View
Sorting
From A to Z
Products found: 59
6Scan
6Scan is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical
issues that - if left unresolved - could damage your business and customers, your reputation and destroy your web presence. What Does ... Learn more
issues that - if left unresolved - could damage your business and customers, your reputation and destroy your web presence. What Does ... Learn more
-
-
ROI-
-
0
0
Aegify RSC Suite
Aegify RSC Suite Reduced riskUnified/integrated approachLower total cost of ownershipOversight easeMaximum securityNo compliance tradeoffs The NEED
RISK management is not optional for healthcare, retail and financial organizations.... Learn more
RISK management is not optional for healthcare, retail and financial organizations.... Learn more
-
-
ROI-
-
0
0
AMT - Banking Malware Detector
The AMT Technology Website The AMT (Agentless anti-Malware Technology) is a new proprietary Minded Security technology for detection and management
of malware software. AMT has been developed after years of study for detecting and managing in real time advanced banking malware for our... Learn more
of malware software. AMT has been developed after years of study for detecting and managing in real time advanced banking malware for our... Learn more
-
-
ROI-
-
0
0
Avocado Systems Platform
Avocado Security platform provides “Deterministic Application Security Functions”. Thus, bringing the security stack literally into the application, enabling
applications to secure themselves and carry the security stack with themselves when they migrate to cloud environment. Features: Avocado Se... Learn more
applications to secure themselves and carry the security stack with themselves when they migrate to cloud environment. Features: Avocado Se... Learn more
-
-
ROI-
-
0
0
Barracuda Sentinel
A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business
Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. E... Learn more
Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. E... Learn more
Barracuda Web Security Gateway
Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization
without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis so... Learn more
without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis so... Learn more
BufferZone
Even the best detection technology cannot return the data, money or reputation that is lost in a breach. While a layered approach that addresses the entire
attack cycle is a must, prevention still has the highest return on investment. BUFFERZONE provides a better way to reduce the attack surface a... Learn more
attack cycle is a must, prevention still has the highest return on investment. BUFFERZONE provides a better way to reduce the attack surface a... Learn more
-
-
ROI-
-
10
6
Claroty Continuous Threat Detection
Continuous Threat Detection extracts precise details about each asset on the industrial network, profiles all communications and protocols, generates a
fine-grain behavioral baseline that characterizes legitimate traffic, and alerts you to network changes, new vulnerabilities and threats. The alert... Learn more
fine-grain behavioral baseline that characterizes legitimate traffic, and alerts you to network changes, new vulnerabilities and threats. The alert... Learn more
-
-
ROI-
-
7
10
Claroty Platform
Claroty’s integrated ICS suite protects the safety of people, assets, and critical processes from cyber-attacks. The platform provides security teams with
extreme visibility into industrial control networks, real-time monitoring, network segmentation, control over employee and 3rd party remote ac... Learn more
extreme visibility into industrial control networks, real-time monitoring, network segmentation, control over employee and 3rd party remote ac... Learn more
CORE Security
Introducing CORE Security When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s
why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security f... Learn more
why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security f... Learn more
-
-
ROI-
-
0
0
Coronet SecureCloud
True cloud security must ensure users are authenticated, that the device used is not compromised, that the network used is safe, and yes, that the user
behavior (Access, downloads, uploads, collaboration, reporting) is allowed. To ensure true cloud security, organizations must purchase, integrat... Learn more
behavior (Access, downloads, uploads, collaboration, reporting) is allowed. To ensure true cloud security, organizations must purchase, integrat... Learn more
-
-
ROI-
-
13
6
CSPi Aria Software Defined Security
The ARIA SDS platform is a radically different approach to comprehensive network and data security as it employs capabilities normally only found in
carrier-class or military-grade architectures. When deployed on available optional hardware offerings it provides the high-availability and fast fa... Learn more
carrier-class or military-grade architectures. When deployed on available optional hardware offerings it provides the high-availability and fast fa... Learn more
-
-
ROI-
-
10
6
CyberX Platform
The Industrial Internet of Things (IIoT) is unlocking new levels of productivity, helping organizations improve safety, increase output, and maximize revenue.
At the same time, digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technolo... Learn more
At the same time, digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technolo... Learn more
-
-
ROI-
-
6
13
Darktrace Antigena
Powered by Darktrace’s multi-award-winning AI, Darktrace Antigena is an autonomous response solution that takes action against in-progress cyber-attacks,
limiting damage and stopping their spread in real time. The technology works like a digital antibody, intelligently generating measured and prop... Learn more
limiting damage and stopping their spread in real time. The technology works like a digital antibody, intelligently generating measured and prop... Learn more
Dragos Industrial Cybersecurity Platform
The Dragos Platform contains all the necessary capabilities to monitor and defend ICS environments. It combines the functionality of an OT security incident
and event management system (SIEM), network detection and anomaly system, and incident response platform with the experience and intelli... Learn more
and event management system (SIEM), network detection and anomaly system, and incident response platform with the experience and intelli... Learn more
Dragos WorldView
Dragos WorldView is the industrial cybersecurity industry’s only product exclusively focused on ICS threat intelligence. Prepared by Dragos’ expert ICS/OT
threat intelligence analysts, it is the essential supplement to any IT-focused intelligence product used by IT or OT professionals with responsibilit... Learn more
threat intelligence analysts, it is the essential supplement to any IT-focused intelligence product used by IT or OT professionals with responsibilit... Learn more
-
-
ROI-
-
16
13
FireEye Security Suite
FireEye Security Suite provides enterprise-grade protection to secure networks, emails and endpoints for organizations of all sizes. It defends against
advanced attacks, accelerates incident response and safeguards the core business.... Learn more
advanced attacks, accelerates incident response and safeguards the core business.... Learn more
Forcepoint Web Security
Forcepoint Web Security provides industry-leading reporting, sandboxing and DLP capabilities, and stops more advanced, non-signature threats to your data
than any other solution – including Blue Coat, Cisco and Zscaler. And because it is cloud hosted, you won’t backhaul traffic or pay for appliances... Learn more
than any other solution – including Blue Coat, Cisco and Zscaler. And because it is cloud hosted, you won’t backhaul traffic or pay for appliances... Learn more
Frontline.Cloud
As the creators of the original SaaS security platform – well before cloud security services became all the rage, and long before competitive companies saw
the light – Digital Defense continues to set the standard for the delivery of SaaS solutions and services. The Frontline.Cloud security Software as... Learn more
the light – Digital Defense continues to set the standard for the delivery of SaaS solutions and services. The Frontline.Cloud security Software as... Learn more
-
-
ROI-
-
6
3
GFI LAN Guard
Patch management: Fix vulnerabilities before an attack Patch management is vital to your business. Network security breaches are most commonly caused
by missing network patches. GFI LanGuard scans and detects network vulnerabilities before they are exposed, reducing the time required to pa... Learn more
by missing network patches. GFI LanGuard scans and detects network vulnerabilities before they are exposed, reducing the time required to pa... Learn more
-
-
ROI-
-
2
10
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.