Onefede > Products
Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Vulnerability Assessment by VP Techno Labs
$300.00$250.00Vulnerability Assessment helps businesses to find and fix security flaws quickly in different assets like network infrastructure, Websites, Mobile Applications, Business APIs, Cloud Infrastructure, Home Automation Devices, etc. After Software Development lifecycle, it is recommend to conduct VAPT of that software product, because this will helps businesses to find loopholes in their code, application structure and databases earlier.Vulnerability Assessment by VP Techno Labs
Vulnerability Assessment helps businesses to find and fix security flaws quickly in different assets like network infrastructure, Websites, Mobile Applications, Business APIs, Cloud Infrastructure, Home Automation Devices, etc. After Software Development lifecycle, it is recommend to conduct VAPT of that software product, because this will helps businesses to find loopholes in their code, application structure and databases earlier. -
Web Application Penetration Testing
$110.00Web application security testing is critical to protecting both your apps and your organization. Your web applications are likely to be the #1 attack vector for malicious individuals seeking to breach your security defenses. Available to users 24/7, web apps are the easiest target for hackers seeking access to confidential back-end data.Web Application Penetration Testing
Web application security testing is critical to protecting both your apps and your organization. Your web applications are likely to be the #1 attack vector for malicious individuals seeking to breach your security defenses. Available to users 24/7, web apps are the easiest target for hackers seeking access to confidential back-end data. -
Web Application Security Penetration Testing
Effective security testing protects your apps from cyber-threats and vulnerabilities
From online and mobile apps to platform and hardware-hosted programs, Kratikal's application security testing services help you address application vulnerabilities while minimizing technological risks to meet regulatory compliance. Our Application Security Methodology goes beyond software detection to identify and prioritize the most vulnerable areas of your online application, as well as offer real solutions.Web Application Security Penetration Testing
Effective security testing protects your apps from cyber-threats and vulnerabilities
From online and mobile apps to platform and hardware-hosted programs, Kratikal's application security testing services help you address application vulnerabilities while minimizing technological risks to meet regulatory compliance. Our Application Security Methodology goes beyond software detection to identify and prioritize the most vulnerable areas of your online application, as well as offer real solutions. -
Webroot DNS Protection
Stop up to 88% of malware at the domain layer by securing corporate and guest networks. Webroot® DNS Protection provides protective filtering for security, visibility, privacy and control. Minimize risks, maximize safety and productivity on the web. Webroot® DNS Protection is built for the future, supporting both IPv6 and DoH so businesses are prepared for the next generation of internet protocols and requests. This means you can protect your users at the DNS layer on modern networks like public hotspots without sacrificing security, privacy, visibility or admin control.Webroot DNS Protection
Stop up to 88% of malware at the domain layer by securing corporate and guest networks. Webroot® DNS Protection provides protective filtering for security, visibility, privacy and control. Minimize risks, maximize safety and productivity on the web. Webroot® DNS Protection is built for the future, supporting both IPv6 and DoH so businesses are prepared for the next generation of internet protocols and requests. This means you can protect your users at the DNS layer on modern networks like public hotspots without sacrificing security, privacy, visibility or admin control. -
Webroot Endpoint Protection
Webroot® Business Endpoint Protection Software for Business
To secure your businesses, you need endpoint protection software that’s stronger and smarter than traditional business antivirus. Easily manage clients across sites and secure users across all stages of a cyberattack with effective, real-time protection.Supported Systems and Browsers
- Desktops
- Servers
- VM Platforms
- Browsers
Webroot Endpoint Protection
Webroot® Business Endpoint Protection Software for Business
To secure your businesses, you need endpoint protection software that’s stronger and smarter than traditional business antivirus. Easily manage clients across sites and secure users across all stages of a cyberattack with effective, real-time protection.Supported Systems and Browsers
- Desktops
- Servers
- VM Platforms
- Browsers
-
Webroot Security Awareness Training
Webroot® Security Awareness Training is a centralised solution for ongoing awareness training. It includes:Phishing Simulator
- Raise awareness, test and measure end users
- 200+ real-world phishing simulations
- With on-site posters and integrated courseware
Training Courses
- 100+ course library
- Content updates on a monthly basis
- Over 85 courses <10 min
- One-click user launch
Reporting Compliance
- Integrated reporting center
- Compliance courses included for PCI, HIPAA, GDPR and CCPA
Webroot Security Awareness Training
Webroot® Security Awareness Training is a centralised solution for ongoing awareness training. It includes:Phishing Simulator
- Raise awareness, test and measure end users
- 200+ real-world phishing simulations
- With on-site posters and integrated courseware
Training Courses
- 100+ course library
- Content updates on a monthly basis
- Over 85 courses <10 min
- One-click user launch
Reporting Compliance
- Integrated reporting center
- Compliance courses included for PCI, HIPAA, GDPR and CCPA
-
Wrixte SIEM
At Wrixte, we offer a dual AI powered SIEM solution that offers real-time security monitoring, correlation, and analysis of security events and alerts generated by network devices, servers, applications, and other sources. Wrixte SIEM enables organizations to gain 360° visibility into their IT security posture and improve their incident response capabilities.Wrixte SIEM
At Wrixte, we offer a dual AI powered SIEM solution that offers real-time security monitoring, correlation, and analysis of security events and alerts generated by network devices, servers, applications, and other sources. Wrixte SIEM enables organizations to gain 360° visibility into their IT security posture and improve their incident response capabilities. -
XRATOR
$10,000.00 for 1 year with a 7-day free trialXRATOR aims to make preventive cyber security accessible and affordable to all organizations. A Cyber Security Cloud based SaaS product that uses AI technology to combine data from vulnerability scans, compliance statements, E-reputation, phishing simulation and threat analysis to assign a 'security score' to IT assets, employees, and third parties. Our automated and unique preventive approach to cyber risks across the value chain enables our clients to close the knowledge gap between CxOs and engineers, accelerate their compliance certification processes, and helps increase eligibility for cyber insurance. Helping organizations better prevent cyber intrusion attempts and empowering resilient business growth as a result. It is ideal for SME’s and Start-ups to manage their cybersecurity at an affordable cost without much skilled workforce.XRATOR
XRATOR aims to make preventive cyber security accessible and affordable to all organizations. A Cyber Security Cloud based SaaS product that uses AI technology to combine data from vulnerability scans, compliance statements, E-reputation, phishing simulation and threat analysis to assign a 'security score' to IT assets, employees, and third parties. Our automated and unique preventive approach to cyber risks across the value chain enables our clients to close the knowledge gap between CxOs and engineers, accelerate their compliance certification processes, and helps increase eligibility for cyber insurance. Helping organizations better prevent cyber intrusion attempts and empowering resilient business growth as a result. It is ideal for SME’s and Start-ups to manage their cybersecurity at an affordable cost without much skilled workforce.$10 000.00 -
Zero Trust Isolation Platform
Zero Trust Isolation platform designed to contain, profile and stop lateral threat movement across any organization.Airgap ring fences every endpoint in a network of “1” to protect against lateral threat movement. AI/ML based technology continuously monitors devices and flows for anomaly detection and threat prevention.Zero Trust Isolation Platform
Zero Trust Isolation platform designed to contain, profile and stop lateral threat movement across any organization.Airgap ring fences every endpoint in a network of “1” to protect against lateral threat movement. AI/ML based technology continuously monitors devices and flows for anomaly detection and threat prevention.