Filter

Security

Product categories

Topics

    Industries

      Delivery methods

      Certifications

      Capabilities level

      Pricing terms

      Vendor

      Source

        Security

          Viewing 27 products

          1
          Security
          STASH 1-Click Ransomless Ransomware Protection & Recovery Solution logo
          1-Click No Ransom Ransomware Solution

          By Stash Global Inc.

          Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.

          SecurityHQ Managed Detection and Response logo
          24/7 Managed Detection and Response - MDR

          By SecurityHQ

          Rapidly identify and limit the impact of security threats and risks with 24/7 threat monitoring, detection and targeted response, powered by real-time log analytics, with security orchestration, automation & response tooling for investigation, threat hunting and response.

          AccuKnox CNAPP logo
          AccuKnox Zero Trust CNAPP for Advanced Cloud Security

          By AccuKnox

          Cloud Security that secures “Build to Runtime”. Compliant with SOC2, STIG, PCI, HIPAA, CIS, MITRE, NIST and more. One Platform that can do Agentless ASPM and CSPM, CWPP, KSPM and KIEM. AI-LLM powered durable, reliable and scalable CNAPP solution.

          Argos Investigation & IBM watsonx logo
          Argos Investigation - Watsonx.data

          By Cogniware

          The unique analytical system that can process large amounts of information from various sources, both within the company and outside it. Argos can handle structured and unstructured data (multimedia files) such as audio, video, images, and text documents. Using watsonx.data, you can connect to data in minutes, quickly get trusted insights and reduce your data warehouse costs.

          BlueChip Cyber Protection Force logo
          BlueChip SOC

          By BlueChip

          Enhance your cybersecurity measures with Blue Chip Cyber Protection Force! Boster your infrastructure security with a team of highly skilled professionals and cutting-edge threat detection technologies. Gain comprehensive visibility, proactive threat identification, and swift incident response capabilities.

          Test Data Management with Data Mask logo
          CRESTT DATA ANONYMIZATION

          By Crestt sp. z o.o.

          Enterprise solution for data masking/anonymization (part of GDPR requirements), based on IBM Optim platform, with addons and best practices prepared and validated by Crestt company. As a result - non-production environments can be refreshed and ready-to-use in hours, not weeks.

          Cyber Threat Defense logo
          Cyber Threat Defense

          By Cognizant

          Cognizant’s Cyber Threat Défense platform provides an integrated managed security solution powered by IBM Qradar on Cloud, ServiceNow & Threat Intelligence platforms, that can scale to the volume of data while ensuring to provide a holistic view of your IT Security to detect adv threats, suspicious user activity, policy violations, & helps you focus on protecting your business against attacks.

          Dynatrace_RHM logo
          Dynatrace

          By Dynatrace

          Provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation

          Ensono Private Cloud Optimizer logo
          Ensono Private Cloud Optimizer

          By Ensono

          The Ensono Private Cloud Optimizer service leverages industry leading tools, coupled with Ensono Private Cloud expertise to deliver continuous optimization of cloud environments to deliver cost savings over time while preserving and improving performance.

          TODAQ logo
          GOTO SDK

          By TODAQ

          Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.

          IBM - DataPower logo
          IBM DataPower Virtual Gateway

          By IBM

          A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

          Qrtime logo
          IBM QRADAR TIMESTAMP SOLUTION

          By Platin Bilisim A.S.

          Our Time Stamper Solution (QRTime) is to stamp the Qradar or Guardium log files, providing the integrity of logs.

          InMapz MAX logo
          InMapz MAX - Maps for Maximo

          By INMAPZ INC.

          Add a visual dimension to Maximo work orders by mapping locations of your buildings' equipment and assets. Save time and costs (get 300%+ ROI on your facilities staff's time) searching for equipment in your buildings by using interactive digital indoor mapping and equipment tracking application. Respond quickly to emergencies when you need to locate shut off valves for gas, water, electricity.

          MDR with QRadar SIEM logo
          Managed Detection and Response - MDR

          By Ward Solutions an EKCO Company

          We provide a Managed Detection and Response (MDR) service, 24x7 across your endpoints, networks, cloud, identities, and application environments helping you to detect respond and recover from today's complex cyber attacks.

          MultiLine logo
          MultiLine by Movius

          By Movius

          MultiLine by Movius allows users to call, text, or send WhatsApp messages on a secure, dedicated business number. Our user-friendly apps work on smartphone, desktop, or directly inside Salesforce.

          NexJ Integrated Advisor Desktop logo
          NexJ Integrated Advisor Desktop and CRM

          By NexJ Systems a business unit of N Harris Computer Corporation

          Most advisors need to juggle multiple applications to properly service a single customer. Advisor productivity and client experience suffer as individual tasks take longer to perform and mistakes are made. Advisors need a consolidated view of their customers with embedded tools and not just links to other applications. This is where an Integrated Advisor Desktop can make all the difference.

          Red Hat 3scale API Management logo
          Red Hat 3scale API Management

          By Red Hat

          Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

          Red Hat Advanced Cluster Security for Kubernetes Managed Service logo
          Red Hat Advanced Cluster Security for Kubernetes

          By Red Hat

          Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.

          Red Hat Runtimes logo
          Red Hat Runtimes

          By Red Hat

          Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

          Red Hat Single Sign-On logo
          Red Hat Single Sign-On

          By Red Hat

          Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

          SecurePlus logo
          SecurePlus

          By InTec System

          SecurePlus module is a fraud prevention solution designed to help financial organizations detect and stop fraud across multiple channels, including online and mobile banking, and more.

          Trustnet TSOC logo
          SIEM/SOC Services

          By Trustnet

          TrustNet’s security center is dedicated to innovation and focused on managing and responding to cyber incidents 24/7. Our services provide end-to-end protection with all the benefits of a local SOC. We will provide a channel of command to respond to abnormal incidents and keep you safe 24/7 Around-the-clock monitoring, providing immediate analysis and response to security incidents.

          Tech Mahindra unified Identity and Access Management Platform logo
          Tech Mahindra unified Identity and Access Management Platform

          By TECH MAHINDRA LIMITED

          Tech M Introduces IAM Suite powered by IBM for comprehensive identity and access management. Empower your organization with the comprehensive Identity and Access Management (IAM) suite, Seamlessly manage identities, control access, and safeguard critical resources with adaptive authentication, ensuring robust security without compromising user experience.

          Tech Mahindra Data Security Powered IBM logo
          Tech Mahindra xMDR

          By TECH MAHINDRA LIMITED

          Tech Mahindra xMDR service is designed from the bottom up with common security operations concerns in mind, minimizes the burden of continual technological stack maintenance and enables responsive, cost-effective, and scalable SOC service. We offer seamless integration with the Client's security operations to improve detection, response, and remediation efforts.

          Trend Micro Cloud One logo
          Trend Micro Cloud One

          By Trend Micro Incorporated

          Trend Micro Cloud One is the complete security services platform for organizations undergoing digital transformations in the cloud. From migration, to S3 buckets, to modern applications, and cloud security posture management, we've got you covered.

          Virtual Guardian SOC logo
          Virtual Guardian 24/7 SOC

          By Virtual Guardian

          Powered by Qradar, our 24/7 Managed Detection & Response (MDR) and Security Operations Center (SOC) services safeguards organizations from digital assaults so they can focus on what matters – running their businesses.

          WaveStrong Risk logo
          Wavestrong

          By Wavestrong Inc.

          WaveStrong’s Managed Detection and Response Services (MDR) deliver a 24/7 threat detection and fast response capability, fueled by threat intelligence and proactive threat hunting to reveal undetected threats faster while improving Security Operations Center productivity.