Filter

Security

Product categories

Topics

    Industries

      Delivery methods

      Certifications

      Capabilities level

      Pricing terms

      Vendor

      Source

        Security

        Viewing 31 products

        1
        Security
        STASH 1-Click Ransomless Ransomware Protection & Recovery Solution logo
        1-Click No Ransom Ransomware Solution

        By Stash Global Inc.

        Accomplishes the previously impossible: turns the most damaging cyberattack of all, ransomware, into just another business problem that is solved with the click of a button without paying a cent (or cyber coin) of ransom. Zero Trust & Self-Healing.

        AnonTech ViziVault logo
        AnonTech ViziVault

        By AnonTech

        Secure & manage personal information and comply with data privacy regulations with ViziVault by AnonTech.

        Aqua Security logo
        Aqua Cloud Native Application Protection Platform

        By Aqua Security

        The Aqua Cloud Native Application Protection Platform (CNAPP) helps teams deliver applications faster and automate more while better detecting, managing and remediating risk from code to production and maturing their DevSecOps practices.

        Cyber Armor logo
        ARMO

        By ARMO

        Secure your cloud workload in minutes, and empower DevOps to automatically deploy secured environments. Create an inherently resilient environment where only valid workloads can run, communicate, and access data.

        Atomic Workload Protection logo
        Atomic Enterprise OSSEC

        By Atomicorp

        Adds manageability, security, and compliance features to OSSEC, the world's most popular open source server intrusion detection system.

        Product for BigID logo
        BigID Data Intelligence and Discovery Platform

        By BigiD Inc

        Actionable Data Intelligence & Discovery across Data Privacy, Data Security and Data Governance

        BloxOne Threat Defense logo
        BloxOne Threat Defense

        By Infoblox

        Infoblox BloxOne® Threat Defense provides hybrid protective DNS services to secure networks, devices and users from cyberthreats on- and off-premises, including remote locations and home offices.

        Bugcrowd Platform logo
        Bugcrowd Cybersecurity Solutions

        By Bugcrowd

        Crowdsourced-powered SaaS platform combining data-driven crowd engagement, integrated validation and triage, built-in workflows, and a rich knowledge graph to reduce risk, improve security ROI, and accelerate digital transformation.

        CrowdStrike Falcon Cloud Security logo
        CrowdStrike Cloud Security

        By CrowdStrike

        CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform.

        CrowdStrike Falcon Endpoint Protection logo
        CrowdStrike Falcon Endpoint Protection

        By CrowdStrike

        CrowdStrike is the leader in cloud-delivered next-gen endpoint protection and the first and only company to unify next-gen AV and endpoint detection and response (EDR) delivered via a single lightweight agent.

        CrowdStrike Falcon Platform logo
        CrowdStrike Falcon Platform

        By CrowdStrike

        Easily install and deploy Falcon Sensors to the control-pane and worker nodes running on Red Hat OpenShift platform 4

        Dynatrace_RHM logo
        Dynatrace

        By Dynatrace

        Provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation

        TODAQ logo
        GOTO SDK

        By TODAQ

        Create unforgeable, portable credentials that can be verified P2P, with biometric face and liveness matching. Cryptographically bind proof of credentials or identity into any other asset or data file to establish verifiable and immutable ownership.

        IBM CloudPak for Security logo
        IBM Cloud Pak for Security

        By IBM

        IBM Cloud Pak for Security can help you gain deeper insights, mitigate risks, and accelerate response. With an open security platform that can advance your zero trust strategy, you can use existing investments while leaving your data where it is.

        IBM - DataPower logo
        IBM DataPower Virtual Gateway

        By IBM

        A purpose-built security and integration gateway for mobile, web, API, SOA, B2B and cloud workloads

        Infoblox NIOS DDI logo
        Infoblox DDI

        By Infoblox

        Infoblox DDI has combined three critical core network services namely DNS, DHCP and IP address management (IPAM) into a single enterprise-grade platform that delivers the highest standards of security, service uptime and operational efficiencies.

        Kong Enterprise RHM logo
        Kong Konnect Enterprise

        By Kong Inc.

        A Service Connectivity Platform that enables organizations to transition to microservices and manage the full lifecycle of services and APIs.

        Lacework Cloud Security Platform logo
        Lacework Polygraph Data Platform for Red Hat

        By Lacework

        Cloud native threat detection, compliance, behavioral anomaly detection, and automated security monitoring for Red Hat. Providing unmatched continuous activity monitoring and assurance checks from build time to runtime.

        NeuVector Operator logo
        NeuVector Full Lifecycle Container Security

        By NeuVector

        Offers the only cloud-native Kubernetes security platform delivering uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

        Nirmata Enterprise for Kyverno logo
        Nirmata Enterprise for Kyverno

        By Nirmata

        The Nirmata Enterprise for Kyverno is designed to address the needs of organizations running production Kubernetes clusters with critical applications. Nirmata, the team behind the #1 Kubernetes-native policy engine, Kyverno, provides its certified distribution of Kyverno along with curated policy sets and long term support

        Tremolo Security logo
        OpenUnison

        By Tremolo Security, Inc

        Authenticate users and authorize access to your clusters and applications using a simple and automated approach. OpenUnison supports SAML2, OpenID Connect, LDAP and deploys with your existing pipeline infrastructure using GitOps.

        Red Hat 3scale API Management logo
        Red Hat 3scale API Management

        By Red Hat

        Red Hat 3scale API Management is an award winning platform that gives you the control, visibility and flexibility you need to create and deploy an API program.

        Red Hat Advanced Cluster Security for Kubernetes Managed Service logo
        Red Hat Advanced Cluster Security for Kubernetes

        By Red Hat

        Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.

        Red Hat Runtimes logo
        Red Hat Runtimes

        By Red Hat

        Accelerate application development and delivery to gain a competitive edge and deliver innovative solutions. Red Hat Runtimes provides comprehensive frameworks, runtimes and programming languages, for developers, architects and IT leaders.

        Red Hat Single Sign-On logo
        Red Hat Single Sign-On

        By Red Hat

        Based on the Keycloak project, Red Hat Single Sign-On enhances security by enabling you to secure your web applications with Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0.

        Snyk Container logo
        Snyk Container

        By Snyk

        Container and Kubernetes security designed to help developers find and fix vulnerabilities in cloud native applications.

        Styra logo
        Styra Declarative Authorization Service - DAS

        By Styra, Inc.

        Styra DAS-built by the founders and maintainers of Open Policy Agent—gives you a single control plane to build, test, distribute and monitor OPA authorization policy across cloud infrastructure and applications

        Sysdig Monitor logo
        Sysdig Secure DevOps Platform

        By Sysdig

        Confidently secure containers, Kubernetes, OpenShift and cloud. Scan images, flag misconfigurations, detect threats, validate compliance, and monitor performance. Built on an open-source security stack, Sysdig is radically simple to run and scale.

        Trend Micro Cloud One logo
        Trend Micro Cloud One

        By Trend Micro Incorporated

        Trend Micro Cloud One is the complete security services platform for organizations undergoing digital transformations in the cloud. From migration, to S3 buckets, to modern applications, and cloud security posture management, we've got you covered.

        SecureCloud logo
        Tufin SecureCloud

        By Tufin

        A cloud-based security policy automation service for organizations needing to gain visibility and control of the security posture of their hybrid cloud environments – without compromising business speed or agility.

        Zettaset Encryption for Kubernetes Containers - RHM logo
        XCrypt for OpenShift

        By Zettaset

        XCrypt for OpenShift is a software-only solution built to transparently protect data in OpenShift environments without impacting performance.