Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
CyberQ ORO
CyberQ ORO helps security leaders in enterprises measure, communicate and reduce human risk to keep their companies safe from cyber threats. One of the most challenging aspects of building a cybersecurity program is the human risk component.
CyberQ ORO provides a way to quantify this human risk across the entire organization using security incident data, automated assessments & training. Quantifying human risk and analyzing it as part of an overall cyber risk framework provides unique insights to security teams & leaders.
Rated 2.31 out of 5CyberQ ORO
CyberQ ORO helps security leaders in enterprises measure, communicate and reduce human risk to keep their companies safe from cyber threats. One of the most challenging aspects of building a cybersecurity program is the human risk component.
CyberQ ORO provides a way to quantify this human risk across the entire organization using security incident data, automated assessments & training. Quantifying human risk and analyzing it as part of an overall cyber risk framework provides unique insights to security teams & leaders.
-
CyberQ Shield
CyberQ Shield is a Cloud Security & Compliance management solution that helps organizations using public cloud to automatically detect & respond to cloud security risks by following security best practices and comply with global security standards & benchmarks. CyberQ Shield is the leading 100% agentless security solution which can detect in “real time” both cloud IOC’s (Indicator of misconfiguration) and system vulnerabilities, it provides contextual security risk based on cloud environment, resources, data using unique labeling technique. Automated remediation using PLOP (Principle of least privilege) is one of the most advanced security capability within the platform.Rated 2.08 out of 5CyberQ Shield
CyberQ Shield is a Cloud Security & Compliance management solution that helps organizations using public cloud to automatically detect & respond to cloud security risks by following security best practices and comply with global security standards & benchmarks. CyberQ Shield is the leading 100% agentless security solution which can detect in “real time” both cloud IOC’s (Indicator of misconfiguration) and system vulnerabilities, it provides contextual security risk based on cloud environment, resources, data using unique labeling technique. Automated remediation using PLOP (Principle of least privilege) is one of the most advanced security capability within the platform. -
Cyberstanc Ransomware Assessment and Simulation Testing
PHASES OF RANSOMWARE ASSESSMENT and SIMULATION TEST- Ransomware Impact Assessment and isolation
- Ransomware evidence and reverse engineering
- Ransomware recovery process
- Ransomware Sanitization process
- Documentation and report briefing
- Ransomware Prevention and Lessons Learned
- Detect early-stage ransomware attacks and families name
- Identify specific assets that ransomware exploits
- Recognize operational deficiencies by simulating various known and unknown ransomware
- Conduct root cause analysis of ransomware
Rated 2.31 out of 5Cyberstanc Ransomware Assessment and Simulation Testing
PHASES OF RANSOMWARE ASSESSMENT and SIMULATION TEST- Ransomware Impact Assessment and isolation
- Ransomware evidence and reverse engineering
- Ransomware recovery process
- Ransomware Sanitization process
- Documentation and report briefing
- Ransomware Prevention and Lessons Learned
- Detect early-stage ransomware attacks and families name
- Identify specific assets that ransomware exploits
- Recognize operational deficiencies by simulating various known and unknown ransomware
- Conduct root cause analysis of ransomware
-
D3 XGEN SOAR
Security Orchestration, Automation, and Response (SOAR) Platform
A nerve centre for security operations, incident response and threat hunting, XGEN SOAR orchestrates and automates workflows, helping each SOC tier, and enabling greater agility, visibility and confidence. Get the most from your security team and technology with a single SOAR solution for security automation, incident response, threat intelligence and case management.- Connected tools and teams
- Automate manual processes
- Uncover stealthy threats
- Speed, scale and strengthen
Rated 2.15 out of 5D3 XGEN SOAR
Security Orchestration, Automation, and Response (SOAR) Platform
A nerve centre for security operations, incident response and threat hunting, XGEN SOAR orchestrates and automates workflows, helping each SOC tier, and enabling greater agility, visibility and confidence. Get the most from your security team and technology with a single SOAR solution for security automation, incident response, threat intelligence and case management.- Connected tools and teams
- Automate manual processes
- Uncover stealthy threats
- Speed, scale and strengthen
-
DARKBEAST
DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictionsRated 2.58 out of 5DARKBEAST
Category: Digital Risk Monitoring Specialized Threat Analysis and Protection Threat Intelligence and Signature Feeds |DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analyst with a robust technology to dive into the cybercrime underground and investigate through KELA’s dark web data lake. Gain Visibility into the underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions -
Data Breach Assessment Testing by VP Techno Labs
$800.00$650.00Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage!Rated 2.50 out of 5Data Breach Assessment Testing by VP Techno Labs
Data Breach Assessment Testing is specially for organizations who want to avoid and prevent heavy fines and compliance violation and Legal disputes regarding Customer's Data. We uses combination of Forensics, Infrastructure Testing and DRE Approach to make this happen. This will covers more scope than traditional RED/Blue Teaming. Moreover we uses proprietary approach Triple Shield DRE(USP) To secure your infrastructure from every perspective. This testing also prepares an organization to be compliant with different National/International Compliance & Regulations Like SOC, HIPAA, GDPR, CCPA, ISO, NIST, FISMA. So that's the main advantage!$650.00Was $800.00Save $150 -
Desksight.ai
$30.00$29.00 for 1 year with a 2-week free trialDesksight.ai is a SaaS based Employee monitoring software product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai is an Easy & quick set up experience. In other words, it’s Plug and Plays literally live in minutes with 4 simple steps:- Invite team members
- Install DeskSight agent
- Assign work definition
- Start monitoring
Rated 1.92 out of 5Desksight.ai
Desksight.ai is a SaaS based Employee monitoring software product which collects and analyzes the data and provides insights to help organizations be more productive and compliant. DeskSight.ai is an Easy & quick set up experience. In other words, it’s Plug and Plays literally live in minutes with 4 simple steps:- Invite team members
- Install DeskSight agent
- Assign work definition
- Start monitoring
$29.00Was $30.00Save $1 -
Deterministic Protection Platform by Virsec
Virsec’s mission is to make security response obsolete and its Deterministic Protection Platform (DPP) that eradicates threats at the software workload is the only way to achieve this. Deterministic protection maps exactly what your software is supposed to do and stops it from doing what it is not. A deterministic protection platform (DPP) ensures better protection against all known and unknown threats to software workloads deployed in production and reduces threat actor dwell time from minutes to milliseconds with true protection and runtime observability.Rated 2.50 out of 5Deterministic Protection Platform by Virsec
Virsec’s mission is to make security response obsolete and its Deterministic Protection Platform (DPP) that eradicates threats at the software workload is the only way to achieve this. Deterministic protection maps exactly what your software is supposed to do and stops it from doing what it is not. A deterministic protection platform (DPP) ensures better protection against all known and unknown threats to software workloads deployed in production and reduces threat actor dwell time from minutes to milliseconds with true protection and runtime observability. -
DevSecOps Consulting Services by Intelidata
Intelidata Technologies has a suite of DevSecOps-ready Consultancy services to enable secure continuous delivery, integrated security testing and cloud native delivery pipelines as per Cert-in guidelines. If you haven’t already begun the process, the time is now to merge your security goals with DevOps and implement ‘Security as Code’ DevSecOps best practices.Rated 2.69 out of 5DevSecOps Consulting Services by Intelidata
Intelidata Technologies has a suite of DevSecOps-ready Consultancy services to enable secure continuous delivery, integrated security testing and cloud native delivery pipelines as per Cert-in guidelines. If you haven’t already begun the process, the time is now to merge your security goals with DevOps and implement ‘Security as Code’ DevSecOps best practices. -
Digital Risk Protection by Foresiet
Digital risk score is a new way to measure the risk of digital assets, and it is becoming a new standard in the industry.
The digital risk score measures the likelihood of a digital asset being compromised or attacked. It is measured by aggregating information from various sources, such as web traffic, DNS records, and other data points.
A plug-and-play solution for your company's digital protection
Rated 2.92 out of 5Digital Risk Protection by Foresiet
Digital risk score is a new way to measure the risk of digital assets, and it is becoming a new standard in the industry.
The digital risk score measures the likelihood of a digital asset being compromised or attacked. It is measured by aggregating information from various sources, such as web traffic, DNS records, and other data points.
A plug-and-play solution for your company's digital protection
-
Dispute and Chargeback Management
The dispute and chargeback management software is a dashboard that integrates with post-authorization tools from Verifi, A Visa Solution, Ethoca Consumer Clarity™, and Ethoca Alerts to help you prevent revenue loss from criminal and friendly fraud. Automatically respond to customer inquiries, and manage chargeback alerts and notifications in one place.Rated 2.77 out of 5Dispute and Chargeback Management
The dispute and chargeback management software is a dashboard that integrates with post-authorization tools from Verifi, A Visa Solution, Ethoca Consumer Clarity™, and Ethoca Alerts to help you prevent revenue loss from criminal and friendly fraud. Automatically respond to customer inquiries, and manage chargeback alerts and notifications in one place. -
DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
Rated 2.79 out of 5DTEX InTERCEPT
InTERCEPT is a smart , sophisticated, scalable workforce cyber security solution. With InTERCEPT -- Prevent data loss with behavioural intent intelligence
- Detect insider threats with dynamic risk scoring
- Enrich SOC operations with human telemetry
- Accelerate incident response with real time forensics
-
Dynamic Analysis Security Testing by Intelidata
Static Analysis Security Testing (SAST) services by Intelidata helps in finding vulnerabilities in the application while it is running. •Black/Grey-box security testing using automated tools; examines an application as it's running to find vulnerabilities that an attacker could exploit. •DAST will help in picking out deployment specific issues •Results from DAST and SAST can be compared to weed out false positivesRated 2.77 out of 5Dynamic Analysis Security Testing by Intelidata
Static Analysis Security Testing (SAST) services by Intelidata helps in finding vulnerabilities in the application while it is running. •Black/Grey-box security testing using automated tools; examines an application as it's running to find vulnerabilities that an attacker could exploit. •DAST will help in picking out deployment specific issues •Results from DAST and SAST can be compared to weed out false positives -
Email Threat Protection by SecurDefense
$5.00Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps.Rated 2.77 out of 5Email Threat Protection by SecurDefense
Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps. -
Emsisoft Anti Malware
$9.35 – $265.00 / yearHighlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
Rated 2.46 out of 5Emsisoft Anti Malware
Highlights- Award-winning threat detection
- High performance
- Dual-engine technology
- Advanced smart cleaning
- Cloud Management
- Advance & Persistent Threat Prevention
- Antivirus and Anti-Malware
- EDR Capabilities
- Best Protection against Ransomware
- Anti-Ransomware
- Surf- & Banking-Protection
- Behavior Blocker
- Firewall
- Advance Malware Detection Techniques
- Free Ransomware decryption tools
$9.35 – $265.00 / year -
Encrypted Phone by Kaymera
NKrypt Phone by Kaymera is a combination of best in class security and premium usability. Off the shelf Google Pixel device powered by Kaymera encrypted OS for your peace of mind and data privacy. The unique solution that protect your smartphone against Pegasus attacks Order a Google Pixel + Kaymera OS from us or purchase a Google Pixel of your choice from a local retailer and buy Kaymera OS separately.Rated 2.31 out of 5Encrypted Phone by Kaymera
NKrypt Phone by Kaymera is a combination of best in class security and premium usability. Off the shelf Google Pixel device powered by Kaymera encrypted OS for your peace of mind and data privacy. The unique solution that protect your smartphone against Pegasus attacks Order a Google Pixel + Kaymera OS from us or purchase a Google Pixel of your choice from a local retailer and buy Kaymera OS separately.