FiltryWyczyść wszystko
Polecane aplikacje
Wyniki (Aplikacje) dla Zabezpieczenia
Pokazywanie wyników w aplikacje.
AiTM FeedLab539Actively preventing account takeover attacks by blocking AiTM infrastructure before it's weaponised
+1
Applicable to:
SaaS
1 out of 60
MXDRAtea<h2>Atea Managed Detection and Response for Microsoft Sentinel (MXDR)</h2>
<p>Managed service which combines Microsoft SIEM and XDR with 24x7 monitoring and SOC operations.</p>
<p>Add world class Incident response approved by National Security Authority
+1
Applicable to:
Managed Services
2 out of 60
Tanium Security Triage Agent with Identity InsightsTanium IncAccelerate alert triage for SOCs using real-time data from Tanium and Microsoft Entra ID
+1
Applicable to:
SaaS
3 out of 60
GDPR ComplianceMicrosoft Sentinel, Microsoft CorporationReport for evaluating your organization's compliance to GDPR guidelines
+1
Applicable to:
Azure Applications
4 out of 60
Labrador OSS SaaSLabrador Labs Streamline open-source security with Labrador OSS for comprehensive vulnerability scans.
+1
Applicable to:
SaaS
5 out of 60
LRQA Managed Sentinel XDRLRQA CyberLRQA’s Managed service for Sentinel provides a fully managed Microsoft Sentinel environment, operated by our 24x7 Security Operations Centre (SOC). We deliver proactive monitoring, advanced threat detection, and rapid incident response
+1
Applicable to:
Managed Services
6 out of 60
Courier IDByrnuPasswordless Email Authentication, OAuth2/OIDC provider
+1
Applicable to:
SaaS
7 out of 60
Compliance Drift And Configuration DeviationPeople Tech Group IncDetects and prioritizes deviations from baseline configurations across Azure and managed endpoints.
+1
Applicable to:
SaaS
8 out of 60
Proofpoint Satori™ Emerging Threats Intelligence AgentProofpoint, Inc.Identify actively exploited vulnerabilities to effectively prioritize remediation.
+1
Applicable to:
SaaS
9 out of 60
Lumen Defender℠ Advanced Managed Detection & Response (AMDR) with Microsoft SentinelLumen TechnologiesLumen Defender℠ Advanced Managed Detection & Response (AMDR) is a cloud-based, managed SOC Service.
+1
Applicable to:
SaaS
10 out of 60
Acronis Cyber Protect CloudAcronisIngest Acronis alerts, events, and activities into Microsoft Sentinel
+1
Applicable to:
Azure Applications
11 out of 60
Curity Identity ServerCurityIdentity Management for APIs, apps and websites
+1
Applicable to:
Containers
12 out of 60
HIPAA ComplianceMicrosoft Sentinel, Microsoft CorporationHIPAA Compliance
+1
Applicable to:
Azure Applications
13 out of 60
SinartisisSINARTISIS ENGINEERINGAutomated security checks for Microsoft 365 and Entra ID with clear, exportable results.
+1
Applicable to:
SaaS
14 out of 60
IAM Shield Security AgentiLink Systems, Inc.IAM Shield Security Agent uses AI to autonomously detect and investigate identity risks.
+1
Applicable to:
SaaS
15 out of 60
ESET PROTECT MDRESETAll-in-one protection with 24/7 MDR service
+1
Applicable to:
SaaS
16 out of 60
TeamScore: Visibility into Work without SurveillanceAscendius IncTrack and improve team performance with AI powered insights and *no spyware*
+1
Applicable to:
SaaS
17 out of 60
Entra Verified ID Implementation & Managed Identity ServicesSimplicity IT Inc.Build a secure, privacy-first digital identity ecosystem with Entra Verified ID. Issue trusted credentials, automate verification, ensure compliance, and gain 24/7 managed identity support through Azure Lighthouse.
+1
Applicable to:
Managed Services
18 out of 60
Entra Verified ID with Govt Proofing & Managed ComplianceSimplicity IT Inc.Prevent identity fraud and streamline onboarding with Simplicity IT’s Managed Entra Verified ID. We deliver W3C decentralized identity with real-time Government ID proofing and biometrics to meet strict compliance and eliminate credential theft.
+1
Applicable to:
Managed Services
19 out of 60
Netcat Debian12 BookwormCloudtrio SolutionsPreconfigured Debian 12 (Bookworm) VM with Net Cat installed for networking, debugging, testing, and secure remote communication tasks on Azure.
+1
Applicable to:
Virtual Machines
20 out of 60
Integration: ESET and OpenCTI by FiligranESETESET's threat intelligence data, consolidated into OpenCTI tools, enhances cybersecurity teams
+1
Applicable to:
SaaS
21 out of 60
iProov WorkforceiProov LimitedSecure and seamless biometric authentication for the modern workforce
+1
Applicable to:
SaaS
22 out of 60
Cloudtrio Caddy On Ubuntu22 04LTSCloudtrio SolutionsPreconfigured Ubuntu 22.04 LTS VM with Caddy for secure web hosting, reverse proxying, and automated HTTPS deployments on Azure.
+1
Applicable to:
Virtual Machines
23 out of 60
Caddy-On-Debian12Cloudtrio SolutionsPreconfigured Debian 12 VM with Caddy for secure web hosting, reverse proxying, and automated HTTPS deployments on Azure.
+1
Applicable to:
Virtual Machines
24 out of 60
Printunlvpn-On-Ubuntu22-04LTSCloudtrio SolutionsPreconfigured Ubuntu 22.04 LTS VM with Pritunl VPN for secure remote access, user authentication, and encrypted network connectivity.
+1
Applicable to:
Virtual Machines
25 out of 60
Caddy-On--Ubuntu-24-04LTSCloudtrio SolutionsPreconfigured Ubuntu 24.04 LTS VM with Caddy for secure web hosting, reverse proxying, and automated HTTPS deployments.
+1
Applicable to:
Virtual Machines
26 out of 60
Pritunlvpn-On-Debian12Cloudtrio SolutionsPreconfigured Debian 12 VM with Pritunl VPN for secure remote access, user authentication, and encrypted network connectivity.
+1
Applicable to:
Virtual Machines
27 out of 60
Shopguard Idkey SSOShopguardSingle Sign-On (SSO) integration for ShopGuard IDKey using Microsoft Entra ID.
+1
Applicable to:
SaaS
28 out of 60
Cognyte LUMINAR solution for Microsoft Entracognyte technologies israel ltdAI-powered external threat intelligence with compromised credentials feed integrated into Microsoft
+1
Applicable to:
SaaS
29 out of 60
Varonis for Purview DSPMVaronisVaronis signals into Purview, data security teams gain unified visibility into sensitive data across
+1
Applicable to:
Azure Applications
30 out of 60
Quokka Q-scout for Microsoft SentinelQuokkaUnified visibility into the risks of mobile apps installed across Intune-managed devices
+1
Applicable to:
Azure Applications
31 out of 60
SAP on AzureGyanSys Inc.GyanSys SAP on Azure – Cloud ERP Transformation and Managed Services helps enterprises modernize and manage SAP workloads on Microsoft Azure with proven frameworks, automation, and continuous innovation.
+1
Applicable to:
Managed Services
32 out of 60
USB Wipe ToolBitRecoverTrusted, Certified and Secure Way to Wipe USB Drive Data Completely
+1
Applicable to:
SaaS
33 out of 60
M 2 Drive WiperBitRecoverFast, secure and reliable tool to wipe M.2 drive with ease
+1
Applicable to:
SaaS
34 out of 60
Postgresqlpython-On-Ubuntu22-04LTSCloudtrio Solutions“Preconfigured Ubuntu 22.04 LTS VM with PostgreSQL and Python for database-driven applications, analytics, and automation on Azure.”
+1
Applicable to:
Virtual Machines
35 out of 60
Postgresqlpython-On-Debian12Cloudtrio SolutionsPreconfigured Debian 12 virtual machine with Python, designed for AI, data science, automation, and PostgreSQL-based application development.
+1
Applicable to:
Virtual Machines
36 out of 60
Snipeit-On-Debian12Cloudtrio Solutions“Preconfigured Debian 12 VM with Snipe-IT for seamless IT asset management. This image includes all required dependencies and a fully configured .
+1
Applicable to:
Virtual Machines
37 out of 60
Snipeit-On-Ubuntu22-04LTSCloudtrio Solutions“Preconfigured Ubuntu 22.04 LTS VM with Snipe-IT for easy deployment of asset management systems.
+1
Applicable to:
Virtual Machines
38 out of 60
nProtect AppGuard잉카인터넷It guarantees the stability of mobile services by blocking forgery, tampering, and hacking of apps
+1
Applicable to:
SaaS
39 out of 60
Rsyslog-Debian12-BookwormCloudtrio SolutionsRsyslog is used to collect, store, filter, and forward system logs in Linux.
+1
Applicable to:
Virtual Machines
40 out of 60
Synack Managed Vulnerability Disclosure ProgramSynack, inc.Service includes vuln triage, remediation guidance, researcher recognition, and reporting data
+1
Applicable to:
SaaS
41 out of 60
Cisco AI Defense Private OfferCisco Systems, Inc.Cisco AI Defense is an end-to-end AI security platform that finds AI assets, detects vulnerabilities, and protects applications.
+1
Applicable to:
Virtual Machines
42 out of 60
Non-Transactional - Aptaero Airport Visitor PassAptaero, Inc.Airport Visitor Pass Solution by Aptaero
+1
Applicable to:
SaaS
43 out of 60
Praxis Navigator: Turn Invisible Security Behaviors Into Visible Risk Data - betaPraxis Security Labs ASSee the security patterns Microsoft 365 isn't showing you — in 15 minutes
+1
Applicable to:
SaaS
Aikido - Autonomous PentestAikido SecurityAutomated penetration testing that matches human creativity with machine speed.
+1
Applicable to:
SaaS
45 out of 60
Rsyslog-On-Ubuntu-22-04LTSCloudtrio SolutionsRsyslog is used to collect, store, filter, and forward system logs in Linux.
+1
Applicable to:
Virtual Machines
46 out of 60
BigID-License-AnnualSpire SolutionsSecure your software with open-source security, software compliance, and risk management solutions.
+1
Applicable to:
SaaS
47 out of 60
Open Systems Data Connector for Microsoft SentinelOpen Systems AGThe data connector ingests log data into Microsoft Sentinel using Open Systems Logs API.
+1
Applicable to:
Azure Applications
48 out of 60
Cloudtrio Netcat On Ubuntu22-04ltsCloudtrio SolutionsNetcat (nc) is a powerful command-line networking tool used to read and write data across network connections using TCP or UDP.
+1
Applicable to:
Virtual Machines
49 out of 60
Cloudtrio Netcat On Ubuntu24 04LTSCloudtrio SolutionsNetcat (nc) is a powerful command-line networking tool used to read and write data across network connections using TCP or UDP.
+1
Applicable to:
Virtual Machines
50 out of 60
Cloudtrio Snipeit On Ubuntu24 04LTSCloudtrio SolutionsPreconfigured Ubuntu 24.04 LTS VM with Snipe-IT for easy IT asset management, inventory tracking, and license management.
+1
Applicable to:
Virtual Machines
51 out of 60
E-InspectorSynergy Advisors LLCDiscover, classify, and secure unstructured data across cloud and on-premises
+1
Applicable to:
Azure Applications
52 out of 60
Nginx On Debian12Cloudtrio SolutionsPreconfigured Debian 12 VM with Nginx for high-performance web hosting, reverse proxying, and load balancing.
+1
Applicable to:
Virtual Machines
53 out of 60
Nginx On Ubuntu22-04LTSCloudtrio SolutionsPreconfigured Ubuntu 22.04 LTS VM with Nginx for high-performance web hosting, reverse proxying, and load balancing.
+1
Applicable to:
Virtual Machines
54 out of 60
VMRay Connector to Microsoft Defender for OfficeVMRay GmbHUnderstand the threat - Enrich alerts&indicators - Clear verdict and IOCs in Defender
+1
Applicable to:
SaaS
55 out of 60
HaloSHARE - Protect CAD File WorkflowsSECUDE Solutions AGProtect CAD file workflows and automate secure collaboration at scale
+1
Applicable to:
SaaS
Printunlvpn-On-Ubuntu24-04LTSCloudtrio SolutionsPreconfigured Ubuntu 24.04 LTS VM with Pritunl VPN for secure remote access, user management, and encrypted network connectivity.
+1
Applicable to:
Virtual Machines
57 out of 60
Security Private LinkMicrosoftPrivate connectivity to Azure services for Microsoft Defender resources.
+1
Applicable to:
Azure Services
58 out of 60
Cyderes MDR for MicrosoftCyderesOptimize your Microsoft environment with Cyderes cutting-edge security capabilities.
+1
Applicable to:
SaaS
59 out of 60
Dayforce to Active Directory (AD), Entra ID (Azure AD)Aquera, IncEmployee Lifecycle Automation, from Pre-Hire to Retire: Dayforce to Active Directory (AD), Entra ID
+1
Applicable to:
SaaS
60 out of 60