Cloud security software

Cloud security software helpt organisaties gegevens en toepassingen in de cloud te beschermen door monitoring, detectie en beheer van beveiligingsbedreigingen te bieden.

Waarom Capterra gratis is
Een cloudgebaseerd platform voor beveiligingsanalyse dat beveiligingsinformatie biedt voor je hybride omgeving. Sumo Logic kan je eerste cloudgebaseerde SIEM zijn, je verouderde SIEM vervangen of samengaan met je bestaande SIEM-oplossing. Sumo Logic levert het enige voor de cloud ontworpen platform voor realtime analyse van machinegegevens dat continue informatie biedt. Meer informatie over Sumo Logic Sumo Logic levert het enige voor de cloud ontworpen platform voor realtime analyse van machinegegevens dat continue informatie biedt. Meer informatie over Sumo Logic

door Turbot

(0 beoordelingen)
Website bezoeken
Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails that ensure your cloud infrastructure is secure, compliant, scalable and cost optimized. Turbot enables your cloud team to focus on delivering higher-level value while your application teams remain agile through use of native AWS, Azure, and GCP tools. Meer informatie over Turbot Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails. Meer informatie over Turbot

door Intruder

(1 review)
Website bezoeken
Een oplossing om zwakke punten in je online digitale eigendommen op te sporen, de risico’s uit te leggen en te helpen met herstel voordat een inbreuk kan plaatsvinden. Meer informatie over Intruder Een oplossing om zwakke punten in je online digitale eigendommen op te sporen, de risico’s uit te leggen en te helpen met herstel voordat een inbreuk kan plaatsvinden. Meer informatie over Intruder
DNS-gebaseerde webcontentfilter en webbeveiligingslaag voor bedrijven die malware, ransomware en phishing blokkeren en controle van webcontent bieden. WebTitan filtert meer dan 2 miljard DNS-verzoeken per dag, identificeert elke dag 300.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter direct je cybersecurity. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Geweldige maandelijkse prijzen beschikbaar. Lokaal gehost. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan

door Netacea

(0 beoordelingen)
Website bezoeken
Netacea protects enterprises from malicious bot traffic. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from sophisticated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Meer informatie over Netacea Bot Management Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots. Meer informatie over Netacea Bot Management
SNEL, veilig en goed gestructureerde digitale platforms bereiken een betere omzetconversie, verbeteren de gebruikerservaringen en verminderen het wereldwijd energieverbruik. RapidSpike is een platform voor digitale belevingsmonitoring dat op dezelfde manier met je digitale platforms communiceert als je klanten. Dit platform is gericht op 3 belangrijke interacties: bedrijfstijd, prestaties en beveiliging, lokaliseren van kritieke problemen en het ondersteunen van continue verbetering met bruikbare inzichten, terwijl tegelijkertijd de blootstelling aan aanvallen van het type Magecart wordt verminderd. Meer informatie over RapidSpike Bescherm en verbeter je digitale platforms - inzichten in digitale ervaring, prestaties, bedrijfstijd, beveiliging en gegevensinbreuken (Magecart) Meer informatie over RapidSpike
Boxcryptor is flexibele en schaalbare versleutelingssoftware voor de cloud, met ondersteuning voor meer dan 30 providers en NAS-versleuteling op alle platforms. Het biedt functies voor samenwerking, controle en beheer die beveiligde samenwerking in bestanden mogelijk maken en tegelijkertijd voldoen aan de privacyregels. Definieer aangepaste beleidsregels, beheer gebruikers met eenmalige aanmelding of active directory en bescherm je accounts met tweevoudige verificatie (2FA). Kies voor beveiliging die in Duitsland is vervaardigd om veilig en efficiënt te werken in de cloud. Meer informatie over Boxcryptor Platformonafhankelijke versleutelingsoplossing voor de cloud en NAS-systemen die meer dan 30 cloudproviders ondersteunt (bijv. Dropbox, OneDrive). Meer informatie over Boxcryptor

door Skybox Security

(0 beoordelingen)
Website bezoeken
Skybox Vulnerability Control ondersteunt een systematische aanpak voor vulnerability management zoals geen enkele andere leverancier. Deze oplossing is gebaseerd op uitgebreide zichtbaarheid van je aanvalsoppervlak, en maakt gebruik van zijn context voor het snel analyseren, prioriteren en herstellen van je meest risicovolle kwetsbaarheden. Meer informatie over Vulnerability Control Stel de risico's voor je netwerk vast en prioriteer ze met uitgebreide scan- en analyseoplossingen voor kwetsbaarheden. Meer informatie over Vulnerability Control
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebruik van meerlagige technologieën die de vaardigheden van standaard antivirusprogramma's ruimschoots overtreffen. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Protect your email against ransomware, spearphishing and all other threats. ZEROSPAM is a highly effective and easy to use Cloud Email Security solution with a proven catch rate of 99.9% against all forms of email-borne threats. Fully compatible with Office 365, it provides superior ransomware and phishing protection, the best spearphishing protection in the industry and a very low false positive rate. We are an service-oriented team with a complete and highly accurate antispam. A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing.
Deep Security biedt meerdere XGen-technieken om fysieke, virtuele en cloudworkloads en containers te beschermen tegen bedreigingen. Eén dashboard vermindert het aantal benodigde beveiligingstools en combineert mogelijkheden met volledig inzicht in toonaangevende omgevingen zoals VMware en AWS. Deep Security verlaagt de kosten en complexiteit van het beveiligen van workloads in meerdere omgevingen die servers virtueel beschermen tegen de nieuwste geavanceerde bedreigingen zoals ransomware en netwerkgebaseerde kwetsbaarheden. Bescherm je bedrijf in fysieke, virtuele cloud- en containeromgevingen met centrale zichtbaarheid en controle.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Software to allow users to improve storage efficiency by remotely controlling digital infrastructure. Software to allow users to improve storage efficiency by remotely controlling digital infrastructure.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidates terabytes of data from any source Consolidates terabytes of data from any source
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Adaptive access control, empowering organizations to determine identities with confidence. Adaptive access control, empowering organizations to determine identities with confidence.

door Palo Alto Networks

(3 beoordelingen)
Profiel bekijken
Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.

door ThreatTrack Security

(2 beoordelingen)
Profiel bekijken
Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Protection and Performance for the Cloud Era Protection and Performance for the Cloud Era
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious. Manage all of your security and compliance operations from one real-time location.
The titan secure business hub and intelligent work platform for lawyers, businesses and professional services. The titan secure business hub and intelligent work platform for lawyers, businesses and professional services.
Wallarm WAF protects websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as CentOS, Ubuntu, AWS, GCP, Azure, K8s, and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. API and SPA automated protection with a built-in vulnerability assessment, cloud inventory, and management service

door Infoblox

(1 review)
Profiel bekijken
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP. The result is a significant decrease in errors and the sheer amount of tasks required to keep networks available, flexible and secure. The real-time visibility and control you need for your network while reducing expenses and increasing availability.

door RedSeal Networks

(1 review)
Profiel bekijken
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.

door Saviynt

(1 review)
Profiel bekijken
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner. Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. InsightIDR verzamelt native gegevens van je eindpunten, beveiligingslogboeken en cloud-diensten. Pas gedragsanalyses van gebruikers en aanvallers toe op je gegevens om activiteiten van indringers te vinden bij elke stap van de aanvalsketen. Verenig je beveiligingsgegevens. Detecteer problemen voordat ze ernstig worden. Reageer 20x sneller met visuele onderzoeken en automatisering. InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken.

door CA Technologies

(1 review)
Profiel bekijken
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.

door Cequence Security

(1 review)
Profiel bekijken
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Cloud Control is a 100% API based agentless cloud security and compliance management platform that offers enterprises complete cloud control through automated actionable cloud security intelligence across AWS, GCP, and Azure. Cloud Control protects cloud environments from the risks of misconfigurations, non-compliance, policy violations, and IAM challenges. Enterprises can assess their security posture, detect misconfigurations and threats, and remediate violations. Cloud Control automates cloud security and compliance monitoring and management.

door Lacework

(1 review)
Profiel bekijken
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation. Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.

door Templarbit

(1 review)
Profiel bekijken
Prevents attacks on your APIs and web applications with a data driven approach to AppSec. Prevents attacks on your APIs and web applications with a data driven approach to AppSec.

door CloudAlly

(1 review)
Profiel bekijken
CloudAllys automated daily SharePoint backup service ensures that you can quickly recover data from any point in time as well as export your archives for local storage. Try out our SharePoint Backup 15 day free trial. Granular item level search and restore, or restore a complete site using our non-destructive restore to the same or different site. With a few simple clicks, you can activate backups for all or selected sites. It's simple & easy to backup SharePoint. Cloud to cloud backup and restore solution that backs up daily changes in your SaaS to unlimited Amazon S3 storage.

door DisruptOps

(1 review)
Profiel bekijken
DisruptOps provides a SaaS-based cloud management platform to implement automated control and security of cloud infrastructure. We are helping organizations enforce cloud security best practices with automated guardrails, for multi-cloud environments. Rather than erecting barriers to cloud adoption, DisruptOps enforces guardrails that empowers DevOps and Security teams to remain agile and innovative while helping avoid security and operational pitfalls. DisruptOps is a multi-cloud management platform that is helping organizations assess and automate cloud security best practices.

door EmpowerID

(0 beoordelingen)
Profiel bekijken
All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance. All-in-one Identity Management & Cloud Security platform designed for comprehensive provisioning, SSO, and access governance.

door Cloud Raxak

(0 beoordelingen)
Profiel bekijken
Cloud Raxak automates the delivery of cloud security compliance across the enterprise. Cloud Raxak automates the delivery of cloud security compliance across the enterprise.

door DataDome

(0 beoordelingen)
Profiel bekijken
DataDome is gespecialiseerd in het beschermen en versnellen van digitale bedrijven. Dankzij de AI-gestuurde botbeheeroplossing kunnen bedrijven de prestaties verbeteren van websites die worden belast door intensieve scraping, gebruikersgegevens beschermen tegen hackers en betere marketing- en zakelijke beslissingen nemen dankzij analytische gegevens die niet zijn aangetast door botverkeer. Ontwikkel je botbeheerstrategie en voer deze uit met behulp van het dashboard, rapporten en realtime waarschuwingen. AI-gestuurde botbeheeroplossing om al je kwetsbaarheidspunten (websites, apps) te beschermen en je digitale zaken te versnellen.

door Threat Stack

(0 beoordelingen)
Profiel bekijken
Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more.

door CloudSploit

(0 beoordelingen)
Profiel bekijken
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Op de Secure DevOps Toolchain van SANS. Amazon Partner. Geautomatiseerde AWS-beveiliging en configuratiebewaking om een veilige en compatibele cloudinfrastructuuromgeving te handhaven. Open source.

door Marty Soft Conception

(0 beoordelingen)
Profiel bekijken
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

door CloudAware

(0 beoordelingen)
Profiel bekijken
Cloudaware is a SaaS multi-cloud management platform with such modules as: CMDB, Cost Management, Vulnerability Scanning, Intrusion Detection, Compliance Engine, Log Management and Backups & Replication. Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products. Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management.

door Akamai Technologies

(0 beoordelingen)
Profiel bekijken
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

door Rohde & Schwarz Cybersecurity

(0 beoordelingen)
Profiel bekijken
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills. R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support

door Cato Networks

(0 beoordelingen)
Profiel bekijken
The Cato Cloud securely connects all business locations, people, and applications. Cato reduces MPLS costs, eliminates distributed appliances, provides secure internet access, and globally extends the WAN to mobile users and cloud datacenters. Cato provides a global SD-WAN with built-in network security, delivered as a cloud service.

NCP

door NCP engineering

(0 beoordelingen)
Profiel bekijken
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.

door Radware

(0 beoordelingen)
Profiel bekijken
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.

door Forcepoint

(0 beoordelingen)
Profiel bekijken
Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, real-time user activity monitoring, and more. Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more.

door NCR

(0 beoordelingen)
Profiel bekijken
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

door Dash Solutions

(0 beoordelingen)
Profiel bekijken
Provides HIPAA Cloud automation for AWS applications and workloads. Plan, enforce, and demonstrate HIPAA compliance internally and externally. Create and enforce organizational and administrative policies with the Policy Navigator then automate DevOps and Security Operations with continuous compliance monitoring. Continuous Compliance Monitoring for AWS. Automate HIPAA compliance and DevOps tasks for AWS. Generate organizational policies.

door Threat X

(0 beoordelingen)
Profiel bekijken
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

door Outpost24

(0 beoordelingen)
Profiel bekijken
Elastic Workload Protector is a Cloud analytics solution which integrates a vulnerability scanner. This way, customers infrastructure are protected all the time because they know every new vulnerability or other potential risk and have detailed reports with adapted remediation solutions. EWP protects every infrastructure (traditional, Cloud, virtualized, hybrid) and containers. Its patented Clone & Scan feature allows customers to make precise analysis without impacting the production. Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously.

door Tigera

(0 beoordelingen)
Profiel bekijken
Solution for secure application connectivity for the cloud-native world. Solution for secure application connectivity for the cloud-native world.

door OPAQ Networks

(0 beoordelingen)
Profiel bekijken
A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report.

door Check Point Software Technologies

(0 beoordelingen)
Profiel bekijken
CloudGuard Dome9 is a comprehensive software platform for public cloud security and compliance orchestration. Using Dome9, organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud. Dome9 delivers security capabilities across Amazon Web Services, Microsoft Azure, and Google Cloud Platform (GCP). CloudGuard Dome9 provides cloud security solutions to keep enterprise data, assets and apps free from sophisticated attacks.

door Palo Alto Networks

(0 beoordelingen)
Profiel bekijken
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.

door Clarip

(0 beoordelingen)
Profiel bekijken
A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices.

door Bolt SaaS

(0 beoordelingen)
Profiel bekijken
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.

door Maddox

(0 beoordelingen)
Profiel bekijken
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!

door Alcide

(0 beoordelingen)
Profiel bekijken
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.

door TokenEx

(0 beoordelingen)
Profiel bekijken
TokenEx is een tokenisatieplatform voor grote ondernemingen dat vrijwel onbeperkte flexibiliteit biedt in hoe klanten toegang hebben tot gegevens, deze kunnen opslaan en beveiligen. Dit platform werkt met meerdere kanalen voor gegevensacceptatie met behulp van een processor-onafhankelijke aanpak, wat betekent dat deze software bijna elk gegevenstype kan tokeniseren en beveiligen, inclusief PCI, PII, PHI en zelfs ongestructureerde gegevensindelingen, en kan worden geïntegreerd met vrijwel elke processor of elk eindpunt. Cloudgebaseerd platform voor gegevensbeveiliging dat tokenisatie en veilige bewaking van cloudgegevens biedt voor alle soorten gevoelige gegevens.

door Coronet

(0 beoordelingen)
Profiel bekijken
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

door CloudPassage

(0 beoordelingen)
Profiel bekijken
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks.

door HackEDU

(0 beoordelingen)
Profiel bekijken
Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code. Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code.

door SecureStack

(0 beoordelingen)
Profiel bekijken
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

door Cossack Labs

(0 beoordelingen)
Profiel bekijken
Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Acra provides selective encryption, multi-layered access control, database leakage prevention and intrusion detection capabilities in a convenient, developer-friendly package. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.

door Protego

(0 beoordelingen)
Profiel bekijken
Recognizing the inadequacy of traditional application security paradigms, Protego Labs designed the first comprehensive solution built with the unique constraints and opportunities of serverless in mind. Through continuous serverless security posture, dynamic serverless intelligence, and elastic defense, Protego helps organizations achieve control over the security of their applications with unmatched automation and security that is at the speed of serverless- in under 20 minutes. Protegos unique technology and automation delivers unmatched security that is at the speed of serverless- in less than 20 minutes.

door MailGuard

(0 beoordelingen)
Profiel bekijken
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more

door Ryver

(0 beoordelingen)
Profiel bekijken
Combining AI + video management to create automated threat detection software. Combining AI + video management to create automated threat detection software.

door CloudHawk

(0 beoordelingen)
Profiel bekijken
CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS. CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS.

door McAfee

(0 beoordelingen)
Profiel bekijken
A data security product that allows users to detect, protect, and correct data in the cloud. A data security product that allows users to detect, protect, and correct data in the cloud.

door SecretHub

(0 beoordelingen)
Profiel bekijken
A developer tool to keep passwords and other secrets out of automation scripts. A developer tool to keep passwords and other secrets out of automation scripts.

door DigitalDefense

(0 beoordelingen)
Profiel bekijken
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

door ElcomSoft

(0 beoordelingen)
Profiel bekijken
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it. Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.

door GitGuardian

(0 beoordelingen)
Profiel bekijken
Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time. Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time.

door iboss

(0 beoordelingen)
Profiel bekijken
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 100 patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. Secure Internet access on any device, from any location, in the cloud.

door Armor Cloud Security

(0 beoordelingen)
Profiel bekijken
Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads. Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads.

door Atomicorp

(0 beoordelingen)
Profiel bekijken
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a single lightweight agent. AtomicWP secures workloads running in Amazon AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, or in any hybrid environment. AtomicWP secures both VM-based and container-based workloads. For more info: https://www.atomicorp.com/atomic-wp/ AtomicWP Workload Protection helps to secure workloads in a variety of environments while enhancing the security.

door Securonix

(0 beoordelingen)
Profiel bekijken
Cloud security with cloud partner ecosystem and multi-tenant architecture. Cloud security with cloud partner ecosystem and multi-tenant architecture.

door G-Core Labs

(0 beoordelingen)
Profiel bekijken
Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs. Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs.

door Kindite

(0 beoordelingen)
Profiel bekijken
Nowadays, technical limitations force encryption keys and sensitive data to be continuously accessed by the cloud infrastructure. By decoupling the cloud infrastructure from the data layer, Kindite's "Zero-trust Searchable Encryption" technology allows cloud-based applications to run smoothly over encrypted data without ever decrypting it. This eliminates the necessity to compute over plain-text data at the cloud and assures sensitive data is readable only at users endpoints. End-to-End Cloud Encryption

door eperi

(0 beoordelingen)
Profiel bekijken
Open-source IT security solution designed for Salesforce, Office 365, and web applications to protect all your critical business data. Open-source IT security solution designed for Salesforce, Office 365, and web applications to protect all your critical business data.

door Edgeo

(0 beoordelingen)
Profiel bekijken
Edgeo is a Global cloud-based web Security Platform that makes your website fast, secure and reliable. Edgeo is a Global cloud-based web Security Platform that makes your website fast, secure and reliable.

door Splunk

(0 beoordelingen)
Profiel bekijken
Splunk Insights voor infrastructuur is een snel te implementeren hulpmiddel voor het controleren van en problemen oplossen voor infrastructuur. Integreer en correleer logboeken en statistieken voor naadloze controle van servers, de cloud en OS. Splunk Insights voor infrastructuur is een snel te implementeren hulpmiddel voor het controleren van en problemen oplossen voor infrastructuur.

door OpsCompass

(0 beoordelingen)
Profiel bekijken
Drives operational control, visibility, and security in Microsoft Azure and other global cloud platforms. Drives operational control, visibility, and security in Microsoft Azure and other global cloud platforms.

door ijura

(0 beoordelingen)
Profiel bekijken
Simplified, cloud based mobile threat defense. Simplified, cloud based mobile threat defense.

door Foregenix

(0 beoordelingen)
Profiel bekijken
Monitors and protects websites against the latest threats affecting online businesses/eCommerce. Monitors and protects websites against the latest threats affecting online businesses/eCommerce.

door Ivanti

(0 beoordelingen)
Profiel bekijken
Cloud security app that helps identify endpoints, enforce security policies, encrypt data & block unauthorized use of removable devices Cloud security app that helps identify endpoints, enforce security policies, encrypt data & block unauthorized use of removable devices

door Sookasa

(0 beoordelingen)
Profiel bekijken
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies. Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.