IoT Detection and Response solution that turns every protected endpoint into a network of sensors
CyberX
CyberX Industrial Cybersecurity Platform
Asset discovery, continuous monitoring and vulnerability management for industrial networks
TEHTRIS
eGambit ZONE
Simulate fake devices and services to deceive intruders
Tufin
Tufin Orchestration Suite
Cybersecurity and agility with Network Security Policy Orchestration
Citrix
Citrix Web App Firewall [formerly Netscaler ]
Protect websites, apps, and APIs
VMRay
VMRay Analyzer
A Smarter, Stealthier Malware Sandbox
Nozomi Networks
Guardian from Nozomi Networks
Real-time ICS Cyber Security and Operational Visibility
PortSwigger
Burp Suite Enterprise from PortSwigger
Web vulnerability scanner protecting some of the world's largest brands
Virtru
Virtru Microsoft office 365 email encryption
Secure End-to-End Encryption for Microsoft Email
FICO
FICO Cyber Risk Score
Online security rating service – now available on the AWS Marketplace
Privitar
Privitar Publisher
A comprehensive solution for data privacy protection and governance.
Dragos
Dragos Platform
Monitor and defend ICS environments across the entire ICS cybersecurity framework
Varonis
Varonis Data Security Platform
Find, protect, and monitor sensitive data on-prem and in the cloud
Lookout
Lookout Mobile Endpoint Security
Get visibility into the entire spectrum of mobile risk, apply policies to reduce that risk, and integrate into existing security …
Code42
Code42 DLP
Detection and response to data loss from insider threats
Terbium Labs
Matchlight from Terbium Labs
Dark web data intelligence platform that analyzes companies cyber-risk exposure
CloudFlare
Cloudflare Magic Transit
Software-defined networking product that offers IP transit with DDoS protection, next-gen firewall, traffic acceleration
Entersekt
Transakt from Entersekt
PSD2 compliant one-touch authentication for banks, AISPs, PISPs and other players
Omada
Omada Identity Suite
Manage identities and govern access to resources across on-premises and cloud-based IT-environments
Panda Security
Panda Endpoint Protection Plus
Centralized protection for Windows, Mac and Linux workstations, virtualization systems and Android devices
BeyondTrust
BeyondTrust for Networks
Endpoint Privilliged Management for Netorks, IoT, ICS & SCADA devices
Micro Focus
ArcSight from Micro Focus
Powerful, efficient threat detection and response through security analytics from a next-gen SIEM
Interset, a Micro Focus Company
Interset user and entity behavioral analytics (UEBA)
Detect, investigate, and respond to threats that may be hiding in your enterprise before your data is stolen
Netwrix
Netwrix Data Classification
A single panoramic view of your enterprise content
Link11
Link11 DDoS Protection
Self-learning AI protection against DDoS Attacks
RHEA Group
rapidPHIRE from Rhea Group
Context-aware cybersecurity Network Traffic Analysis platform that provides situational awareness and remediation of cyber-threats
PerimeterX
PerimeterX Bot Defender Web
Protect Your Website Against Automated Attacks
HyTrust
HyTrust CloudAdvisor
Data Discovery & Classification
Deep Instinct
Deep learning endpoint security solution from Deep Instinct
Endpoint security solution that detects and predicts threat behavior to block attacks
Feedzai
Feedzai risk management platform
Machine learning platform that allows banks and merchants to identify fraudulent payment transactions
SpyCloud
Spycloud Account Takeover Prevention
API into your current application to identify when your users’ credentials have been exposed in the underground
Ivanti
Ivanti Security Controls
Solution that brings together patch management, dynamic whitelisting and granular privilege management
SecurityScorecard
Security Ratings from SecurityScorecard
Understand the cyberhealth of your ecosystem across 10 risk factors
SailPoint
SailPoint Predictive Identity
The Intelligent Cloud Identity Platform
SCADAfence
SCADAfence Platform
Continuous OT network monitoring that provides visibility, risk management and threat detection
LogRhythm
LogRhythm NextGen SIEM Platform
Analytics, user and entity behavior analytics, network detection and response, security orchestration and response in a single platform
Cyberbit
Cyberbit Range
Cyber Security Training and simulation platform
DomainTools
Iris Investigation Platform from DomainTools
threat intelligence and investigation platform that maps connected infrastructure to get ahead of threats
Cellebrite
Cellebrite Premium
Solution for law enforcement agencies to unlock and extract crucial mobile phone evidence from iOS and Android devices
Galvanize
HighBond by Galvanize
End-to-end GRC platform
Bitglass, Inc.
Bitglass CASB
Zero-Day data & threat protection, any app, any device, anywhere
LexisNexis Risk Solutions, formerly ThreatMetrix
LexisNexis Risk Defense Platform
Automate risk-assessment and select calibrated authentication actions in real-time for better fraud prevention and customer experience
Druva
Druva Cloud Platform
Take control of your data with secure, scalable, on-demand data protection and management
Contrast Security
Contrast Assess
Interactive Application Security Testing Solution
PhishLabs
Phishlabs Digital Risk Protection
24/7 security operations centers that continuously hunts across vectors for external threats
Bayshore Networks
SCADAfuse from Bayshore
Industrial Controller Protection
Synack
Synack Platform
Crowdsourced Security Testing Platform
Infoblox
BloxOne Threat Defense Advanced from Infoblox
Scalable Platform That Maximizes Your Existing Threat Defense Investment
Netskope
Netskope CASB
Confidently adopt cloud applications and services – without sacrificing security
Recorded Future
Recorded Future Threat Intelligence Portal
Sourced from the largest breadth of sources, automatically analyzed, and tailored to your role
IronNet Cybersecurity
IronDefense from IronNet
Network Traffic Analysis platform that delivers behavioral analysis and integrated packet-level cyber hunt to detect advanced threats
Foregenix
FGX-WEB from Foregenix
Monitors and protects websites against the latest threats affecting online businesses
RiskIQ
RiskIQ Digital Footprint
Visualize and Defend your Attack Surface
Sumo Logic
JASK Autonomous Security Operations Center from Sumo Logic
Cloud-native SIEM, analyzing cloud environments, on-premises network, endpoints, and logs in a single platform
WhiteHat Security
WhiteHat Sentinel Application Security Platform
Application Security and Risk Management platform with integrated secure development, security testing and continuous monitoring.
SentinelOne
Vigilance from SentinelOne
24/7 Threat Assessment and Response
Siemplify
Siemplify Security Orchestration Platform
A Powerfully Simple Security Operations Platform
Clearswift part of HelpSystems
Clearswift SECURE Web Gateway
Deep content inspection capabilities that facilitate the competitive advantages inherent in open and safe communications.
ThreatQuotient
THREATQ from ThreatQuotient
Threat intelligence platform that accelerates security operations through streamlined threat operations and management
Bugcrowd
Bugcrowd Bug Bounty Program
A Human-based Approach to Risk Reduction
eSentire
eSentire Managed Detection and Response for Office 365
Comprehensive visibility. Rapid threat detection
ImmuniWeb
ImmuniWeb Discovery from NCC Group
Attack Surface Management & Dark Web Monitoring For self-assessment and third-party risk scoring
NCC Group
NCC Group GatewayCrypt for S3
Cloud encryption gateway product capable of storing protectively marked data
NCC Group
Vulnerability Scanning from NCC Group
Finding vulnerabilities with attention to detail
Proficio
ProSOC from Proficio
SOC-as-a-Service designed to meet unique security and compliance challenges.
Securonix
Securonix Next-Generation SIEM
Harness the Power of Big Data Using Machine Learning
Centrify
Centrify Privileged Access Service
Cloud-ready Zero Trust Privilege
ESET
ESET Dynamic Threat Defense
Cloud based Sandboxing for dynamic malware and zero day attacks
ThreatConnect
ThreatConnect SOAR Platform
Intel-Driven Security Orchestration and Response
ThreatConnect
ThreatConnect’s Threat Intelligence Platform
Aggregate, Analyze, and Act on Threat Intelligence
Comodo
Comodo Threat Intelligence
Sophisticated verdicting engine that provides you insight with 100% trust on all files in your network at lightning speed
Vectra AI
Cognito platform from Vectra
AI driven threat detection and response platform
Duo Security, a Cisco Company
Duo MFA
A Better Authentication Experience
Trustwave
Trustwave SpiderLabs Threat Hunting
Manual and automated processes to help you get ahead of your adversaries by flagging risks you may not have been …
Trustwave
Trustwave Managed Application Control
Endpoint whitelisting solution that combines a trust-based and policy-driven approach to application control, backed by real-time threat intelligence and around-the-clock …
LookingGlass Cyber Solutions
LookingGlass Third Party Risk Monitoring
Continuously monitor up to five thousand organizations across thirteen categories of cyber risk
LookingGlass Cyber Solutions
scoutTHREAT from LookingGlass
Threat Intelligence Platform (TIP) that identifies threats before impact
Anomali
Anomali Altitude
Platform that harnesses threat data, information, and intelligence to drive effective cyber security decisions
Elastic
Elastic Endpoint Security [Formerly Endgame]
Full Stack Endpoint Protection Platform with automated Threat Hunting
Elastic
Elastic Siem
Security analytics at the speed of Elasticsearch
GoSecure [Formerly CounterTack]
GoSecure Managed Detection and Response
CyberSponse a Fortinet Company
CyberSponse Fortinet CyOPs Platform
Sccurity orchestration & automation response (SOAR) solution that bridges the gap between automation only & human dependent security organizations.
R9B [Root9b]
ORION Threat Hunting Platform from R9B [Root9b]
Agentless hunting with cybersecurity software that stealthily identifies and eliminates threats before they turn into attacks
Ixia, a Keysight Company
Ixia Breakingpoint Applications and Security Testing
Security simulation test solution that verifies the stability, accuracy, and quality of networks and network devices
ZeroFOX
ZeroFOX Platform
Protects business & employees from cyber, brand and physical threats on social & digital channels
Menlo Security
Menlo Security Cloud Platform Powered by Isolation
Cybereason
Cybereason Threat Hunting Platform
Hunt with Ease at Scale
Cybereason
Cybereason endpoint detection and response platform
Hunt, Detect, Protect. An end-to-end cybersecurity solution built to empower defenders
Digital Shadows
Digital Shadows Searchlight
Identify Unwanted Exposure Online: Data Loss Detection, Online Brand Security, Attack Surface Reduction
Attivo Networks
Attivo ThreatDefend Platform
Deception Technology for early post-compromise threat detection and accelerated incident response
Avanan
Avanan Cloud Security for Office 365
Bay Dynamics
Bay Dynamics Risk Fabric
Data protection analytics platform for Data Loss Prevention
Claroty
Claroty Platform
Integrated and Comprehensive IoT and OT Security
Zscaler
Zscaler Internet Access
Secure Internet and web gateway delivered as a service from the cloud
F5 Networks
F5 Networks Web Application Firewall (WAF)
Protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data.
HackerOne
HackerOne Bug Bounty Platform
Trusted Hacker- Powered Security Platorm
Unisys
Unisys Stealth aware
Live discovery, modeling and visualization to see network relationships and use microsegmentation to isolate trusted entities
CYREN
Cyren Email Security
Comprehensive protection to safeguard against ransomware, phishing, malware, and spam
Virsec Systems
Virsec Web Application Security
Automate protection with unprecedented accuracy and coverage
Fidelis Cybersecurity
Fidelis Network
Cornerstone Security Stack Architecture for Network, Web and Email Traffic Analysis and DLP
Illusive Networks
Illusive Networks Attack Detection System
Agentless, noiseless deception technology for early cyberattack detection
Skybox Security
Skybox Horizon
Visualize, control and reduce the attack surface
Forescout
Forescout eyeSight
Continuously discover, classify and assess devices to gain situational awareness and reduce risk
CenturyLink
CenturyLink Adaptive Network Security
Networkbased layer of protection against an increasingly complicated threat landscape
A10 Networks
A10 DDoS protection Cloud
Full spectrum enterprise DDoS Protection
Tanium
Tanium Core Platform
Allows security and IT operations teams to secure, control and manage millions of endpoints in seconds
Illumio
Illumio Adaptive Security Platform
Stops lateral movement in your data center and cloud environment, see how applications communicate, get vulnerability exposure insights, take control. …
Juniper Networks
Juniper Advanced Threat Prevention (ATP)
Cloud-based service or on-premises appliance that provides complete advanced malware detection and prevention
Imprivata
Imprivata Confirm ID for Clinical Workflows
Fast, convenient authentication for clinical workflows
Tripwire
Tripwire Industrial Visibility
Automated ICS Monitoring for maximum uptime
Webroot, a Carbonite Company
Webroot Carbonite DNS Protection
DNS Web Filtering with Cloud Based Protection
Verizon
Verizon Threat Intelligence Platform Service
Proactive intelligence analysis, correlating the expert insights of dark web hunters with an enhanced threat intelligence feed, open source content, …
Akamai
Prolexic Routed from Akamai
Fastest DDoS Mitigation of Terabit Scale Attacks
Oracle
Oracle Cloud Infrastucture Web Application Firewall
Cloud-Based, Globally Distributed Network
Oracle
Oracle CASB
Cloud Access Security Broker for Applications and Workloads
Oracle
Oracle Identity Cloud Service
Oracle’s next generation security and identity platform, cloud-native and designed to be an integral part of the enterprise security fabric …
Gigamon
GigaVUE-HC from Gigamon
Scalable Traffic Intelligence for Small to Large Enterprises and Service Providers
Palantir
Palantir Foundry
Platform that generates live risk benchmarks among peer organizations and automates compliance and risk reports
Darktrace
Darktrace Enterprise Immune System
Self-learning cyber AI technology that detects novel attacks and insider threats at an early stage.
SAS Cybersecurity
SAS Cybersecurity analytics software
Flexible security analytics software that delivers network visibility and better security outcomes through a combination of data, analytics and collaboration …
Thycotic
Thycotic Privilege Manager
Endpoint Privilege Management and Application Control Software
Barracuda
Barracuda Secure SD-WAN
Boost application performance and reduce costs
Imperva
Imperva API Security
Protects your APIs, detecting and blocking exploits of vulnerabilities
Imperva
Imperva Web Application Firewall (WAF)
Firewall that analyzes and inspects requests coming in to applications and stops attacks
Dell EMC Cyber Solutions Group (CSG)
Dell SOC Management and Incident Response Platform
SOC management platform, based on proven incident response methodologies and implemented within Dell EMC
AT&T Cybersecurity - Alienvault
AlienVault Open Threat Exchange from AT&T Cybersecurity
Global open threat intelligence community that enables collaborative defense with actionable, community-powered threat data.
Tenable
Nessus from Tenable
The de facto industry standard for vulnerability assessment
Checkmarx
Checkmarx Software Security Platform
Software security platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis and application …
SonicWALL Inc.
SonicWall Web Application Firewall
Comprehensive foundation for web application security, data leak prevention and performance, on prem or in the cloud
Forcepoint
Forcepoint Data Loss Prevention (DLP)
Data protection in a zero-perimeter world
Kaspersky
Kaspersky Endpoint Security
Reliable, proven security platform that protects your bottom line
Trend Micro
Trend Micro Cloud One security services platform
A security services platform for cloud builders
Northrop Grumman
LYNXeon Cyber Pattern Analysis Platform from Northrop Grumman
Cyber Pattern Analysis Platform empowers cyber analysts to detect and disrupt cyber threats
VMware Carbon Black
Carbon Black VMware ThreatHunter
Scalable, real-time threat hunting and incident response (IR) solution delivering unfiltered visibility for SOC's and IR teams
VMware Carbon Black
VMware Carbon Black Cloud
Cloud - native, easy to use endpoint protection
Intel Corporation
Intel Threat Detection Technology Platform
Hardware enhanced Detection using Accelerated Memory Scanning and Advanced Platform Telemetry
Secureworks, a Dell Company
Red Cloak Threat Detection and Response from Secureworks, a Dell Company
Detect, investigate, and respond to advanced attacks
Combining the use of threat intelligence, analytics and automated security tools with human smarts
Raytheon
Raytheon Detection and Response Services
Advanced threat detection, analytics technology and threat-hunting to identify, assess, manage, and respond to advanced persistent threats
Raytheon
Raytheon OSINT services
Aid discovery and assessment to mitigate and remediate current threats
CyberArk
CyberArk Privileged Access Security Solution
Secure privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between
nextAuth
nextAuth
Frictionless authentication from the user's own mobile phone, using your branded app. No more password, no more username, just a …
Intigriti
Intigrity Ethical Hacking and Bug Bounty Platform
Crowdsourced security platform where security researchers and companies meet
Fortinet
FortiDeceptor from Fortinet
Deception Technology based automated Detection and Response to Threats
Fortinet
FortiGate Secure SD-WAN from Fortinet
WAN Edge Transformation with Security-Driven Networking
Fortinet
Security Fabric from Fortinet
All in one security solution that protects the entire end-to-end infrastructure without compromising performance
SentinelOne
SentinelOne Endpoint Protection
SaaS based endpoint protection solution that unifies prevention, detection, response, remediation and forensics powered by artificial intelligence
Altran
SYNERGi GRC Platform from IRM, an Altran Company
GRC platform to develop, maintain and report compliance against legal and regulatory obligations
Airbus CyberSecurity
Airbus Cyber Threat Intelligence
Service that monitors and shares APT's, and enables knowledge-sharing for better decision-making
Airbus CyberSecurity
Airbus CyberRange
Operational capability for Cyber Training and Cyber Testing
Accenture
Accenture iDefense
Intelligence Platform and Professional Services providing timely, relevant and actionable security intelligence
EclecticIQ
EclecticIQ Fusion Center
Your single source of tailored cyber threat intelligence, from leading suppliers.
ATAR Labs
ATAR
Next generation Security Automation & Orchestration platform.
CSI tools
CSI Role Build & Manage for compliant and automated role building and user maintenance
CSI Role Build & Manage (CSI RBM) supports the SAP authorization processes with fully automated SAP role building. By documenting …
FireEye
FireEye EndPoint Security
Integrated endpoint protection platform to maximize threat prevention automation and facilitate proactive endpoint protection against known and advanced threats
FireEye
FireEye Email Security
Adaptive, intelligent, scalable defense against email borne threats
OneTrust
OneTrust Privacy Management Platform
Comprehensive and Integrated Privacy Management Platform
TrustArc
TrustArc Data Privacy Management Platform
Powerful technology solution to operationalize and demonstrate GDPR privacy compliance
PrivacyPerfect
PrivacyPerfect
The ultimate GDPR compliance toolkit
FireEye
Security Orchestrator from FireEye
Simplify threat response through integration and automation
FireEye
FireEye Helix Platform
Security operations platform that surfaces unseen threats and empowers expert decisions
Dimension Data, part of NTT Group
Dimension Data Managed Intrusion Detection and Prevention Service
Fully managed service that protects networks from attack and misuse, using network-based intrusion detection and prevention systems
genua gmbh
Data Diode for Industrial Applications from Genua
Unidirectional security gateway for protecting the integrity of industrial control systems and critical infrastructure
Allied Telesis
Secure Enterprise SDN from Allied Telesis
Intelligent SDN controller that reads data from business applications and automatically changes the network configuration; and works with security …
ZIVVER
ZIVVER
SaaS based solution for secure email, chat and file sharing
CGI
CGI Managed Security Services
Full services solution that manages and monitors your complete operational IT-, network- and security infrastructure
SIM-CI - Simulating Critical Infrastructures
SIM-CI Suite - Simulating Critical Infrastructures
Cloud-based asset management and simulation platform – giving a 360° perspective on critical infrastructures, and help you manage and maintain …
Scarabee Security Group
Scarabee 24/7 Remote Object Surveillance
Remote object surveillance for threat protection
Palo Alto Networks
Palo Alto VM-Series Next Generation Firewall
Virtualized Next-generation firewall that can be deployed in a range of public and private cloud computing environments
Onegini
Onegini Mobile Security Platform
Platform that provides all security elements to create secure mobile apps
Guardian360
Guardian360 Security Platform
8 Guardian360 Scanners, hacking alerts and professional SOC for optimal managed security
DTEX Systems
Dtex User Behavior Intelligence Platform
Endpoint visibility, user behavior intelligence, and expert analysts to manage and interpret your results
AET Europe
SafeSign Identity Client from AET Europe
Flexible token middleware solution for strong authentication with smart cards and USB tokens on any device
Glasswall Solutions Limited
Glasswell email security
Eliminates malware attacks in email attachments
Surevine
Surevine Secure Information Sharing
Secure, scalable collaboration environments for the most security conscious organisations
Panaseer
Panaseer Security Data Lake
Big data analytics software platform that enables Boards, CISOs, and security teams to gain continuous, joined-up visibility of business risk …
Device Authority
KeyScaler Platform from Device Authority
Security solution for IoT and M2M
Exonar
GDPR Regulation Data Mapping Solution from Exonar
Finding, Mapping and Managing your data to reduce the risk associated with GDPR
Intruder
Intruder security monitoring platform
Cloud based security monitoring platform for internet-facing systems
Assuria Ltd
Assuria SOC Management Platform
Complete SOC technology suite for SME security providers, including processes and procedures
NXP Semiconductors
A1006 Secure Authenticator Solution from NXP
Secure Authentication and Anti-Counterfeit Technology into end products
SSH Communications Security
CryptoAuditor from SSH Communications Security
Virtual appliance for monitoring, auditing and controlling encrypted privileged access and data transfers
LEET Security, SL
LEET stamp
TRUST reaches the cloud with the specific qualification and scoring of security for ICT services
McAfee
McAfee Public Cloud Server Security Suite
Comprehensive security for AWS and Azure cloud-workloads
CY4GATE
CY4GATE NET-INT
Platform for the surveillance and monitoring of phone calls, chats, messages on social networks, forum discussions, emails, instant messaging and …
CY4GATE
G-SINT from CY4GATE
GSM and Satellite Intelligence systems-composed of a GSM Interceptor and a Satellite Communications interceptor
S21sec
Lookwise Device Manager for ATM from S21sec
Centralized security solution to protect, monitor and control your ATM network
Indra
iPhalanx Cyber Range Solution from Indra
Advanced solution for hands-on training, experimentation, testing and research in cyber security
aizoOn Technology Consulting
Aramis from aizoOn Technology Consulting
Security network monitoring platform bonding artificial intelligence to human intelligence
Rohde & Schwarz Cybersecurity
Secure Modbus Protocol Communication for the Industrial Internet of Things from Rohde Schwarz Cybersecurity
Rohde & Schwarz Cybersecurity
Browser in the Box from Rohde & Schwarz Cybersecurity
The virtual environment for secured and comfortable web browsing
G&D - Giesecke & Devrient
Cyber Physical Systems - CPS Solutions from G&D - Giesecke & Devrient
Industry 4.0 Security Solution that secures communication with and between machines
F-Secure Corporation
F-Secure Rapid Detection Service
Enterprise-grade managed service that detects, quantifies and gathers evidence regarding advanced attacks
F-Secure Corporation
F-Secure Protection Service for Business
One of the world's leading multi-endpoint security solutions
Ping Identity
Ping Identity Platform
Identity Defined Security
OneLogin, Inc.
OneLogin
Cloud-based IAM/IDaaS solution with an industry-leading SSO and identity-management solution
Okta
Okta Identity Cloud
IAM Solutions that use identity information to grant people access to applications on any device at any time, enforcing strong …
Guardtime
Guardtime Keyless Signature Infrastructure (KSI) for M2M
Real-time Situational Awareness for Machines and Their Data
Guardtime
Guardtime Keyless Signature Infrastructure (KSI) for Hadoop Big Data Lakes
Blockchain Security and Assurance for Big Data
Guardtime
Guardtime Keyless Signature Infrastructure (KSI) for Critical Infrastructure Protection
Real-time Situational Awareness, Protection against zero-day attacks and Integrity Monitoring for industrial infrastructures
Guardtime
Guardtime Keyless Signature Infrastructure (KSI) for DevOps Platforms
Real-time verification of the integrity of your network, independently from system admins and outsourced service providers
FireEye
FireEye Network Security
Advanced threat protection and breach detection platform that provides threat visibility and holistic protection against the world’s most sophisticated and …
ProofPoint
Proofpoint Data Discover
Identifies sensitive data at risk and enables real-time remediation through quarantine, access revocation or deletion
Brightsight
Brightsight security evaluation lab
Product Security evaluation & certification support services, leading in security approval excellence
miaa Guard
miaa Cloudware from miaa Guard
SaaS-based plug-ins and tailored solutions providing a Managed Access Solution for Identity Management Platforms
Cobalt Strike
Cobalt Strike
Advanced Threat Tactics for Penetration Testers
Secret Double Octopus
Secret Double Octopus
Multi Shield Protection for Users and Things
BAE Systems
NetReveal Enterprise Payment Fraud from BAE Systems
Protects critical payment systems, using behavioural profiling, anomaly detection and machine learning analytics for quicker identification of fraud
BAE Systems
NetReveal® Insider Fraud from BAE Systems
Enhances your ability to identify and reduce your exposure to insider fraud
BAE Systems
NetReveal P&C Claims Fraud solution from BAE Systems
Detect, investigate, and prevent insurance fraud, while minimising the impact on genuine claimants
ObserveIT
ObserveIT Insider Threat Solution
End Point Solution that identifies and eliminates insider threats with real-time security awareness, precise visibility and fast investigations
Armor Defense
Armor Anywhere from Armor Defense
Managed Security for Any Cloud. Anywhere
Cofense, formerly PhishMe
Cofense PhishMe
Threat management platform that helps turn employees into your own human phishing defense
Malwarebytes
Malwarebytes Endpoint Security
Endpoint protection platform that uses multiple technologies to proactively protect computers against unknown and known threats
Secures cloud users, data, and apps across any cloud environment and app
Crowdstrike
CrowdStrike Falcon™ Platform
Leading cloud-delivered next-generation endpoint protection platform
KnowBe4
KnowBe4
Integrated platform for Security Awareness Training and simulated phishing attacks
Cylance, a BlackBerry Company
BlackBerry CylancePROTECT
Artificial Intelligence Based Endpoint Protection solution against advanced Threats
WinMagic
SecureDoc from WinMagic
Volume And Full Disk Encryption For Virtualized And Cloud Workloads
Seclore
Seclore EDRM
Advanced, automated EDRM Solution that accelerates the adoption of data-centric security and close collaboration security gaps
Fasoo
Fasoo Data Security Framework
Data Security Framework that performs discovery, classification and protection by scanning company file systems
EgoSecure
EgoSecure Data Protection
Data Security solution that determines exactly what protection you require, and offers protection modules can are set up and adapted …
Accellion
Kiteworks Content Collaboration Platform from Accellion
Private Cloud Secure Content Collaboration Platform that increases productivity and ensures data security and compliance
Bufferzone Security
BUFFERZONE
patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity
DriveLock SE
DriveLock for Cloud Security
Protects data from theft, misuse and loss in the cloud
Bromium
Bromium Security Platform
Advanced End Point Security Platform that uses a combination of a Sensor Network, for Endpoint Detection and Response (EDR), virtualization …
GlobalSign
GlobalSign Managed SSL (MSSL) platform
Centralized certificate management and tools, services and SSL products to reduce risk, respond to threats and control SSL cost
BitSight Technologies
BitSight Security Rating Platform
Generates objective, outside-in ratings on companies’ security performance
Xlab
Device Monitor for Android from Xlab
Botnet hunting on Android mobile devices
OneSpan [ Previously Vasco Data Security ]
DIGIPASS® for Mobile from Vasco Data Security - OneSpan
Secure Authenticator that offers build-in security for mobile applications combined with a frictionless, hands-free authentication and e-signing experience for mobile …
Unomaly
Unomaly
Automated analysis, profiling and anomaly detection of data produced by systems
TNO
AVACS (Automatic Video Compilation and Analysis System) from TNO
User-friendly surveillance product that dramatically shortens the time needed for videotape analysis
ThreadStone Cyber Security
ThreadScan Infra & Web from ThreadStone Cyber Security
Automated security scan specially developed for SME’s
Tanker
Tanker
Desktop application that provides effortless encryption for private data in public clouds
Confidently use cloud applications and services while staying safe, secure and compliant
Sweepatic
Sweepatic
Data exploration and reconnaissance tool that collects, quantifies and visualizes the clients’ exposure to cyber- attacks caused by publically available …
Stormshield an Airbus Company
Stormshield SNi40
Security solution dedicated to operating systems with strict industrial constraints
Splunk
Splunk Enterprise Security
Analytics-Driven SIEM that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and …
Sophos
Sophos SafeGuard Enterprise
Proactive Data Protection with Synchronized Encryption
Sophos
Sophos Intercept X
Next-generation endpoint detection and response platform for anti-exploit protection
Sentryo a Cisco Company
Sentryo ICS CyberVision
Delivers an operational security capacity to prevent, detect and respond to cyber attacks targeting the Industrial Internet
Sedicii
Sedicii Protecting Identities
Authenticating users without the need to transmit or share private information
SecurityMatters, A Forescout Company
SilentDefense from SecurityMatters Forescout
OT network monitoring and intelligence platform that provides instant visibility and detection of all cyber threats to industrial environments
SecurIT
TrustBuilder Identity hub from SecurIT
Powerful Identity Hub, providing brokerage between modern cloud and legacy architectures
SafeNet / Gemalto a Thales Company
SafeNet Authentication Service from Gemalto
Authentication as a Service that applies multi-factor authentication to secure access to any application, from any device, anywhere
RSA Security
RSA FraudAction
External threat management service that provides proactive detection and mitigation of online threats such as phishing, Trojans and mobile rogue …
Rosberg System
Verji SMS from Rosberg System
Encrypts and protects mobile communication against the most sophisticated attacks
Radware
Radware Cloud WAF Service
Fully managed Cloud Web Application Firewall Service Offering with complete web security coverage including OWASP Top-10, advanced attacks and zero-day …
Qualys
Qualys Cloud Platform
Cloud platform with integrated security & compliance solutions that provide clients a global view of their security and compliance
Outpost24
Secure Web Application Tactics (SWAT) from Outpost24
Vulnerability management solution for web applications, that combines advanced web application scanning tools with security expert support
Lumeta Corporation
Lumeta® Enterprise Situational Intelligence (ESI)
Real-time, context-driven security intelligence to provide Cyber Situational Awareness in Real-Time
Liopa
LipVerify from Liopa
Biometric Authenticator that validate a user’s identity by analysing the appearance and movement of their lips as they speak into …
iWelcome
iWelcome Identity & Access Management as a Service
iWelcome provides a service: Identity as you go. Identity and access management for your applications. Quick and easy
InWebo
inWebo Multi Factor Authentication for IoT
Seamless Multi-Factor Authentication For The Internet of Things
InWebo
inWebo Multi Factor Authentication for Enterprises
SaaS solution for user-centric authentication
Intrinsic-ID
CITADEL from Intrinsic-ID
The world’s first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, …
G DATA
G DATA Endpoint Protection Business
Complete Client Protection through active hybrid protection using CloseGap technology, and fast response times to current threats
FOX-IT, part of NCC Group
DetACT from FOX-IT
Real-time web & mobile event analytics and mitigation
Enigmedia
Enigmedia Secure Communications
Solution for encrypted audio calls, video calls, instant messaging and secure file sharing
Real-time analysis of advanced malware threat detection leveraging threat intelligence to create advanced malware defenses for companies of all sizes …
Opacity
Opacity
Cryptographic permissioned block-chain technology that allows a company to differentiate itself by enabling their end-users to get insights in how …
Mimecast
Mimecast Secure Email Gateway
protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks using targeted threat protection
Ciptor
Yubikey from Yubico
Small USB and NFC device supporting multiple authentication and cryptographic protocols, that protects access to computers, networks, and online services …
Business Forensics
BusinessForensics HQ Platform
Intelligence platform that provides (big) data analysis in real-time of network transactions, forensic analysis, fraud management and machine learning.
Symantec a Broadcom Company
Blue Coat Security Platform from Symantec a Broadcom Company
Detects malware-infected devices and determines both the nature of the threat and the potential risk. Organizations receive alerts when malware-infected …
IBM Security Services
IBM Trusteer Pinpoint Detect
Protects online banking sites against account takeover and fraudulent transactions; and detects end user devices infected with malware
IBM Security Services
IBM® Trusteer Rapport
Advanced end-point protection solution that uses machine learning and advanced analytics to deliver real-time cognitive phishing detection, remove malware from …
Guardsquare
IxGuard from Guardsquare
Protector and optimizer for iOS, making apps faster, more compact, and more difficult to crack
Guardsquare
DexGuard from Guardsquare
Protector and optimizer for Android, making apps faster, more compact, and more difficult to crack
ForgeRock
ForgeRock Identity Platform
Enterprise Identity Platform that secures digital identities for people, devices, and connected things
Digital Guardian
Digital Guardian
Data-centric security platform designed to stop data theft, that combines data awareness and transformative endpoint visibility with behavioral threat detection …
Digitronic
HiCrypt™ from Digitronic
An encoding solution for everyone; a digital vault with an exclusive key ownership guarantee
Cyberwatch
Cyberwatch
A vulnerability management solution from detection to remediation
Cyberlytic - out of business
Cyber Threat Defender from Cyberlytic
An intelligent, self-learning web application firewall that does not require human intervention or rule management
Cyberlytic - out of business
Cyber Threat Profiler from Cyberlytic
Real-time risk assessment of web-based cyber-attacks
Covertix acquired by Micro Focus
Covertix SmartCipher from Micro Focus
All files secured, anywhere
CSI tools
CSI Data Xtractor from CSI Tools
Exports tables from any SAP system to take data offline and examine them as an independent data viewing tool
CSI tools
CSI Automated Request Engine from CSI Tools
Middleware application that processes user access requests based on XML input and generates XML output with SOD results
CSI tools
CSI Role Build & Manage (CSI RBM) from CSI Tools
Application that supports the SAP authorization processes with fully automated SAP role building
CSI tools
CSI Authorization Auditor (CSI AA) from CSI Tools to (automate) audit and monitoring of SAP security
Automated Audit & monitoring application of authorization and role setup in SAP environments
Continuum Security
IriusRisk from Continuum Security
A single integrated console to manage application security risk throughout the software development process
Compumatica
CompuPIM from Compumatica
Secure mobile application that protects BYOD by providing a complete separation of private and business data by using a secure …
Compumatica
CompuMobile from Compumatica
Mobile security solution that prevents interception and allows secure calling, secure SMS and secure messaging
Compumatica
CompuMail Gateway from Compumatica
Email security solution that encrypts and signs all the e-mail traffic in an organization
Compumatica
CompuWall from Compumatica
Network security solution that offers a Next Generation Firewall and secure VPN Connection in one
Compumatica
CompuDiode from Compumatica
SCADA / ICS Security solution that protects PCS systems against attacks from the outside
Compumatica
Cryptoguard VPN from Compumatica
Network encryption solution that controls all the IP traffic between different locations, securing the connection
Coblue Cybersecurity BV
Cointel from Coblue Cybersecurity
Analysis and forensics software that provides insight into Bitcoin transactions, flows and the identities behind them
Coblue Cybersecurity BV
Coable from Coblue Cybersecurity
Helps organizations to gain insight in their cyber security controls and policies and benchmark them against international standards and best …
Coblue Cybersecurity BV
Storro from Coblue Cybersecurity
Peer-to-peer, Blockchain application that lets you safely store and share files, without the cloud
Crypho
Crypho
Enterprise file-sharing and chat with end-to-end encryption.
DocRAID
Safemail from DocRAID
Email protection made easy. No software installation. No hassles. All email clients. All devices.
DocRAID
DocRAID
Pioneer in CloudRAID technology, 100% zero-knowledge backup and file sync, secure file exchange, and easy to use email encryption