Cyber Security

Explore products in this category. Compare highlights and request a special price tailored for your organization.

Fortinet FortiGate Next-Generation Firewall
Fortinet

A powerful network security appliance that provides integrated threat protection, including intrusion prevention, web filtering, and application control.

JumpCloud SSO & MFA
JumpCloud

A single sign-on (SSO) and multi-factor authentication (MFA) service that simplifies user access while enhancing security for your applications.

JumpCloud Device Identity Mgmt
JumpCloud

A service that manages and secures user and device identities, ensuring only authorized devices and users can access your company resources.

JumpCloud Platform
JumpCloud

A comprehensive directory platform that centralizes identity, access, and device management for a modern, all-in-one IT solution.

JumpCloud Platform Prime
JumpCloud

An enhanced version of the JumpCloud Platform that provides more advanced features, support, and security for larger enterprise customers.

CrowdStrike Falcon Identity Protection
Crowdstrike

A cybersecurity solution that defends against identity-based attacks by monitoring and securing user accounts and credentials.

CrowdStrike Falcon Cloud Security
Crowdstrike

A cloud security platform that provides comprehensive protection for your cloud workloads, containers, and serverless environments.

Bionic ASPM
Crowdstrike

An application security posture management solution that provides real-time visibility into your application's architecture to identify security risks and data privacy violations.

CrowdStrike Falcon Cloud Security for Red Hat OpenShift Service on AWS
Crowdstrike

A specialized security solution that protects your cloud-native applications running on the Red Hat OpenShift platform on AWS.

CrowdStrike Falcon Endpoint Protection
Crowdstrike

An endpoint security platform that provides comprehensive protection against malware, ransomware, and other advanced threats on your endpoints.

CrowdStrike Services
Crowdstrike

Professional services from CrowdStrike experts that help you deploy, configure, and optimize their cybersecurity solutions.

Okta Identity Cloud
Okta

A cloud-based identity and access management (IAM) solution that secures user access to all your applications and services.

Trend Enterprise Security Solutions
TrendMicro

A suite of enterprise-grade security products that provide comprehensive protection against a wide range of cyber threats.

Trend Premium Support
TrendMicro

An advanced support service that provides you with expert technical assistance for your Trend Micro products.

Trend Service One
TrendMicro

A managed service that provides expert security operations and monitoring for your Trend Micro products.

Trend Vision One
TrendMicro

A unified cybersecurity platform that provides a single console to manage and monitor your security posture across your entire IT environment.

Free Public Cloud Security Assessment for Amazon S3
TrendMicro

A no-cost service that assesses the security of your Amazon S3 buckets and provides recommendations to address potential vulnerabilities.

Unit 42 Retainer
PaloAlto

A retainer service that provides your organization with on-demand access to Palo Alto Networks' expert threat research and incident response team, Unit 42.

Prisma Cloud (Annual Contract)
PaloAlto

A comprehensive cloud-native security platform that protects your applications and data across multi-cloud environments.

Quickstart Service for Software NGFW - VM-Serie
PaloAlto

This professional service helps you rapidly deploy and configure Palo Alto Networks' virtual firewalls in your environment.

Trend Cloud One
TrendMicro

A comprehensive security platform for your cloud environment that provides workload security, network security, and application security.

Ransomware Readiness Assessment Tier 3 - Unit 42
PaloAlto

A comprehensive service from Unit 42 that assesses your organization's readiness to defend against and respond to ransomware attacks.

Ransomware Readiness Assessment Tier 1 - Unit 42
PaloAlto

A more foundational assessment service from Unit 42 that evaluates your ransomware defenses and provides a high-level overview of your risks.

Cloud Next-Generation Firewall as a Service (30-Day Free Trial to PAYG
PaloAlto

A managed firewall service that provides robust network security and threat prevention for your cloud workloads.

Premium Customer Success for Prisma Cloud
PaloAlto

An enhanced customer success service that provides dedicated guidance and support to help you get the most value from your Prisma Cloud platform.

HCP Vault
HashiCorp

A managed service for securely storing and accessing sensitive data, such as API keys and passwords.

HCP Vault Secret
HashiCorp

A managed service that provides a secure way to manage and rotate secrets for your applications and services.

HCP Boundary
HashiCorp

A secure remote access solution that provides simple and dynamic access to your private networks and applications.

Akamai API Security
Akamai

A service that protects your APIs from malicious attacks, misuse, and data exfiltration by enforcing strong security policies and monitoring traffic in real-time.

Akamai Guardicore Segmentation
Akamai

A micro-segmentation solution that helps you achieve a Zero Trust security model by containing attacks and preventing lateral movement within your network.

Sophos Central Cybersecurity - Secure Workloads, Data, Apps, and Access
Sophos

A centralized platform that provides a unified approach to cybersecurity, managing security for your workloads, data, applications, and user access.

Sophos Cloud Optix (CSPM) - PAYG with Free Trial
Sophos

A Cloud Security Posture Management (CSPM) solution that helps you continuously monitor your cloud environments for misconfigurations and compliance issues.

Cybersecurity as a Service for AWS
Sophos

A managed service that provides expert security monitoring, threat detection, and incident response for your AWS environment.

Sophos Endpoint Protection
Sophos

A security solution that protects your endpoints, such as laptops and servers, from malware, ransomware, and other cyber threats.

Sophos Incident Response Services
Sophos

A professional service that provides expert assistance in responding to and recovering from a cyber security incident.

Sophos Managed Detection and Response (MDR) service
Sophos

A 24/7 managed security service that uses human experts to proactively hunt for threats and respond to attacks in your environment.

Cloudbric WMS (WAF Managed Service) for AWS WAF (PAYG)
PentaSecurity

A managed service that provides expert rule management and monitoring for your AWS WAF, protecting your web applications without requiring in-house expertise.

D.AMO KE for Ransomware Protection
PentaSecurity

A data encryption solution that protects your data from ransomware and other malicious attacks by encrypting files and preventing unauthorized access.

Cloudbric WMS (WAF Managed Service) for AWS WAF
PentaSecurity

A managed service for AWS WAF that provides expert security policy management and monitoring to optimize your web application firewall.

Penta Security - D'Amo Data Encryption Solution
PentaSecurity

A comprehensive data encryption solution that secures your sensitive data at rest and in transit.

Cloudbric Private Access Solution (PAS)
PentaSecurity

A Zero Trust Network Access (ZTNA) solution that provides secure and segmented remote access to your applications and networks.

Cloudbric Managed Rules for AWS WAF - OWASP Top 10 Rule Set
PentaSecurity

A set of security rules for AWS WAF that provides protection against the most common web application vulnerabilities listed in the OWASP Top 10.

Cloudbric Managed Rules for AWS WAF - Malicious IP Protection
PentaSecurity

A security rule set for AWS WAF that blocks malicious traffic based on a continuously updated list of known malicious IP addresses.

Cloudbric Managed Rules for AWS WAF - Anonymous IP Protection
PentaSecurity

A security rule set that blocks traffic from anonymous sources, such as Tor networks and VPNs, to mitigate potential threats.

Cloudbric Managed Rules for AWS WAF - Bot Protection
PentaSecurity

A security rule set for AWS WAF that protects your web applications from malicious bots and automated attacks.

Cloudbric Managed Rules for AWS WAF - Tor IP Protection
PentaSecurity

A specific security rule set for AWS WAF that blocks traffic originating from the Tor anonymity network.

Plerion Cloud Security Platform (Contract)
Plerion

A cloud security platform that provides continuous security and compliance monitoring for your multi-cloud environments.

Plerion Cloud Security Platform (Contract + PAYG)
Plerion

A flexible offering of the Plerion platform that combines a contract-based agreement with pay-as-you-go pricing for usage beyond the contracted amount.

Cloudflare Email Security
Cloudflare

A cloud-native email security platform that protects user inboxes from phishing, business email compromise (BEC), and other advanced email threats.

AWS Cloud Security & Privacy Professional Services by Cloudwrxs
Cloudworx

Expert services that help you design and implement robust security and privacy controls for your AWS cloud environment.

Rapid7 Insight Platform
Rapid7

Unify your security operations with a comprehensive platform that delivers visibility, analytics, and automation across your entire attack surface.

InsightVM - Vulnerability Management
Rapid7

Continuously monitor and manage vulnerabilities across your IT infrastructure to reduce cyber risk and improve your security posture.

Rapid7 Managed Threat Complete
Rapid7

Proactively detect and respond to threats with a fully managed service that provides 24/7 security monitoring and expert incident response.

InsightCloudSec - Cloud Risk and Compliance Management
Rapid7

Gain full visibility and control over your cloud security, ensuring continuous compliance and automated risk remediation across multi-cloud environments.

InsightIDR - Next-gen SIEM
Rapid7

Accelerate threat detection and response by correlating security data, logs, and user behavior to identify and investigate malicious activities.

Exposure Command
Rapid7

Understand and manage your organization's digital exposure to threats with a clear, prioritized view of your attack surface.

Vector Command
Rapid7

Automate and orchestrate your security workflows to streamline response and improve the efficiency of your security teams.

Surface Command
Rapid7

Discover and secure your external attack surface by identifying and addressing unknown assets and exposures.

Insight CloudSec - Cloud-Native Application Security
Rapid7

Embed security into your cloud-native application development lifecycle to protect against emerging threats and misconfigurations.

Insight AppSec - Web Application Security
Rapid7

Automatically test your web applications for vulnerabilities and manage security risks throughout development and production.

Deployment and Training Services
Rapid7

Get your security solutions up and running quickly with expert deployment and empower your team with comprehensive training.

Managed Detection and Response (MDR)
Rapid7

Elevate your security with a team of experts who provide 24/7 threat hunting, detection, and response to stop attacks before they cause damage.

Orca Security CNAPP Cloud Security Platform
Orca Security

Achieve comprehensive cloud-native application protection by consolidating visibility, risk management, and security across your entire cloud infrastructure.

Orca Security CNAPP Cloud Security Platform - Unique Expansion
Orca Security

Expand your cloud security capabilities to address unique use cases, providing greater depth and coverage for specialized environments.

Cyber Security Cloud Managed Rules for AWS WAF -HighSecurity OWASP Set-
Cyber Security Cloud

Protect your web applications from the most common and critical threats with managed rules that align with the OWASP Top 10.

WafCharm for AWS Marketplace (Subscription)
Cyber Security Cloud

Automate the management and optimization of your AWS WAF rules, ensuring continuous protection with minimal manual effort.

Cyber Security Cloud Managed Rules for AWS WAF -API Gateway/Serverless-
Cyber Security Cloud

Secure your API Gateway and serverless applications with specialized managed rules designed to protect modern cloud architectures.

Cyber Security Cloud Managed Rules for AWS WAF Classic -OWASP Set-
Cyber Security Cloud

Defend your legacy web applications with a robust set of managed rules based on the classic OWASP guidelines.

CloudFastener for AWS Marketplace (Subscription)
Cyber Security Cloud

Enhance the security of your cloud environment with automated configuration checks and best-practice enforcement to prevent misconfigurations.

Cyber Security Cloud Managed Rules -Protocol Enforcement by WafCharm-
Cyber Security Cloud

Enforce strict protocol adherence to block malicious traffic and protect your applications from protocol-based attacks.

WafCharm for AWS Marketplace (Premium Plan)
Cyber Security Cloud

Gain advanced WAF management and enhanced security with a premium subscription that offers specialized support and more granular controls.

Tenable Vulnerability Management
Tenable

Proactively identify and prioritize vulnerabilities across your modern attack surface, giving you the context needed to reduce risk effectively.

Tenable One [Private Offer Only]
Tenable

Unify your exposure management with a comprehensive solution that helps you see, predict, and reduce cyber risk across all your digital assets.

Tenable Cloud Security [Private Offer Only]
Tenable

Get complete visibility and control over your cloud security posture, from development to production, ensuring continuous compliance and risk reduction.

ServiceNow Security Incident Response integration with AWS Security Hub
ServiceNow

Automate and accelerate your security incident response by integrating with AWS Security Hub, ensuring a faster and more effective reaction to threats.

Okta Customer Identity Cloud (powered by Auth0)
Okta

A customer identity and access management (CIAM) platform that helps you build secure, modern, and engaging customer experiences.