathlock CAC: Threat Detection & Response Microsoft Sentinel IntegrationPathlock, Inc.Threat Detection and Response for SAP
+1
Applicable to:
Azure Applications
52 out of 60
OLOID Passwordless AuthenticationOloid Inc.OLOID Passwordless Authentication enables secure access without the need for passwords.
+1
Applicable to:
SaaS
53 out of 60
MXDR Var GroupVar GroupMXDR Var Group: sicurezza H24 con AI, XDR e risposta automatica alle minacce.
+1
Applicable to:
SaaS
54 out of 60
Shadow Saas DiscoveryPeople Tech Group IncAnalyses SaaS usage across identity, device, and cloud activity to uncover Shadow SaaS.
+1
Applicable to:
SaaS
55 out of 60
Credential Theft Hunt and Anomaly ValidationPeople Tech Group IncAutomatically correlates endpoint, identity, and network logs to validate credential theft alerts.
+1
Applicable to:
SaaS
56 out of 60
Supply Chain Third Party RiskPeople Tech Group IncIdentify and mitigate third-party risks in your supply chain effectively.
+1
Applicable to:
SaaS
57 out of 60
Noma SecurityNoma SecurityAI and Agent Security Platform
+1
Applicable to:
SaaS
58 out of 60
OneTrust for Purview DSPMOT Technology, Inc.Monitor sensitive data in near real time across Google Cloud and other OneTrust supported sources
+1
Applicable to:
Azure Applications
59 out of 60
Luminar Threat Intelligence for Microsoft Defendercognyte technologies israel ltdIntegration of intelligence-based IOCs identified by Luminar
+1
Applicable to:
SaaS
60 out of 60