Canada Show local products
355 results
Advanced protection for Microsoft 365 apps with ultimate zero-day threat defense. Learn more about ESET Cloud Office Security
ESET Cloud Office Security provides advanced protection for users of Microsoft 365 applications with ultimate zero-day threat defense. The combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect company communication, collaboration and cloud storage. Our easy-to-use cloud console gives you an overview of quarantined items and immediately notifies you when detection occurs. Learn more about ESET Cloud Office Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service. Learn more about Cato Networks Suite
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Learn more about Cato Networks Suite

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Perimeter 81 provides secure access to local network, applications and cloud infrastructures with one unified platform. Learn more about Perimeter 81
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG. With its groundbreaking ease-of-use and global network of PoPs, Perimeter 81 allows you to manage your network and scale as you grow. Learn more about Perimeter 81

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Qumulo is the leading file data platform for data management and storage across multi-cloud environments. Learn more about Qumulo File Data Platform
Qumulo's disruptive file data platform is defining a new category in enterprise data management, providing its customers the most advanced solution available in the market for managing and accessing file data to create new services and applications. We built a unified file data platform to support the entire data lifecycle with powerful data services, right out of the box. Manage, store, and build with unstructured data at massive scale, anywhere you want. Learn more about Qumulo File Data Platform

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Datadog's Cloud Security Platform enables you to get full-stack security for your production environment. Get set up in minutes. Learn more about Datadog
Datadog Cloud Security Platform offers full-stack security for your production environment. With real-time threat detection, continuous configuration audits, and context-rich security signals, you can easily bring speed and scale to your security organization. Secure your environment by correlating security threats with metrics or logs from across your environment. Get started quickly with Datadog's turn-key detection rules, dashboards, and support for 500+ technologies. Learn more about Datadog

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SpamTitan Email Security prevents unwanted email spam, phishing attacks, malware, ransomware, Spoofing, BEC and other email threats Learn more about SpamTitan
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Learn more about SpamTitan

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Learn more about SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Learn more about SpectralOps

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secure Your Cloud. Identity-First. Comprehensive cloud security platform for AWS, Azure and GCP. Learn more about Ermetic
Ermetic is a comprehensive cloud security platform for AWS, Azure and GCP that enables you to proactively reduce your attack surface, detect threats and reduce your blast radius in case of a breach. It provides everything from full-stack visibility and actionable risk intelligence, to automated remediation, real-time anomaly detection and compliance. With Ermetic, you can reveal the toxic scenarios that put your data at risk, and implement zero trust and least privilege access. Learn more about Ermetic

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Cloud security is essential for protecting company data and applications from exposure to potential risks. Unauthorized access might lead to data breaches and leaks, resulting in reputational and financial damage. NordLayer enables security measures to company cloud environments, ensuring remote login and access controls. It allows them to operate securely even on a public network encrypting and hiding all business-related data traffic. Learn more about NordLayer

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage® safeguards cloud infrastructure for the world’s best-recognized brands in finance, e-commerce, gaming, B2B SaaS, healthcare, biotech, and digital media. The CloudPassage Halo® platform unifies security and compliance across servers, containers, and IaaS resources across any mix of public, private, hybrid, and multi-cloud environments including Amazon Web Services, Microsoft Azure, and Google Cloud Platform. Halo’s extensive automation capabilities streamline and accelerate workflow Learn more about CloudPassage Halo

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management. Learn more about JumpCloud Directory Platform
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. Learn more about JumpCloud Directory Platform

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure. Learn more about SailPoint
Stop the #1 cloud threat: Unauthorized access. SailPoint Cloud Access Management allows you to get complete visibility and control across your cloud infrastructure and workloads, detect potential anomalies, and better enforce access policies across all users. Learn more about SailPoint

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges Learn more about Portnox CLEAR
Great for all industries with 500-10,000 Employees. Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR is vendor agnostic and eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Learn more about Portnox CLEAR

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Proactive Best Practice & Security Analysis for AWS, Azure, Kubernetes, VMware & Windows & Linux OS. Learn more about Runecast Analyzer
Runecast is an enterprise IT platform which saves your Security and Operations teams time and money by enabling a proactive approach to ITOM, CSPM and compliance. Your teams can do more with less via a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. Runecast helps Operations teams reduce operational overheads and increase clarity and Security teams benefit from simplified vulnerability management and regulatory compliance. Learn more about Runecast Analyzer

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
First End-User Driven Compliance Automation Software for Google Workspace and Microsoft 365! Full Onboarding In Just 7 days. Learn more about Tricent
In 2018, a bank approached us with a critical security and compliance concern: they didn't know how many files were shared externally and who could access them. We realized many businesses struggled with the same issue and discovered that Google Workspace nor Microsoft 365 (OneDrive, SharePoint, and Teams) could solve this. That's why we developed Tricent - a tool that helps you discover and remove (external) access to files and Teams. It's simple, user-driven, and automatic. Learn more about Tricent

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
A comprehensive web security solution that includes WAF, bot management, DDoS protection, API security, ATO prevention, and much more. Learn more about Reblaze
A cloud-native security solution for sites, web apps, and APIs. Reblaze includes next-gen WAF, DDoS protection, API security, bot mitigation, ATO (Account Takeover) prevention, real-time traffic analysis, Machine Learning, and more. As a fully managed solution, Reblaze is always up-to-date, and is hardened immediately against new threats as they arise. It is fully integrated with AWS, Azure, and GCP. Flexible deployment options include single-cloud, multi-cloud, hybrid, and service meshes. Learn more about Reblaze

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
365 Total Protection offers two packages for your company's security management developed specifically for Microsoft Office 365. Learn more about 365 Total Protection
Hornetsecurity offers you two comprehensive packages for your company's Microsoft Office 365 security management: With 365 Total Protection Business, you get a comprehensive security solution with a wide range of features that ensure email and data security in Office 365. The Enterprise version covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms. Learn more about 365 Total Protection

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, and Google Cloud. Learn more about Sonrai Public Cloud Security Platform
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, and Google Cloud. The Sonrai Dig platform is built on a sophisticated graph that identifies, monitors and secures every possible relationship between identities and data that exists inside an organization's public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end cloud security. Learn more about Sonrai Public Cloud Security Platform

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
An award-winning solution that delivers comprehensive security for small and medium business devices, data, and employees. Learn more about Avast Business Pro Plus
Avast Business Antivirus Pro Plus is an award-winning, enterprise-grade solution that delivers comprehensive protection for small and medium business devices, data, and employees. Fully equipped with next-gen endpoint, server, and identity protection, our advanced solution is designed to block advanced cyberthreats from entering your network. Learn more about Avast Business Pro Plus

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Simplify complexity with automated protection policies. Create policies in minutes by selecting backup frequency and retention. Learn more about Rubrik
Recover from ransomware with immutable backups built into the platform. Quickly search and restore files to the most recent clean versions, whether they are stored on-premises or in the cloud. Minimize downtime without paying a ransom. Polaris Radar makes it faster and easier to recover from ransomware. See how your data changed at the time of an attack. Leverage machine learning to detect and alert on suspicious behavior. Learn more about Rubrik

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform. Learn more about SentinelOne
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity™ ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. Learn more about SentinelOne

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
HackerOne is the industry standard for hacker-powered security. Learn more about HackerOne
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Effortlessly backup and restore ExchangeOnline, OneDrive, SharePoint, and Teams including all files, folders, and document libraries. Learn more about x360Cloud
Axcient x360Cloud protects and secures Microsoft 365 and Google Workspace data by providing complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams, plus Google Drive, including Google Docs, Files, and Folders. x360Cloud supports cloud-to-cloud backup directly from Microsoft 365 or Google Workspace to the Axcient Cloud, and is HIPAA, SOC-2, and GDPR compliant. x360Cloud allows MSPs avoid the risks of being 100% dependent on Microsoft or Google for business continuity. Learn more about x360Cloud

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Clumio unleashes the full power of the cloud to deliver secure backup as a service for your enterprise data wherever it needs to be. Learn more about Clumio
Clumio helps organizations simplify data protection in AWS. Its secure air-gapped SaaS solution protects from ransomware and enables organizations to achieve stringent compliance requirements, backup and restore data in minutes, and gain better visibility to optimize cloud storage costs. Learn more about Clumio

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Learn more about VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Learn more about VaultCore

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secures remote access to private apps, replacing corporate VPNs with a more secure and usable zero trust-based solution. Learn more about Twingate
Twingate is a Zero Trust Networking solution that enables businesses of all sizes to secure remote access to their private apps, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of developers, DevOps, IT teams, and end users easier, Twingate deploys in minutes and replaces outdated, insecure, and difficult-to-maintain corporate VPNs which were not built to handle the "work from anywhere" world where cloud-based assets and remote work are now the norm. Learn more about Twingate

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Nordcloud Klarity helps midsize & large businesses handle multi-cloud forecasting, reporting, cost allocation, and more. Learn more about Nordcloud Klarity Core
Nordcloud Klarity is an innovative set of cloud management tools giving you complete control over your public cloud estates while maintaining stakeholder alignment. Thanks to the user-friendly dashboards and automation capabilities, you have full control of your cloud estates and costs across Azure, AWS, GCP and VMware. Designed to automate cloud operations, optimize spend, and improve security, Nordcloud Klarity has something for everyone – from devs to compliance to finance to the C-suite. Learn more about Nordcloud Klarity Core

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
24/7 SOC-as-a-Service capabilities in a turnkey approach. Learn more about CipherBox
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities. Learn more about CipherBox

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Zycada is a Programmable Intelligent Edge built to accelerate Dynamic content (10x faster than any traditional CDN can deliver) Learn more about Zycada
Zycada is the world's first Programmable Intelligent Edge platform. Think Zycada for Dynamic content; (traditional) CDN for Static content. Zycada's platform helps provide maximum availability for cloud applications with our CDN Reserve solution. And we help Deliver the fastest online shopping experience globally with our Cloud Service Accelerator solution (10x faster for Dynamic content). Learn more about Zycada

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Teleport (OSS & Enterprise) is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications. Learn more about Teleport
Teleport is a secure access solution that consolidates infrastructure access into a single platform. With Teleport, engineers and security teams get unified access to Linux and Windows servers, Kubernetes clusters, databases, and DevOps applications like CI/CD, version control, and monitoring dashboards across all environments. Teleport replaces VPNs, shared credentials, and legacy privileged access management technologies to improve security and engineering productivity. Learn more about Teleport

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
SpamTitan Plus is an AI-driven email protection solution that provides “zero-day” threat protection and intelligence. Learn more about SpamTitan Plus
SpamTitan Plus Anti-Phishing is an AI-driven email protection solution that provides “zero-day” threat protection and intelligence. Spam Titan Plus provides 100% coverage of ALL current market leading anti-phishing feeds, 1.5X increase in unique phishing URL detections and has 1.6X faster phishing detections than the current market leaders. With real-time continuous updates providing SpamTitan Plus with 10 million new, never-before seen malicious URLs a day. Book a SpamTitan Plus demo Today. Learn more about SpamTitan Plus

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
LastPass provides secure password management without compromising ease of use and employee productivity.
Improve your business’ password hygiene and security, without compromising ease of use. LastPass empowers employees to generate, store, and share credentials seamlessly, while providing valuable insight and control to Admins through security policies and advanced reporting. LastPass ensures data protection and privacy through LastPass’ zero-knowledge security infrastructure. Learn more about LastPass

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Canada Local product
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click.
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. When everyone uses 1Password, your risk goes down and your productivity goes up. Learn more about 1Password

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications.
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about ManageEngine Patch Manager Plus

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Zerospam The AI-driven email security solution
Zerospam is the only cloud-based email security protection providing an unparalleled, AI-powered filtering technology, engineered by experts to be highly accurate and remarkably simple to use. The Zerospam solution was created for small and medium businesses and enterprise customers across North America and beyond because we care about your safety in an era of unprecedented cyber risk to your #1 communication method. Learn more about Zerospam

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Secure and resizable compute capacity in the cloud. Launch applications when needed without upfront commitments.
Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of operating systems, load them with your custom application environment, manage your network’s access permissions, and run your image using as many or few systems as you desire. Learn more about Amazon EC2

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity. Learn more about OneLogin

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Learn more about Delivery Trust

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more. Learn more about Business VoiceEdge

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Learn more about Incapsula

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
Provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe.
uniscon GmbH is a Munich-based provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe. uniscon’s products work hand in hand: uniscon’s business cloud idgard® secures and simplifies digital communication and data exchange with partners, customers and colleagues at the highest level. More than 1,200 companies already rely on the web-based data room and file sharing service. Learn more about idgard

Features

  • Threat Intelligence
  • Behavioral Analytics
  • Incident Management Software
  • Access Controls/Permissions
  • Real Time Monitoring
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics