Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Axiom Protect
$6.00 – $9.60 for 1 yearAxiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users.Axiom Protect
Category: Data Masking Data Security Database Security Fraud Prevention Identity and Access Management Mobile Data Protection |Axiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users. -
baiMobile Smartcard Reader Framework for Android and iOS
$10.00$9.00baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile applicationbaiMobile Smartcard Reader Framework for Android and iOS
baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile application -
Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss.Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss. -
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
-
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
-
Data Breach Assessment Testing by VP Techno Labs
$800.00$650.00Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage!Data Breach Assessment Testing by VP Techno Labs
Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage! -
DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
-
Galaxkey – Enterprise Cloud Plus
Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access. Key Features:- Email Encryption
- Electronic Document Signing
- Secure File Transfer
- Secure Workspace
Galaxkey – Enterprise Cloud Plus
Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access. Key Features:- Email Encryption
- Electronic Document Signing
- Secure File Transfer
- Secure Workspace
-
Information Archive
Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware.Information Archive
Category: Cloud Security Compliance Management Cyber Security Services Data Breach Protection Data Discovery Data Security |Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware. -
Passwordless4u
$60.00 – $450.00 for 1 monthPasswordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risksPasswordless4u
Category: Application Control Cyber Security Services Data Security Email Security Password Manager |Passwordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risks -
PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest.PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest. -
PK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protectionPK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protection -
PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure.PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure. -
PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy.PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy. -
PK Privacy
Business are required to keep up with an ever-changing privacy landscape, protecting the personally identifiable information they interact with. Meeting these requirements starts with understanding the organization's data as a whole, including indexing and correlating records based on specific criteria. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation.PK Privacy
Business are required to keep up with an ever-changing privacy landscape, protecting the personally identifiable information they interact with. Meeting these requirements starts with understanding the organization's data as a whole, including indexing and correlating records based on specific criteria. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. -
Safetica ONE Discovery+ UEBA
$22.00 – $30.00 for 1 yearIdentify how company data is used and where it is stored and sent, no matter where it resides or flows.- Windows and macOS support
- One-click integration with Microsoft 365
- File content inspection and classification
- Easy to upgrade to the full-featured data security platform
- Runs on bare metal or virtualized on-prem hosted, VM hosted in cloud
Safetica ONE Discovery+ UEBA
Identify how company data is used and where it is stored and sent, no matter where it resides or flows.- Windows and macOS support
- One-click integration with Microsoft 365
- File content inspection and classification
- Easy to upgrade to the full-featured data security platform
- Runs on bare metal or virtualized on-prem hosted, VM hosted in cloud