15 years helping Canadian businesses
choose better software

Cloud Security Software

Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.

Featured software

Canada Show local products
435 results
Covalence detects, analyzes, and responds to cyber threats across your endpoints, networks, and cloud services—all from one platform. Learn more about Field Effect
As a holistic cybersecurity solution, Covalence detects, analyzes, and responds to cyber threats across your entire business—including your cloud-based services. Covalence's cloud-native monitoring sensor protects your company domain and cloud-based programs, including Microsoft 365, Google Workspace, Amazon Web Services, Azure, Dropbox, Box, Okta, Salesforce, and much more. Plus, Covalence powerfully protects your endpoints and network for a truly end-to-end defense. Learn more about Field Effect

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Advanced protection for Microsoft 365 apps with ultimate zero-day threat defense. Learn more about ESET Cloud Office Security
ESET Cloud Office Security provides advanced protection for users of Microsoft 365 applications with ultimate zero-day threat defense. The combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect company communication, collaboration and cloud storage. Our easy-to-use cloud console gives you an overview of quarantined items and immediately notifies you when detection occurs. Learn more about ESET Cloud Office Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service. Learn more about Cato Networks Suite
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Learn more about Cato Networks Suite

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Discover all SaaS accounts & cloud assets ever created in your org, in minutes. No agents or browser plug-ins required. Learn more about Nudge Security
Nudge Security provides complete visibility of every SaaS and cloud asset ever created in your org, and real-time alerts as new apps are introduced. With this visibility, you can expose shadow IT, track MFA and SSO enrollment, simplify access reviews and automate IT offboarding, all without impeding the pace of work. Within minutes of starting a free trial, you will have a full inventory of all cloud and SaaS accounts with built-in playbooks to automate time-consuming IT governance tasks. Learn more about Nudge Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Nightfall is built to discover, classify, and protect data across any app. We take a modern approach to cloud data protection, using machine learning to zero in on data that you deem critical – for easy, comprehensive coverage without the alert fatigue. With Nightfall you can discover, classify, and protect PII, PCI, PHI, and other business-critical data using high accuracy machine learning-based detectors. Additionally, you'll be able to remediate data compliance violations in real-time. Learn more about Nightfall DLP

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Datadog's Cloud Security Platform enables you to get full-stack security for your production environment. Get set up in minutes. Learn more about Datadog
Datadog Cloud Security Platform offers full-stack security for your production environment. With real-time threat detection, continuous configuration audits, and context-rich security signals, you can easily bring speed and scale to your security organization. Secure your environment by correlating security threats with metrics or logs from across your environment. Get started quickly with Datadog's turn-key detection rules, dashboards, and support for 500+ technologies. Learn more about Datadog

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Push is a SaaS security platform that equips your employees to use their chosen SaaS tools securely. Learn more about Push Security
The Push SaaS security platform identifies security issues that arise from your employees’ use of cloud apps and guides them to self remediate - freeing up your security team. - Get visibility of the SaaS employees are using and third-party app integrations. - Identify security issues such as weak and reused passwords, no MFA, malicious mail rules and risky app integrations. - Guide employees to self-remediate security issues, delete abandoned SaaS accounts and remove obsolete integrations. Learn more about Push Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Learn more about SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Learn more about SpectralOps

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure. Learn more about SailPoint
Stop the #1 cloud threat: Unauthorized access. SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure and workloads, detect potential anomalies, and better enforce access policies across all users. Learn more about SailPoint

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network & computer security now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Safetica protects your data against insider threats and helps you to be compliant with regulations. Learn more about Safetica
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance. Safetica is a global software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions. Safetica NXT (cloud-native) Safetica ONE (on-prem) Learn more about Safetica

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Proactive Best Practice & Security Analysis for AWS, Azure, GCP, Kubernetes, VMware, Windows and Linux OS. Learn more about Runecast
An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere. Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. Runecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance. Learn more about Runecast

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Cloud security is essential for protecting company data and applications from exposure to potential risks. Unauthorized access might lead to data breaches and leaks, resulting in reputational and financial damage. NordLayer enables security measures to company cloud environments, ensuring remote login and access controls. It allows them to operate securely even on a public network encrypting and hiding all business-related data traffic. Learn more about NordLayer

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Streamline smooth and secure password management and access control with NordPass Business. Learn more about NordPass Business
NordPass Business — an easy-to-use password manager designed to meet the demands of today's fast-paced organizations. With NordPass Business, you can log in to your accounts instantly, safely share access and sensitive data between teams, smoothly onboard and offboard employees, enforce a company-wide password policy, receive instant breach alerts, identify weak, old, or reused passwords, enable passkeys, get access to the activity log of all employees, use ToTP authenticator, and more. Learn more about NordPass Business

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Clumio unleashes the full power of the cloud to deliver secure backup as a service for your enterprise data wherever it needs to be. Learn more about Clumio
Clumio is a backup and recovery solution that helps AWS customers build resilience into their applications, data lakes, and sensitive information. Air gapped and immutable by design, Clumio helps organizations recover instantly from ransomware and operational disruptions, automate data compliance, and optimize storage costs. Learn more about Clumio

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
HackerOne is the industry standard for hacker-powered security. Learn more about HackerOne
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Banyan’s ZTNA solution provides secure one-click access to applications and infrastructure from anywhere – without legacy VPNs. Learn more about Banyan Security
Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments. Learn more about Banyan Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management. Learn more about CloudAware
Cloudaware is a SaaS multi-cloud management platform with such modules as: CMDB, Change Management, Cost Management, Vulnerability Scanning, Monitoring, Intrusion Detection, Patch Management, Compliance Engine, Log Management and Backups & Replication. Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products. Learn more about CloudAware

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secures remote access to private apps, replacing corporate VPNs with a more secure and usable zero trust-based solution. Learn more about Twingate
Twingate is a Zero Trust Networking solution that enables businesses of all sizes to secure remote access to their private apps, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of developers, DevOps, IT teams, and end users easier, Twingate deploys in minutes and replaces outdated, insecure, and difficult-to-maintain corporate VPNs which were not built to handle the "work from anywhere" world where cloud-based assets and remote work are now the norm. Learn more about Twingate

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Ermetic’s identity-first cloud infrastructure security platform unifies asset management, threat detection, remediation & compliance. Learn more about Ermetic
Ermetic’s holistic cybersecurity platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate them immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Ermetic automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Ermetic dramatically reduces the cloud attack surface and enforces least privilege at scale. Learn more about Ermetic

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
24/7 SOC-as-a-Service capabilities in a turnkey approach. Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities. Learn more about CipherBox

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Satori enables self-service access to data in DBs, data warehouses and data lakes, so users can access data in seconds instead of weeks Learn more about Satori
Satori is a Data Security Platform (DSP) enabling self-service data access using a data portal to accelerate time-to-value from data. Satori dynamically handles security and compliance requirements dynamically, so that users can focus on data analytics & AI, and data engineering teams can be more productive. Security teams gets visibility and control over access to sensitive data, as well as continuous sensitive data discovery and a true multi-cloud DAM. Learn more about Satori

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Keep your cloud infrastructure safe and running while having clear control and a single pane of glass for cybersecurity. Learn more about UnderDefense MAXI
Security-as-a-Service platform tailored for cloud monitoring, empowering you to safeguard performance and security in intricate cloud setups. Jumpstart your journey with UnderDefense's 1500+ ready-to-use correlation rules, interactive dashboards, and seamless integration with 80+ technologies. Sign up today to effortlessly run a self-service AWS CIS Controls assessment. Learn more about UnderDefense MAXI

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
AccuKnox is your Cloud Security partner to prevent advanced Zero-Day Attacks. Agentless CSPM + eBPF, LSM powered CWPP. Learn more about AccuKnox
AccuKnox provides a Zero Trust Cloud Native Application Security (CNAPP) platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of: Container Security, Anomaly Detection and Data Provenance. AccuKnox can be deployed in Public and Private Cloud environments. Learn more about AccuKnox

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
LastPass provides secure password management without compromising ease of use and employee productivity.
Improve your business’ password hygiene and security, without compromising ease of use. LastPass empowers employees to generate, store, and share credentials seamlessly, while providing valuable insight and control to Admins through security policies and advanced reporting. LastPass ensures data protection and privacy through LastPass’ zero-knowledge security infrastructure. Learn more about LastPass

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Canada Local product
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Secure your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture. Learn more about 1Password

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
An award-winning next-gen antivirus with online privacy tools and patch management automation software for small businesses.
Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser (cloud-based management console). Learn more about Avast Ultimate Business Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SpamTitan is a cloud based Anti Spam email filter. Easy to use and very effective blocking Email-Spam, malware and phishing attacks.
SpamTitan is a cloud based Anti Spam email filter. It is an easy to use, effective, multi-award winning Anti-Spam, malware blocking and phishing prevention solution . Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a FREE 14 day Trial of SpamTitan Email Security today, full support included during trial. Learn more about SpamTitan

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential info
Keeper’s easy-to-use cybersecurity platform is built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com. Learn more about Keeper Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 850+ third-party applications.
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 850+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is available both on the cloud and on-premises. Learn more about ManageEngine Patch Manager Plus

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. Learn more about JumpCloud Directory Platform

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Search, analyze, and visualize data from your entire data ecosystem. Monitor, alert, and report on your operations to drive resilience.
Are you ready to take control of your data? Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one unified security and observability platform. Learn more about Splunk Enterprise

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secure and resizable compute capacity in the cloud. Launch applications when needed without upfront commitments.
Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of operating systems, load them with your custom application environment, manage your network’s access permissions, and run your image using as many or few systems as you desire. Learn more about Amazon EC2

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method. Learn more about Zerospam

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity. Learn more about OneLogin

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. Learn more about SentinelOne

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Phoenix Security (AppSec Phoenix) next-gen Vulnerability & Posture management correlating Application Security, Cloud Security.
Vulnerability Management: we help organizations get in control of their vulnerabilities regardless of the source. We cover - Cloud Security (Vuln, Misconfig, VM, Containers) - Application Security (SAST, DAST, SCA) Pentesting/Red Team Consolidation: Pentest Results, Red Team, Burpsuite Results As a cross-domain Vulnerability management solution, We help scaling security and 10X devsecops professionals We help engineer focus on what's matter most We empower executives to set risk-based Learn more about Phoenix Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Learn more about Delivery Trust

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform. Learn more about Lookout

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloud-based security solution that helps businesses of all sizes secure emails against spam, viruses, ransomware, scams and phishing.
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas mode helps protect businesses, associations and local communities unwanted messages: spam, viruses, phishing, ransomware, advertising. Learn more about ALTOSPAM

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
With a cloud-based VPN infrastructure, Perimeter 81 provides secure remote access to employees worldwide.
Perimeter 81 is a leading network cybersecurity platform, delivering a cloud-based network infrastructure that provides globally secure access. With its comprehensive and easy-to-use platform, Perimeter 81 allows your employees around the world to connect securely. Learn more about Perimeter 81

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Simplify security operations with a single SaaS cloud security platform. Data protection, CSPM, and compliance made easier with Orca.
Move at cloud speed with Orca's Cloud Security Platform. Agentless efficiency and accuracy means no impact to your workloads, no performance hits and no organizational friction. In less than 24 hours of deployment, Orca's SideScanningTM technology detects and categorizes threats in proper context for your unique environment. Orca Security even provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. Learn more about Orca Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe.
idgard is a brand of uniscon GmbH, a TÜV SÜD Group company based in Munich. Founded in 2009, uniscon has been part of TÜV SÜD's digitalization strategy since 2017 and is one of Europe's leading secure cloud providers. With idgard, the company offers solutions for highly secure data exchange and virtual datarooms for legally compliant collaboration in the cloud. Idgard's vision is to become the most trusted global platform for secure content collaboration to instantly enable everyone, across all Learn more about idgard

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more. Learn more about Business VoiceEdge

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Workato is a next-gen iPaaS with 1,000+ pre-built connectors to help automate the most complex workflows across your organization
Workato is the recognized Enterprise Automation Platform Leader. Workato empowers business and IT teams to integrate their apps and automate business workflows without compromising on security and governance. Built on a cloud-native architecture that is designed for scale and speed to significantly reduce operational footprint and overall costs. Our low-code/no-code platform enables teams to build integrations 5X faster than traditional platforms. Contact us for a free trial now! Learn more about Workato

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics