an information tracking app in Microsoft 365 that enables users to work with anyone, anywhere. Users can configure lists to better organize events, issues … issues, and assets.
Search Results
Listings (351-375 of 10,000)
designed to manage user accounts, identity information and security entitlements on a variety of systems and applications. Identity Manager is presented … an integrated solution for managing identities, groups and security entitlements across systems and applications. It aims to ensure that u…
provides event history of AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS … AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use Clou…
Menlo Security's Isolation Security Operations Center (iSOC) is a continuous threat monitoring service that complements the Menlo Security Cloud Secure … through the Menlo Global Cloud to identify unintended policy gaps, and misconfigurations and provides policy advice/recommendations based o…
also deploy AWS WAF (Web Application Firewall) and Akamai’s Web Application Protector for real-time security protection of online assets. Services also include … include incident response, vulnerability management, and compliance. … also deploy AWS WAF (Web Application Firewall) and Ak…
A managed security monitoring and investigation of security incidents for Microsoft’s SaaS services such as Microsoft 365, Azure AD, and OneDrive. ConnectWise … ConnectWise SaaS Security offers users the ability to lockdown clients’ cloud data and keep them secure. The solution also provides …
StackPath Edge Security includes device-level fingerprinting, diverse DDoS attack profiling, and globally synchronized threat detection and mitigation reduces … reduces false-positives and catches sophisticated and emerging threats.
With Instart Web Security you get: Support and expertise for proactive security consults, rule creation and implementation, and incident investigation … been tuned and optimized to present the smallest overhead possible.React to security events in real time by analyzing attack specifics, a…
implementation of security products, Security Operations Center (SOC), vulnerability management, endpoint security, network security, and identity access management … provides managed security services designed to support security posture and security architecture. Services encompass consulta…
Korea offers managed security services including endpoint protection, forensics, assessments and vulnerability management, and intrusion response.
protection products, such as laptop and desktop locking stations, surface locks and travel locks, lock anchor points, and other tools to secure enterprise
decades of security experience and being on the cutting-edge of new tools and technologies to protect assets from legacy systems to cloud-native and mobile … mobile apps. Xoriant's security services focus on helping the customer's business to be and remain free from actual and potential vul…
Telefónica Managed Security includes teams of professionals offering managed Network Security, Cloud Security, IoT and OT Security, and Identity and Access Management
end users, Mobile Security offers various services such as app reinforcement, security assessment and compatibility testing for industries including finance … Tencent's Mobile Security provides a scenario-based security solution for apps. Based on Tencent's experience with over 1.2 billion m…
extensive range of security services and has a global team of cybersecurity and computer forensic analysts with years of law enforcement and legal experience
GlobalView security cloud, Cyren Email Security Gateway products are delivered as a 100% SaaS service and is designed to be easy to deploy and manage. … Email Security is a cloud-based secure email gateway that filters an organization’s inbound and outbound email to protect users from cyber t…
notifications and alertsSingle Sign On and Active Directory IntegrationsLearning Management System, built in-house, designed for information security trainingMobile … Hut Six Security allows users to train, test and track an organisation's information security culture with one comprehensive s…
comprehensive managed security services to augment hybrid IT infrastructure, with a five-layer defense approach and a staff of security engineers and a CISO for … environment safe, secure and compliant – providing up to 80% of the controls needed for FedRAMP, FISMA, HIPAA, PCI DSS, SSAE 18 a…
BT offers Security Consulting services to entities seeking advise for managing vulnerability, cyber security threats, and incident response planning, IAM … IAM, as well as covering many governance, compliance, and risk issues.
Mesh is an email security platform built exclusively for managed service providers, helping them to better deploy, protect, and manage their clients. While … Mesh aims to provide true-multi-tenancy, affording MSPs greater visibility and control over email across their entire client base, fro…
Beyond Security offers beSTORM, a tool used to discover code weaknesses and certify the security strength of any product without access to source code … in IoT, process control, automotive and aerospace. Beyond Security was acquired by HelpSystems in May, 2021, and is now a HelpSystems brand…
application security testing (SAST) used to be divorced from Code quality reviews, resulting in limited impact and value. So Beyond Security offers beSOURCE … they state addresses the code security quality of applications and thus integrates SecOps into DevOps. Beyond Security was acquired b…