Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
BeyondTrust Active Directory Bridge
BeyondTrust Active Directory Bridge centralizes authentication and configuration management for Unix, Linux, and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on and Group Policy capabilities to these platforms.BeyondTrust Active Directory Bridge
BeyondTrust Active Directory Bridge centralizes authentication and configuration management for Unix, Linux, and Mac environments by extending Active Directory’s Kerberos authentication and single sign-on and Group Policy capabilities to these platforms. -
Block Armour Secure Shield
Block Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware.Block Armour Secure Shield
Block Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware. -
Brand Protection by Foresiet
Continuous brand scan helps to protect from Impersonation, Phishing, Rogue website, Fake social media accounts, pages, mobile application etc.
Stay protected against counterfeiters and unauthorized replicas, while also being proactive in spotting and preventing phishing scams.
Brand Protection by Foresiet
Continuous brand scan helps to protect from Impersonation, Phishing, Rogue website, Fake social media accounts, pages, mobile application etc.
Stay protected against counterfeiters and unauthorized replicas, while also being proactive in spotting and preventing phishing scams.
-
Calico Cloud
$36.50Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes.Calico Cloud
Calico Cloud is the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability. It enables organizations to prevent attacks using zero trust, and to detect, troubleshoot, and automatically mitigate vulnerabilities and security threats in build, deploy, and runtime stages across multi-cloud and hybrid deployments. Calico Cloud supports multiple dataplanes including eBPF, Windows and Linux. With Calico Cloud, users get a fully managed pay-as-you-go SaaS platform for active build and runtime security of cloud-native applications running on containers and Kubernetes. -
Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss.Carbonite Backup for Microsoft 365
Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365. Microsoft 365 comes with some native tools for large scale disaster recovery, but there are gaps when it comes to everyday data loss threats like ransomware and accidental deletions. To avoid data loss in Microsoft 365 applications, businesses need to rely on a purpose-built backup solution that ensures IT administrators can recover as much data as needed, regardless of the cause of data loss. -
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
Carbonite Endpoint
Carbonite’s data protection and migration solutions provide large organizations and small to medium-sized businesses uninterrupted access to critical business data.Carbonite backup & data protection for business includes:
- Carbonite Endpoint
- Carbonite Cloud to Cloud Backup
- Carbonite Server
-
Citadel by Ercom
Citadel is a flexible, user-friendly, trusted and secured collaboration solution for messaging, call, audio and video conference.- Fast deployment - Registration in less than 2 minutes, available Android, iOS, web-browser and in thick client for PC and MAC.
- Security - Encryption of data exchanged, Trusted Infrastructure developed and operated by Thales, hosted in France
- High availability - Service guaranteed - 99.99% availability
- Telephony - HD calls phone upto 5 participants, end-to-end encryption, call history
- Citadel Conference - Video conference upto 10 participants, audio conference upto 30 participants, screen sharing
Citadel by Ercom
Citadel is a flexible, user-friendly, trusted and secured collaboration solution for messaging, call, audio and video conference.- Fast deployment - Registration in less than 2 minutes, available Android, iOS, web-browser and in thick client for PC and MAC.
- Security - Encryption of data exchanged, Trusted Infrastructure developed and operated by Thales, hosted in France
- High availability - Service guaranteed - 99.99% availability
- Telephony - HD calls phone upto 5 participants, end-to-end encryption, call history
- Citadel Conference - Video conference upto 10 participants, audio conference upto 30 participants, screen sharing
-
Cloud Access Security Broker by Netskope
Confidently adopt cloud applications and services – without sacrificing security. Manage the unintentional or unapproved movement of sensitive data between cloud app instances and in the context of app risk and user risk with Netskope CASB, a core component of Netskope Security Service Edge (SSE). As a component of Netskope Security Service Edge (SSE), Netskope’s industry leading cloud access security broker (CASB) solution enables you to quickly identify and manage the use of cloud applications, regardless of whether they are managed or unmanaged. Prevents sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals who have breached your perimeter.Cloud Access Security Broker by Netskope
Confidently adopt cloud applications and services – without sacrificing security. Manage the unintentional or unapproved movement of sensitive data between cloud app instances and in the context of app risk and user risk with Netskope CASB, a core component of Netskope Security Service Edge (SSE). As a component of Netskope Security Service Edge (SSE), Netskope’s industry leading cloud access security broker (CASB) solution enables you to quickly identify and manage the use of cloud applications, regardless of whether they are managed or unmanaged. Prevents sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals who have breached your perimeter. -
Cloud Penetration Testing
Protect your Cloud Environment with our best security solutions. As the demands of business innovation outstrip the capabilities of on-premises infrastructure, companies are turning to cloud solutions. Migrating to the cloud, on the other hand, brings with it new cybersecurity challenges. As you migrate to hybrid cloud systems, you must maintain visibility, control, and security. To keep ahead of new threats, you require effective cloud configuration at each important stage of your cloud transformation journey.Cloud Penetration Testing
Protect your Cloud Environment with our best security solutions. As the demands of business innovation outstrip the capabilities of on-premises infrastructure, companies are turning to cloud solutions. Migrating to the cloud, on the other hand, brings with it new cybersecurity challenges. As you migrate to hybrid cloud systems, you must maintain visibility, control, and security. To keep ahead of new threats, you require effective cloud configuration at each important stage of your cloud transformation journey. -
Cloud Security Assessments
$150.00A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on.Cloud Security Assessments
A technical security assessment for cloud-deployed applications to assess for bad exposures, vulnerabilities, and deviations from the best practices. Cloud security assessments checks for vulnerabilities emerging from unintended network accessibility, misconfigurations, user accounts, and their permissions, access management, and so on. -
Cloud Security Services by Intelidata
CDL Cloud Security Services help clients secure their cloud migration and transformation journey to build a cyber- resilient and IT compliant cloud ecosystem. Our offerings include:- Cloud security strategy and architecture
- Cloud security assessment services
- Cloud managed security services
- Cloud security governance
- Cloud security solutions in implementation and support
Cloud Security Services by Intelidata
CDL Cloud Security Services help clients secure their cloud migration and transformation journey to build a cyber- resilient and IT compliant cloud ecosystem. Our offerings include:- Cloud security strategy and architecture
- Cloud security assessment services
- Cloud managed security services
- Cloud security governance
- Cloud security solutions in implementation and support
-
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
Cloud to Cloud Backup & Recovery
Data is essential for businesses around the globe, and none can afford to lose any of it for any reason, whether malicious or not. With a backup and recovery plan in place, you can ensure that your business will be prepared for the unexpected with an essential business continuity too.
“Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss and start proactively protecting cloud data before it’s too late.” - Forrester
-
Compromise Assessment by SecurDefense
$4,500.00Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information.Compromise Assessment by SecurDefense
Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information. -
Cryptobox by Ercom
Cryptobox eases and secures professional collaboration. Cryptobox improves enterprise productivity with easy, internal and external exchanges.- A flexible solution
- A highly-secure solution
- A user-friendly solution
- Best in class security
- Ensures maximum privacy
Cryptobox by Ercom
Cryptobox eases and secures professional collaboration. Cryptobox improves enterprise productivity with easy, internal and external exchanges.- A flexible solution
- A highly-secure solution
- A user-friendly solution
- Best in class security
- Ensures maximum privacy
-
Cyber Security Consulting Services by Athena Dynamics
Athena Dynamics is a pure-play cyber security consulting arm of BH Global which is fully independent of any state-level relationship. This gives Athena Dynamics the full neutrality and trust of regional and global customers to assist with cyber protection of their Enterprise Information Technology platforms (IT), Industrial Control Operation Technology Systems (OT) and not least, Critical National Info-Infrastructures (CNII). The Good Hackers’ Alliance (“gha”) formed by Athena Dynamics delivers best practices via custom mix of credible and ethical hacker groups with state-level competencies. gha has since fulfilled more than 40 vulnerability assessments for sensitive establishments, as well as recovery operations necessitated by cyber related breaches.Cyber Security Consulting Services by Athena Dynamics
Athena Dynamics is a pure-play cyber security consulting arm of BH Global which is fully independent of any state-level relationship. This gives Athena Dynamics the full neutrality and trust of regional and global customers to assist with cyber protection of their Enterprise Information Technology platforms (IT), Industrial Control Operation Technology Systems (OT) and not least, Critical National Info-Infrastructures (CNII). The Good Hackers’ Alliance (“gha”) formed by Athena Dynamics delivers best practices via custom mix of credible and ethical hacker groups with state-level competencies. gha has since fulfilled more than 40 vulnerability assessments for sensitive establishments, as well as recovery operations necessitated by cyber related breaches. -
Cyber Security Training by Cyber Sierra
Your Greatest Asset can be Your Weakest Link
Employees are your greatest asset. But they may also be your weakest link. Ensure your employees are trained to be cyber-aware and cyber-ready.
- Ensure your employees are aware of cyber security risks
- Run employee awareness training regularly
- Help your employees detect phishing emails and landing pages
- Run counter-phishing campaigns regularly
Cyber Security Training by Cyber Sierra
Your Greatest Asset can be Your Weakest Link
Employees are your greatest asset. But they may also be your weakest link. Ensure your employees are trained to be cyber-aware and cyber-ready.
- Ensure your employees are aware of cyber security risks
- Run employee awareness training regularly
- Help your employees detect phishing emails and landing pages
- Run counter-phishing campaigns regularly