Viewing 30 products
1-Click No Ransom Ransomware Solution
By Stash Global Inc.
Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.
By Anchore, Inc
Provides deep container image inspection to generate vulnerability analysis, software bill of materials and policy enforcement.
Secure & manage personal information and comply with data privacy regulations with ViziVault by AnonTech.
Aqua Cloud Native Application Protection Platform
By Aqua Security
The Aqua Cloud Native Application Protection Platform (CNAPP) helps teams deliver applications faster and automate more while better detecting, managing and remediating risk from code to production and maturing their DevSecOps practices.
Secure your cloud workload in minutes, and empower DevOps to automatically deploy secured environments. Create an inherently resilient environment where only valid workloads can run, communicate, and access data.
Atomic Enterprise OSSEC
Adds manageability, security, and compliance features to OSSEC, the world's most popular open source server intrusion detection system.
BigID Data Intelligence and Discovery Platform
By BigiD Inc
Actionable Data Intelligence & Discovery across Data Privacy, Data Security and Data Governance
BloxOne Threat Defense
Infoblox BloxOne® Threat Defense provides hybrid protective DNS services to secure networks, devices and users from cyberthreats on- and off-premises, including remote locations and home offices.
Bugcrowd Cybersecurity Solutions
Crowdsourced-powered SaaS platform combining data-driven crowd engagement, integrated validation and triage, built-in workflows, and a rich knowledge graph to reduce risk, improve security ROI, and accelerate digital transformation.
CrowdStrike Cloud Security
CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform.
CrowdStrike Falcon Endpoint Protection
CrowdStrike is the leader in cloud-delivered next-gen endpoint protection and the first and only company to unify next-gen AV and endpoint detection and response (EDR) delivered via a single lightweight agent.
CrowdStrike Falcon Platform
Easily install and deploy Falcon Sensors to the control-pane and worker nodes running on Red Hat OpenShift platform 4
Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.
IBM Cloud Pak for Security
IBM Cloud Pak for Security can help you gain deeper insights, mitigate risks, and accelerate response. With an open security platform that can advance your zero trust strategy, you can use existing investments while leaving your data where it is.
IBM DataPower Virtual Gateway
A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads
Infoblox DDI has combined three critical core network services namely DNS, DHCP and IP address management (IPAM) into a single enterprise-grade platform that delivers the highest standards of security, service uptime and operational efficiencies.
Kong Konnect Enterprise
By Kong Inc.
A Service Connectivity Platform that enables organizations to transition to microservices and manage the full lifecycle of services and APIs.
Lacework Polygraph Data Platform for Red Hat
Cloud native threat detection, compliance, behavioral anomaly detection, and automated security monitoring for Red Hat. Providing unmatched continuous activity monitoring and assurance checks from build time to runtime.
NeuVector Full Lifecycle Container Security
Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.
By Tremolo Security, Inc
Authenticate users and authorize access to your clusters and applications using a simple and automated approach. OpenUnison supports SAML2, OpenID Connect, LDAP and deploys with your existing pipeline infrastructure using GitOps.
Red Hat 3scale API Management
By Red Hat
Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.
Red Hat Advanced Cluster Security for Kubernetes
By Red Hat
Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.
Red Hat Runtimes
By Red Hat
Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.
Red Hat Single Sign-On
By Red Hat
Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.
Container and Kubernetes security designed to help developers find and fix vulnerabilities in cloud native applications.
Styra Declarative Authorization Service - DAS
By Styra, Inc.
Styra DAS-built by the founders and maintainers of Open Policy Agent—gives you a single control plane to build, test, distribute and monitor OPA authorization policy across cloud infrastructure and applications
Sysdig Secure DevOps Platform
Confidently secure containers, Kubernetes, OpenShift and cloud. Scan images, flag misconfigurations, detect threats, validate compliance, and monitor performance. Built on an open-source security stack, Sysdig is radically simple to run and scale.
Trend Micro Cloud One
By Trend Micro Incorporated
Trend Micro Cloud One is the complete security services platform for organizations undergoing digital transformations in the cloud. From migration, to S3 buckets, to modern applications, and cloud security posture management, we've got you covered.
A cloud-based security policy automation service for organizations needing to gain visibility and control of the security posture of their hybrid cloud environments – without compromising business speed or agility.
XCrypt for OpenShift
XCrypt for OpenShift is a software-only solution built to transparently protect data in OpenShift environments without impacting performance.