Canada Show local products
469 results
Flowmon ADS is a security solution that uses machine learning to detect anomalies and malicious behaviour hidden in network traffic. Learn more about Flowmon Anomaly Detection System
Flowmon Anomaly Detection System analyzes network traffic from multiple perspectives to counter malicious behavior and cyberattacks. By using a combination of detection methods, including machine learning, adaptive baselining, heuristics, behavior patterns, and signatures, context-rich visualization and reporting, ADS provides SecOps teams with capabilities for incident detection, handling, analysis and response. Flowmon ADS is a part of Kemp product portfolio. Learn more about Flowmon Anomaly Detection System

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service. Learn more about Cato Networks Suite
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Learn more about Cato Networks Suite

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Secures remote access to private apps, replacing corporate VPNs with a more secure and usable zero trust-based solution. Learn more about Twingate
Twingate is a Zero Trust Networking solution that enables businesses of all sizes to secure remote access to their private apps, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of developers, DevOps, IT teams, and end users easier, Twingate deploys in minutes and replaces outdated, insecure, and difficult-to-maintain corporate VPNs which were not built to handle the "work from anywhere" world where cloud-based assets and remote work are now the norm. Learn more about Twingate

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Network security aims to protect the company network from occurring digital threats and enable secure access to company resources despite the device’s location. NordLayer developed seamless and scalable network protection within all company levels: it encrypts data, enables virtual private network (VPN), secures devices, and manages permissions to access controls providing insights for traffic and activity analytics. Learn more about NordLayer

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
SecureLink, an Imprivata company, is the industry leader in critical access management Learn more about SecureLink
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Learn more about SecureLink

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports. Learn more about DSRAZOR for Windows
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. Learn more about DSRAZOR for Windows

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
SpamTitan Email Security prevents unwanted email spam, phishing attacks, malware, ransomware, Spoofing, BEC and other email threats Learn more about SpamTitan
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Create an encrypted, zero-trust network that hides your systems, cloud apps and assets from the internet. 14 days free trial. Learn more about GoodAccess
GoodAccess creates a secure and encrypted network infrastructure that hides your business systems, cloud apps, assets and resources from the internet and controls authorized access using the concept of Software-Defined Perimeter. With fully automated deployment, in 10 minutes you can secure all devices wherever they connect while avoiding complex infrastructure designs that result in higher operational costs and risk. Learn more about GoodAccess

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Remediant software reduces your attack surface and prevents lateral movement attacks by scanning and removing privileged access sprawl Learn more about SecureONE
Remediant SecureONE enables dynamic discovery and removal of always available admin access sprawl from systems. You can add back privileged access as needed, Just-in-Time (JIT) to enable Zero Standing Privilege (ZSP) and mandate MFA to implement Zero Trust security. This reduces the attack surface and prevents lateral movement of attacks such as ransomware and phishing by applying the principle of least privilege. SecureONE is simple to deploy and manage as it is agentless. Learn more about SecureONE

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot Business Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Learn more about Webroot Business Endpoint Protection

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management. Learn more about JumpCloud Directory Platform
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Ensure network security and prevent unwarranted access with MFA, SSO, and more, across Windows, macOS, and Linux systems. Plus, leverage JumpCloud’s hosted RADIUS servers to easily provision and deprovision access to VPNs and Wi-Fi networks — no on-prem infrastructure needed on your end, and no shared passwords. Learn more about JumpCloud Directory Platform

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Learn more about ConnectWise Automate
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. Learn more about ConnectWise Automate

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
GlassWire is a modern network monitor & security tool with a built in firewall. Learn more about GlassWire
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Learn more about GlassWire

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Canada Local product
Web filtering software. Blocks websites based on URLs and categories. Restrictions can be customized based on user, computer, or OU. Learn more about BrowseControl
BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. Learn more about BrowseControl

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Server Manager is an enterprise Log Management, Ransomware, Access Permissions and Server Monitoring Software Tool for IT pros. Learn more about Corner Bowl Server Manager
Corner Bowl Server Manager is a SIEM, a Network Monitor, a Server Monitor, an Application Monitor, a Log Manager, a Syslog Server, an Azure Active Directory Audit Log Manager, a Ransomware Monitor, a Website Monitor, an Email Server Monitor, a Database Monitor, an SSL Certificate Expiration Monitor, a Process Monitor and much more. Generate network-wide performance summary reports. Get real-time notifications when networks, hardware and software fail. Monitor user and file activity. Learn more about Corner Bowl Server Manager

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
A flow-based complete traffic analytics tool that gives a holistic view of your network traffic activity in real-time. Learn more about ManageEngine NetFlow Analyzer
NetFlow Analyzer avails flow technology to monitor and analyse your network bandwidth usage. It helps you identify and avoid bandwidth delays and bottlenecks with customized reports, and set threshold-based email/SMS alerts to understand the severity of an issue. This easy-to-use analytics tool detects, diagnoses and troubleshoots network anomalies and zero-day intrusions in real-time and plans your future bandwidth need based on usage trend pattern thereby optimizing your bandwidth usage. Learn more about ManageEngine NetFlow Analyzer

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges Learn more about Portnox CLEAR
Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Learn more about Portnox CLEAR

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Learn more about PhishingBox
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. Learn more about PhishingBox

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Network Detective Security Assessment Module is the #1 tool used by MSPs to perform ongoing IT security assessments. Learn more about Network Detective Pro
The Network Detective Security Assessment module is the #1 tool used by MSPs to identify internal and external security threats for their clients and prospects. The network scanner is non-intrusive -- no probes, agents or software to install. Generate fully-branded security risk reports, security management plans, anomalous Login reports, external vulnerability scan reports, outbound security reports, data breach liability reports, and so much more. Get a demo today. Money-back guarantee. Learn more about Network Detective Pro

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
With DefendX File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. Learn more about DefendX Control
With DefendX Software File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your company's sensitive file data and intellectual property. Learn more about DefendX Control

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Learn more about ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Learn more about ManageEngine Key Manager Plus

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
ManageEngine PAM360 Complete privileged access security for enterprise IT Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security. Learn more about ManageEngine PAM360

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
SpamTitan Plus is an AI-driven email protection solution that provides “zero-day” threat protection and intelligence. Learn more about SpamTitan Plus
SpamTitan Plus Anti-Phishing is an AI-driven email protection solution that provides “zero-day” threat protection and intelligence. Spam Titan Plus provides 100% coverage of ALL current market leading anti-phishing feeds, 1.5X increase in unique phishing URL detections and has 1.6X faster phishing detections than the current market leaders. With real-time continuous updates providing SpamTitan Plus with 10 million new, never-before seen malicious URLs a day. Book a SpamTitan Plus demo Today. Learn more about SpamTitan Plus

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Network security tool that helps users protect PC, Mac, Android & iOS devices against spyware, viruses, malware, ransomware, and more.
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money. Learn more about Norton AntiVirus

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform. Learn more about Malwarebytes for Business

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Google Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. Learn more about Google Cloud Platform

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Computer security tool that helps businesses secure networks through encryption, personal IP addresses, browser extensions, and more.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world Learn more about NordVPN

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
VPN solution that provides businesses with remote access, policy management, threat protection, and more.
VPN solution that provides businesses with remote access, policy management, threat protection, and more. Learn more about Cisco AnyConnect

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
An award-winning solution that delivers comprehensive security for small and medium business devices, data, and employees.
Avast Business Antivirus Pro Plus is an award-winning, enterprise-grade solution that delivers comprehensive protection for small and medium business devices, data, and employees. Fully equipped with next-gen endpoint, server, and identity protection, our advanced solution is designed to block advanced cyberthreats from entering your network. Learn more about Avast Business Pro Plus

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Download free IT help desk software for IT pros & sysadmins around the world in all businesses. Support & mobile apps also free.
The Spiceworks IT Help Desk is purpose-built for IT pros, we have just what you need to run a better internal IT help desk and a better business. Start tackling tickets in minutes with free help desk software (on your server or in the cloud). Plus, it's more than just ticket tracking: understand (and change!) team behavior and articulate your value to the business. Get it free today! Learn more about Spiceworks

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Canada Local product
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. Learn more about TunnelBear

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Protect your business from viruses, ransomware, and email threats including spam, phishing, and more.
AVG Internet Security Business Edition protects your business from viruses, ransomware, and email threats including spam, phishing, and more. Our top-rated antivirus protects your business by blocking cyberthreats, keeping your data secure, and allowing remote access from a management console. AVG Cloud Management Console is an easy-to-use platform that allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and secure devices. Learn more about AVG Internet Security Business Edition

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Learn more about CrashPlan

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Learn more about Bitdefender GravityZone

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based solution that provides remote systems management for desktops, servers, and mobile laptops.
With the release of GoTo Central and GoTo Pro, GoTo's next-generation solutions for remote access and systems management, GoTo IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products. Learn more about Pro

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities enterprise management
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications. Learn more about OpenVPN

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Learn more about Malwarebytes for Teams

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Learn more about DNSFilter

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Learn more about Connect Secure

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin provides multiple solutions that allow you to enable seamless and reliable Single Sign-On and MFA for on-premises network appliances and applications, like VPN and WiFi endpoints. Benefits include zero on-premises footprint, simplified administrative experience, decreased costs, and increased security, visibility, and productivity. Learn more about OneLogin

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. Learn more about Xeams

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Network Performance Monitor (NPM) is affordable software that can help you detect, diagnose, and resolve network performance issues.
SolarWinds Network Performance Monitor (NPM) is a powerful and affordable solution that can help you quickly detect, diagnose, and resolve network performance problems and outages. NPM provides advanced network troubleshooting for on-premise, hybrid, and cloud services with critical path hop-by-hop analysis. NPM's comprehensive coverage is designed to enable an IT professional to reduce mean outage time, see return on network investments & determine how to reallocate resources for future health. Learn more about Network Performance Monitor

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Learn more about BlackBerry Protect

Features

  • Reporting/Analytics
  • Intrusion Detection System
  • Vulnerability Scanning
  • Activity Monitoring
  • Threat Response
  • Access Controls/Permissions
  • Firewalls