Protegrity
protegrity.com
Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data and bring it to life. The Protegrity Data Protection Software provides the most comprehensive range of protection no matter where your data rests, moves, or is used including on-prem, in the cloud, and everywhere in between.
Satori
satoricyber.com
Satori is a Data Security Platform that allows data teams to enable their users to go fast with their data while meeting security and compliance requirements. This in turn helps companies win with data, and become AI-ready faster. Satori continuously discovers sensitive data across your databases, lakes and warehouses, tracks data usage and applies security policies dynamically. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
Regulait
regulait.com
Regulait Compliance is a set of embedded tools that simplifies and streamlines compliance processes, offering features such as virtual assistance, collaboration tools, multi-framework compatibility, document automation, HR management, access control, vendor oversight, asset tracking, and more. It is a comprehensive solution for organizations in every sector seeking to navigate their regulatory environments, as Regulait is framework agnostic. By using Regulait Compliance Suite, organizations can save time, reduce compliance costs, and minimize risks while maintaining a robust compliance posture.
HighGround
highground.io
Under pressure from the board to make the business safe from Cyber threats, but without enough budget to do so? HighGround enables you to take control of your security experience with a range of security management capabilities. Get access to everything you require to manage all elements of your cyber security based on what you need and when you need it. Key features include Cyber Score, Integrations, Cyber Compliance Manager and ROI tools to help justify security investment and allow you to be subject matter experts. Feel like a Cyber superhero and in turn, sleep that little bit better.
Sonrai Security
sonraisecurity.com
Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and permissions security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. Trusted by leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. The company is trusted by Cloud Operations, Development, and Security Teams. The Cloud Permissions Firewall removes all unused sensitive permissions, quarantines unused identities and disables unused service and regions – all in one click. There is zero disruption to the business because all identities using sensitive permissions maintain their access and any new access is seamlessly granted through an automated chatops workflow. SecOps teams spend 97% less time achieving least privilege and slash the attack surface by 92%. After reaching platform-wide least privilege, the Sonrai CIEM+ solution discovers toxic combinations of permissions and shuts down the unintended attack paths they create with automated or detailed remediation.
Kloudle
kloudle.com
Kloudle is a cloud security scanner for AWS, GCP, DigitalOcean, Kubernetes. It scans your cloud accounts, servers, clusters for 300+ security issues in minutes. Making cloud security effortless for developers and small teams. Compared to the open source scanners Kloudle scans get done under 30 Minutes. There is nothing to install or configure. With issues and their severity calculated Kloudle makes it easy to understand what needs to be fixed. Going beyond with simply giving you the list of security issues, Kloudle features simple steps to fix all the security issues it detects. It also provides potential pitfalls for some of the fixes. Allowing you to make the right choice in terms of what to fix and what not to. With powerful features to mark issues as false positive, report generator to get reports in excel supported csv format, or easy to share PDF Kloudle is focussed on making cloud security effortless for its users. With the credit based pay as you go model, buying and getting value for the money spent is also super smooth and worry free. Never have to worry about usage etc. Pricing for the scans starts from $30 onwards.
Carbide
carbidesecure.com
Carbide is an information security and privacy management platform designed to help fast-growing companies develop and maintain a robust security posture. Leverage Carbide’s continuous cloud monitoring, in-platform security awareness training via Carbide Academy, and 100+ technical integrations to save time and resources as you collect evidence and meet security framework controls and requirements to pass security audits. Unlike “checkbox-style” compliance solutions, our is based on universal best practices to enable customers to create, implement, and prove their commitment to security, continuously, with Carbide’s supported security frameworks: SOC 2, ISO, 27001, NIST 800-53, NIST 800-171, FedRAMP, HIPAA and more. By making it easy to embed security and privacy into the DNA of your organization, Carbide can help sharpen your competitive edge and accelerate your company’s growth trajectory.
Strike Graph
strikegraph.com
Strike Graph is a compliance operation and certification platform that empowers companies to achieve the security certifications they need to unlock revenue and build trust with customers at a fraction of the cost and time of traditional audit solutions.
Apptega
apptega.com
Tired of spreadsheets that don’t scale and require too much manual effort? Hampered by overly complex IT GRC systems that have you working for them? Apptega is the cybersecurity and compliance management platform that makes it easy to assess, build, manage, and report your cybersecurity and compliance program. Organizations in all industries and MSSPs rely on Apptega to meet the challenges of cybersecurity and compliance more efficiently and cost-effectively than with any other approach. Featuring 25+ frameworks, including SOC 2, NIST, CMMC, ISO, CIS, PCI, GDPR, HIPAA and more, and manage your program with: - Multi-Tenant - Assessments - Compliance Scoring - Risk Management - Vendor Risk Management - Audit Management - Reporting - Integrations
Thoropass
thoropass.com
Thoropass (previously known as Laika) Relying on compliance software that doesn’t include the auditor is like buying a car without an engine; it looks nice but doesn’t get you where you need to go. Thoropass is the only compliance and audit solution that truly gives you everything you need without surprises or gaps: in-house auditors and the automation of evidence collection in a single process and place. From day one, you use a single platform to implement, manage, and monitor your compliance and security stance while our auditor-approved monitors automatically collect evidence for the audit conducted by one of our experienced in-house auditors. With automation and integrations, you can demonstrate compliance to multiple frameworks–including SOC 1, SOC 2, HITRUST, ISO 2700X, and PCI–in a single audit on a single platform. By partnering with Thoropass, you can feel confident that an otherwise complicated process will be frictionless and predictable, allowing you to reduce cost, build trust, and focus on things that matter most to your business.
Orca Security
orca.security
The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google Cloud, Kubernetes, Alibaba Cloud, and Oracle Cloud. Orca offers the industry’s most comprehensive cloud security solution in a single platform — eliminating the need to deploy and maintain multiple point solutions. Orca is agentless-first, and connects to your environment in minutes using Orca’s patented SideScanning™ technology that provides deep and wide visibility into your cloud environment, without requiring agents. In addition, Orca can integrate with third-party agents for runtime visibility and protection for critical workloads. Orca is at the forefront of leveraging Generative AI for simplified investigations and accelerated remediation – reducing required skill levels and saving cloud security, DevOps, and development teams time and effort, while significantly improving security outcomes. As a Cloud Native Application Protection Platform (CNAPP), Orca consolidates many point solutions in one platform, including: CSPM, CWPP, CIEM, Vulnerability Management, Container and Kubernetes Security, DSPM, API Security, CDR, Multi-cloud Compliance, Shift Left Security, and AI-SPM.
ComplyCloud
complycloud.com
ComplyCloud is the only software you need to ensure your data protection and IT security compliance. It combines legal and IT expertise with software to automate all your compliance management and provide you with the mandatory documentation output. You can look forward to spending more time where it matters for your business since its platform saves you up to 80% of your compliance workload. You get a combined GDPR & NIS2 expert and project manager at your fingertips. With this, all you need for GDPR and NIS2 compliance is included, easy to implement, intuitive, and automated. Its software is developed and kept up to date by EU data protection lawyers and IT security experts. Unlike any other solution, ComplyCloud combines compliance software with legal expertise, which gives you as its customer legal knowledge, guidance, and support. All of the above is the result of its shared fight for the right to privacy. It wants a world where compliance is easy to achieve, fair, and transparent for all. That’s why it aims to empower organizations to protect personal data and infrastructure in a cost- and time-efficient way. This is not 'only' good for the organizations but also for society and democracy.
Skypher
skypher.co
Skypher is a cloud-based software that automates response to security questionnaires for leading and modern software companies companies from startups to Fortune 500. Skypher combines best of both worlds: use your knowledge base to automatically respond to your clients custom security questionnaires while keeping a library of standard questionnaires for the SIG, CAIQ and others. Skypher allows you to: - Complete security questionnaires 10x faster thanks to our NLP technology - Breeze through online platforms questionnaires with our powerful browser extension - Easily communicate your security posture with clients and prospects (document sharing, security reports generation)
Arpio
arpio.io
Arpio is the only disaster recovery platform built specifically for AWS. Unlike legacy solutions, Arpio was built for the cloud. It automatically replicates your entire cloud environment -- data, servers, and infrastructure -- so you get complete protection and immediate recovery if disaster strikes. Key Features: - Total Environment (Data and Infrastructure) Recovery: Unlike traditional DR tools, Arpio recognizes and replicates everything your cloud workloads need to run - Automated, Dynamic Environment Replication: Arpio understands how to replicate your entire environment—data and infrastructure—and rebuild it in an alternate environment, so you can seamlessly recover from any disaster. - Testing: Arpio spins up your recovery environment using automation, in parallel while your production environment is still actively taking traffic - Ransomware Recovery: Arpio uses a multi-account protocol, which means that backups are stored in an immutable “bunker” account. Arpio supports cross-region and cross-account replication for all your workloads and provides vaulted, air-gapped protection for your business-critical data and infrastructure. Arpio supports 105+ AWS resources across nearly 30 services, with support for new services being added regularly.
Telivy
telivy.com
Elevate your cyber security audits. Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script.
Redstor
redstor.com
Redstor is a leading provider of cloud-based, on-premise and hybrid data backup and recovery services, its mission is to make data management simpler, easier and more pleasurable, providing instant access to all data - wherever it's stored, from a single control centre. It assists thousands of businesses worldwide (used by defence and Governments) to protect one of their most valuable assets: their data. It helps businesses be GDPR compliant – complies with the highest standards (ISO27001 and 9001 certified) to ensure the integrity and security of data. Small businesses need an affordable secure, robust, easy to manage backup and recovery solution: * 50% could not withstand any amount of data loss whatsoever * Around 80% experience a shutdown if they can’t get to their data Multi-tenanted and built for the cloud, Redstor’s MSP backup and recovery solutions enable you to profitably satisfy every user’s expectations for instant access to the data, files and operating systems they need, whenever they need them - locally and in the cloud.
Openli
openli.com
Openli automates the process of vetting and managing your data processors, and we create your RoPA for you. In minutes. Founded in Copenhagen, Denmark, on a strong belief that the importance of privacy should make it more manageable for legal teams. Our solution is The Privacy Hub. A platform that does the management, outreach, and vetting of all your data processors, and stores all relevant vendor information. By the book and at your fingertips. Upload your own information in the Hub for easy access. Share your privacy efforts with customers, stakeholders and prospects with just a few clicks. Let your team support Sales with less resources. Help close deals faster. Our customers say we take serious amounts of monotonous admin off their hands. That the platform “provides the single most valuable software solution to scale our legal operations”. We say privacy is important work - but it doesn’t have to be your work.
ResponsiveAds
responsiveads.com
ResponsiveAds™ is the leading engagement-driving creative automation ad tech for brands, agencies & publishers to produce, deliver & optimize high-impact HTML5 ads that adapt to any size, shape, or variant. We simplify resizing rich-media ads. — Thus accelerating revenue lift.
ECOMPLY.io
ecomply.io
The ECOMPLY software supports you with data protection audits, the register of processing activities, TOM, incidents, data subject inquiries and risk management.
Panoptica
panoptica.app
Panoptica is Cisco’s powerful cloud native application protection platform that uncovers and remediates vulnerabilities during development through to production, ensuring your applications are secure and compliant. Through graph-based technology, the platform is able to unlock visual insights, critical attack paths, and speed up remediation to safeguard your modern apps across multiple hybrid cloud platforms. Visit https://www.panoptica.app Key Features: - Visibility and Context: Panoptica offers clear visibility and context by identifying attack paths and prioritizing risks, helping you make informed decisions. - Holistic and Complete Coverage: Manage your cloud-native environments effortlessly through Panoptica's integrated security platform, reducing gaps often caused by using separate siloed solutions. - Advanced Analysis: Utilize advanced attack path and root cause analysis techniques to spot potential risks from an attacker's perspective. - Agentless Scanning: Panoptica's agentless technology scans any cloud environment—Azure, AWS, GCP, Kubernetes, or a combination thereof. - Comprehensive Visualization: Map assets and relationships onto an advanced graph database for a complete visual representation of your cloud stack. Benefits - Advanced CNAPP: Panoptica enhances Cloud Native Application Protection Platform capabilities. - Multi-Cloud Compliance: Ensure compliance across various cloud platforms. - End-to-End Visualization: Gain insights into your entire cloud application stack. - Dynamic Remediation: Employ dynamic techniques to resolve issues effectively. - Increased Efficiency: Streamline security processes and reduce response times. - Reduced Overheads: Minimize resource expenditure while optimizing security.
Cypago
cypago.com
The revolutionary Cypago Cyber GRC Automation (CGA) Platform combines the strength of SaaS architecture and advanced Correlation Engines, GenAI, and NLP based automation with an intuitive user experience, delivering complete coverage across all security frameworks and IT environments. The platform enables organizations to increase security and GRC maturity through simplified cross-functional workflows, reduced manual efforts, and lower costs–all while reinforcing trust with their customers and stakeholders.
Lacework
lacework.com
Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run. Lacework empowers customers to prioritize risks, find known and unknown threats faster, achieve continuous cloud compliance, and develop secure code without slowing down, all from one unified platform. Since our founding in 2017, Lacework has been refining a single cloud-native platform to ingest and comprehend as much data as possible to provide the best security possible — by both agent-based or agentless means. Our unified platform then uses this data to accomplish common cloud use cases: posture management, workload protection, vulnerability management, compliance, container security, and more. Customers depend on Lacework to drive revenue, bring products to market faster and safer, and consolidate point security solutions into a single platform. Our platform, on average, replaces 2 to 5 point tools. Customers average a 100:1 reduction in alert noise thanks to our patented anomaly detection technology. And Lacework users have experienced 80% faster investigations with our context-rich alerts.
Conveyor
conveyor.com
Fast, easy, accurate security reviews for your SaaS vendors. We're on a mission to make security reviews massively better for everyone! Find & follow vendors to quickly assess their security posture. Connect with them to get access to SOC 2 reports & other security artifacts.
© 2025 WebCatalog, Inc.