Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
Horangi Warden Cloud Security tool
$10,000.00$6,000.00Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise.Horangi Warden Cloud Security tool
Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise. -
Information Archive
$0.00Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware.Information Archive
Category: Cloud Security Compliance Management Cyber Security Services Data Breach Protection Data Discovery Data Security |Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware. -
Information Security Risk Assessment
$100.00Performing a comprehensive Risk Assessment on the identified critical IT assets would enable the selection of appropriate risk mitigation controls. Intect’s Risk assessment methodology is a multi-fold activity comprising assigning values to the identified critical information assets, threat assessment, & gap analysisInformation Security Risk Assessment
Performing a comprehensive Risk Assessment on the identified critical IT assets would enable the selection of appropriate risk mitigation controls. Intect’s Risk assessment methodology is a multi-fold activity comprising assigning values to the identified critical information assets, threat assessment, & gap analysis -
ISMAC SOAR
$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up feeFor large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.ISMAC SOAR
Category: Cloud Security Compliance Management Container Security Log Management Malware Detection and Analysis Security Incident Management and Response SOAR Threat Intelligence and Signature Feeds Vulnerability Assessment | SKU: 003For large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.$25.99Was $29.99Save $4$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up fee -
ISMS
$8,000.00To define the polices for implementing ISMS or ISO27001, Do the GAP analysis as per the ISMS Policies and reassessment of the Security policies as ISMS Standards and Controls.ISMS
To define the polices for implementing ISMS or ISO27001, Do the GAP analysis as per the ISMS Policies and reassessment of the Security policies as ISMS Standards and Controls. -
Network Penetration Testing
$120.00A technical security assessment that goes beyond the standard port scanning and enumerating vulnerabilities to identify the security risks and their business impact on your network: be it external, internal, or wireless.Network Penetration Testing
A technical security assessment that goes beyond the standard port scanning and enumerating vulnerabilities to identify the security risks and their business impact on your network: be it external, internal, or wireless. -
oak9 Cloud Infrastructure Security SaaS Platform
$2,000.00oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks.oak9 Cloud Infrastructure Security SaaS Platform
Category: Cloud Security Compliance Management Digital Risk Monitoring Risk Assessment Vulnerability Assessment |oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks. -
Red Team Assessments
$100.00Red Team engagements can demonstrate the risk posed by an APT (Advanced Persistent Threat). These types of comprehensive, complex security assessments are best used by companies looking to improve the security maturity of the organization.Red Team Assessments
Red Team engagements can demonstrate the risk posed by an APT (Advanced Persistent Threat). These types of comprehensive, complex security assessments are best used by companies looking to improve the security maturity of the organization. -
SecPoint Penetrator – VAPT
$250.00 – $12,750.00 / yearSecPoint Highlights- Discover your weak points before it is too late.
- Ultimate Vulnerability Scanning
- Distributed Scanning Capability. Master / Client mode.
- Hardware 1U Rack or Virtual ESXi,Hyper-V,Linux Images
- Build in Ticket System
- Multiple Reporting: Consultant, Tech, Executive
- Multiple Report Formats: PDF, HTML & XML
- Not fixed on IP adresses, scan unlimited IPs, buy license for simultanous scan
- Best VAPT – Vulnerability Assessment & Penetration Testing.
- Multiple Vulnerability Scanning profiles to choose from.
- Easily Schedule vulnerability scans. Get reports on email.
- Master / Node distribution support. Control multiple units centrally.
- Multi user support in the interface. Have different users with different policy, different access rights – centralised master.
- Ticket system to easily manage vulnerabilities with multi user support.
- Create groups, locations, severity of devices – define profile – schedule
- WiFi Penetration Testing capability for WEP, WPA, WPA2, WPS, DoS.
- High speed password recovery cracking engine.
- Find vulnerable Memcached servers open to attack.
- Vulnerability Scanning, 65000+ Signatures.
- Launch Dos (Denial of Service) and DDoS Attacks.
- Brute Forcing, launch real Exploits.
- WAS, Web Application Vulnerability Scanning.
- Google Hack Database, Google Safe Browsing Checks.
- Blackhat SEO Scanning, 50 Other Black List checks.
- Prevent Hackers from entering your network and stealing sensitive information.
- Prevent ransomware, prevent malware
- Best Vulnerability Scanning Software.
- Multiple format report for management, consulting and for tech.
- Multiple languages supported in reports.
- Customize reports with company name, watermark and logos.
- Highly Cost effective – Unlimited devices – Unlimited Scans – Unlimited Reports
- Concurrent scans cost policy. Allowed to change IP addresses.
- CVE, Bugtraq, OVSDB, HIPAA compliance.
- SSL VAPT scanning, SCADA VAPT systems scanning, IoT VAPT scanning, Website, Webapps VAPT scanning, Servers, Workstations VAPT, Firewall, switches and other network device VAPT solution
SecPoint Penetrator – VAPT
Category: Attack Simulation Data Breach Protection Penetration Testing Risk Assessment Vulnerability Assessment | SKU: secpointSecPoint Highlights- Discover your weak points before it is too late.
- Ultimate Vulnerability Scanning
- Distributed Scanning Capability. Master / Client mode.
- Hardware 1U Rack or Virtual ESXi,Hyper-V,Linux Images
- Build in Ticket System
- Multiple Reporting: Consultant, Tech, Executive
- Multiple Report Formats: PDF, HTML & XML
- Not fixed on IP adresses, scan unlimited IPs, buy license for simultanous scan
- Best VAPT – Vulnerability Assessment & Penetration Testing.
- Multiple Vulnerability Scanning profiles to choose from.
- Easily Schedule vulnerability scans. Get reports on email.
- Master / Node distribution support. Control multiple units centrally.
- Multi user support in the interface. Have different users with different policy, different access rights – centralised master.
- Ticket system to easily manage vulnerabilities with multi user support.
- Create groups, locations, severity of devices – define profile – schedule
- WiFi Penetration Testing capability for WEP, WPA, WPA2, WPS, DoS.
- High speed password recovery cracking engine.
- Find vulnerable Memcached servers open to attack.
- Vulnerability Scanning, 65000+ Signatures.
- Launch Dos (Denial of Service) and DDoS Attacks.
- Brute Forcing, launch real Exploits.
- WAS, Web Application Vulnerability Scanning.
- Google Hack Database, Google Safe Browsing Checks.
- Blackhat SEO Scanning, 50 Other Black List checks.
- Prevent Hackers from entering your network and stealing sensitive information.
- Prevent ransomware, prevent malware
- Best Vulnerability Scanning Software.
- Multiple format report for management, consulting and for tech.
- Multiple languages supported in reports.
- Customize reports with company name, watermark and logos.
- Highly Cost effective – Unlimited devices – Unlimited Scans – Unlimited Reports
- Concurrent scans cost policy. Allowed to change IP addresses.
- CVE, Bugtraq, OVSDB, HIPAA compliance.
- SSL VAPT scanning, SCADA VAPT systems scanning, IoT VAPT scanning, Website, Webapps VAPT scanning, Servers, Workstations VAPT, Firewall, switches and other network device VAPT solution
-
Security Compliance Management
$0.00ARCON | Security Compliance Management (SCM) is a highly effective enterprise-grade solution to identify, assess and mitigate system vulnerabilities. ARCON|SCM automates the entire risk assessment process, manages execution and generates detailed review documentation of IT risk factors. The vulnerability assessment solution enhances IT controls and visibility by setting-up baseline security configurations and policies for disparate technology platforms. Enterprise IT risk management teams find ARCON| SCM as a robust technology to adhere to various IT security standards for compliance purposes as well.Security Compliance Management
ARCON | Security Compliance Management (SCM) is a highly effective enterprise-grade solution to identify, assess and mitigate system vulnerabilities. ARCON|SCM automates the entire risk assessment process, manages execution and generates detailed review documentation of IT risk factors. The vulnerability assessment solution enhances IT controls and visibility by setting-up baseline security configurations and policies for disparate technology platforms. Enterprise IT risk management teams find ARCON| SCM as a robust technology to adhere to various IT security standards for compliance purposes as well. -
Software Compliance Audit & Management
$3,000.00Our passion is to give our customers the absolutely correct view of all their software Products Deployments. Microsoft, Autodesk, Adobe, Oracle .....products from 136 global software publishers are tracked by our application. . We will install Euladox Auditor on premise & train you on conducting discovery across the network. Conduct Discovery across your network domains & on systems not connected to the network. We will analyze data, run the software recognition engine and map the discovered programs to deployed licenses. We provide a deployment & compliance report for all products installed across your enterprise.Software Compliance Audit & Management
Our passion is to give our customers the absolutely correct view of all their software Products Deployments. Microsoft, Autodesk, Adobe, Oracle .....products from 136 global software publishers are tracked by our application. . We will install Euladox Auditor on premise & train you on conducting discovery across the network. Conduct Discovery across your network domains & on systems not connected to the network. We will analyze data, run the software recognition engine and map the discovered programs to deployed licenses. We provide a deployment & compliance report for all products installed across your enterprise. -
Suite – Enterprise Tier
$1,999.00 / month with a 7-day free trialYou can now automate your red team task. Choose and schedule recurring attack simulations such as Phishing, External/Internal scans, domain scans, Vulnerability Assessments, and more! This includes PDF reports based on your findings with premium support and consultation. Own Your Pentesting: With the Enterprise Suite, CTOs and IT Security Professionals can finally move beyond manual pentesting and get intelligent, automated results. Twice as fast as a pentest and 5x cheaper. You can easily manage, schedule, and review pentests from a single dashboard.Suite – Enterprise Tier
You can now automate your red team task. Choose and schedule recurring attack simulations such as Phishing, External/Internal scans, domain scans, Vulnerability Assessments, and more! This includes PDF reports based on your findings with premium support and consultation. Own Your Pentesting: With the Enterprise Suite, CTOs and IT Security Professionals can finally move beyond manual pentesting and get intelligent, automated results. Twice as fast as a pentest and 5x cheaper. You can easily manage, schedule, and review pentests from a single dashboard. -
Suite – Premium Tier
$100.00 / monthThis includes 100 Credits delivered monthly to your account! You can schedule what you want, when you need it, at the price you want it. You can now Schedule recurring simulations tests such as Phishing, external scans, domain scans, and more! This includes PDF reports based on your findings with premium support and consultation. Modules cost credits, Modules Included: ● Web Applications: HTTP(S), Source Code, Containerization, ● APIs: SOAP, REST, GraphQL ● Networks: Layers 1-7, Active Directory, LDAP, IPv6, Wireless ● OSINT: Leaked Users, Files ● Amazon Web Services ● Google Cloud Platform ● Microsoft Azure ● Kubernetes: App to Pod, Pod to Worker, Worker to Master, and so on ● Mobile & IoT Applications ● Social Engineering: Phishing, SMSSuite – Premium Tier
This includes 100 Credits delivered monthly to your account! You can schedule what you want, when you need it, at the price you want it. You can now Schedule recurring simulations tests such as Phishing, external scans, domain scans, and more! This includes PDF reports based on your findings with premium support and consultation. Modules cost credits, Modules Included: ● Web Applications: HTTP(S), Source Code, Containerization, ● APIs: SOAP, REST, GraphQL ● Networks: Layers 1-7, Active Directory, LDAP, IPv6, Wireless ● OSINT: Leaked Users, Files ● Amazon Web Services ● Google Cloud Platform ● Microsoft Azure ● Kubernetes: App to Pod, Pod to Worker, Worker to Master, and so on ● Mobile & IoT Applications ● Social Engineering: Phishing, SMS -
User Behaviour Analytics
$0.00End users, not the machines, pose the biggest security challenge in the fast-changing IT infrastructure landscape. While compromise of privileged credentials remains one of the most feared IT threats of an enterprise IT security team, more and more IT incidents are stemming from anomalous end user behavioral profiles. Threat Detection and real-time analytics is a need of the hour.
ARCON | User Behaviour Analytics solution offer enterprise IT security teams with necessary tools to crunch a large lake of enterprise data, spot anomalous and risky behavior profiles along with a capability to trigger alerts in real-time.User Behaviour Analytics
End users, not the machines, pose the biggest security challenge in the fast-changing IT infrastructure landscape. While compromise of privileged credentials remains one of the most feared IT threats of an enterprise IT security team, more and more IT incidents are stemming from anomalous end user behavioral profiles. Threat Detection and real-time analytics is a need of the hour.
ARCON | User Behaviour Analytics solution offer enterprise IT security teams with necessary tools to crunch a large lake of enterprise data, spot anomalous and risky behavior profiles along with a capability to trigger alerts in real-time. -
VAPT
$29.00Vulnerability scanning, also commonly known as ‘vuln scan,’ is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service providerVAPT
Vulnerability scanning, also commonly known as ‘vuln scan,’ is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service provider