Security
2 Review
Bufferzone is a patented containment solution designed to defend endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.
2 Review
BluSapphire is one platform that replaces your entire advanced cyber defense stack. It gets rid of silos by converging network, system, and end point based multi-vector analysis. Built on an Open Data Platform, it readily integrates with existing security tools to deliver comprehensive advanced cyber defense.
2 Review
IGELβs endpoint management software is designed to allow users to convert any x86 device and control every PC from one easy-to-manage platform.
2 Review
VXL Software is a world leader in digital signage, unified endpoint management, PC repurposing & thin-client migration.
2 Review
CrowdSec is an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global IP reputation database to protect the user network.
2 Review
Metapacket is a proxy platform that detects & prevents malwares from exfiltration, rendering malware useless.
2 Review
EgoSecure Endpoint provides comprehensive protection against all threats to your data. The solution is based on the C.A.F.E. management principle that is used by more than 1,500 customers. The innovative principle combines the functions of control, audit, filter and encryption intelligently combined in a holistic safety concept that offers completeβ¦
Read more about this company2 Review
FortifyData offers a clear and accurate analysis of cyber risks through a risk scoring platform. Using statistical analysis and continuous monitoring of a companyβs network and application layer, dark web search discoveries, IP reputation, and breach history records, companies can now understand their current cyber risk posture using our easy toβ¦
Read more about this company2 Review
BowTieXP is a next generation risk assessment tool that uses the Bowtie Method to assess risks. BowTieXP is unique in its ability to visualise complex risks in a way that is understandable.
2 Review
HyperComply helps vendors respond to security questionnaires in a fraction of the time.
2 Review
The Respond Analyst is security decision automation software that performs just like an expert cyber security analyst but at machine speed -- making escalations decisions by analyzing streaming security data. The Respond Analyst processes millions of alerts, in real-time, and escalates detailed, vetted security situations for security teams to respondβ¦
Read more about this company2 Review
Vendict provides you a solution to validate a Vendor at business speed, build a documented compliance on Privacy and Vendor Management and track your Vendor risk. First scan automatically all your website domains and review your third-party Vendors. Get a full Vendor inventory, including fourth parties. Each Vendor has a 360-degree profile to assess itsβ¦
Read more about this company2 Review
CYREBRO was founded in 2012 as CyberHat to help companies take cyber protection to new and unprecedented heights. Today, we have evolved into CYREBRO and are on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization. Our team ofβ¦
Read more about this company2 Review
P2Scan software containins PFP's patented PowerIQ analytics algorithms, which provide a complete identification and analysis solution.
2 Review
SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and suitable for small as well as the largest IoT solutions in the world
2 Review
Transform your incident and data breach response processes with dynamic incident response plans that are always up to date, automated workflows designed specifically to accelerate privacy team processes, and the best central system of record that reinforces legal privilege for all your response actions.