Filter

Security

Product categories

Topics

    Industries

      Delivery methods

      Certifications

      Capabilities level

      Pricing terms

      Vendor

      Source

        Security

          Viewing 83 products

          1
          Security
          STASH 1-Click Ransomless Ransomware Protection & Recovery Solution logo
          1-Click No Ransom Ransomware Solution

          By Stash Global Inc.

          Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.

          SecurityHQ Managed Detection and Response logo
          24/7 Managed Detection and Response - MDR

          By SecurityHQ

          Rapidly identify and limit the impact of security threats and risks with 24/7 threat monitoring, detection and targeted response, powered by real-time log analytics, with security orchestration, automation & response tooling for investigation, threat hunting and response.

          30Sec logo
          30sec Security Operations Center

          By Combis d.o.o.

          Combis 30sec SOC (Security Operations Center) service is a security service that provides 24/7 monitoring, detection and response to security incidents in the IT systems of organizations.

          Federated MDR logo
          Accenture Federated MDR

          By Accenture

          Discover real threats, trigger automated responses amidst chaos with Accenture Federated MDR; a branch of our client security operations team. A comprehensive coverage of services which includes, • Early Detection and Response • Security Monitoring On-prem/Cloud Infrastructure Security Monitoring SaaS Security Monitoring • Security Analytics and Automation

          Access: One logo
          Access One

          By Pirean, An Exostar Company

          From workforce and partner Identity Access Management (IAM) to customer facing mobile and web experiences, Access: One enables resilient and versatile services for access management, administration and governance. Delivered as a Service, Access: One enables highly regulated organizations to provide secure IAM services to employees, partners and consumers.

          AccuKnox CNAPP logo
          AccuKnox Zero Trust CNAPP for Advanced Cloud Security

          By AccuKnox

          Cloud Security that secures “Build to Runtime”. Compliant with SOC2, STIG, PCI, HIPAA, CIS, MITRE, NIST and more. One Platform that can do Agentless ASPM and CSPM, CWPP, KSPM and KIEM. AI-LLM powered durable, reliable and scalable CNAPP solution.

          Advanced SIEM Solution logo
          Advanced SIEM Solution

          By Alibaba Cloud

          The joint solution of IBM QRadar SIEM and Alibaba Cloud can provide a compliant set of security rules, reports, and references in Alibaba Cloud environment. Alibaba Cloud security center and log service(SLS) are already combined with IBM QRadar SIEM.

          AnonTech ViziVault logo
          AnonTech ViziVault

          By AnonTech

          Secure & manage personal information and comply with data privacy regulations with ViziVault by AnonTech.

          Aqua Security logo
          Aqua Cloud Native Application Protection Platform

          By Aqua Security

          The Aqua Cloud Native Application Protection Platform (CNAPP) helps teams deliver applications faster and automate more while better detecting, managing and remediating risk from code to production and maturing their DevSecOps practices.

          Argos Investigation & IBM watsonx logo
          Argos Investigation - Watsonx.data

          By Cogniware

          The unique analytical system that can process large amounts of information from various sources, both within the company and outside it. Argos can handle structured and unstructured data (multimedia files) such as audio, video, images, and text documents. Using watsonx.data, you can connect to data in minutes, quickly get trusted insights and reduce your data warehouse costs.

          Cyber Armor logo
          ARMO

          By ARMO

          Secure your cloud workload in minutes, and empower DevOps to automatically deploy secured environments. Create an inherently resilient environment where only valid workloads can run, communicate, and access data.

          Atomic Workload Protection logo
          Atomic Enterprise OSSEC

          By Atomicorp

          Adds manageability, security, and compliance features to OSSEC, the world's most popular open source server intrusion detection system.

          Product for BigID logo
          BigID Data Intelligence and Discovery Platform

          By BigiD Inc

          Actionable Data Intelligence & Discovery across Data Privacy, Data Security and Data Governance

          BloxOne Threat Defense logo
          BloxOne Threat Defense

          By Infoblox

          Infoblox BloxOne® Threat Defense provides hybrid protective DNS services to secure networks, devices and users from cyberthreats on- and off-premises, including remote locations and home offices.

          BlueChip Cyber Protection Force logo
          BlueChip SOC

          By BlueChip

          Enhance your cybersecurity measures with Blue Chip Cyber Protection Force! Boster your infrastructure security with a team of highly skilled professionals and cutting-edge threat detection technologies. Gain comprehensive visibility, proactive threat identification, and swift incident response capabilities.

          Boat.Alert logo
          Boat.Alert

          By Boat.Systems

          Boat.Alert is an advanced real-time application and infrastructure monitoring tool. It offers a wide range of functionalities that aid in the management and optimization of IT systems' performance. Here are some key features of the Boat.Alert product

          Bugcrowd Platform logo
          Bugcrowd Cybersecurity Solutions

          By Bugcrowd

          Crowdsourced-powered SaaS platform combining data-driven crowd engagement, integrated validation and triage, built-in workflows, and a rich knowledge graph to reduce risk, improve security ROI, and accelerate digital transformation.

          Test Data Management with Data Mask logo
          CRESTT DATA ANONYMIZATION

          By Crestt sp. z o.o.

          Enterprise solution for data masking/anonymization (part of GDPR requirements), based on IBM Optim platform, with addons and best practices prepared and validated by Crestt company. As a result - non-production environments can be refreshed and ready-to-use in hours, not weeks.

          CrowdStrike Falcon Platform logo
          CrowdStrike Falcon Platform

          By CrowdStrike

          Easily install and deploy Falcon Sensors to the control-pane and worker nodes running on Red Hat OpenShift platform 4

          CANCOM SOC aaS logo
          Cyber Defense Service

          By CANCOM

          The CANCOM Security Operations Center (SOC) supports your company in comprehensive cyber defense – to keep security in your operations at the highest level at all times.

          QRader , Incident Forensic , SOAR logo
          Cyber Fusion Center, CFC

          By Security Management Technology -SMT

          "SMT Cyber Fusion Center is not a conventional Security Operations Center, it's a powerhouse fueled by tech superheroes, engineered by SMT to a formidable defense." CFC has brought a new, innovative, It redefines Security Operations and Management by introducing cognitive systems built using Artificial Intelligence – Natural Language Understanding and Supervised Machine Learning

          Cyber Threat Defense logo
          Cyber Threat Defense

          By Cognizant

          Cognizant’s Cyber Threat Défense platform provides an integrated managed security solution powered by IBM Qradar on Cloud, ServiceNow & Threat Intelligence platforms, that can scale to the volume of data while ensuring to provide a holistic view of your IT Security to detect adv threats, suspicious user activity, policy violations, & helps you focus on protecting your business against attacks.

          CYBERSOC logo
          Cybersecurity Services

          By SECURESOFT ECUADOR S.A

          The service includes the correlation of events, monitoring, administration and support of the client's security platforms, the service is 24x7 and the SLAs will be defined together with each client.

          Dynatrace_RHM logo
          Dynatrace

          By Dynatrace

          Provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation

          Easycurity logo
          Easycurity

          By SecureDevice A/S

          Easycurity - With SIEM as a Service, the customer gets a managed and hosted IBM QRadar SIEM solution that is continuously optimised and tuned.

          Ensono Private Cloud Optimizer logo
          Ensono Private Cloud Optimizer

          By Ensono

          The Ensono Private Cloud Optimizer service leverages industry leading tools, coupled with Ensono Private Cloud expertise to deliver continuous optimization of cloud environments to deliver cost savings over time while preserving and improving performance.

          EyeGuard Cyber SOC logo
          EyeGuard Cyber SOC

          By Excellium Services SA

          EyeGuard Cyber SOC is an advanced cybersecurity service that focuses on detecting and responding to threats and attacks in real-time. It uses Security Technologies capabilities to identify potential indicators of compromise (IOCs), abnormal behaviours, and suspicious activities that could indicate a security incident.

          TODAQ logo
          GOTO SDK

          By TODAQ

          Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.

          IBM CloudPak for Security logo
          IBM Cloud Pak for Security

          By IBM

          IBM Cloud Pak for Security can help you gain deeper insights, mitigate risks, and accelerate response. With an open security platform that can advance your zero trust strategy, you can use existing investments while leaving your data where it is.

          IBM - DataPower logo
          IBM DataPower Virtual Gateway

          By IBM

          A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

          Qrtime logo
          IBM QRADAR TIMESTAMP SOLUTION

          By Platin Bilisim A.S.

          Our Time Stamper Solution (QRTime) is to stamp the Qradar or Guardium log files, providing the integrity of logs.

          Infoblox NIOS DDI logo
          Infoblox DDI

          By Infoblox

          Infoblox DDI has combined three critical core network services namely DNS, DHCP and IP address management (IPAM) into a single enterprise-grade platform that delivers the highest standards of security, service uptime and operational efficiencies.

          ISIM logo
          Infrastructure Services for Infrastructure Management

          By Cloudware Polska Sp. z o. o.

          Infrastructure Services for Infrastructure Management

          InMapz MAX logo
          InMapz MAX - Maps for Maximo

          By INMAPZ INC.

          Add a visual dimension to Maximo work orders by mapping locations of your buildings' equipment and assets. Save time and costs (get 300%+ ROI on your facilities staff's time) searching for equipment in your buildings by using interactive digital indoor mapping and equipment tracking application. Respond quickly to emergencies when you need to locate shut off valves for gas, water, electricity.

          Kong Enterprise RHM logo
          Kong Konnect Enterprise

          By Kong Inc.

          A Service Connectivity Platform that enables organizations to transition to microservices and manage the full lifecycle of services and APIs.

          Lacework Cloud Security Platform logo
          Lacework Polygraph Data Platform for Red Hat

          By Lacework

          Cloud native threat detection, compliance, behavioral anomaly detection, and automated security monitoring for Red Hat. Providing unmatched continuous activity monitoring and assurance checks from build time to runtime.

          IBM QRadar Siem-Soc Solution logo
          Managed 24/7 SOC

          By 2BSecure

          2BSecure Managed Siem Soc 24/7 solution using IBM QRadar. Detecting, Investigating and Reporting alerts on your environment and sensitive data.

          Managed Data Protection logo
          Managed Data Protection

          By SureSkills

          Our Managed Data Protection service offers a fully managed backup, snapshot and replication services with simple consumption-based pricing and a range of recovery options for organisations, companies, government agencies & departments. With solutions and services delivered directly by SureSkills IT Consulting & Solutions - one of Ireland's leading data protection and recovery solutions providers.

          MDR with QRadar SIEM logo
          Managed Detection and Response - MDR

          By Ward Solutions an EKCO Company

          We provide a Managed Detection and Response (MDR) service, 24x7 across your endpoints, networks, cloud, identities, and application environments helping you to detect respond and recover from today's complex cyber attacks.

          SOCaaS logo
          MANAGED INTELLIGENT SOC AND SOC-AS-A-SERVICE

          By S21Sec

          Companies of all sizes face the challenge of detecting and responding to breaches on-time when they occur. By mean, it takes to companies an average of 197 days to detect a security breach.

          Managed SOC Services logo
          Managed Security Operations Center Services

          By IS4IT GmbH

          The Security Operations Center identifies potential threats and recommends countermeasures to prevent or mitigate cyberattacks. The primary goal of a SOC is to ensure comprehensive monitoring and analysis of information security to early identify and address potential security incidents. Effective integration into the client's Security Incident process is crucial for its effectiveness.

          Managed Security Service Provider logo
          Managed Security Service Provider

          By NovaRed

          Monitoring with Qradar. is the security monitoring service that includes alerts and 24/7 performance, its purpose is to manage alerts generated on client platforms; These alerts are analyzed by Level 1 security analysts and, if necessary, an analysis by Level 2 analysts. The service is provided with World Class tools.

          Managed Security Service logo
          Managed Security Services

          By Presidio

          Presidio’s Managed Security Service delivers a team of security analysts monitoring your environment 24x7, using state-of-the art QRadar SIEM technology from IBM, detecting and responding to threats in real time, keeping your organization secure.

          Managed SIEM Service logo
          Managed SIEM Service

          By CYBERWISE

          Cyberwise's Managed SIEM Service delivers installation, configuration, monitoring and management of your SIEM deployment 24x7 by using stat-of-the-art Security QRadar SIEM technology from IBM, which helps to comply with regulatory requirements, detect suspicious activities timely and to respond to threats effectively.

          MultiLine logo
          MultiLine by Movius

          By Movius

          MultiLine by Movius allows users to call, text, or send WhatsApp messages on a secure, dedicated business number. Our user-friendly apps work on smartphone, desktop, or directly inside Salesforce.

          Navita Connect powered by MaaS360 logo
          Navita Connect powered by MaaS360

          By Navita

          Navita Connect + Maas360 is a turn-key offer for enterprise customer mobility considering remote onboarding, support, inventory and consumption management including IBM MaaS 360 software solution for applying control and security policies for mobile devices and notebooks and the Navita SaaS platform for inventory and consumption management.

          NeuVector Operator logo
          NeuVector Full Lifecycle Container Security

          By NeuVector by SUSE

          Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

          NexJ Integrated Advisor Desktop logo
          NexJ Integrated Advisor Desktop and CRM

          By NexJ Systems a business unit of N Harris Computer Corporation

          Most advisors need to juggle multiple applications to properly service a single customer. Advisor productivity and client experience suffer as individual tasks take longer to perform and mistakes are made. Advisors need a consolidated view of their customers with embedded tools and not just links to other applications. This is where an Integrated Advisor Desktop can make all the difference.

          Nirmata Enterprise for Kyverno logo
          Nirmata Enterprise for Kyverno

          By Nirmata

          The Nirmata Enterprise for Kyverno is designed to address the needs of organizations running production Kubernetes clusters with critical applications. Nirmata, the team behind the #1 Kubernetes-native policy engine, Kyverno, provides its certified distribution of Kyverno along with curated policy sets and long term support

          Digital Resilience Platform logo
          OnDMARC

          By Red Sift

          Blocks phishing/spoofing attacks and increases deliverability of legitimate emails.

          Tremolo Security logo
          OpenUnison

          By Tremolo Security, Inc

          Authenticate users and authorize access to your clusters and applications using a simple and automated approach. OpenUnison supports SAML2, OpenID Connect, LDAP and deploys with your existing pipeline infrastructure using GitOps.

          Origo - Managed Security Services logo
          Origo Manage Security Services

          By Origo

          Managed security service is monitoring and interpreting important system events throughout a network. This includes and is not limited to, unauthorized behaviour, malicious hacks, denial of service (DoS), anomalies, and trend analysis.

          OSS Privilege Manager logo
          OSS Privilege Manager

          By OSS One System Safe

          Solution is a remote ITSM of customer's endpoints, including some mission-critical endpoints. OSS manages the device and the user lifecycle in those devices.

          Privileged Account Protection logo
          Privileged Management Protection

          By Shanghai Binqsoft Technology Co.,Ltd.

          I, Establish an enterprise-level password repository with the function of securely saving all historical versions of passwords for all platform production users of the enterprise. II, Implement one password at a time for privileged accounts, automatically recover passwords III, Scan privileged accounts on RHEL systems.

          Red Hat 3scale API Management logo
          Red Hat 3scale API Management

          By Red Hat

          Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

          Red Hat Advanced Cluster Security for Kubernetes Managed Service logo
          Red Hat Advanced Cluster Security for Kubernetes

          By Red Hat

          Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.

          Red Hat Runtimes logo
          Red Hat Runtimes

          By Red Hat

          Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

          Red Hat Single Sign-On logo
          Red Hat Single Sign-On

          By Red Hat

          Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

          ReliaQuest logo
          ReliaQuest GreyMatter

          By ReliaQuest, LLC

          ReliaQuest GreyMatter helps clients see greater effectiveness and faster-time-to-value in IBM QRadar to meet the security use cases

          SDT- Secured Data Transfer logo
          SDT- Secured Data Transfer

          By Kun Computing Technology (Shanghai) Co., Ltd

          A tool to manage data or files transferring, betwee different network VLAN in the secure way.