Cloud Security Software

Cloud Security Software unterstützt Organisationen beim Schutz von Daten und Anwendungen in der Cloud, indem Funktionen zur Überwachung, Erkennung und Verwaltung von Sicherheitsbedrohungen bereitgestellt werden.

Warum Capterra kostenlos ist
Eine cloudbasierte Plattform zur Sicherheitsanalyse, die Sicherheitsinformationen für deine Hybridumgebung bereitstellt. Sumo Logic kann dein erstes Cloud-SIEM sein, dein bestehendes SIEM ersetzen oder mit deiner vorhandenen SIEM-Lösung koexistieren. Sumo Logic bietet die einzige Cloud-native Plattform mit kontinuierlicher Intelligenz für Maschinendatenanalyse in Echtzeit. Erfahre mehr über Sumo Logic Sumo Logic bietet die einzige Cloud-native Plattform mit kontinuierlicher Intelligenz für Maschinendatenanalyse in Echtzeit. Erfahre mehr über Sumo Logic

von Turbot

(0 Bewertungen)
Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails that ensure your cloud infrastructure is secure, compliant, scalable and cost optimized. Turbot enables your cloud team to focus on delivering higher-level value while your application teams remain agile through use of native AWS, Azure, and GCP tools. Erfahre mehr über Turbot Turbot delivers Cloud Governance automation for the enterprise cloud with automated guardrails. Erfahre mehr über Turbot
TokenEx ist eine Plattform der Unternehmensklasse zur Tokenisierung, die praktisch unbegrenzte Flexibilität hinsichtlich dessen bietet, wie Kunden auf Daten zugreifen, diese speichern und sichern können. Es wird mit mehreren Datenakzeptanzkanälen zusammengearbeitet, während ein Prozessor-agnostischer Ansatz beibehalten wird, d. h., nahezu alle Arten von Daten, einschließlich PCI, PII, PHI und sogar unstrukturierte Datenformate, können tokenisiert und gesichert und mit nahezu jedem Prozessor oder Endpunkt integriert werden. Erfahre mehr über Cloud-Based Tokenization Cloudbasierte Datensicherheitsplattform, die Tokenisierung und sicheres Cloud-Datenvaulting für alle sensiblen Datentypen bietet. Erfahre mehr über Cloud-Based Tokenization
DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing-Versuche und stellt Webinhaltskontrolle bereit. Wir filtern über 1/2 Milliarden DNS-Anfragen täglich, identifizieren 60.000 Malware-Iterationen pro Tag und haben mehr als 7.500 Kunden. Cloud und Gateway-Versionen stehen zur Verfügung. Verbessere Deine Cybersicherheit jetzt. Nutze die kostenlose Testversion von WebTitan heute, inkl. Support. Erfahre mehr über WebTitan DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing Versuche und stellt Webinhaltskontrolle bereit Erfahre mehr über WebTitan
Eine Lösung, um Schwachstellen in deiner digitalen Online-Immobilie zu finden, die Risiken zu erklären und bei der Beseitigung zu helfen, bevor ein Verstoß auftreten kann. Erfahre mehr über Intruder Eine Lösung, um Schwachstellen in deiner digitalen Online-Immobilie zu finden, die Risiken zu erklären und bei der Beseitigung zu helfen, bevor ein Verstoß auftreten kann. Erfahre mehr über Intruder
Boxcryptor ist eine flexible und skalierbare Verschlüsselungssoftware für die Cloud, die mehr als 30 Anbieter sowie NAS-Verschlüsselung auf allen Plattformen unterstützt. Es bietet Funktionen für die Zusammenarbeit, Prüfung und Verwaltung, die eine sichere Zusammenarbeit mit Dateien ermöglichen und gleichzeitig die Datenschutzbestimmungen einhalten. Erstelle nutzerdefinierte Richtlinien, verwalte Nutzer mit Single Sign-On oder Active Directory und schütze deine Konten mit 2FA. Wähle Sicherheit Made in Germany, um sicher und effizient in der Cloud zu arbeiten. Erfahre mehr über Boxcryptor Plattformübergreifende Verschlüsselungslösung für Cloud- und NAS-Systeme, die mehr als 30 Cloud-Anbieter unterstützt (z. B. Dropbox, OneDrive). Erfahre mehr über Boxcryptor

von Rohde & Schwarz Cybersecurity

(0 Bewertungen)
R&S®Cloud Protector wurde für Cloud-spezifische Herausforderungen bei Sicherheitsaspekten auf Anwendungsebene entwickelt. Die Anti-DDoS-Option verhindert DDoS-Angriffe, die Websites lahmlegen. R&S®Cloud Protector wird in europäischen Rechenzentren gehostet und garantiert beste Hosting-Qualität auf höchstem Sicherheitsniveau. Er ermöglicht es Unternehmen und Nutzern, Webanwendungen zu schützen, ohne die erforderliche Back-End-Infrastruktur verwalten oder neue Qualifikationen erwerben zu müssen. Erfahre mehr über R&S Cloud Protector R&S®Cloud Protector bietet hochskalierbaren Web-Application-Firewall-as-a-Service, Sicherheit, globale Verfügbarkeit und Support Erfahre mehr über R&S Cloud Protector

von Skybox Security

(0 Bewertungen)
Skybox Vulnerability Control unterstützt einen systematischen Ansatz zum Vulnerability Management im Vergleich zu Produkten anderer Anbieter. Die Lösung basiert auf umfassender Transparenz der Angriffsfläche und nutzt den dazugehörigen Kontext, um die riskantesten Schwachstellen schnell analysieren, priorisieren und beheben zu können. Erfahre mehr über Vulnerability Control Identifizieren und Priorisieren von Risiken für das Netzwerk mit umfassenden Scan- und Analyselösungen für Schwachstellen. Erfahre mehr über Vulnerability Control
Eliminiert alle Arten von Bedrohungen, einschließlich Viren, Malware, Ransomware, Rootkits, Würmer und Spyware, mit optionalem Cloud-basiertem Scannen für noch bessere Leistung und Erkennung. ESET verwendet mehrschichtige Technologien, die weit über die Möglichkeiten von Antivirenprogrammen hinausgehen. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion.
Protect your email against ransomware, spearphishing and all other threats. ZEROSPAM is a highly effective and easy to use Cloud Email Security solution with a proven catch rate of 99.9% against all forms of email-borne threats. Fully compatible with Office 365, it provides superior ransomware and phishing protection, the best spearphishing protection in the industry and a very low false positive rate. We are an service-oriented team with a complete and highly accurate antispam. A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities. Protect your business across physical, virtual cloud and container environments with central visibility and control.
SiteLock ist der weltweit führende Anbieter von Websitesicherheit und schützt derzeit mehr als fünf Millionen Websites. Das Unternehmen bietet fortschrittliche, cloudbasierte Sicherheitslösungen für Unternehmen jeder Größe. Zu den SiteLock-Produkten gehören tägliche Scans mit automatischer Malware-Entfernung, eine Managed Web Application Firewall mit einem globalen CDN für eine rasend schnelle Website, fortschrittlicher DDoS-Schutz und ein exzellentes Telefonsupport-Team in den USA, das rund um die Uhr verfügbar ist. SiteLock ist der weltweit führende Anbieter von Websitesicherheit und schützt derzeit mehr als fünf Millionen Websites.
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Software zur Verbesserung der Speichereffizienz durch Fernsteuerung der digitalen Infrastruktur. Software zur Verbesserung der Speichereffizienz durch Fernsteuerung der digitalen Infrastruktur.
Die globale Cloud von Zscaler ist zu 100 % in der Cloud aufgebaut und stellt den gesamten Gateway-Sicherheitsstack als Service bereit. Durch die sichere Verbindung von Nutzern mit ihren Anwendungen, unabhängig von Gerät, Standort oder Netzwerk, verändert Zscaler die Unternehmenssicherheit. Zscaler stellt den gesamten Gateway-Sicherheitsstack als einfach zu implementierenden Cloud-Service bereit.
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
CipherCloud for Salesforce befasst sich mit Fragen des Datenschutzes, der Speicherung, der Sicherheit und der Compliance, sodass Unternehmen Salesforce sicher einsetzen können. Die CipherCloud-Lösung versteht Salesforce-Metadaten und bietet Unternehmen die Möglichkeit, alle Standard- und nutzerdefinierten Felder, Dateien und Anhänge, die als sensibel gelten, einfach zu markieren. Nach der Konfiguration sichert die CipherCloud-Lösung diese Daten und verhindert, dass sie an unbefugte Nutzer weitergegeben werden, während sie nahtlos mit Salesforce zusammenarbeitet. Zerstreut Datenschutz-, Speicher-, Sicherheits- und Compliance-Bedenken, sodass Unternehmen Salesforce sicher einsetzen können.
Adaptive Zugriffskontrolle, die Unternehmen befähigt, Identitäten sicher zu bestimmen. Adaptive Zugriffskontrolle, die Unternehmen befähigt, Identitäten sicher zu bestimmen.
Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Avanan is the premier security solution for cloud-based email, messaging, and collaboration. Deploying in minutes, Avanans unique, multi-vendor security solution leverages the industrys best technologies to protect organizations from advanced threats such as phishing, malware, data leakage, account takeover, and shadow IT. In just one click, secure enterprise SaaS applications such as Office 365, G Suite, Slack, and more against the latest threats.
Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Consolidates terabytes of data from any source Consolidates terabytes of data from any source
The titan secure business hub and intelligent work platform for lawyers, businesses and professional services. The titan secure business hub and intelligent work platform for lawyers, businesses and professional services.
Infoblox-Lösungen reduzieren die Netzwerkkosten und erhöhen die Netzwerkverfügbarkeit und -flexibilität durch die Automatisierung wichtiger Komponenten der Netzwerkinfrastruktur, einschließlich IP-Adressmanagement (IPAM), DNS und DHCP. Das Ergebnis ist eine signifikante Verringerung der Fehler und der großen Menge an Aufgaben, die erforderlich sind, um Netzwerke verfügbar, flexibel und sicher zu halten. Die Echtzeittransparenz und -kontrolle, die du für dein Netzwerk benötigst, während du die Kosten senkst und die Verfügbarkeit erhöhst.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Saviynt ist ein führender Anbieter von Identity Governance und Administration (IGA) sowie Cloud-Sicherheitslösungen. Mit Saviynt können Unternehmen Anwendungen, Daten und Infrastruktur auf einer einzigen Plattform für die Cloud und Unternehmen sichern. Saviynt bietet IGA-Lösungen der nächsten Generation durch die Integration fortschrittlicher Risikoanalysen mit differenzierter Rechteverwaltung. Saviynt bietet integrierte Unterstützung für kontinuierliches Compliance-Management, SOD-Analyse und -Wiederherstellung, Zugriffsrechte und Rollenkontrolle. Zugriffsteuerung und Intelligence für Cloud- und Unternehmensanwendungen.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
C3M is a unique security management solution giving enterprises complete control over their cloud environment and the ability to manage compliance with HIPAA, PCI-DSS, GDPR, GLBA, ISO 27001, NIST and other relevant compliances, all at the click of a button. C3M monitors an enterprise's cloud infrastructure 24/7, combining it with C3M's real-time analytics platform to detect resources that drift from security best practices and auto-remediate any violations back to a compliant state. A platform ensuring total cloud control along with ease of managing cloud security and compliance across multiple cloud environments.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation. Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec. Prevents attacks on your APIs and web applications with a data driven approach to AppSec.

von EmpowerID

(0 Bewertungen)
All-in-One-Identitätsmanagement- und Cloud-Security-Plattform für umfassende Bereitstellung, SSO und Zugriffskontrolle. All-in-One-Identitätsmanagement- und Cloud-Security-Plattform für umfassende Bereitstellung, SSO und Zugriffskontrolle.

von Cloud Raxak

(0 Bewertungen)
Cloud Raxak automates the delivery of cloud security compliance across the enterprise. Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
DataDome ist spezialisiert im Schutz und der Beschleunigung digitaler Unternehmen. Dank der KI-basierten Bot-Management-Lösung können Unternehmen die Leistung von Websites verbessern, die durch intensives Scraping belastet werden; Nutzerdaten vor Hackern schützen und bessere Marketing- und Geschäftsentscheidungen dank Analysedaten treffen, die nicht durch den Bot-Verkehr kontaminiert sind. Entwickle und implementiere deine Bot-Management-Strategie dank des Dashboards, Berichten und Echtzeit-Benachrichtigungen. KI-basierte Bot-Management-Lösung zum Schutz all deiner Schwachstellen (Websites, Apps etc.) und zur Beschleunigung deines digitalen Geschäfts

von Threat Stack

(0 Bewertungen)
Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more.

von CloudSploit

(0 Bewertungen)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source.

von Marty Soft Conception

(0 Bewertungen)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

von Akamai Technologies

(0 Bewertungen)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

von Cato Networks

(0 Bewertungen)
Verwalte ein WAN, bewerte die Echtzeit-Transportqualität und verwende das Policy-basierte Routing, um anwendungsspezifischen Datenverkehr zu routen. Verwalte ein WAN, bewerte die Echtzeit-Transportqualität und verwende das Policy-basierte Routing, um anwendungsspezifischen Datenverkehr zu routen.

von NCP engineering

(0 Bewertungen)
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.

von Forcepoint

(0 Bewertungen)
Die Cloud-Access-Security-Broker-Lösung (CASB) ermöglicht die Kontrolle von Endgeräten, Malware-Erkennung, Überwachung der Nutzeraktivität in Echtzeit und vieles mehr. Die Cloud-Access-Security-Broker-Lösung (CASB) ermöglicht die Kontrolle von Endgeräten, Malware-Erkennung, Überwachung der Nutzeraktivität und mehr.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

von Dash Solutions

(0 Bewertungen)
Provides HIPAA Cloud automation for AWS applications and workloads. Plan, enforce, and demonstrate HIPAA compliance internally and externally. Create and enforce organizational and administrative policies with the Policy Navigator then automate DevOps and Security Operations with continuous compliance monitoring. Continuous Compliance Monitoring for AWS. Automate HIPAA compliance and DevOps tasks for AWS. Generate organizational policies.

von Threat X

(0 Bewertungen)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Elastic Workload Protector is a Cloud analytics solution which integrates a vulnerability scanner. This way, customers infrastructure are protected all the time because they know every new vulnerability or other potential risk and have detailed reports with adapted remediation solutions. EWP protects every infrastructure (traditional, Cloud, virtualized, hybrid) and containers. Its patented Clone & Scan feature allows customers to make precise analysis without impacting the production. Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously.

von Tigera

(0 Bewertungen)
Solution for secure application connectivity for the cloud-native world. Solution for secure application connectivity for the cloud-native world.

von OPAQ Networks

(0 Bewertungen)
A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report.

von Check Point Software Technologies

(0 Bewertungen)
Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications. Security solution that helps protect enterprise information and prevent attacks on SaaS and cloud-based applications.

von Barracuda Networks

(0 Bewertungen)
Protection and Performance for the Cloud Era Protection and Performance for the Cloud Era

von Palo Alto Networks

(0 Bewertungen)
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.

von Clarip

(0 Bewertungen)
A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices.

von Bolt SaaS

(0 Bewertungen)
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.

von LifeOmic

(0 Bewertungen)
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious. Manage all of your security and compliance operations from one real-time location.

von Maddox

(0 Bewertungen)
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.

von Coronet

(0 Bewertungen)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

von CloudPassage

(0 Bewertungen)
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, and find and respond to critical risks other tools miss. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, portability and automation needed to succeed in these new environments. Cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks other tools miss.
Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code. Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code.

von SecureStack

(0 Bewertungen)
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

von Cossack Labs

(0 Bewertungen)
Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Acra provides selective encryption, multi-layered access control, database leakage prevention and intrusion detection capabilities in a convenient, developer-friendly package. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.

von Protego

(0 Bewertungen)
Recognizing the inadequacy of traditional application security paradigms, Protego Labs designed the first comprehensive solution built with the unique constraints and opportunities of serverless in mind. Through continuous serverless security posture, dynamic serverless intelligence, and elastic defense, Protego helps organizations achieve control over the security of their applications with unmatched automation and security that is at the speed of serverless- in under 20 minutes. Protegos unique technology and automation delivers unmatched security that is at the speed of serverless- in less than 20 minutes.

von MailGuard

(0 Bewertungen)
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. MailGuard is a leading cloud-based email security provider. MailGuard detects and stop new threats 2-48 hours ahead of competitors.

von Ryver

(0 Bewertungen)
Combining AI + video management to create automated threat detection software. Combining AI + video management to create automated threat detection software.

von CloudHawk

(0 Bewertungen)
CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS. CloudHawk is a Cloud Security Platform that gives you a complete view of your Security Posture in AWS.

von McAfee

(0 Bewertungen)
A data security product that allows users to detect, protect, and correct data in the cloud. A data security product that allows users to detect, protect, and correct data in the cloud.

von SecretHub

(0 Bewertungen)
A developer tool to keep passwords and other secrets out of automation scripts. A developer tool to keep passwords and other secrets out of automation scripts.

von DigitalDefense

(0 Bewertungen)
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it. Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.

von GitGuardian

(0 Bewertungen)
Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time. Security bot designed to scan GitHub public and private activity and detect secrets in source code in real time.

von iboss

(0 Bewertungen)
Secure user Internet access on any device, from any location in the cloud. Secure user Internet access on any device, from any location in the cloud.

von Armor Cloud Security

(0 Bewertungen)
Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads. Armors solutions provide the highest level of security and compliance for vital cloud and hybrid workloads.

von Atomicorp

(0 Bewertungen)
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a single lightweight agent. AtomicWP secures workloads running in Amazon AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, or in any hybrid environment. AtomicWP secures both VM-based and container-based workloads. For more info: https://www.atomicorp.com/atomic-wp/ AtomicWP Workload Protection helps to secure workloads in a variety of environments while enhancing the security.

von Securonix

(0 Bewertungen)
Cloud security with cloud partner ecosystem and multi-tenant architecture. Cloud security with cloud partner ecosystem and multi-tenant architecture.

von G-Core Labs

(0 Bewertungen)
Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs. Defending your business against cyber threats without interrupting processes and at no additional infrastructure costs.
Netacea takes a smarter approach to bot management. Intent Analytics powered by machine learning quickly and accurately distinguishes bots from humans to protect websites, mobile apps and APIs from automated threats while prioritising genuine users. Actionable intelligence with data-rich visualisations empowers you to make informed decisions about your traffic. Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious bots.

von Kindite

(0 Bewertungen)
Nowadays, technical limitations force encryption keys and sensitive data to be continuously accessed by the cloud infrastructure. By decoupling the cloud infrastructure from the data layer, Kindite's "Zero-trust Searchable Encryption" technology allows cloud-based applications to run smoothly over encrypted data without ever decrypting it. This eliminates the necessity to compute over plain-text data at the cloud and assures sensitive data is readable only at users endpoints. End-to-End Cloud Encryption

von Hazelcast

(0 Bewertungen)
A comprehensive platform for in-memory computing A comprehensive platform for in-memory computing
Open-source IT security solution designed for Salesforce, Office 365, and web applications to protect all your critical business data. Open-source IT security solution designed for Salesforce, Office 365, and web applications to protect all your critical business data.

von Edgeo

(0 Bewertungen)
Edgeo is a Global cloud-based web Security Platform that makes your website fast, secure and reliable. Edgeo is a Global cloud-based web Security Platform that makes your website fast, secure and reliable.
Splunk Insights for Infrastructure is a quick-to-deploy infrastructure monitoring and troubleshooting tool. Unify and correlate logs and metrics for seamless server, cloud and OS monitoring. Splunk Insights for Infrastructure is a quick-to-deploy infrastructure monitoring and troubleshooting tool.

von OpsCompass

(0 Bewertungen)
Drives operational control, visibility, and security in Microsoft Azure and other global cloud platforms. Drives operational control, visibility, and security in Microsoft Azure and other global cloud platforms.

von CloudAlly

(0 Bewertungen)
CloudAllys automated daily SharePoint backup service ensures that you can quickly recover data from any point in time as well as export your archives for local storage. Try out our SharePoint Backup 15 day free trial. Granular item level search and restore, or restore a complete site using our non-destructive restore to the same or different site. With a few simple clicks, you can activate backups for all or selected sites. It's simple & easy to backup SharePoint. Cloud to cloud backup and restore solution that backs up daily changes in your SaaS to unlimited Amazon S3 storage.

von ijura

(0 Bewertungen)
Simplified, cloud based mobile threat defense. Simplified, cloud based mobile threat defense.