Onefede > Products
Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Mobile Application Testing by Kratikal
“The quickest access point to your digital self is now your mobile device.” Mobile application security testing is the process of looking for bugs in the code and other aspects of the application. The overall evaluation process must include a stage called VAPT for mobile applications since it improves in-app security and lowers the chance of fraud, malware infection, data leakage, and other security problems. Organizations are hired to conduct mobile application security testing because cyberattacks are becoming more sophisticated.Mobile Application Testing by Kratikal
“The quickest access point to your digital self is now your mobile device.” Mobile application security testing is the process of looking for bugs in the code and other aspects of the application. The overall evaluation process must include a stage called VAPT for mobile applications since it improves in-app security and lowers the chance of fraud, malware infection, data leakage, and other security problems. Organizations are hired to conduct mobile application security testing because cyberattacks are becoming more sophisticated. -
Morphisec Breach Prevention Platform
The Morphisec breach prevention platform enables IT and security teams of any size to secure critical systems against the most advanced and disruptive cyberthreats without needing prior knowledge of them. From endpoints to servers to the cloud, Morphisec streamlines cybersecurity and ensures you don’t end up on the news.Morphisec Breach Prevention Platform
The Morphisec breach prevention platform enables IT and security teams of any size to secure critical systems against the most advanced and disruptive cyberthreats without needing prior knowledge of them. From endpoints to servers to the cloud, Morphisec streamlines cybersecurity and ensures you don’t end up on the news. -
Network Configuration & Firewall Rules Review
$100.00Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.Network Configuration & Firewall Rules Review
Category: Network Access Control Network Behavior Analysis and Anomaly Detection Network Firewall (includes Next Generation Firewalls) Network Monitoring and Forensics |Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy. -
Network Penetration Testing
Make your Defenses more resilient against hackers with Network Security. Network testing is a means of examining the present condition of the network's security, including internal, external, and device-level security policies, to find and illustrate weaknesses and assess vulnerabilities. At Kratikal, we use an organized process to identify and prioritize the most vulnerable aspects of your network. The fundamental purpose of a network penetration test is to detect exploitable vulnerabilities in networks, network devices, systems, and hosts so they may be fixed before a hacker discovers and exploits them.Network Penetration Testing
Make your Defenses more resilient against hackers with Network Security. Network testing is a means of examining the present condition of the network's security, including internal, external, and device-level security policies, to find and illustrate weaknesses and assess vulnerabilities. At Kratikal, we use an organized process to identify and prioritize the most vulnerable aspects of your network. The fundamental purpose of a network penetration test is to detect exploitable vulnerabilities in networks, network devices, systems, and hosts so they may be fixed before a hacker discovers and exploits them. -
Network Penetration Testing
$120.00A technical security assessment that goes beyond the standard port scanning and enumerating vulnerabilities to identify the security risks and their business impact on your network: be it external, internal, or wireless.Network Penetration Testing
A technical security assessment that goes beyond the standard port scanning and enumerating vulnerabilities to identify the security risks and their business impact on your network: be it external, internal, or wireless. -
Network Scanning and Hardening by Intelidata
Network Scanning is a method of getting network information such as identification of hosts, port information, and services by scanning networks and ports. Our Scanning Methodology includes the following steps: -- Checking for live systems
- Discovering open ports
- Scanning beyond IDS
- Banner grabbing
- Scanning Vulnerabilities
- Network Diagram Proxies and more
Network Scanning and Hardening by Intelidata
Network Scanning is a method of getting network information such as identification of hosts, port information, and services by scanning networks and ports. Our Scanning Methodology includes the following steps: -- Checking for live systems
- Discovering open ports
- Scanning beyond IDS
- Banner grabbing
- Scanning Vulnerabilities
- Network Diagram Proxies and more
-
Nucleon Endpoint Detection and Response
Nucleon Detection & Response platform ensures the protection of workstations and servers by implementing successive layers of protection to protect you during all phases of an attacks. Nucleon Detection & Response allows the identification of weak points on your infrastructures, blocks attacks and provides you with all the tools to investigate.Nucleon Endpoint Detection and Response
Nucleon Detection & Response platform ensures the protection of workstations and servers by implementing successive layers of protection to protect you during all phases of an attacks. Nucleon Detection & Response allows the identification of weak points on your infrastructures, blocks attacks and provides you with all the tools to investigate. -
oak9 Cloud Infrastructure Security SaaS Platform
$2,000.00oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks.oak9 Cloud Infrastructure Security SaaS Platform
oak9 lets you tailor security standards to your needs and intelligently learns the more you build, so you aren’t slowed by hundreds of false positives or non-relevant exceptions. You can focus on the functional capabilities of your application while oak9 assess every change to your application architecture against your customized security blueprint to notify you in real-time of any risks. -
Password Safe by BeyondTrust
Password Safe combines Privileged Account and Session Management (PASM) + Secrets Management capabilities, in one solution. Protect human and machine privileged identities, and your network, against account hijacking, credential re-use attacks, exposed hardcoded passwords, lateral movement, privilege escalation attacks, and more.- Credential, Key, & Secrets Management
- Real-Time Session Management
- Advanced Auditing & Forensics
Password Safe by BeyondTrust
Password Safe combines Privileged Account and Session Management (PASM) + Secrets Management capabilities, in one solution. Protect human and machine privileged identities, and your network, against account hijacking, credential re-use attacks, exposed hardcoded passwords, lateral movement, privilege escalation attacks, and more.- Credential, Key, & Secrets Management
- Real-Time Session Management
- Advanced Auditing & Forensics
-
Passwordless4u
$60.00 – $450.00 for 1 monthPasswordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risksPasswordless4u
Category: Application Control Cyber Security Services Data Security Email Security Password Manager |Passwordless Authentication is a method that allows users to log in and gain access to any application or system with the need of Password Passwordless4u completely eliminates the Passwords and Password-related risks$60.00 – $450.00 for 1 month -
PingSafe CNAPP Platform
Protect your cloud with our complete CNAPP
Proactively secure your cloud with unparalleled protection, from development to deployment.How Does PingSafe Work?
PingSafe quickly scans your entire cloud infrastructure from an attacker's point of view. We then identify, prioritize and auto-remediate issues, to secure your business.PingSafe CNAPP Platform
Protect your cloud with our complete CNAPP
Proactively secure your cloud with unparalleled protection, from development to deployment.How Does PingSafe Work?
PingSafe quickly scans your entire cloud infrastructure from an attacker's point of view. We then identify, prioritize and auto-remediate issues, to secure your business. -
PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest.PK Classification
PKWARE's persistent provides valuable data insight, which can be integrated with an organization's access control system to ensure constant privacy of sensitive personal data while in motion or at rest. -
PK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protectionPK Discovery
Where Sensitive Data Resides
Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears. PK Discovery provides automated discovery for improved data protection -
PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure.PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure. -
PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy.PK Masking
Fully utilized data is an enterprise’s most valuable asset. But data without protection becomes a liability. Masking personal, confidential, or otherwise sensitive information allows data to be desensitized or protected while still remaining usable by business teams. It’s a straightforward concept, but businesses have to consider certain complexities and subtleties to ensure their masked data remains fit for purpose. Maintain control of your sensitive data by using PK Policy. -
PK Privacy
Business are required to keep up with an ever-changing privacy landscape, protecting the personally identifiable information they interact with. Meeting these requirements starts with understanding the organization's data as a whole, including indexing and correlating records based on specific criteria. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation.PK Privacy
Business are required to keep up with an ever-changing privacy landscape, protecting the personally identifiable information they interact with. Meeting these requirements starts with understanding the organization's data as a whole, including indexing and correlating records based on specific criteria. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation.