Find security solutions

based on categories, threats, features, compliance, markets, deployment mode & more
Use the filter on the left for a quick search. Or tell us what you want in the text box and use the filter
to narrow down or expand your selection.
Filter
Categories
    • Application Security ()
    • Cloud Security ()
    • Data Security ()
    • Endpoint Security ()
    • Identity & Access Management ()
    • Infrastructure Security ()
    • Risk Management & Compliance ()
    • Security Operations & Incident Response ()
    • Threat Intelligence & Vulnerability Management ()
    • Defence, Intelligence & Law Enforcement ()
Deployment mode
    • Managed Service
    • Product
Customer Type
    • Customer
Markets
    • Markets
Compliance & Certifications
    • Compliance
    • Product Certifications

Get started, it's free!

Are you a supplier?

Click here
329 applications found

The Cre8ion.Lab BV Test

Test

test

Nucleon

Cyber Cure

Free cyber threat intelligence feeds

SentinelOne Ranger

IoT Detection and Response solution that turns every protected endpoint into a network of sensors

CyberX

CyberX Industrial Cybersecurity Platform

Asset discovery, continuous monitoring and vulnerability management for industrial networks

TEHTRIS

eGambit ZONE

Simulate fake devices and services to deceive intruders

Tufin

Tufin Orchestration Suite

Cybersecurity and agility with Network Security Policy Orchestration

Citrix

Citrix Web App Firewall [formerly Netscaler ]

Protect websites, apps, and APIs

VMRay

VMRay Analyzer

A Smarter, Stealthier Malware Sandbox

Nozomi Networks

Guardian from Nozomi Networks

Real-time ICS Cyber Security and Operational Visibility

PortSwigger

Burp Suite Enterprise from PortSwigger

Web vulnerability scanner protecting some of the world's largest brands

Virtru

Virtru Microsoft office 365 email encryption

Secure End-to-End Encryption for Microsoft Email

FICO

FICO Cyber Risk Score

Online security rating service – now available on the AWS Marketplace

Privitar

Privitar Publisher

A comprehensive solution for data privacy protection and governance.

Dragos

Dragos Platform

Monitor and defend ICS environments across the entire ICS cybersecurity framework

Varonis

Varonis Data Security Platform

Find, protect, and monitor sensitive data on-prem and in the cloud

Lookout

Lookout Mobile Endpoint Security

Get visibility into the entire spectrum of mobile risk, apply policies to reduce that risk, and integrate into existing security …

Code42

Code42 DLP

Detection and response to data loss from insider threats

Terbium Labs

Matchlight from Terbium Labs

Dark web data intelligence platform that analyzes companies cyber-risk exposure

CloudFlare

Cloudflare Magic Transit

Software-defined networking product that offers IP transit with DDoS protection, next-gen firewall, traffic acceleration

Entersekt

Transakt from Entersekt

PSD2 compliant one-touch authentication for banks, AISPs, PISPs and other players

Omada

Omada Identity Suite

Manage identities and govern access to resources across on-premises and cloud-based IT-environments

Panda Security

Panda Endpoint Protection Plus

Centralized protection for Windows, Mac and Linux workstations, virtualization systems and Android devices

BeyondTrust

BeyondTrust for Networks

Endpoint Privilliged Management for Netorks, IoT, ICS & SCADA devices

Micro Focus

ArcSight from Micro Focus

Powerful, efficient threat detection and response through security analytics from a next-gen SIEM

Interset, a Micro Focus Company

Interset user and entity behavioral analytics (UEBA)

Detect, investigate, and respond to threats that may be hiding in your enterprise before your data is stolen

Netwrix

Netwrix Data Classification

A single panoramic view of your enterprise content

Link11

Link11 DDoS Protection

Self-learning AI protection against DDoS Attacks

RHEA Group

rapidPHIRE from Rhea Group

Context-aware cybersecurity Network Traffic Analysis platform that provides situational awareness and remediation of cyber-threats

PerimeterX

PerimeterX Bot Defender Web

Protect Your Website Against Automated Attacks

HyTrust

HyTrust CloudAdvisor

Data Discovery & Classification

Deep Instinct

Deep learning endpoint security solution from Deep Instinct

Endpoint security solution that detects and predicts threat behavior to block attacks

Feedzai

Feedzai risk management platform

Machine learning platform that allows banks and merchants to identify fraudulent payment transactions

SpyCloud

Spycloud Account Takeover Prevention

API into your current application to identify when your users’ credentials have been exposed in the underground

Ivanti

Ivanti Security Controls

Solution that brings together patch management, dynamic whitelisting and granular privilege management

SecurityScorecard

Security Ratings from SecurityScorecard

Understand the cyberhealth of your ecosystem across 10 risk factors

SailPoint

SailPoint Predictive Identity

The Intelligent Cloud Identity Platform

SCADAfence

SCADAfence Platform

Continuous OT network monitoring that provides visibility, risk management and threat detection

LogRhythm

LogRhythm NextGen SIEM Platform

Analytics, user and entity behavior analytics, network detection and response, security orchestration and response in a single platform

Cyberbit

Cyberbit Range

Cyber Security Training and simulation platform

DomainTools

Iris Investigation Platform from DomainTools

threat intelligence and investigation platform that maps connected infrastructure to get ahead of threats

Cellebrite

Cellebrite Premium

Solution for law enforcement agencies to unlock and extract crucial mobile phone evidence from iOS and Android devices

Galvanize

HighBond by Galvanize

End-to-end GRC platform

Bitglass, Inc.

Bitglass CASB

Zero-Day data & threat protection, any app, any device, anywhere

LexisNexis Risk Solutions, formerly ThreatMetrix

LexisNexis Risk Defense Platform

Automate risk-assessment and select calibrated authentication actions in real-time for better fraud prevention and customer experience

Druva

Druva Cloud Platform

Take control of your data with secure, scalable, on-demand data protection and management

Contrast Security

Contrast Assess

Interactive Application Security Testing Solution

PhishLabs

Phishlabs Digital Risk Protection

24/7 security operations centers that continuously hunts across vectors for external threats

Bayshore Networks

SCADAfuse from Bayshore

Industrial Controller Protection

Synack

Synack Platform

Crowdsourced Security Testing Platform

Infoblox

BloxOne Threat Defense Advanced from Infoblox

Scalable Platform That Maximizes Your Existing Threat Defense Investment

Netskope

Netskope CASB

Confidently adopt cloud applications and services – without sacrificing security

Recorded Future

Recorded Future Threat Intelligence Portal

Sourced from the largest breadth of sources, automatically analyzed, and tailored to your role

IronNet Cybersecurity

IronDefense from IronNet

Network Traffic Analysis platform that delivers behavioral analysis and integrated packet-level cyber hunt to detect advanced threats

Foregenix

FGX-WEB from Foregenix

Monitors and protects websites against the latest threats affecting online businesses

RiskIQ

RiskIQ Digital Footprint

Visualize and Defend your Attack Surface

Sumo Logic

JASK Autonomous Security Operations Center from Sumo Logic

Cloud-native SIEM, analyzing cloud environments, on-premises network, endpoints, and logs in a single platform

WhiteHat Security

WhiteHat Sentinel Application Security Platform

Application Security and Risk Management platform with integrated secure development, security testing and continuous monitoring.

SentinelOne

Vigilance from SentinelOne

24/7 Threat Assessment and Response

Siemplify

Siemplify Security Orchestration Platform

A Powerfully Simple Security Operations Platform

Clearswift part of HelpSystems

Clearswift SECURE Web Gateway

Deep content inspection capabilities that facilitate the competitive advantages inherent in open and safe communications.

ThreatQuotient

THREATQ from ThreatQuotient

Threat intelligence platform that accelerates security operations through streamlined threat operations and management

Bugcrowd

Bugcrowd Bug Bounty Program

A Human-based Approach to Risk Reduction

eSentire

eSentire Managed Detection and Response for Office 365

Comprehensive visibility. Rapid threat detection

ImmuniWeb

ImmuniWeb Discovery from NCC Group

Attack Surface Management & Dark Web Monitoring For self-assessment and third-party risk scoring

NCC Group

NCC Group GatewayCrypt for S3

Cloud encryption gateway product capable of storing protectively marked data

NCC Group

Vulnerability Scanning from NCC Group

Finding vulnerabilities with attention to detail

Proficio

ProSOC from Proficio

SOC-as-a-Service designed to meet unique security and compliance challenges.

Securonix

Securonix Next-Generation SIEM

Harness the Power of Big Data Using Machine Learning

Centrify

Centrify Privileged Access Service

Cloud-ready Zero Trust Privilege

ESET

ESET Dynamic Threat Defense

Cloud based Sandboxing for dynamic malware and zero day attacks

ThreatConnect

ThreatConnect SOAR Platform

Intel-Driven Security Orchestration and Response

ThreatConnect

ThreatConnect’s Threat Intelligence Platform

Aggregate, Analyze, and Act on Threat Intelligence

Comodo

Comodo Threat Intelligence

Sophisticated verdicting engine that provides you insight with 100% trust on all files in your network at lightning speed

Vectra AI

Cognito platform from Vectra

AI driven threat detection and response platform

Duo Security, a Cisco Company

Duo MFA

A Better Authentication Experience

Trustwave

Trustwave SpiderLabs Threat Hunting

Manual and automated processes to help you get ahead of your adversaries by flagging risks you may not have been …

Trustwave

Trustwave Managed Application Control

Endpoint whitelisting solution that combines a trust-based and policy-driven approach to application control, backed by real-time threat intelligence and around-the-clock …

LookingGlass Cyber Solutions

LookingGlass Third Party Risk Monitoring

Continuously monitor up to five thousand organizations across thirteen categories of cyber risk

LookingGlass Cyber Solutions

scoutTHREAT from LookingGlass

Threat Intelligence Platform (TIP) that identifies threats before impact

Anomali

Anomali Altitude

Platform that harnesses threat data, information, and intelligence to drive effective cyber security decisions

Elastic

Elastic Endpoint Security [Formerly Endgame]

Full Stack Endpoint Protection Platform with automated Threat Hunting

Elastic

Elastic Siem

Security analytics at the speed of Elasticsearch

GoSecure [Formerly CounterTack]

GoSecure Managed Detection and Response

CyberSponse a Fortinet Company

CyberSponse Fortinet CyOPs Platform

Sccurity orchestration & automation response (SOAR) solution that bridges the gap between automation only & human dependent security organizations.

R9B [Root9b]

ORION Threat Hunting Platform from R9B [Root9b]

Agentless hunting with cybersecurity software that stealthily identifies and eliminates threats before they turn into attacks

Ixia, a Keysight Company

Ixia Breakingpoint Applications and Security Testing

Security simulation test solution that verifies the stability, accuracy, and quality of networks and network devices

ZeroFOX

ZeroFOX Platform

Protects business & employees from cyber, brand and physical threats on social & digital channels

Menlo Security

Menlo Security Cloud Platform Powered by Isolation

Cybereason

Cybereason Threat Hunting Platform

Hunt with Ease at Scale

Cybereason

Cybereason endpoint detection and response platform

Hunt, Detect, Protect. An end-to-end cybersecurity solution built to empower defenders

Digital Shadows

Digital Shadows Searchlight

Identify Unwanted Exposure Online: Data Loss Detection, Online Brand Security, Attack Surface Reduction

Attivo Networks

Attivo ThreatDefend Platform

Deception Technology for early post-compromise threat detection and accelerated incident response

Avanan

Avanan Cloud Security for Office 365

Bay Dynamics

Bay Dynamics Risk Fabric

Data protection analytics platform for Data Loss Prevention

Claroty

Claroty Platform

Integrated and Comprehensive IoT and OT Security

Zscaler

Zscaler Internet Access

Secure Internet and web gateway delivered as a service from the cloud

F5 Networks

F5 Networks Web Application Firewall (WAF)

Protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data.

HackerOne

HackerOne Bug Bounty Platform

Trusted Hacker- Powered Security Platorm

Unisys

Unisys Stealth aware

Live discovery, modeling and visualization to see network relationships and use microsegmentation to isolate trusted entities

CYREN

Cyren Email Security

Comprehensive protection to safeguard against ransomware, phishing, malware, and spam

Virsec Systems

Virsec Web Application Security

Automate protection with unprecedented accuracy and coverage

Fidelis Cybersecurity

Fidelis Network

Cornerstone Security Stack Architecture for Network, Web and Email Traffic Analysis and DLP

Illusive Networks

Illusive Networks Attack Detection System

Agentless, noiseless deception technology for early cyberattack detection

Skybox Security

Skybox Horizon

Visualize, control and reduce the attack surface

Forescout

Forescout eyeSight

Continuously discover, classify and assess devices to gain situational awareness and reduce risk

CenturyLink

CenturyLink Adaptive Network Security

Networkbased layer of protection against an increasingly complicated threat landscape

A10 Networks

A10 DDoS protection Cloud

Full spectrum enterprise DDoS Protection

Tanium

Tanium Core Platform

Allows security and IT operations teams to secure, control and manage millions of endpoints in seconds

Illumio

Illumio Adaptive Security Platform

Stops lateral movement in your data center and cloud environment, see how applications communicate, get vulnerability exposure insights, take control. …

Juniper Networks

Juniper Advanced Threat Prevention (ATP)

Cloud-based service or on-premises appliance that provides complete advanced malware detection and prevention

Imprivata

Imprivata Confirm ID for Clinical Workflows

Fast, convenient authentication for clinical workflows

Tripwire

Tripwire Industrial Visibility

Automated ICS Monitoring for maximum uptime

Webroot, a Carbonite Company

Webroot Carbonite DNS Protection

DNS Web Filtering with Cloud Based Protection

Verizon

Verizon Threat Intelligence Platform Service

Proactive intelligence analysis, correlating the expert insights of dark web hunters with an enhanced threat intelligence feed, open source content, …

Akamai

Prolexic Routed from Akamai

Fastest DDoS Mitigation of Terabit Scale Attacks

Oracle

Oracle Cloud Infrastucture Web Application Firewall

Cloud-Based, Globally Distributed Network

Oracle

Oracle CASB

Cloud Access Security Broker for Applications and Workloads

Oracle

Oracle Identity Cloud Service

Oracle’s next generation security and identity platform, cloud-native and designed to be an integral part of the enterprise security fabric …

Gigamon

GigaVUE-HC from Gigamon

Scalable Traffic Intelligence for Small to Large Enterprises and Service Providers

Palantir

Palantir Foundry

Platform that generates live risk benchmarks among peer organizations and automates compliance and risk reports

Darktrace

Darktrace Enterprise Immune System

Self-learning cyber AI technology that detects novel attacks and insider threats at an early stage.

SAS Cybersecurity

SAS Cybersecurity analytics software

Flexible security analytics software that delivers network visibility and better security outcomes through a combination of data, analytics and collaboration …

Thycotic

Thycotic Privilege Manager

Endpoint Privilege Management and Application Control Software

Barracuda

Barracuda Secure SD-WAN

Boost application performance and reduce costs

Imperva

Imperva API Security

Protects your APIs, detecting and blocking exploits of vulnerabilities

Imperva

Imperva Web Application Firewall (WAF)

Firewall that analyzes and inspects requests coming in to applications and stops attacks

Dell EMC Cyber Solutions Group (CSG)

Dell SOC Management and Incident Response Platform

SOC management platform, based on proven incident response methodologies and implemented within Dell EMC

AT&T Cybersecurity - Alienvault

AlienVault Open Threat Exchange from AT&T Cybersecurity

Global open threat intelligence community that enables collaborative defense with actionable, community-powered threat data.

Tenable

Nessus from Tenable

The de facto industry standard for vulnerability assessment

Checkmarx

Checkmarx Software Security Platform

Software security platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis and application …

SonicWALL Inc.

SonicWall Web Application Firewall

Comprehensive foundation for web application security, data leak prevention and performance, on prem or in the cloud

Forcepoint

Forcepoint Data Loss Prevention (DLP)

Data protection in a zero-perimeter world

Kaspersky

Kaspersky Endpoint Security

Reliable, proven security platform that protects your bottom line

Trend Micro

Trend Micro Cloud One security services platform

A security services platform for cloud builders

Northrop Grumman

LYNXeon Cyber Pattern Analysis Platform from Northrop Grumman

Cyber Pattern Analysis Platform empowers cyber analysts to detect and disrupt cyber threats

VMware Carbon Black

Carbon Black VMware ThreatHunter

Scalable, real-time threat hunting and incident response (IR) solution delivering unfiltered visibility for SOC's and IR teams

VMware Carbon Black

VMware Carbon Black Cloud

Cloud - native, easy to use endpoint protection

Intel Corporation

Intel Threat Detection Technology Platform

Hardware enhanced Detection using Accelerated Memory Scanning and Advanced Platform Telemetry

Secureworks, a Dell Company

Red Cloak Threat Detection and Response from Secureworks, a Dell Company

Detect, investigate, and respond to advanced attacks

Splunk

Splunk Phantom Security Orchestration & Automation

Harness the full power of your existing security investments with security orchestration, automation and response

Rapid7

insightIDR from Rapid7

Cloud Siem Tool for Threat Detection and Response

Palo Alto Networks

Cortex XDR from Palo Alto

Detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks

Booz Allen Hamilton

Booz Allen Cyber Fusion Center (CFC)

Combining cyber threat intelligence and threat defense operations into a single, integrated cyber defense platform.

Check Point

Check Point SandBlast Agent for Endpoint Protection

Check Point

SandBlast Network from Check Point

Advanced network threat prevention solution that protects against zero-day cyber attacks

Cisco Security

CISCO Advanced Malware Protection (AMP)

Breach prevention. Continuous monitoring of malicious behavior. Rapid malware detection. Malware removal.

Raytheon

Raytheon Threat Hunting Services

Combining the use of threat intelligence, analytics and automated security tools with human smarts

Raytheon

Raytheon Detection and Response Services

Advanced threat detection, analytics technology and threat-hunting to identify, assess, manage, and respond to advanced persistent threats

Raytheon

Raytheon OSINT services

Aid discovery and assessment to mitigate and remediate current threats

CyberArk

CyberArk Privileged Access Security Solution

Secure privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between

nextAuth

nextAuth

Frictionless authentication from the user's own mobile phone, using your branded app. No more password, no more username, just a …

Intigriti

Intigrity Ethical Hacking and Bug Bounty Platform

Crowdsourced security platform where security researchers and companies meet

Fortinet

FortiDeceptor from Fortinet

Deception Technology based automated Detection and Response to Threats

Fortinet

FortiGate Secure SD-WAN from Fortinet

WAN Edge Transformation with Security-Driven Networking

Fortinet

Security Fabric from Fortinet

All in one security solution that protects the entire end-to-end infrastructure without compromising performance

SentinelOne

SentinelOne Endpoint Protection

SaaS based endpoint protection solution that unifies prevention, detection, response, remediation and forensics powered by artificial intelligence

Altran

SYNERGi GRC Platform from IRM, an Altran Company

GRC platform to develop, maintain and report compliance against legal and regulatory obligations

Airbus CyberSecurity

Airbus Cyber Threat Intelligence

Service that monitors and shares APT's, and enables knowledge-sharing for better decision-making

Airbus CyberSecurity

Airbus CyberRange

Operational capability for Cyber Training and Cyber Testing

Accenture

Accenture iDefense

Intelligence Platform and Professional Services providing timely, relevant and actionable security intelligence

EclecticIQ

EclecticIQ Fusion Center

Your single source of tailored cyber threat intelligence, from leading suppliers.

ATAR Labs

ATAR

Next generation Security Automation & Orchestration platform.

CSI tools

CSI Role Build & Manage for compliant and automated role building and user maintenance

CSI Role Build & Manage (CSI RBM) supports the SAP authorization processes with fully automated SAP role building. By documenting …

FireEye

FireEye EndPoint Security

Integrated endpoint protection platform to maximize threat prevention automation and facilitate proactive endpoint protection against known and advanced threats

FireEye

FireEye Email Security

Adaptive, intelligent, scalable defense against email borne threats

OneTrust

OneTrust Privacy Management Platform

Comprehensive and Integrated Privacy Management Platform

TrustArc

TrustArc Data Privacy Management Platform

Powerful technology solution to operationalize and demonstrate GDPR privacy compliance

PrivacyPerfect

PrivacyPerfect

The ultimate GDPR compliance toolkit

FireEye

Security Orchestrator from FireEye

Simplify threat response through integration and automation

FireEye

FireEye Helix Platform

Security operations platform that surfaces unseen threats and empowers expert decisions

Dimension Data, part of NTT Group

Dimension Data Managed Intrusion Detection and Prevention Service

Fully managed service that protects networks from attack and misuse, using network-based intrusion detection and prevention systems

genua gmbh

Data Diode for Industrial Applications from Genua

Unidirectional security gateway for protecting the integrity of industrial control systems and critical infrastructure

Allied Telesis

Secure Enterprise SDN from Allied Telesis

Intelligent SDN controller that reads data from business applications and automatically changes the network configuration; and works with security …

ZIVVER

ZIVVER

SaaS based solution for secure email, chat and file sharing

CGI

CGI Managed Security Services

Full services solution that manages and monitors your complete operational IT-, network- and security infrastructure

SIM-CI - Simulating Critical Infrastructures

SIM-CI Suite - Simulating Critical Infrastructures

Cloud-based asset management and simulation platform – giving a 360° perspective on critical infrastructures, and help you manage and maintain …

Scarabee Security Group

Scarabee 24/7 Remote Object Surveillance

Remote object surveillance for threat protection

Palo Alto Networks

Palo Alto VM-Series Next Generation Firewall

Virtualized Next-generation firewall that can be deployed in a range of public and private cloud computing environments

Onegini

Onegini Mobile Security Platform

Platform that provides all security elements to create secure mobile apps

Guardian360

Guardian360 Security Platform

8 Guardian360 Scanners, hacking alerts and professional SOC for optimal managed security

DTEX Systems

Dtex User Behavior Intelligence Platform

Endpoint visibility, user behavior intelligence, and expert analysts to manage and interpret your results

AET Europe

SafeSign Identity Client from AET Europe

Flexible token middleware solution for strong authentication with smart cards and USB tokens on any device

Glasswall Solutions Limited

Glasswell email security

Eliminates malware attacks in email attachments

Surevine

Surevine Secure Information Sharing

Secure, scalable collaboration environments for the most security conscious organisations

Panaseer

Panaseer Security Data Lake

Big data analytics software platform that enables Boards, CISOs, and security teams to gain continuous, joined-up visibility of business risk …

Device Authority

KeyScaler Platform from Device Authority

Security solution for IoT and M2M

Exonar

GDPR Regulation Data Mapping Solution from Exonar

Finding, Mapping and Managing your data to reduce the risk associated with GDPR

Intruder

Intruder security monitoring platform

Cloud based security monitoring platform for internet-facing systems

Assuria Ltd

Assuria SOC Management Platform

Complete SOC technology suite for SME security providers, including processes and procedures

NXP Semiconductors

A1006 Secure Authenticator Solution from NXP

Secure Authentication and Anti-Counterfeit Technology into end products

SSH Communications Security

CryptoAuditor from SSH Communications Security

Virtual appliance for monitoring, auditing and controlling encrypted privileged access and data transfers

LEET Security, SL

LEET stamp

TRUST reaches the cloud with the specific qualification and scoring of security for ICT services

McAfee

McAfee Public Cloud Server Security Suite

Comprehensive security for AWS and Azure cloud-workloads

CY4GATE

CY4GATE NET-INT

Platform for the surveillance and monitoring of phone calls, chats, messages on social networks, forum discussions, emails, instant messaging and …

CY4GATE

G-SINT from CY4GATE

GSM and Satellite Intelligence systems-composed of a GSM Interceptor and a Satellite Communications interceptor

S21sec

Lookwise Device Manager for ATM from S21sec

Centralized security solution to protect, monitor and control your ATM network

Indra

iPhalanx Cyber Range Solution from Indra

Advanced solution for hands-on training, experimentation, testing and research in cyber security

aizoOn Technology Consulting

Aramis from aizoOn Technology Consulting

Security network monitoring platform bonding artificial intelligence to human intelligence

Rohde & Schwarz Cybersecurity

Secure Modbus Protocol Communication for the Industrial Internet of Things from Rohde Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Browser in the Box from Rohde & Schwarz Cybersecurity

The virtual environment for secured and comfortable web browsing

G&D - Giesecke & Devrient

Cyber Physical Systems - CPS Solutions from G&D - Giesecke & Devrient

Industry 4.0 Security Solution that secures communication with and between machines

F-Secure Corporation

F-Secure Rapid Detection Service

Enterprise-grade managed service that detects, quantifies and gathers evidence regarding advanced attacks

F-Secure Corporation

F-Secure Protection Service for Business

One of the world's leading multi-endpoint security solutions

Ping Identity

Ping Identity Platform

Identity Defined Security

OneLogin, Inc.

OneLogin

Cloud-based IAM/IDaaS solution with an industry-leading SSO and identity-management solution

Okta

Okta Identity Cloud

IAM Solutions that use identity information to grant people access to applications on any device at any time, enforcing strong …

Guardtime

Guardtime Keyless Signature Infrastructure (KSI) for M2M

Real-time Situational Awareness for Machines and Their Data

Guardtime

Guardtime Keyless Signature Infrastructure (KSI) for Hadoop Big Data Lakes

Blockchain Security and Assurance for Big Data

Guardtime

Guardtime Keyless Signature Infrastructure (KSI) for Critical Infrastructure Protection

Real-time Situational Awareness, Protection against zero-day attacks and Integrity Monitoring for industrial infrastructures

Guardtime

Guardtime Keyless Signature Infrastructure (KSI) for DevOps Platforms

Real-time verification of the integrity of your network, independently from system admins and outsourced service providers

FireEye

FireEye Network Security

Advanced threat protection and breach detection platform that provides threat visibility and holistic protection against the world’s most sophisticated and …

ProofPoint

Proofpoint Data Discover

Identifies sensitive data at risk and enables real-time remediation through quarantine, access revocation or deletion

Brightsight

Brightsight security evaluation lab

Product Security evaluation & certification support services, leading in security approval excellence

miaa Guard

miaa Cloudware from miaa Guard

SaaS-based plug-ins and tailored solutions providing a Managed Access Solution for Identity Management Platforms

Cobalt Strike

Cobalt Strike

Advanced Threat Tactics for Penetration Testers

Secret Double Octopus

Secret Double Octopus

Multi Shield Protection for Users and Things

BAE Systems

NetReveal Enterprise Payment Fraud from BAE Systems

Protects critical payment systems, using behavioural profiling, anomaly detection and machine learning analytics for quicker identification of fraud

BAE Systems

NetReveal® Insider Fraud from BAE Systems

Enhances your ability to identify and reduce your exposure to insider fraud

BAE Systems

NetReveal P&C Claims Fraud solution from BAE Systems

Detect, investigate, and prevent insurance fraud, while minimising the impact on genuine claimants

ObserveIT

ObserveIT Insider Threat Solution

End Point Solution that identifies and eliminates insider threats with real-time security awareness, precise visibility and fast investigations

Armor Defense

Armor Anywhere from Armor Defense

Managed Security for Any Cloud. Anywhere

Cofense, formerly PhishMe

Cofense PhishMe

Threat management platform that helps turn employees into your own human phishing defense

Malwarebytes

Malwarebytes Endpoint Security

Endpoint protection platform that uses multiple technologies to proactively protect computers against unknown and known threats

CloudLock a Cisco Company

Cisco CloudLock CASB & Cloud Cybersecurity Platform

Secures cloud users, data, and apps across any cloud environment and app

Crowdstrike

CrowdStrike Falcon™ Platform

Leading cloud-delivered next-generation endpoint protection platform

KnowBe4

KnowBe4

Integrated platform for Security Awareness Training and simulated phishing attacks

Cylance, a BlackBerry Company

BlackBerry CylancePROTECT

Artificial Intelligence Based Endpoint Protection solution against advanced Threats

WinMagic

SecureDoc from WinMagic

Volume And Full Disk Encryption For Virtualized And Cloud Workloads

Seclore

Seclore EDRM

Advanced, automated EDRM Solution that accelerates the adoption of data-centric security and close collaboration security gaps

Fasoo

Fasoo Data Security Framework

Data Security Framework that performs discovery, classification and protection by scanning company file systems

EgoSecure

EgoSecure Data Protection

Data Security solution that determines exactly what protection you require, and offers protection modules can are set up and adapted …

Accellion

Kiteworks Content Collaboration Platform from Accellion

Private Cloud Secure Content Collaboration Platform that increases productivity and ensures data security and compliance

Bufferzone Security

BUFFERZONE

patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity

DriveLock SE

DriveLock for Cloud Security

Protects data from theft, misuse and loss in the cloud

Bromium

Bromium Security Platform

Advanced End Point Security Platform that uses a combination of a Sensor Network, for Endpoint Detection and Response (EDR), virtualization …

GlobalSign

GlobalSign Managed SSL (MSSL) platform

Centralized certificate management and tools, services and SSL products to reduce risk, respond to threats and control SSL cost

BitSight Technologies

BitSight Security Rating Platform

Generates objective, outside-in ratings on companies’ security performance

Xlab

Device Monitor for Android from Xlab

Botnet hunting on Android mobile devices

OneSpan [ Previously Vasco Data Security ]

DIGIPASS® for Mobile from Vasco Data Security - OneSpan

Secure Authenticator that offers build-in security for mobile applications combined with a frictionless, hands-free authentication and e-signing experience for mobile …

Unomaly

Unomaly

Automated analysis, profiling and anomaly detection of data produced by systems

TNO

AVACS (Automatic Video Compilation and Analysis System) from TNO

User-friendly surveillance product that dramatically shortens the time needed for videotape analysis

ThreadStone Cyber Security

ThreadScan Infra & Web from ThreadStone Cyber Security

Automated security scan specially developed for SME’s

Tanker

Tanker

Desktop application that provides effortless encryption for private data in public clouds

Symantec a Broadcom Company

Symantec Broadcom CloudSOC - CASB (Cloud Access Security Broker)

Confidently use cloud applications and services while staying safe, secure and compliant

Sweepatic

Sweepatic

Data exploration and reconnaissance tool that collects, quantifies and visualizes the clients’ exposure to cyber- attacks caused by publically available …

Stormshield an Airbus Company

Stormshield SNi40

Security solution dedicated to operating systems with strict industrial constraints

Splunk

Splunk Enterprise Security

Analytics-Driven SIEM that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and …

Sophos

Sophos SafeGuard Enterprise

Proactive Data Protection with Synchronized Encryption

Sophos

Sophos Intercept X

Next-generation endpoint detection and response platform for anti-exploit protection

Sentryo a Cisco Company

Sentryo ICS CyberVision

Delivers an operational security capacity to prevent, detect and respond to cyber attacks targeting the Industrial Internet

Sedicii

Sedicii Protecting Identities

Authenticating users without the need to transmit or share private information

SecurityMatters, A Forescout Company

SilentDefense from SecurityMatters Forescout

OT network monitoring and intelligence platform that provides instant visibility and detection of all cyber threats to industrial environments

SecurIT

TrustBuilder Identity hub from SecurIT

Powerful Identity Hub, providing brokerage between modern cloud and legacy architectures

SafeNet / Gemalto a Thales Company

SafeNet Authentication Service from Gemalto

Authentication as a Service that applies multi-factor authentication to secure access to any application, from any device, anywhere

RSA Security

RSA FraudAction

External threat management service that provides proactive detection and mitigation of online threats such as phishing, Trojans and mobile rogue …

Rosberg System

Verji SMS from Rosberg System

Encrypts and protects mobile communication against the most sophisticated attacks

Radware

Radware Cloud WAF Service

Fully managed Cloud Web Application Firewall Service Offering with complete web security coverage including OWASP Top-10, advanced attacks and zero-day …

Qualys

Qualys Cloud Platform

Cloud platform with integrated security & compliance solutions that provide clients a global view of their security and compliance

Outpost24

Secure Web Application Tactics (SWAT) from Outpost24

Vulnerability management solution for web applications, that combines advanced web application scanning tools with security expert support

Lumeta Corporation

Lumeta® Enterprise Situational Intelligence (ESI)

Real-time, context-driven security intelligence to provide Cyber Situational Awareness in Real-Time

Liopa

LipVerify from Liopa

Biometric Authenticator that validate a user’s identity by analysing the appearance and movement of their lips as they speak into …

iWelcome

iWelcome Identity & Access Management as a Service

iWelcome provides a service: Identity as you go. Identity and access management for your applications. Quick and easy

InWebo

inWebo Multi Factor Authentication for IoT

Seamless Multi-Factor Authentication For The Internet of Things

InWebo

inWebo Multi Factor Authentication for Enterprises

SaaS solution for user-centric authentication

Intrinsic-ID

CITADEL from Intrinsic-ID

The world’s first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, …

G DATA

G DATA Endpoint Protection Business

Complete Client Protection through active hybrid protection using CloseGap technology, and fast response times to current threats

FOX-IT, part of NCC Group

DetACT from FOX-IT

Real-time web & mobile event analytics and mitigation

Enigmedia

Enigmedia Secure Communications

Solution for encrypted audio calls, video calls, instant messaging and secure file sharing

Redsocks [ now Bitdefender ]

BitDefender Network Traffic Security Analytics [ previously RedSocksMTD ]

Real-time analysis of advanced malware threat detection leveraging threat intelligence to create advanced malware defenses for companies of all sizes …

Opacity

Opacity

Cryptographic permissioned block-chain technology that allows a company to differentiate itself by enabling their end-users to get insights in how …

Mimecast

Mimecast Secure Email Gateway

protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks using targeted threat protection

Ciptor

Yubikey from Yubico

Small USB and NFC device supporting multiple authentication and cryptographic protocols, that protects access to computers, networks, and online services …

Business Forensics

BusinessForensics HQ Platform

Intelligence platform that provides (big) data analysis in real-time of network transactions, forensic analysis, fraud management and machine learning.

Symantec a Broadcom Company

Blue Coat Security Platform from Symantec a Broadcom Company

Integrated security platform that addresses network + security + cloud requirements

Balabit, now One Identity

Blindspotter from Balabit, now One Identity

Monitoring tool that uses real-time user behavior analytics for the identification of internal & external attackers

Excellium Services

CERT-XLM from Excellium Services

The Excellium CSIRT that helps organisations to respond efficiently to IT incidents

Excellium Services

EyeGuard from Excellium Services

Monitors critical assets in real time and offers security analyst support against a fixed price

Elimity

Elimity

Agile Access Management Platform

EclecticIQ

EclecticIQ Platform

EclecticIQ Platform is a Threat Intelligence Platform (TIP) that empowers threat analysts to perform faster, better, and deeper investigations while …

IBM Security Services

IBM Security QRadar SIEM

Security intelligence and Sense Analytics for protecting assets and information from advanced threats

IBM Security Services

IBM Security QRadar Incident Forensics

Quickly and easily conduct in-depth security forensics investigations

IBM Security Services

IBM QRadar User Behavior Analytics

Provides visibility to user behavioral anomalies and insider threats

IBM Security Services

IBM QRadar Advisor with Watson

Unlocks the power of cognitive security to uncover new insights and rapidly respond to threats

IBM Security Services

IBM Security Guardium® Vulnerability Assessment

Scans data infrastructures (databases, datawarehouses and bigdata environment) to detect vulnerabilities and suggest remedial actions

IBM Security Services

IBM Security Guardium® Data Protection for Databases

Uses cognitive analytics to discover unusual activity around sensitive data, prevents unauthorized data access, provides alerts on suspicious activities, automates …

IBM Security Services

IBM Security Guardium® Data Privacy for Hadoop

Monitors and masks confidential information within Hadoop to protect privacy

IBM Security Services

IBM Security Guardium® Activity Monitor for Files

Continuously monitor unstructured data access and protect sensitive data across the enterprise

IBM Security Services

IBM Security Guardium Data Encryption for DB2 and IMS Databases

Sensitive and private data protection for DB2 and IMS systems

IBM Security Services

IBM Cloud Security Enforcer

Discover, manage, and secure employee use of cloud applications

IBM Security Services

IBM® Security AppScan® Enterprise

Mitigates application security risk, strengthens application security program management and compliance for the enterprise

IBM Security Services

IBM Application Security on Cloud

Comprehensive and convenient Application Security Testing in the Cloud

IBM Security Services

IBM® MobileFirst® Platform Application Scanning

Identify and fix vulnerabilities in mobile applications

IBM Security Services

Cigital Application Security Testing Managed Services

On-demand application testing and remediation services

IBM Security Services

IBM® Trusteer Pinpoint™ Criminal Detection

Evidence-based detection of criminals and account takeover attempts

IBM Security Services

IBM Security Trusteer Rapport® for Mitigation

Detects malware-infected devices, determines the nature of the threat and potential risk, sends alerts to fraud teams to prevent potential …

IBM Security Services

IBM® Security Trusteer Pinpoint Malware Detection™

Detects malware-infected devices and determines both the nature of the threat and the potential risk. Organizations receive alerts when malware-infected …

IBM Security Services

IBM Trusteer Pinpoint Detect

Protects online banking sites against account takeover and fraudulent transactions; and detects end user devices infected with malware

IBM Security Services

IBM® Trusteer Rapport

Advanced end-point protection solution that uses machine learning and advanced analytics to deliver real-time cognitive phishing detection, remove malware from …

Guardsquare

IxGuard from Guardsquare

Protector and optimizer for iOS, making apps faster, more compact, and more difficult to crack

Guardsquare

DexGuard from Guardsquare

Protector and optimizer for Android, making apps faster, more compact, and more difficult to crack

ForgeRock

ForgeRock Identity Platform

Enterprise Identity Platform that secures digital identities for people, devices, and connected things

Digital Guardian

Digital Guardian

Data-centric security platform designed to stop data theft, that combines data awareness and transformative endpoint visibility with behavioral threat detection …

Digitronic

HiCrypt™ from Digitronic

An encoding solution for everyone; a digital vault with an exclusive key ownership guarantee

Cyberwatch

Cyberwatch

A vulnerability management solution from detection to remediation

Cyberlytic - out of business

Cyber Threat Defender from Cyberlytic

An intelligent, self-learning web application firewall that does not require human intervention or rule management

Cyberlytic - out of business

Cyber Threat Profiler from Cyberlytic

Real-time risk assessment of web-based cyber-attacks

Covertix acquired by Micro Focus

Covertix SmartCipher from Micro Focus

All files secured, anywhere

CSI tools

CSI Data Xtractor from CSI Tools

Exports tables from any SAP system to take data offline and examine them as an independent data viewing tool

CSI tools

CSI Automated Request Engine from CSI Tools

Middleware application that processes user access requests based on XML input and generates XML output with SOD results

CSI tools

CSI Role Build & Manage (CSI RBM) from CSI Tools

Application that supports the SAP authorization processes with fully automated SAP role building

CSI tools

CSI Authorization Auditor (CSI AA) from CSI Tools to (automate) audit and monitoring of SAP security

Automated Audit & monitoring application of authorization and role setup in SAP environments

Continuum Security

IriusRisk from Continuum Security

A single integrated console to manage application security risk throughout the software development process

Compumatica

CompuPIM from Compumatica

Secure mobile application that protects BYOD by providing a complete separation of private and business data by using a secure …

Compumatica

CompuMobile from Compumatica

Mobile security solution that prevents interception and allows secure calling, secure SMS and secure messaging

Compumatica

CompuMail Gateway from Compumatica

Email security solution that encrypts and signs all the e-mail traffic in an organization

Compumatica

CompuWall from Compumatica

Network security solution that offers a Next Generation Firewall and secure VPN Connection in one

Compumatica

CompuDiode from Compumatica

SCADA / ICS Security solution that protects PCS systems against attacks from the outside

Compumatica

Cryptoguard VPN from Compumatica

Network encryption solution that controls all the IP traffic between different locations, securing the connection

Coblue Cybersecurity BV

Cointel from Coblue Cybersecurity

Analysis and forensics software that provides insight into Bitcoin transactions, flows and the identities behind them

Coblue Cybersecurity BV

Coable from Coblue Cybersecurity

Helps organizations to gain insight in their cyber security controls and policies and benchmark them against international standards and best …

Coblue Cybersecurity BV

Storro from Coblue Cybersecurity

Peer-to-peer, Blockchain application that lets you safely store and share files, without the cloud

Crypho

Crypho

Enterprise file-sharing and chat with end-to-end encryption.

DocRAID

Safemail from DocRAID

Email protection made easy. No software installation. No hassles. All email clients. All devices.

DocRAID

DocRAID

Pioneer in CloudRAID technology, 100% zero-knowledge backup and file sync, secure file exchange, and easy to use email encryption