Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Axiom Protect
$6.00 – $9.60 for 1 yearAxiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users.Axiom Protect
Category: Data Masking Data Security Database Security Fraud Prevention Identity and Access Management Mobile Data Protection |Axiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users. -
baiMobile Smartcard Reader Framework for Android and iOS
$10.00$9.00baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile applicationbaiMobile Smartcard Reader Framework for Android and iOS
baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile application -
BDB Data Platform
BDB is a powerful Low Code, Hyper Automation, and Data Analytics platform designed to accelerate Data Ops and AI Ops for enterprises embarking on their journey towards digitization and data monetization. With BDB, businesses can experience a remarkable boost in efficiency, achieving speeds 3x to 5x faster compared to the competition. As a comprehensive Decision Platform, BDB offers a robust Big Data Pipeline capable of handling various types of data, including streaming, structured, and unstructured data. Its microservices architecture provides a modern and scalable foundation that seamlessly integrates with popular business applications or offers customizable Analytics flows.BDB Data Platform
BDB is a powerful Low Code, Hyper Automation, and Data Analytics platform designed to accelerate Data Ops and AI Ops for enterprises embarking on their journey towards digitization and data monetization. With BDB, businesses can experience a remarkable boost in efficiency, achieving speeds 3x to 5x faster compared to the competition. As a comprehensive Decision Platform, BDB offers a robust Big Data Pipeline capable of handling various types of data, including streaming, structured, and unstructured data. Its microservices architecture provides a modern and scalable foundation that seamlessly integrates with popular business applications or offers customizable Analytics flows. -
Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss.Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss. -
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
-
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
-
Data Breach Assessment Testing by VP Techno Labs
$800.00$650.00Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage!Data Breach Assessment Testing by VP Techno Labs
Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage! -
DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
-
Galaxkey – Enterprise Cloud Plus
Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access. Key Features:- Email Encryption
- Electronic Document Signing
- Secure File Transfer
- Secure Workspace
Galaxkey – Enterprise Cloud Plus
Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access. Key Features:- Email Encryption
- Electronic Document Signing
- Secure File Transfer
- Secure Workspace
-
Information Archive
Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware.Information Archive
Category: Cloud Security Compliance Management Cyber Security Services Data Breach Protection Data Discovery Data Security |Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware. -
Mirobase DLP with Employee Monitoring
Lets not just call Mirobase an Employee Monitoring solution, its much more than that. Mirobase can improve productivity, increase revenue, improve profits and safeguard data. Mirobase can be used for- Insider Threat Management
- Employee Monitoring
- User Behavior Analysis - Finding Disloyal Employees, Getting to know in advance who wants to leave job
- Data Leak Prevention
- User management
- Endpoint management
- Most importantly Safeguard Confidential & Crucial Data
Mirobase DLP with Employee Monitoring
Lets not just call Mirobase an Employee Monitoring solution, its much more than that. Mirobase can improve productivity, increase revenue, improve profits and safeguard data. Mirobase can be used for- Insider Threat Management
- Employee Monitoring
- User Behavior Analysis - Finding Disloyal Employees, Getting to know in advance who wants to leave job
- Data Leak Prevention
- User management
- Endpoint management
- Most importantly Safeguard Confidential & Crucial Data
-
Passwordless4u
$60.00 – $450.00 for 1 monthPasswordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risksPasswordless4u
Category: Application Control Cyber Security Services Data Security Email Security Password Manager |Passwordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risks -
PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest.PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest. -
PK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protectionPK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protection -
PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure.PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure. -
PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy.PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy.