Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
Account AI
Account AI provides comprehensive risk analysis across the entire customer lifecycle of an account. - Collective Intelligence Network Insights: Compare applicant details to the billions of data points captured by our global anti-fraud network so you can detect fraud even if you have never encountered the customer before. - Marketplace Data Solutions: Access dozens of third-party APIs in seconds while avoiding the technical hassles and maintenance costs of managing multiple data vendors and technology partners. Our solutions include KYC, AML, device and behavioral solutions as well as IP address, physical address, email, and payment detail validation. - Dynamic Device Fingerprinting: Capture the device ID used for the application to detect bots, proxies, and other fraudulent activity as well as assess user behavior and other contextual information to create a unique digital fingerprint.Account AI
Account AI provides comprehensive risk analysis across the entire customer lifecycle of an account. - Collective Intelligence Network Insights: Compare applicant details to the billions of data points captured by our global anti-fraud network so you can detect fraud even if you have never encountered the customer before. - Marketplace Data Solutions: Access dozens of third-party APIs in seconds while avoiding the technical hassles and maintenance costs of managing multiple data vendors and technology partners. Our solutions include KYC, AML, device and behavioral solutions as well as IP address, physical address, email, and payment detail validation. - Dynamic Device Fingerprinting: Capture the device ID used for the application to detect bots, proxies, and other fraudulent activity as well as assess user behavior and other contextual information to create a unique digital fingerprint. -
Advanced Email Threat Protection
$0.00Email Threat Protection provides multi-layered filtering that permits legitimate email while blocking malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages—all automatically.
Advanced Email Threat Protection
Email Threat Protection provides multi-layered filtering that permits legitimate email while blocking malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages—all automatically.
-
Application AI
Application AI provides a real-time risk assessment of applications requested by a customer or prospect. This helps clients verify legitimate customers, while detecting duplicate and fake accounts, synthetic identities, and bots before they can cause further financial harm. Additionally, this product provides a best in class Know-Your-Vendor framework, powered by intelligent automation. Derisk your vendors, trust your customers, and protect your profits with Application AI.Application AI
Application AI provides a real-time risk assessment of applications requested by a customer or prospect. This helps clients verify legitimate customers, while detecting duplicate and fake accounts, synthetic identities, and bots before they can cause further financial harm. Additionally, this product provides a best in class Know-Your-Vendor framework, powered by intelligent automation. Derisk your vendors, trust your customers, and protect your profits with Application AI. -
Axiom Protect
$6.00 – $9.60 for 1 yearAxiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users.Axiom Protect
Category: Data Masking Data Security Database Security Fraud Prevention Identity and Access Management Mobile Data Protection |Axiom Protect 2.0 (AP2) Platform protects your business with automated onboarding, solid identity verification, adaptive and absolute authentication covering secure biometric authentication and data protection while simplifying the multiple applications integration and finally offering an easy login experience for not just employees but also end-users. -
baiMobile Smartcard Reader Framework for Android and iOS
$10.00$9.00baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile applicationbaiMobile Smartcard Reader Framework for Android and iOS
baiMobile Smartcard Reader framework is an SDK for mobile device for smartcard based security for secure authentication, secure email communication, digital signing, data encryption and cryptographic operations within a mobile application -
Block Armour Secure Shield
$9,500.00 for 1 yearBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware.Block Armour Secure Shield
Category: Cloud Security Data-in-Motion Encryption and VPN Network Access Control Transport Access Control User Authentication Zero trust | SKU: BA-SS-ULBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware. -
Calico Cloud
$36.50Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes.Calico Cloud
Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes. -
Cloud Security Assessments
$150.00A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on.Cloud Security Assessments
A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on. -
Cloud to Cloud Backup & Recovery
$0.00Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
-
Compromise Assessment
$4,500.00Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information.Compromise Assessment
Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information. -
DARKBEAST
$0.00DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictionsDARKBEAST
Category: Digital Risk Monitoring Specialized Threat Analysis and Protection Threat Intelligence and Signature Feeds |DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions -
Desksight.ai
$30.00$29.00 for 1 year with a 2-week free trialIt is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.Desksight.ai
It is a SaaS based product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai has Easy & quick sale, an average of 7-10 days of closure timelines since it is a Plug and Play product and you can be up & live in minutes. This product has a very simple U.I. and no major IT intervention is required for implementing or monitoring/handling of this solution. You can also classify users in different teams, groups, projects etc. and also, move users who have left the organization into Retired users from Active users.$29.00Was $30.00Save $1$30.00$29.00 for 1 year with a 2-week free trial -
Device AI
Device AI scores, measures and reports real-time insights on your traffic and transactions so you can take action to keep your organization safe and ensure your user experience is friction-free. - Connect and contextualize unique customer events: Deepen your understanding of your customers’ behavior by getting a comprehensive view of their interactions at every touchpoint. - Real-time Alerts and Risk Scores For Every Customer: Stop fraud before it can occur with event-driven risk scores delivered through an API, as well as alerts for unrecognized devices and key changes in PII or payment data. - Customizable Case Management Platform: Create and manage thousands of risk rules and workflows—including data from login, device, transaction and account changes—to flag anomalous customer behavior and make smarter decisions when evaluating an event. - Actionable Analytics and Reporting Portal: Visualize fraud trends and monitor events in real-time with customizable charting tools.Device AI
Device AI scores, measures and reports real-time insights on your traffic and transactions so you can take action to keep your organization safe and ensure your user experience is friction-free. - Connect and contextualize unique customer events: Deepen your understanding of your customers’ behavior by getting a comprehensive view of their interactions at every touchpoint. - Real-time Alerts and Risk Scores For Every Customer: Stop fraud before it can occur with event-driven risk scores delivered through an API, as well as alerts for unrecognized devices and key changes in PII or payment data. - Customizable Case Management Platform: Create and manage thousands of risk rules and workflows—including data from login, device, transaction and account changes—to flag anomalous customer behavior and make smarter decisions when evaluating an event. - Actionable Analytics and Reporting Portal: Visualize fraud trends and monitor events in real-time with customizable charting tools. -
Dynamic Application Security Testing
$0.00Dynamic Application Security Testing (DAST) simplified for your mobile apps. See exactly what hackers see. Save your apps from Man in the Middle Attacks (MiTM) with Appknox.Dynamic Application Security Testing
Dynamic Application Security Testing (DAST) simplified for your mobile apps. See exactly what hackers see. Save your apps from Man in the Middle Attacks (MiTM) with Appknox. -
Email AI
$900.00 / yearPrevent Business-Email-Compromise (BEC) right in your inbox for FREE. Installs in minutes.Email AI
Prevent Business-Email-Compromise (BEC) right in your inbox for FREE. Installs in minutes. -
Email Threat Protection
$5.00Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps.Email Threat Protection
Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps.