Featured software

Canada Show local products
739 results
Canada Local product
ArkAngel

ArkAngel

(0) Canada Local product
ArkAngel is a technology-agnostic tool that monitors security devices and networks, ensuring a secure IT environment at all times. Learn more about ArkAngel
ArkAngel is a platform that helps transform live security data from multiple sources into actionable information. It protects your critical assets by monitoring your companys network security with a 360 degree view. The automated log and security event correlation from distributed devices facilitates threat detection and significantly improves the efficiency of the incident response management process. ArkAngel allows our security experts to collaborate with clients in a secure environment. Learn more about ArkAngel

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Secure Your Cloud. Identity-First. Comprehensive cloud security platform for AWS, Azure and GCP. Learn more about Ermetic
Ermetic is a comprehensive cloud security platform for AWS, Azure and GCP that enables you to proactively reduce your attack surface, detect threats and reduce your blast radius in case of a breach. Ermetic’s holistic cloud security solution enables comprehensive risk assessment across the entire security stack – from full asset discovery and deep risk visualization, prioritization and guided remediation to anomaly detection and compliance audit. Learn more about Ermetic

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A DNS security solution that enhances any antivirus or firewall, stopping ransomware, data leaks, and network malware in their tracks. Learn more about Heimdal Threat Prevention
Heimdal Threat Prevention is an advanced DNS, HTTP, and HTTPS filtering product that adds prevention and threat hunting on top of traditional protection, detection, and response. It enriches any existing antivirus, going beyond signature-based recognition and spotting both known and unknown malware strains. Powered by proprietary DarkLayer GUARD and VectorN Detection technologies, our product allows you to gain code-autonomous protection against multiple attack vectors. Learn more about Heimdal Threat Prevention

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybersecurity for businesses wanting real-time protection against cyberthreats for up to 10 devices including PC, Mac, iOS, & Android. Learn more about Avast Small Office Protection
Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks. Get multi-OS support for up to 10 devices - including PC, Mac, iOS, and Android. Small Office Protection works effortlessly with your business’ existing hardware and devices, and there’s no IT experience required to manage it. Learn more about Avast Small Office Protection

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. Learn more about Google Cloud
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more. New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products. Learn more about Google Cloud

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications. Learn more about ESET Endpoint Security
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Learn more about Perimeter 81
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG. With its groundbreaking ease-of-use and global network of PoPs, Perimeter 81 allows you to manage your network and scale as you grow. Learn more about Perimeter 81

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Canada Local product
Flare is the proactive external cyber threat detection solution that helps security teams visualize and manage external cyber risk. Learn more about Flare
Flare is the proactive external cyber threat detection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark and clear web, to discover unknown events, automatically prioritize risks and deliver actionable intelligence you can use instantly to improve security. Learn more about Flare

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SpamTitan Email Security prevents unwanted email spam, phishing attacks, malware, ransomware, Spoofing, BEC and other email threats Learn more about SpamTitan
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise. Learn more about DNSFilter
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Learn more about DNSFilter

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Learn more about Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Secures remote access to private apps, replacing corporate VPNs with a more secure and usable zero trust-based solution. Learn more about Twingate
Twingate is a Zero Trust Networking solution that enables businesses of all sizes to secure remote access to their private apps, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of developers, DevOps, IT teams, and end users easier, Twingate deploys in minutes and replaces outdated, insecure, and difficult-to-maintain corporate VPNs which were not built to handle the "work from anywhere" world where cloud-based assets and remote work are now the norm. Learn more about Twingate

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Log360 is a comprehensive SIEM solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. Learn more about ManageEngine Log360
Log360 is a SIEM solution that helps combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to several compliance mandates. You can customize the solution to cater to your unique use cases. It offers real-time log collection, analysis, correlation, alerting and archiving abilities. You can monitor activities that occur in your Active Directory, network devices, employee workstations, file servers, Microsoft 365, cloud services and more. Learn more about ManageEngine Log360

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
The importance of cybersecurity rises with the growing numbers of cyber-attacks and malicious activities businesses face every second. Securing the data and constantly mitigating external threats like malware, phishing, or unfiltered websites is a challenge easier to overcome with advanced solutions. NordLayer is designed and developed with Secure Access Service Edge (SASE) architecture and Zero Trust model in mind to adhere to the most comprehensive and contemporary security landscape. Learn more about NordLayer

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Banyan’s ZTNA solution provides secure one-click access to applications and infrastructure from anywhere – without legacy VPNs. Learn more about Banyan Security
Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments. Learn more about Banyan Security

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your business endpoints from ransomware, malware, hackers, and more with AVG Antivirus Business Edition. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Password Manager
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Password Manager

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot Business Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Learn more about Webroot Business Endpoint Protection

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a cybersecurity platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-every thing platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Connect, optimize & scale your cyber risk management program with Risk Cloud’s® Cyber Risk & Controls Compliance Solution. Learn more about Risk Cloud
Prioritize cyber risk mitigation and response with Risk Cloud’s® Cyber Risk & Controls Compliance Solution. Risk Cloud helps you link cyber risk to business impact, so you can add context to any risk decision by reporting what matters most to your stakeholders. NIST Cybersecurity Framework, CMMC, CIS Top 20, and ISO 27001 are just a few of the 20+ control frameworks available in Risk Cloud. Connect, Optimize & Scale Your Cyber Risk Management Program. Learn more about Risk Cloud

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Agrello's e-signing platform simplifies the entire document management and e-signing process, from the initial contract to signing. Learn more about Agrello
Change the way you manage and sign your documents. Agrello's platform simplifies everything from document management to digital signatures with all the back-and-forth drafting that happens in-between . ‍Getting started with a digital contract is easy. Prepare your contract in whichever text editor suits you best. Upload the file to Agrello, add signatories and our platform will take care of the rest. A team on a simple mission: Making digital signatures and document management simple and fun! Learn more about Agrello

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Deliver powerful, layered protection to multiple customers quickly and easily. Learn more about Avast Business CloudCare
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Learn more about Avast Business CloudCare

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Learn more about Jamf Protect
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers. Learn more about Jamf Protect

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform. Learn more about SentinelOne
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. Learn more about SentinelOne

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Peace of mind for your phone. Protecting your mobile device with Cyber Security Solution gives you one less thing to worry about. Learn more about Web.com
Securing your device is good for business. Some of your biggest decisions happen on a small screen. Protect your business and the people who rely on it by securing the devices you use every day. With 24/7 access to a team of world-class cyber security experts, you'll have everything you need to fix, prevent, and investigate potential security issues. Includes: *Identity Protection *Device Monitoring *Theft Prevention *Safe Browsing *Contact Backup *Stores photos and call history online Learn more about Web.com

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SharePass is an online solution for confidential data sharing. No agents, cross-platform supported. Learn more about SharePass
SharePass is a SaaS created for sharing secrets and confidential information using a web application, browser extension, or mobile app. SharePass uses encrypted links sent from the sender to the receiver; This link includes various security properties and flags that guarantee the safety of your data by leaving no digital footprint. When it comes to data privacy, SharePass or any of its employees cannot see the passwords. The passwords can be seen only by the exchanging parties. Learn more about SharePass

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges Learn more about Portnox CLEAR
Great for all industries with 500-10,000 Employees. Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR is vendor agnostic and eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Learn more about Portnox CLEAR

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Logpoint's SIEM+SOAR & UEBA platform helps businesses protect their infrastructure from breaches & efficiently respond to cyberattacks Learn more about LogPoint
Logpoint is the creator of a reliable, innovative cybersecurity operations platform — empowering organizations to thrive in a world of evolving threats. By combining sophisticated technology and a profound understanding of customer challenges, Logpoint bolsters security teams’ capabilities while helping them combat current and future threats. Logpoint offers SIEM, UEBA, SOAR and SAP security technologies converged into a complete platform that efficiently detects and respond to threats. Learn more about LogPoint

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your equipment from digital threats. Complete security for small and medium businesses. Learn more about ESET PROTECT
ESET provides modern Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass. Learn more about ESET PROTECT

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
HackerOne is the industry standard for hacker-powered security. Learn more about HackerOne
HackerOne can provide a unique security experience for businesses of all sizes and industries empowering the world to build a safer internet. Feel confident with not just another security vendor, but a true security partner. See greater coverage, instant results and seamless remediation all on one integrated platform. Our offerings include Penetration Testing, Vulnerability Management, Bug Bounty Programs and much more. Learn more about HackerOne

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Learn more about PhishingBox
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective, and helps clients reduce risk and achieve cybersecurity objectives. Learn more about PhishingBox

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. Learn more about SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. SecurityScorecard's patented rating technology is used by over 22,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. Learn more about SecurityScorecard

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Learn more about SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Learn more about SpectralOps

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Fortra's Agari Phishing Defense stops sophisticated email attacks from being delivered to employee inboxes. Learn more about Agari Phishing Defense
Fortra's Agari Phishing Defense stops sophisticated identity deception threats that can bypass legacy security controls, including business email compromise, executive spoofing and spear phishing attempts, and account takeover-based attacks. • Detect BEC or identity deception threats, such as employee impersonation • Block attacks from compromised accounts through account takeover ID models • Prevent fraud against trusted partners through auto-generated & continuously updated policies Learn more about Agari Phishing Defense

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Risk Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers Learn more about Resecurity Risk
Resecurity Risk is Artificial Intelligence driven Supply Chain monitoring platform that you can use to identify upstream and downstream providers for real time analysis for all business and technical users. Tracking security posture changes depending on the identified security events, Dark/Web/Surface Web, and other malicious activity. Identifying and eliminating potential blind spots and security gaps throughout your network infrastructure and exposed digital footprint. Learn more about Resecurity Risk

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Quantum Armor is an attack surface management platform with fully integrated cloud security, threat intel, and mitigation planning. Learn more about Quantum Armor
Quantum Armor is an award-winning attack surface management and analytics platform that allows you to proactively spot trends, patch vulnerabilities and detect potential attacks. Quantum Armor is the first platform of its kind to offer fully integrated cloud security, as well as threat intelligence, mitigation planning, dark web scanning, and cyber due diligence. Only pay for what you need. Quantum Armor is fully customizable and offers competitive pricing to meet every budget. Learn more about Quantum Armor

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, and Google Cloud. Learn more about Sonrai Public Cloud Security Platform
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, and Google Cloud. The Sonrai Dig platform is built on a sophisticated graph that identifies, monitors and secures every possible relationship between identities and data that exists inside an organization's public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end cloud security. Learn more about Sonrai Public Cloud Security Platform

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
24/7 SOC-as-a-Service capabilities in a turnkey approach. Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities. Learn more about CipherBox

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Learn more about Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Learn more about Acronis Cyber Protect

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. Learn more about Endpoint Detection and Response
N-able Endpoint Detection and Response (EDR) helps MSPs prevent, detect, and respond to ever-changing cyberthreats. Powered by SentinelOne, N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. As an integrated feature of N-able N-central and N-able RMM, N-able EDR lets you gain full monitoring and management of your endpoint security, all from a single dashboard. Learn more about Endpoint Detection and Response

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Next-generation GRC platform enabling teams to implement, assess, monitor and manage risk and compliance across the organization. Learn more about Alyne
A full-suite GRC platform for ESG, cyber, governance, risk and compliance – designed to deliver data-driven insights powered by AI technology to innovative organizations. Perform Integrated Risk Management, Policy Management, IT and Cyber Risk Assessments, Third Party Risk and more. Intuitively identify risks in real-time, increase transparency and compliance efficiency, and collaborate effectively across your enterprise and third parties. Learn more about Alyne

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Push is a SaaS security platform that equips your employees to use their chosen SaaS tools securely. Learn more about Push Security
The Push SaaS security platform identifies security issues that arise from your employees’ use of cloud apps and guides them to self remediate - freeing up your security team. - Get visibility of the SaaS employees are using and third-party app integrations. - Identify security issues such as weak and reused passwords, no MFA, malicious mail rules and risky app integrations. - Guide employees to self-remediate security issues, delete abandoned SaaS accounts and remove obsolete integrations. Learn more about Push Security

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Proven compliance analytics to detect, identify, and convert unpaid software use Learn more about Revulytics Compliance Intelligence
Revenera Compliance Intelligence detects, identifies, and reports on organizations using your software without paying for it. Whether they're pirates or existing customers overusing licenses, you get insight into who's using it, how long they've used it, and how widely they've deployed it. Compliance Intelligence has helped customers uncover tens of millions of infringers around the world. Learn more about Revulytics Compliance Intelligence

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Learn more about ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Learn more about ManageEngine Key Manager Plus

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
Cybervigilance monitors malicious networks (web, deepweb & darknet) 24/7 and alerts you in real time of cyber threats or leaks. Learn more about HTTPCS Cyber Vigilance
The automated CTI solution for monitoring malicious networks and anticipating cyber attacks. Based on the development of virtual agents capable of scanning millions of sources daily, and OSINT teams that integrate the most restricted sources, CyberVigilance infiltrates the clear and the dark web to alert you in case of cyber threats on your organization (attack notification, phishing threat, ransomware...) or information leaks (Data Leak, file leakage, compromised email from an employee). Learn more about HTTPCS Cyber Vigilance

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform unifies security and compliance across servers, containers, and IaaS resources across any mix of public, private, hybrid, and multi-cloud environments including Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Halo’s extensive automation capabilities streamline and accelerate workflow Learn more about CloudPassage Halo

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting
STORM improves cybersecurity incident management by helping analysts securely orchestrate, automate and respond to incidents. Learn more about STORM
Improve cybersecurity incident management with STORM. STORM is SOAR software that quickly helps analysts manage the orchestration, automation and response of security incidents. Plus, its secure structured communication components allow you to coordinate between IT, security, SOC, risk and management teams. Learn more about STORM

Features

  • AI/Machine Learning
  • Behavioral Analytics
  • Incident Management Software
  • Vulnerability Scanning
  • Endpoint Management
  • Whitelisting/Blacklisting