Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
Block Armour Secure Shield
$9,500.00 for 1 yearBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware.Block Armour Secure Shield
Category: Cloud Security Data-in-Motion Encryption and VPN Network Access Control Transport Access Control User Authentication Zero trust | SKU: BA-SS-ULBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware. -
Desksight.ai
$30.00$29.00 for 1 year with a 2-week free trialIt is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.Desksight.ai
It is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.$29.00Was $30.00Save $1$30.00$29.00 for 1 year with a 2-week free trial -
Emsisoft Anti Malware
$9.35 – $265.00 / yearHighlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
Emsisoft Anti Malware
Category: Endpoint Protection and Anti-virus Endpoint Security Endpoint Threat Detection and Response Intrusion Prevention Systems / Intrusion Detection System Malware Detection and Analysis | SKU: EMSHighlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
-
Impero Connect
$12.00 – $35.00 / yearImpero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
Impero Connect
Impero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
-
IoT Armour
$0.00With IoT Armour an organization can now move confidently into the journey of adopting IoT Sensors and Devices as part of their business processes. The solution utilizes a unique blockchain based digital identity for secure IOT device authentication and a policy based authorization to ensure only genuine devices and traffic is allowed to communicate with the IT based management systems. While reducing the attack surface available for attack by malware and ransomware.IoT Armour
With IoT Armour an organization can now move confidently into the journey of adopting IoT Sensors and Devices as part of their business processes. The solution utilizes a unique blockchain based digital identity for secure IOT device authentication and a policy based authorization to ensure only genuine devices and traffic is allowed to communicate with the IT based management systems. While reducing the attack surface available for attack by malware and ransomware. -
Network Configuration & Firewall Rules Review
$100.00Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.Network Configuration & Firewall Rules Review
Category: Network Access Control Network Behavior Analysis and Anomaly Detection Network Firewall (includes Next Generation Firewalls) Network Monitoring and Forensics |Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy. -
Reblaze WAAP
$0.00About Reblaze: Reblaze provides a complete, cloud-based, comprehensive and proactive protection shield for web platforms (websites/web applications/API), together with a command and control system. We offer an all-in-one private virtual cloud-based solution (VPC) that includes IPS/WAF, DoS/DDoS protection, BOT detection and exclusion, anti-scraping, CDN and more. As a result of our unique approach, we monitor and cleanse the traffic before it reaches our customers' websites, and we can easily work with existing security solutions. The service requires a five-minute setup, zero installation, a single DNS change and can be deployed even under an attack. Service can be stopped at any stage and with a Try and Buy period of 30 days. We're fully integrated with AWS, GCP, and Azure, being able to build our platform in the clients' environment, ensuring privacy, enhancing the cloud's latency and efficiency, and also, reducing costs of traffic.Reblaze WAAP
About Reblaze: Reblaze provides a complete, cloud-based, comprehensive and proactive protection shield for web platforms (websites/web applications/API), together with a command and control system. We offer an all-in-one private virtual cloud-based solution (VPC) that includes IPS/WAF, DoS/DDoS protection, BOT detection and exclusion, anti-scraping, CDN and more. As a result of our unique approach, we monitor and cleanse the traffic before it reaches our customers' websites, and we can easily work with existing security solutions. The service requires a five-minute setup, zero installation, a single DNS change and can be deployed even under an attack. Service can be stopped at any stage and with a Try and Buy period of 30 days. We're fully integrated with AWS, GCP, and Azure, being able to build our platform in the clients' environment, ensuring privacy, enhancing the cloud's latency and efficiency, and also, reducing costs of traffic. -
SCRUTINY SENSOR
$8,000.00Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available.SCRUTINY SENSOR
Category: Cloud Security Data Security Email Security Endpoint Security Industrial Security Internet of Things Security Malware Detection and Analysis |Scrutiny predicts the true nature of files by emulating the static and dynamic behavior in a crypto caged environment and simultaneously training self-learning sensors at the same time to provide accurate verdicts along with detailed analysis in seconds. Our unique approach detects both known and unknown ransomware strains without any reliance on data engrams, centralized signature databases, etc. Also, this stands out as multi-tier, more innovative, and advanced than the other ransomware detection methods available.