529 results
Why Capterra is free
Secure, passwordless multi-factor authentication that provides the highest assurance of a person’s digital identity. Learn more about Beyond Identity
Beyond Identity completely removes passwords from the authentication workflow; they’re not used in the background or available as a backup. Beyond Identity provides the highest assurance of a user’s digital identity by cryptographically binding their identity to their enrolled devices. Our platform complements existing cybersecurity tech stacks by capturing and logging the granular security details of devices in real-time. Learn more about Beyond Identity
Beyond Identity completely removes passwords from the authentication workflow; they’re not used in the background or available as a backup. Beyond Identity provides the highest assurance of a user’s...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Canada Local product
ArkAngel

ArkAngel

(0) Canada Local product
ArkAngel is a technology-agnostic tool that monitors security devices and networks, ensuring a secure IT environment at all times. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a 360 degree view. The automated log and security event correlation from distributed devices facilitates threat detection and significantly improves the efficiency of the incident response management process. ArkAngel allows our security experts to collaborate with clients in a secure environment. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats. Learn more about Endpoint Detection and Response
N-able™ Endpoint Detection and Response (EDR), an integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats—and recover quickly when ransomware or other exploits strike. Remediation and rollback help reverse the effects of an attack and restore endpoints to their pre-attack healthy state to minimize customer downtime. Gain full monitoring and management of your endpoint security, all from a single dashboard. Learn more about Endpoint Detection and Response
N-able™ Endpoint Detection and Response (EDR), an integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats—and recover quickly when ransomware or other...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware. Learn more about ESET Endpoint Security
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Learn more about Perimeter 81
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Learn more about Netacea Bot Management
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Learn more about Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option. Learn more about Infocyte
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker. Learn more about Infocyte
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Download SYSVOOT™ Antivirus Pro now and shield your PC/Laptop against latest internet threats. Learn more about SYSVOOT Antivirus Pro
SYSVOOT™ Antivirus Pro comes with the best features bundled in a single software and that to with unmatched price. Download now and shield your PC/Laptop against latest internet threats. We offer malware protection, antivirus, real time protection, ransomware protection, registry cleanup, file shredder, and anti spyware. Learn more about SYSVOOT Antivirus Pro
SYSVOOT™ Antivirus Pro comes with the best features bundled in a single software and that to with unmatched price. Download now and shield your PC/Laptop against latest internet threats. We offer...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about ManageEngine Log360
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SpamTitan Email Security for business email that helps control mail flow, clean it, and protect against unwanted email spam and malware Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and outbound scanning. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business and msp without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan
SpamTitan Email Security. Leading Email Security for business and MSPs. Helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Inbound and...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Minimise the risk of cyber threats and compliance failure. We make cyber security and data protection easier for your employees. Learn more about MetaCompliance
Our cyber security awareness software helps keep your staff safe online, secure your digital assets, and protect your corporate reputation. MetaCompliance's award winning SaaS platform provides a one-stop-shop solution to engage users, provide defence against cyber threats, and deliver regulator reporting. It provides customers with a fully integrated suite of cybersecurity and compliance capabilities that include policy management, privacy, eLearning, simulated phishing, and risk management. Learn more about MetaCompliance
Our cyber security awareness software helps keep your staff safe online, secure your digital assets, and protect your corporate reputation. MetaCompliance's award winning SaaS platform provides a...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cross-platform encryption solution for over 30 cloud providers and NAS systems, with new Microsoft Teams integration. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with SSO, SCIM, or Active Directory, and protect your accounts with 2FA. Learn more about Boxcryptor
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers (including OneDrive, SharePoint and an integration in Microsoft Teams) as well as NAS...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Real-time bot protection that deploys in minutes (SaaS) and runs on autopilot. Proud to protect 10,000+ global e-commerce businesses. Learn more about DataDome
Datadome is the best cybersecurity software for e-commerce and classified ads businesses. We protect websites, mobile apps and APIs from account takeovers, scraping, DDoS, server overload and any other threats to your network. Datadome can be deployed in minutes on any web infrastructure. Learn more about DataDome
Datadome is the best cybersecurity software for e-commerce and classified ads businesses. We protect websites, mobile apps and APIs from account takeovers, scraping, DDoS, server overload and any...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Peace of mind for your phone. Protecting your mobile device with Cyber Security Solution gives you one less thing to worry about. Learn more about Web.com
Securing your device is good for business. Some of your biggest decisions happen on a small screen. Protect your business and the people who rely on it by securing the devices you use every day. With 24/7 access to a team of world-class cyber security experts, you'll have everything you need to fix, prevent, and investigate potential security issues. Includes: *Identity Protection *Device Monitoring *Theft Prevention *Safe Browsing *Contact Backup *Stores photos and call history online Learn more about Web.com
Securing your device is good for business. Some of your biggest decisions happen on a small screen. Protect your business and the people who rely on it by securing the devices you use every...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Learn more about PhishingBox
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. Learn more about PhishingBox
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Detectify automates the knowledge of the best ethical hackers in the world to secure web apps. Stay on top of threats with Detectify. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabilities within the OWASP top 10 categories and beyond. Detectifys Deep Scan and Asset Monitoring services identifies security vulnerabilities and misconfigurations across all layers of your internet-facing assets and keeps you up to date for the latest threats. Learn more about Detectify
By automating the knowledge of its crowdsource network of ethical hackers from all around the world, Detectify maps up and continuously monitors your entire attack surface for thousands of vulnerabili...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. Learn more about Cyber Hawk
Cyber Hawk is a cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity,...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. Learn more about Sonrai Public Cloud Security Platform
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organizations public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security. Learn more about Sonrai Public Cloud Security Platform
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Proven compliance analytics to detect, identify, and convert unpaid software use Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get insight into who's using it, how long they've used it, and how widely they've deployed it. Compliance Intelligence has helped customers uncover tens of millions of infringers around the world. Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks. Learn more about Agari Secure Email Cloud
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks. Learn more about Agari Secure Email Cloud
Agari is the Trusted Email Identity Company, protecting brands and people from devastating phishing and socially-engineered attacks.

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform unifies security and compliance across servers, containers, and IaaS resources across any mix of public, private, hybrid, and multi-cloud environments including Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Halo’s extensive automation capabilities streamline and accelerate workflow Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firmware Security Framework for Iot and SCADA firmware system. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for cloud computing support. Learn more about Exein
Exein is the first Open Source security framework for IoT, SCADA firmware systems. It operates as an embedded component from within the hardware, stopping any external threats, without the need for...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Gain an experienced security team without increasing your headcount. Get your dedicated ThreatAdvice vCISO team. Learn more about ThreatAdvice vCISO
Reduce your security burden with ThreatAdvice vCISO, NXTsoft's flagship software solution that provides oversight into all of your cybersecurity needs. Your vCISO dashboard allows you can communicate securely with your vCISO team, access completed reports and policies, view upcoming and completed tasks and more. All of your security information is warehoused in one place with oversight and interpretation from your dedicated vCISO team. Learn more about ThreatAdvice vCISO
Reduce your security burden with ThreatAdvice vCISO, NXTsoft's flagship software solution that provides oversight into all of your cybersecurity needs. Your vCISO dashboard allows you can communicate...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
All-In-One Network Security & Management Solution for CoWorking Spaces, SMEs, Hotels & Retail. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes, and disasters while keeping you 100% DoT compliance. BhaiFi is very simple to use & doesn't require extra technical skills to operate, leveraging Machine Learning & Artificial Intelligence to do the tough job itself. Being software-based, it is scalable, cost-effective & integrates with your other software. Learn more about BhaiFi Core
BhaiFi is an All-In-One Software-Based Networking Platform that Secures, Manages, Monitors & Visualizes your Network automatically. It ensures that you are safe from Cyberattacks, downtimes, and...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
24/7 SOC-as-a-Service capabilities in a turnkey approach. Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities. Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
ThreatMark enables banks to secure trusted banking experiences with legitimate users, seamlessly across all digital channels. Learn more about ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. Major banks use ThreatMark's AI-powered technology to build secured banking experience by precisely validating their legitimate users, seamlessly across all digital channels. All while securing the users' most precious assets and keeping the fraudsters away. Learn more about ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. Major banks use ThreatMark's AI-powered technology to build secured banking experience by...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
RedShield Programmatically Minimizes Threat Surface. Fix Findings Fast With App Shields. Learn more about RedShield
RedShield removes the risk from vulnerabilities in your web-facing applications and APIs. RedShield's service, aided by bespoke technology & AI, will tune and operate a WAF for you, then uses shields (code objects) to make complex vulnerabilities, such as business logic flaws undiscoverable to attackers (which will be confirmed by pen tests). RedShield's baseline service also includes - Application layer DDoS & advanced bot protection - Attack reporting & analysis - 24/7 incident response Learn more about RedShield
RedShield removes the risk from vulnerabilities in your web-facing applications and APIs. RedShield's service, aided by bespoke technology & AI, will tune and operate a WAF for you, then uses shields...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors,...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enable them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-every...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomware attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomwar...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Astra Security serves all PHP-based websites. It is highly compatible with websites built on CMS like WordPress, Magento, Joomla, etc.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. This means you can get rid of multiple security solutions & let Astra take care of it all.
Astra is the go-to security suite for your website. With Astra, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue.
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces...

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting