Filter
Delivery methods
Certifications
Pricing terms
Vendor
Vendor
Security
Viewing 27 products

1-Click No Ransom Ransomware Solution
By Stash Global Inc.
Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.

24/7 Managed Detection and Response - MDR
By SecurityHQ
Rapidly identify and limit the impact of security threats and risks with 24/7 threat monitoring, detection and targeted response, powered by real-time log analytics, with security orchestration, automation & response tooling for investigation, threat hunting and response.

AccuKnox Zero Trust CNAPP for Advanced Cloud Security
By AccuKnox
Cloud Security that secures “Build to Runtime”. Compliant with SOC2, STIG, PCI, HIPAA, CIS, MITRE, NIST and more. One Platform that can do Agentless ASPM and CSPM, CWPP, KSPM and KIEM. AI-LLM powered durable, reliable and scalable CNAPP solution.

Argos Investigation - Watsonx.data
By Cogniware
The unique analytical system that can process large amounts of information from various sources, both within the company and outside it. Argos can handle structured and unstructured data (multimedia files) such as audio, video, images, and text documents. Using watsonx.data, you can connect to data in minutes, quickly get trusted insights and reduce your data warehouse costs.

BlueChip SOC
By BlueChip
Enhance your cybersecurity measures with Blue Chip Cyber Protection Force! Boster your infrastructure security with a team of highly skilled professionals and cutting-edge threat detection technologies. Gain comprehensive visibility, proactive threat identification, and swift incident response capabilities.

CRESTT DATA ANONYMIZATION
By Crestt sp. z o.o.
Enterprise solution for data masking/anonymization (part of GDPR requirements), based on IBM Optim platform, with addons and best practices prepared and validated by Crestt company. As a result - non-production environments can be refreshed and ready-to-use in hours, not weeks.

Cyber Threat Defense
By Cognizant
Cognizant’s Cyber Threat Défense platform provides an integrated managed security solution powered by IBM Qradar on Cloud, ServiceNow & Threat Intelligence platforms, that can scale to the volume of data while ensuring to provide a holistic view of your IT Security to detect adv threats, suspicious user activity, policy violations, & helps you focus on protecting your business against attacks.

Dynatrace
By Dynatrace
Provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation

Ensono Private Cloud Optimizer
By Ensono
The Ensono Private Cloud Optimizer service leverages industry leading tools, coupled with Ensono Private Cloud expertise to deliver continuous optimization of cloud environments to deliver cost savings over time while preserving and improving performance.

GOTO SDK
By TODAQ
Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.

IBM DataPower Virtual Gateway
By IBM
A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

IBM QRADAR TIMESTAMP SOLUTION
By Platin Bilisim A.S.
Our Time Stamper Solution (QRTime) is to stamp the Qradar or Guardium log files, providing the integrity of logs.

InMapz MAX - Maps for Maximo
By INMAPZ INC.
Add a visual dimension to Maximo work orders by mapping locations of your buildings' equipment and assets. Save time and costs (get 300%+ ROI on your facilities staff's time) searching for equipment in your buildings by using interactive digital indoor mapping and equipment tracking application. Respond quickly to emergencies when you need to locate shut off valves for gas, water, electricity.

Managed Detection and Response - MDR
By Ward Solutions an EKCO Company
We provide a Managed Detection and Response (MDR) service, 24x7 across your endpoints, networks, cloud, identities, and application environments helping you to detect respond and recover from today's complex cyber attacks.
MultiLine by Movius
By Movius
MultiLine by Movius allows users to call, text, or send WhatsApp messages on a secure, dedicated business number. Our user-friendly apps work on smartphone, desktop, or directly inside Salesforce.

NexJ Integrated Advisor Desktop and CRM
By NexJ Systems a business unit of N Harris Computer Corporation
Most advisors need to juggle multiple applications to properly service a single customer. Advisor productivity and client experience suffer as individual tasks take longer to perform and mistakes are made. Advisors need a consolidated view of their customers with embedded tools and not just links to other applications. This is where an Integrated Advisor Desktop can make all the difference.

Red Hat 3scale API Management
By Red Hat
Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

Red Hat Advanced Cluster Security for Kubernetes
By Red Hat
Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.

Red Hat Runtimes
By Red Hat
Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

Red Hat Single Sign-On
By Red Hat
Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

SecurePlus
By InTec System
SecurePlus module is a fraud prevention solution designed to help financial organizations detect and stop fraud across multiple channels, including online and mobile banking, and more.

SIEM/SOC Services
By Trustnet
TrustNet’s security center is dedicated to innovation and focused on managing and responding to cyber incidents 24/7. Our services provide end-to-end protection with all the benefits of a local SOC. We will provide a channel of command to respond to abnormal incidents and keep you safe 24/7 Around-the-clock monitoring, providing immediate analysis and response to security incidents.

Tech Mahindra unified Identity and Access Management Platform
By TECH MAHINDRA LIMITED
Tech M Introduces IAM Suite powered by IBM for comprehensive identity and access management. Empower your organization with the comprehensive Identity and Access Management (IAM) suite, Seamlessly manage identities, control access, and safeguard critical resources with adaptive authentication, ensuring robust security without compromising user experience.

Tech Mahindra xMDR
By TECH MAHINDRA LIMITED
Tech Mahindra xMDR service is designed from the bottom up with common security operations concerns in mind, minimizes the burden of continual technological stack maintenance and enables responsive, cost-effective, and scalable SOC service. We offer seamless integration with the Client's security operations to improve detection, response, and remediation efforts.

Trend Micro Cloud One
By Trend Micro Incorporated
Trend Micro Cloud One is the complete security services platform for organizations undergoing digital transformations in the cloud. From migration, to S3 buckets, to modern applications, and cloud security posture management, we've got you covered.

Virtual Guardian 24/7 SOC
By Virtual Guardian
Powered by Qradar, our 24/7 Managed Detection & Response (MDR) and Security Operations Center (SOC) services safeguards organizations from digital assaults so they can focus on what matters – running their businesses.

Wavestrong
By Wavestrong Inc.
WaveStrong’s Managed Detection and Response Services (MDR) deliver a 24/7 threat detection and fast response capability, fueled by threat intelligence and proactive threat hunting to reveal undetected threats faster while improving Security Operations Center productivity.