Search Results
Listings (401-425 of 10,000)
data detection, and misconfiguration prevention across AWS, Azure, and GCP. … Cloud Storage Security protects data inside the files stored in the cloud. Their cloud-native platform delivers in-tenant malware scanning, sensitive data … industries, and deployed by public sector agencies,…
The Fortinet Security Fabric is a solution suite that enables security for converged IT/OT ecosystems. It also provides OT-centric features and products to … to extend Security-Fabric capabilities to OT networks in factories, plants, remote locations, and ships. … edge products to NOC …
Zscaler Data Security
risk exposure, and secures sensitive data across the web, email, workloads, private apps, and BYOD endpoints. … Zscaler Data Security is a cloud-delivered platform built to safeguard an organization's sensitive data. It locates sensitive data, understands its risk … Its cloud-delivered…
Because businesses' security requirements are not unique and companies all face common some common threats, Trustwave's Security Colony offers access to … assessments and reviews of organizational security standing.Videos developed for educational and awareness training.Awareness training str…
Microsoft Security Copilot
Microsoft Security Copilot helps security and IT teams to protect organizations at the speed and scale of AI. It is available in a standalone experience … experience or embedded into other Microsoft Security products. … intelligence gathering, and posture management. Microsoft Securit…
CommandLink offers a managed security solution that integrates a Network Operations Center (NOC) and Security Operations Center (SOC) within the same platform … CommandLink offers a managed security solution that integrates a Network Operations Center (NOC) and Security Operations Center (SOC…
BT offers Security Consulting services to entities seeking advise for managing vulnerability, cyber security threats, and incident response planning, IAM … IAM, as well as covering many governance, compliance, and risk issues.
strategy, risk and vulnerability management. … Cisco Security Services is a collection of available services including Active Threat Analytics as well as consultatory incident response services, strategy
presented as a DevOps-centric SCA solution for identifying and resolving security vulnerabilities and license compliance issues in open source dependencies … JFrog Security Essentials / Xray SCA can be used to discover and eliminate unwanted or unexpected packages, using JFrog’s database of i…
protection products, such as laptop and desktop locking stations, surface locks and travel locks, lock anchor points, and other tools to secure enterprise
stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. … Kiuwan Code Security, from Idera company Kiuwan, automatically scans code to identify and remediate vulnerabilities. Compliant with the most str…
business endpoint security products, including AhnLab EPP integrated endpoint security management console, AhnLab EDR detection and response application … application, V3 Internet Security, and related products.
Korea offers managed security services including endpoint protection, forensics, assessments and vulnerability management, and intrusion response.
implementation of security products, Security Operations Center (SOC), vulnerability management, endpoint security, network security, and identity access management … provides managed security services designed to support security posture and security architecture. Services encompass consulta…
phishing attempts, spoofing and illicit content. According to the vendor, SpamTitan blocks over 99.9% of spam, viruses, malware, and other email threats. … of spam, viruses, malware, and other email threats.Hundreds of advanced tests scan email separating unwanted email and security threats f…
Watchguard Endpoint Security
protection, endpoint detection and response (EDR), patch management, content filtering, email security, full disk encryption, and more, into one package. The … The platform touts a unique zero-trust security service that certifies the legitimacy and safety of all running applications thanks t…











