Mesh is an email security platform built exclusively for managed service providers, helping them to better deploy, protect, and manage their clients. While … Mesh aims to provide true-multi-tenancy, affording MSPs greater visibility and control over email across their entire client base, fro…
Search Results
Listings (376-400 of 10,000)
Beyond Security offers beSTORM, a tool used to discover code weaknesses and certify the security strength of any product without access to source code … in IoT, process control, automotive and aerospace. Beyond Security was acquired by HelpSystems in May, 2021, and is now a HelpSystems brand…
application security testing (SAST) used to be divorced from Code quality reviews, resulting in limited impact and value. So Beyond Security offers beSOURCE … they state addresses the code security quality of applications and thus integrates SecOps into DevOps. Beyond Security was acquired b…
technology allows users to enforce security policy adherence and mitigate the risks of security misconfiguration, a cause of data breaches. … Powertech Security Auditor from HelpSystems centralizes security administration across cloud, on-premises or hybrid environments. The agentless technol…
manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever … SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enfor…
Security and Resiliency Services from Kyndryl helps the user's company embed cyber resilience into a broader IT and operational strategy. Kyndryl’s integrated … effectively protect business-critical infrastructure, and mitigate the business impact of security and resiliency incidents.
2LRN4 is a learning management platform (LMS) intended to help organizations improve privacy and security awareness. The platform has been developed in … organization can configure and manage everything by itself, but that is not necessary. The platform is delivered including courses and is c…
visibility and context-aware control over enterprise IoT networks. The IoT security solution utilizes HyperContext®, an agentless smart device security platform … providing granular device context, and TruID™, a unique device identifier and authenticity rating technology, to discover managed …
certified security professionals deliver multiple security layers and encryption technologies designed to protect against online, external and internal … organization is set up to successfully protect and control your data and applications across the internet and mobile devices. … team…
CensorNet offers web and email security solutions. … Censornet Web Security protects organisations from web-borne malware, offensive or inappropriate content and manage time spent on websites that impact
GoSecure Web Security offers a combination of fine-grained content filtering combined with threat detection and mitigation methods to assure protection … protection from Advanced Persistent Threats, including botnets, malware, viruses and others.
London offers web, mobile, and infrastructure penetration testing services, approved by CREST, aiming to help clients find security issues before others do
Rhino Security Labs offers deep-dive penetration testing services. It provides companies with the following assessment services: Web application penetration
Cloud Access Security Broker (CASB) from Menlo Security in Mountain View aims to give organizations deep visibility and control over SaaS traffic—including … traffic—including sensitive data protection and read-only access.