Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Advanced Email Threat Protection
Email Threat Protection provides multi-layered filtering that permits legitimate email while blocking malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages—all automatically.
Rated 2.23 out of 5Advanced Email Threat Protection
Email Threat Protection provides multi-layered filtering that permits legitimate email while blocking malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages—all automatically.
-
Calico Cloud
$36.50Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes.Rated 2.92 out of 5Calico Cloud
Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes. -
Cloud Penetration Testing
Protect your Cloud Environment with our best security solutions. As the demands of business innovation outstrip the capabilities of on-premises infrastructure, companies are turning to cloud solutions. Migrating to the cloud, on the other hand, brings with it new cybersecurity challenges. As you migrate to hybrid cloud systems, you must maintain visibility, control, and security. To keep ahead of new threats, you require effective cloud configuration at each important stage of your cloud transformation journey.Rated 2.80 out of 5Cloud Penetration Testing
Protect your Cloud Environment with our best security solutions. As the demands of business innovation outstrip the capabilities of on-premises infrastructure, companies are turning to cloud solutions. Migrating to the cloud, on the other hand, brings with it new cybersecurity challenges. As you migrate to hybrid cloud systems, you must maintain visibility, control, and security. To keep ahead of new threats, you require effective cloud configuration at each important stage of your cloud transformation journey. -
Cloud Security Assessments
$150.00A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on.Rated 3.08 out of 5Cloud Security Assessments
A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on. -
Cloud Security Services by Intelidata
CDL Cloud Security Services help clients secure their cloud migration and transformation journey to build a cyber- resilient and IT compliant cloud ecosystem. Our offerings include:- Cloud security strategy and architecture
- Cloud security assessment services
- Cloud managed security services
- Cloud security governance
- Cloud security solutions in implementation and support
Rated 2.69 out of 5Cloud Security Services by Intelidata
CDL Cloud Security Services help clients secure their cloud migration and transformation journey to build a cyber- resilient and IT compliant cloud ecosystem. Our offerings include:- Cloud security strategy and architecture
- Cloud security assessment services
- Cloud managed security services
- Cloud security governance
- Cloud security solutions in implementation and support
-
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
Rated 2.62 out of 5Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
-
CyberQ Shield
CyberQ Shield is a Cloud Security & Compliance management solution that helps organizations using public cloud to automatically detect & respond to cloud security risks by following security best practices and comply with global security standards & benchmarks. CyberQ Shield is the leading 100% agentless security solution which can detect in “real time” both cloud IOC’s (Indicator of misconfiguration) and system vulnerabilities, it provides contextual security risk based on cloud environment, resources, data using unique labeling technique. Automated remediation using PLOP (Principle of least privilege) is one of the most advanced security capability within the platform.Rated 2.08 out of 5CyberQ Shield
CyberQ Shield is a Cloud Security & Compliance management solution that helps organizations using public cloud to automatically detect & respond to cloud security risks by following security best practices and comply with global security standards & benchmarks. CyberQ Shield is the leading 100% agentless security solution which can detect in “real time” both cloud IOC’s (Indicator of misconfiguration) and system vulnerabilities, it provides contextual security risk based on cloud environment, resources, data using unique labeling technique. Automated remediation using PLOP (Principle of least privilege) is one of the most advanced security capability within the platform. -
Horangi Warden Cloud Security Tool
$10,000.00$6,000.00Transform your cloud security in minutes!
Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise. Warden is the only human-centric, agentless security platform that sets up in minutes and delivers only relevant security alerts at the right time, giving organizations the freedom to innovate in the cloud.Rated 2.92 out of 5Horangi Warden Cloud Security Tool
Transform your cloud security in minutes!
Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise. Warden is the only human-centric, agentless security platform that sets up in minutes and delivers only relevant security alerts at the right time, giving organizations the freedom to innovate in the cloud.$6 000.00Was $10 000.00Save $4000 -
Information Archive
Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware.Rated 2.92 out of 5Information Archive
Category: Cloud Security Compliance Management Cyber Security Services Data Breach Protection Data Discovery Data Security |Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware. -
ISMAC SOAR
$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up feeFor large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.Rated 2.54 out of 5ISMAC SOAR
Category: Cloud Security Compliance Management Container Security Log Management Malware Detection and Analysis Security Incident Management and Response SOAR Threat Intelligence and Signature Feeds VAPT | SKU: 003For large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.$25.99Was $29.99Save $4Rated 2.54 out of 5$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up fee2.5| 13 reviews -
oak9 Cloud Infrastructure Security SaaS Platform
$2,000.00oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks.Rated 2.09 out of 5oak9 Cloud Infrastructure Security SaaS Platform
oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks. -
PingSafe CNAPP Platform
Protect your cloud with our complete CNAPP
Proactively secure your cloud with unparalleled protection, from development to deployment.How Does PingSafe Work?
PingSafe quickly scans your entire cloud infrastructure from an attacker's point of view. We then identify, prioritize and auto-remediate issues, to secure your business.PingSafe CNAPP Platform
Protect your cloud with our complete CNAPP
Proactively secure your cloud with unparalleled protection, from development to deployment.How Does PingSafe Work?
PingSafe quickly scans your entire cloud infrastructure from an attacker's point of view. We then identify, prioritize and auto-remediate issues, to secure your business. -
Plurilock AI Cloud DLP
Plurilock AI Cloud DLP secures your users, software, and data seamlessly.- Single sign-on.
- Access control.
- Cloud least privilege.
- Data loss prevention.
- Workday control.
- Identity sanity.
Plurilock AI Cloud DLP
Plurilock AI Cloud DLP secures your users, software, and data seamlessly.- Single sign-on.
- Access control.
- Cloud least privilege.
- Data loss prevention.
- Workday control.
- Identity sanity.
-
SCRUTINY SENSOR
Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available.Rated 2.77 out of 5SCRUTINY SENSOR
Category: Cloud Security Data Security Email Security Endpoint Security Industrial Security Internet of Things Security Malware Detection and Analysis |Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available. -
SecurDPS Connect
SecurDPS Connect allows users to develop customized templates which train the solution to detect and replace sensitive data with encrypted or tokenized data before that information is stored in the application or cloud service. These templates provide the mechanism to define what types of information are sensitive and guide the type of protection for each data field.Rated 2.25 out of 5SecurDPS Connect
SecurDPS Connect allows users to develop customized templates which train the solution to detect and replace sensitive data with encrypted or tokenized data before that information is stored in the application or cloud service. These templates provide the mechanism to define what types of information are sensitive and guide the type of protection for each data field. -
Security Service Edge by Netskope
Netskope Intelligent Security Service Edge is fast, easy to use, and secures your transactions wherever your people and data go. Netskope SSE converges security capabilities into a single cloud platform. Netskope helps you reduce risk, accelerate performance, and provide unrivaled visibility into any cloud, web, and private application activity. To empower safe collaboration, we balance trust against risk with granular controls that adapt to changes in your environment. Netskope SSE protects against advanced and cloud-enabled threats and safeguards data across all vectors (any cloud, any app, any user). A single-pass architecture delivers a fast user experience and simplified operations.Rated 2.83 out of 5Security Service Edge by Netskope
Netskope Intelligent Security Service Edge is fast, easy to use, and secures your transactions wherever your people and data go. Netskope SSE converges security capabilities into a single cloud platform. Netskope helps you reduce risk, accelerate performance, and provide unrivaled visibility into any cloud, web, and private application activity. To empower safe collaboration, we balance trust against risk with granular controls that adapt to changes in your environment. Netskope SSE protects against advanced and cloud-enabled threats and safeguards data across all vectors (any cloud, any app, any user). A single-pass architecture delivers a fast user experience and simplified operations.