Filter

Security

Product categories

Topics

    Industries

      Delivery methods

      Certifications

      Capabilities level

      Pricing terms

      Vendor

      Source

        Security

        Viewing 26 products

        1
        Security
        STASH 1-Click Ransomless Ransomware Protection & Recovery Solution logo
        1-Click No Ransom Ransomware Solution

        By Stash Global Inc.

        Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.

        SecurityHQ Managed Detection and Response logo
        24/7 Managed Detection and Response - MDR

        By SecurityHQ

        Rapidly identify and limit the impact of security threats and risks with 24/7 threat monitoring, detection and targeted response, powered by real-time log analytics, with security orchestration, automation & response tooling for investigation, threat hunting and response.

        AccuKnox CNAPP logo
        AccuKnox Zero Trust CNAPP for Advanced Cloud Security

        By AccuKnox

        Cloud Security that secures “Build to Runtime”. Compliant with SOC2, STIG, PCI, HIPAA, CIS, MITRE, NIST and more. One Platform that can do Agentless ASPM and CSPM, CWPP, KSPM and KIEM. AI-LLM powered durable, reliable and scalable CNAPP solution.

        Argos Investigation & IBM watsonx logo
        Argos Investigation - Watsonx.data

        By Cogniware

        The unique analytical system that can process large amounts of information from various sources, both within the company and outside it. Argos can handle structured and unstructured data (multimedia files) such as audio, video, images, and text documents. Using watsonx.data, you can connect to data in minutes, quickly get trusted insights and reduce your data warehouse costs.

        BlueChip Cyber Protection Force logo
        BlueChip SOC

        By BlueChip

        Enhance your cybersecurity measures with Blue Chip Cyber Protection Force! Boster your infrastructure security with a team of highly skilled professionals and cutting-edge threat detection technologies. Gain comprehensive visibility, proactive threat identification, and swift incident response capabilities.

        Test Data Management with Data Mask logo
        CRESTT DATA ANONYMIZATION

        By Crestt sp. z o.o.

        Enterprise solution for data masking/anonymization (part of GDPR requirements), based on IBM Optim platform, with addons and best practices prepared and validated by Crestt company. As a result - non-production environments can be refreshed and ready-to-use in hours, not weeks.

        Cyber Threat Defense logo
        Cyber Threat Defense

        By Cognizant

        Cognizant’s Cyber Threat Défense platform provides an integrated managed security solution powered by IBM Qradar on Cloud, ServiceNow & Threat Intelligence platforms, that can scale to the volume of data while ensuring to provide a holistic view of your IT Security to detect adv threats, suspicious user activity, policy violations, & helps you focus on protecting your business against attacks.

        Dynatrace_RHM logo
        Dynatrace

        By Dynatrace

        Provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation

        Ensono Private Cloud Optimizer logo
        Ensono Private Cloud Optimizer

        By Ensono

        The Ensono Private Cloud Optimizer service leverages industry leading tools, coupled with Ensono Private Cloud expertise to deliver continuous optimization of cloud environments to deliver cost savings over time while preserving and improving performance.

        TODAQ logo
        GOTO SDK

        By TODAQ

        Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.

        IBM - DataPower logo
        IBM DataPower Virtual Gateway

        By IBM

        A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

        Qrtime logo
        IBM QRADAR TIMESTAMP SOLUTION

        By Platin Bilisim A.S.

        Our Time Stamper Solution (QRTime) is to stamp the Qradar or Guardium log files, providing the integrity of logs.

        MDR with QRadar SIEM logo
        Managed Detection and Response - MDR

        By Ward Solutions an EKCO Company

        We provide a Managed Detection and Response (MDR) service, 24x7 across your endpoints, networks, cloud, identities, and application environments helping you to detect respond and recover from today's complex cyber attacks.

        MultiLine logo
        MultiLine by Movius

        By Movius

        MultiLine by Movius allows users to call, text, or send WhatsApp messages on a secure, dedicated business number. Our user-friendly apps work on smartphone, desktop, or directly inside Salesforce.

        NexJ Integrated Advisor Desktop logo
        NexJ Integrated Advisor Desktop and CRM

        By NexJ Systems a business unit of N Harris Computer Corporation

        Most advisors need to juggle multiple applications to properly service a single customer. Advisor productivity and client experience suffer as individual tasks take longer to perform and mistakes are made. Advisors need a consolidated view of their customers with embedded tools and not just links to other applications. This is where an Integrated Advisor Desktop can make all the difference.

        Red Hat 3scale API Management logo
        Red Hat 3scale API Management

        By Red Hat

        Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

        Red Hat Advanced Cluster Security for Kubernetes Managed Service logo
        Red Hat Advanced Cluster Security for Kubernetes

        By Red Hat

        Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.

        Red Hat Runtimes logo
        Red Hat Runtimes

        By Red Hat

        Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

        Red Hat Single Sign-On logo
        Red Hat Single Sign-On

        By Red Hat

        Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

        SecurePlus logo
        SecurePlus

        By InTec System

        SecurePlus module is a fraud prevention solution designed to help financial organizations detect and stop fraud across multiple channels, including online and mobile banking, and more.

        Trustnet TSOC logo
        SIEM/SOC Services

        By Trustnet

        TrustNet’s security center is dedicated to innovation and focused on managing and responding to cyber incidents 24/7. Our services provide end-to-end protection with all the benefits of a local SOC. We will provide a channel of command to respond to abnormal incidents and keep you safe 24/7 Around-the-clock monitoring, providing immediate analysis and response to security incidents.

        Tech Mahindra unified Identity and Access Management Platform logo
        Tech Mahindra unified Identity and Access Management Platform

        By TECH MAHINDRA LIMITED

        Tech M Introduces IAM Suite powered by IBM for comprehensive identity and access management. Empower your organization with the comprehensive Identity and Access Management (IAM) suite, Seamlessly manage identities, control access, and safeguard critical resources with adaptive authentication, ensuring robust security without compromising user experience.

        Tech Mahindra Data Security Powered IBM logo
        Tech Mahindra xMDR

        By TECH MAHINDRA LIMITED

        Tech Mahindra xMDR service is designed from the bottom up with common security operations concerns in mind, minimizes the burden of continual technological stack maintenance and enables responsive, cost-effective, and scalable SOC service. We offer seamless integration with the Client's security operations to improve detection, response, and remediation efforts.

        Trend Micro Cloud One logo
        Trend Micro Cloud One

        By Trend Micro Incorporated

        Trend Micro Cloud One is the complete security services platform for organizations undergoing digital transformations in the cloud. From migration, to S3 buckets, to modern applications, and cloud security posture management, we've got you covered.

        Virtual Guardian SOC logo
        Virtual Guardian 24/7 SOC

        By Virtual Guardian

        Powered by Qradar, our 24/7 Managed Detection & Response (MDR) and Security Operations Center (SOC) services safeguards organizations from digital assaults so they can focus on what matters – running their businesses.

        WaveStrong Risk logo
        Wavestrong

        By Wavestrong Inc.

        WaveStrong’s Managed Detection and Response Services (MDR) deliver a 24/7 threat detection and fast response capability, fueled by threat intelligence and proactive threat hunting to reveal undetected threats faster while improving Security Operations Center productivity.