Jamf Threat Defense protects against mobile endpoints including iOS, iPadOS, and Android threat vectors through a highly effective mobile application and prevents in-network threats in real-time.
SpyHunter is an on-premise malware detection and removal tool for Windows and Mac designed to help businesses scan, identify, remove, and block potentially unwanted programs (PUPs) and malware. It lets users protect their system against the latest malware threats by removing ransomware, trojans, viruses, worms, adware, rootkits, and other objects.
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.
Identity Services Engine (ISE) provides visibility into network devices on a zero-trust framework. It builds visibility based-segmentation, offers dynamic and complete visbility.
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.
IronDefense is a network detection and response (NDR) software, which helps businesses in financial, public, and other sectors detect and prevent malicious network activities. It lets security operations center (SOC) teams identify, analyze, and respond to cybersecurity threats using AI technology.
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.
BelkaVPN proxy - is a fast VPN proxy service that ensures internet privacy and security for everyone. Unblock media streaming, protect your data, shun away snoopers and hackers, and enjoy the full palette of online experiences with our VPN extension.
Trellix Network Security is an on-premise and cloud-based network security platform, which helps midsize to large businesses detect and resolve cyber threats or advanced, targeted, and other evasive attacks using Multi-Vector Virtual Execution (MVX), artificial intelligence (AI), and machine learning (ML) technologies. Administrators can receive alerts about critical issues and prioritize or contain targeted and newly discovered attacks based on real-time evidence.
INETCO Insight is an independent real-time payment network intelligence platform designed to meet the specific needs of the payments industry, including banking, retail and payments industries.
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns
Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.
DDoS-GUARD is a network security software that helps businesses protect websites against various types of distributed denial-of-service (DDoS) attacks, including TCP SYN flood, Slowloris, and HTTP flood. The platform allows managers to optimize content and images across web pages to improve website performances.
ThreatSpotter tool integrates with private cloud resources and ensures that compliance risk management summary should be integrated with provided credentials so that all compliance results would be available in threat analytics dashboard. Threatspotter helps in achievement of tracking continuously.
Genian NAC is a network security and access control software that helps businesses identify IP-enabled devices, manage vulnerabilities, and inspect device configurations to secure network access environments. Key features of the platform include network monitoring, device risk analysis, switch port management, IT security automation, and compliance regulation.