App store for web apps

Find the right software and services.

WebCatalog Desktop

Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.

Top System Security Software - United States

System Security Software encompasses a broad range of tools and technologies designed to protect computer systems, networks, and devices from unauthorized access, cyber threats, malware, and other security vulnerabilities. This category includes software solutions that secure both endpoint devices (like PCs, laptops, and mobile devices) and server infrastructures by defending against a variety of attacks such as viruses, ransomware, spyware, and phishing attempts. System security software typically focuses on maintaining the confidentiality, integrity, and availability of systems and data, ensuring that they are resilient to both external and internal threats. It offers essential capabilities for threat detection, prevention, and response, and is widely used by businesses and organizations to protect sensitive data, secure communications, and maintain operational continuity.

Submit New App


ConnectWise Manage

ConnectWise Manage

connectwise.com

Made for companies that sell, service, and support technology, ConnectWise PSA (formerly ConnectWise Manage) is the leading business management platform worldwide. Technology Solution Providers (TSPs) rely on ConnectWise PSA to achieve greater accountability, operational efficiency, and profitability. Leveraging the cloud, ConnectWise PSA facilitates business-process automation, help desk management and customer service, sales, marketing, project management, and business analytics that dramatically streamline a company's operations. ConnectWise PSA is the centralized hub that gives TSPs an end-to-end view and total control over their business. ConnectWise PSA also gives its users access to a powerful network of ideas, experts, and solutions. A veteran in the technology services industry, ConnectWise PSA has been the premier business management platform for technology companies for more than 15 years.

Datadog

Datadog

datadoghq.com

Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

ConnectWise Home

ConnectWise Home

connectwise.com

Made for companies that sell, service, and support technology, ConnectWise PSA (formerly ConnectWise Manage) is the leading business management platform worldwide. Technology Solution Providers (TSPs) rely on ConnectWise PSA to achieve greater accountability, operational efficiency, and profitability. Leveraging the cloud, ConnectWise PSA facilitates business-process automation, help desk management and customer service, sales, marketing, project management, and business analytics that dramatically streamline a company's operations. ConnectWise PSA is the centralized hub that gives TSPs an end-to-end view and total control over their business. ConnectWise PSA also gives its users access to a powerful network of ideas, experts, and solutions. A veteran in the technology services industry, ConnectWise PSA has been the premier business management platform for technology companies for more than 15 years.

VirusTotal

VirusTotal

virustotal.com

Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.

ServiceNow

ServiceNow

servicenow.com

ServiceNow (NYSE: NOW) makes the world work better for everyone. Our cloud-based platform and solutions help digitize and unify organizations so that they can find smarter, faster, better ways to make work flow. So employees and customers can be more connected, more innovative, and more agile. And we can all create the future we imagine. The world works with ServiceNow.

n8n.cloud

n8n.cloud

n8n.cloud

Secure and AI-native workflow automation tool for technical people with hundreds of native nodes. Insert code when you need it and host it on your own infrastructure. With 40k+ Github Stars, n8n is supported by a fast-growing community of thousands of developers and users building automation workflows and LLM apps.

Haltdos

Haltdos

haltdos.com

Haltdos Remote Access Gateway is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote access VPN capability. It enables devices with an internet connection to establish a secure remote access VPN connection with a web browser. The Haltdos Remote Access Gateway connection uses end-to-end encryption (E2EE) to protect data transmitted between the endpoint device client software and the SSL VPN server through which the client connects securely to the internet.

Elastic Cloud

Elastic Cloud

elastic.co

Enterprise search, observability, and security for the cloud. Quickly and easily find information, gain insights, and protect your technology investment whether you run on Amazon Web Services, Microsoft Azure, or Google Cloud.

ActivTrak

ActivTrak

activtrak.com

ActivTrak’s workforce analytics help hybrid workplaces boost productivity and maximize results. The company’s highly scalable, cloud-native SaaS solution gives users visibility into people, processes and technology that mitigate risk and uncertainty, and provide the basis for long-term success. This includes ensuring workforce activity adheres to policies and expectations; improving team productivity and performance; and effectively allocating workforce investments. The solution is unique for its privacy-first analytics that exclude employees’ personal identifiable information and non-business activity from reporting. Based in Austin, Texas, ActivTrak is led by a seasoned team of software industry veterans.

Logz.io

Logz.io

logz.io

Logz.io helps cloud-native businesses monitor and secure their environment. The Logz.io Open 360TM Platform turns observability from a high-cost, low-value burden to a high-value, cost-efficient enabler of better business outcomes by combining and extending familiar, powerful and relevant Open Source capabilities across Logs, Metrics and Traces – complemented by security monitoring in the form of cloud-based SIEM. Now developers and engineers can employ an end-to-end, cloud-native observability stack built on scalable and easy-to-use Open Source using a single UI and unified agent – at a cost that anyone can afford. Unlock proactive troubleshooting, faster product delivery and a fully supported SaaS observability platform, all while compounding efficiencies in time and cost.

ANY.RUN

ANY.RUN

any.run

Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.

Mimecast

Mimecast

mimecast.com

Mimecast's AI-powered Advanced Email Security blocks the most dangerous email-borne attacks, from phishing and ransomware to social engineering, payment fraud, and impersonation. With Mimecast's Advanced Email Security you get: - The industry's best protection: Block email-based threats with AI-powered, industry-leading detection trusted by more than 42,000 customers. - Deployment flexibility: Choose your deployment option - email security delivered with or without a gateway. - AI-powered, world-class detection: Apply the power of AI, machine learning, and social graphing to make security smarter and empower employees.

Hybrid Analysis

Hybrid Analysis

hybrid-analysis.com

Submit malware for free analysis with Falcon Sandbox and Hybrid Analysis technology. Hybrid Analysis develops and licenses analysis tools to fight malware.

N-Able Passportal

N-Able Passportal

passportalmsp.com

N-able Passportal offers professional Password Management and Documentation Management for managed services and IT solutions providers.

Dataminr

Dataminr

dataminr.com

Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Dataminr's leading AI platform detects the earliest signals of high-impact events and emerging risks from vast amounts of publicly available information. Dataminr's real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.

Privacy Bee

Privacy Bee

privacybee.com

Remember that file sharing site you created an account on 5 years ago? Did you ever go back and delete your account, or did you just abandon it and never return? If it was the latter, that means you’re still in that company’s database half a decade later. Some data was freely given to a company years ago (and forgotten), but most of it is bought and sold through a massive network of data brokers. It’s a multi-billion dollar surveillance industry that few people know exists. Privacy Bee is your partner in data protection. We scrub away personal and work data for your executives and employees, deleting it from corporate databases so that it doesn’t end up in the wrong hands. We accomplish this by reaching out to corporations and more than 150,000 websites to make removal requests on your behalf. With each deletion, your most sensitive business data less likely to be hacked! Reach out today to get the most comprehensive data privacy service on the market.

Proofpoint

Proofpoint

proofpoint.com

Proofpoint, Inc. is an American enterprise security company based in Sunnyvale, California that provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving.

Tines

Tines

tines.com

Tines is the smart, secure workflow builder for your whole team. You can use Tines to build any workflow or process – regardless of complexity. Get up and running in minutes, not days or weeks. There's no code, and no custom development. Teams at McKesson, Mars, and Oak Ridge National Laboratory trust Tines to power their most important workflows. The result? Greater efficiency, reduced risk, and more time to do the work that matters most. You can start building right away, by signing up for our always-free Community Edition and importing one of our pre-built workflows from the library.

Bitdefender GravityZone

Bitdefender GravityZone

bitdefender.com

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and xchange mail servers. GravityZone is one product with a unified management console available in the cloud, hosted by Bitdefender, or as one virtual appliance to be installed on company's premises, and it provides a single point for deploying, enforcing and managing security policies for any number of endpoints and of any type, in any location. GravityZone delivers multiple layers of security for endpoints and for Microsoft Exchange mail servers: antimalware with behavioral monitoring, zero day threat protection, application control and sandboxing, firewall, device control, content control, anti-phishing and antispam.

Splunk

Splunk

splunk.com

Splunk Inc. is an American technology company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a Web-style interface.The Splunk Enterprise and Enterprise Cloud solutions capture, index and correlate real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.Splunk makes machine data accessible across an organization by identifying data patterns, providing metrics, diagnosing problems and providing intelligence for business operations. Splunk is a horizontal technology used for application management, security and compliance, as well as business and web analytics. Recently, Splunk has also begun developing machine learning and data solutions for BizOps.

Sumo Logic

Sumo Logic

sumologic.com

Sumo Logic, Inc. is a cloud-based machine data analytics company focusing on security, operations and BI usecases. It provides log management and analytics services that leverage machine-generated big data to deliver real-time IT insights. Headquartered in Redwood City, California, Sumo Logic was founded in April 2010 by ArcSight veterans Kumar Saurabh and Christian Beedgen, and has received funding from Accel Partners, DFJ Growth, Greylock Partners, Institutional Venture Partners, Sequoia Capital, Sapphire Ventures, Sutter Hill Ventures, angel investor Shlomo Kramer, Battery Ventures, Tiger Global Management and Franklin Templeton. As of May 2019, the company has collected VC funding totaling $345 million.On September 17, 2020 Sumo Logic debuted on the NASDAQ stock exchange in its initial public offering as a public company.

OneTrust

OneTrust

onetrust.com

Trust Intelligence Platform helps organizations connect data, teams, and processes. OneTrust’s mission is to enable the responsible use of data and AI. Its platform simplifies the collection of data with consent and preferences, automates the governance of data with integrated risk management across privacy, security, IT/tech, third-party, and AI risk, and activates the responsible use of data by applying and enforcing data policies across the entire data estate and lifecycle. OneTrust supports seamless collaboration between data teams and risk teams to drive rapid and trusted innovation. Recognized as a market pioneer and leader, OneTrust boasts over 300 patents and serves more than 14,000 customers globally, ranging from industry giants to small businesses. * Consent & Preferences: Streamline consent and preference management for consumer transparency. * Privacy Automation: Enable responsible use throughout the data lifecycle by operationalizing your privacy program. * Tech Risk & Compliance: Scale your resources and optimize your risk and compliance lifecycle. * Third-Party Management: Automate third-party management from intake to risk assessment, mitigation, ongoing monitoring, and reporting.

Cybereason

Cybereason

cybereason.com

Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services.

Sophos Central

Sophos Central

sophos.com

Defend your organization from cyberattacks with Sophos adaptive defenses and expertise at your service. Protect the future of your business with confidence.

Optery

Optery

optery.com

Remove Yourself from Dozens of Data Brokers all in One Place. Sign up for free to receive your personalized Exposure Report. Upgrade to a paid plan, and we’ll submit the removals for you. We cover 150+ data brokers – more than any other service – and offer a 30-day, no questions asked, money back guarantee!

BMC

BMC

bmc.com

BMC helps customers run and reinvent their businesses with open, scalable, and modular solutions to complex IT problems. BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.

SolarWinds

SolarWinds

solarwinds.com

The Help Desk Essentials Pack is the combination of Solarwinds® Web Help Desk and Dameware Remote Support. They integrate to save you time by automating and simplifying help desk and IT remote support tasks. Key features: • Centralized ticketing and incident management • IT asset management (ITAM) with automated discovery and centralized inventory • Built-in knowledge base for self-service • IT change management and customizable approval workflows • Reporting, SLA alerts, and customer surveys • Remote control Windows®, Mac OS® X and Linux® systems • Built-in tools for system monitoring, event log viewing, and network diagnostics without initiating a full remote session • Remote access to support end-users outside the firewall

Guardz

Guardz

guardz.com

Guardz is a leading unified cybersecurity solution designed for managed service providers (MSPs), empowering them to protect their clients from evolving digital threats by leveraging AI and a multilayered approach to combat phishing, ransomware attacks, data loss, and user risks. Our technology streamlines cybersecurity by automating the detection and response process across user data, devices, emails, and cloud directories, all in a single pane of glass. At Guardz, we are committed to your peace of mind and business continuity. Integrating top-tier cybersecurity technology with deep insurance expertise ensures your security measures are consistently monitored, managed, and optimized.

Blink

Blink

blinkops.com

Automate all things security in the Blink of AI. Blink is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless. Whether you prefer code, low-code, or no-code, Blink has got you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt. Use Blink as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.

Factal

Factal

factal.com

Factal gives companies the facts they need in real time to protect people, avoid disruptions and drive automation when the unexpected happens. Factal combines lightning-fast discovery with trusted verification into a single platform, outpacing other breaking news sources. Experienced journalists use machine learning to identify, verify and geolocate global incidents, sending sophisticated alerts through email, web, and both iOS and Android apps.

Dynatrace

Dynatrace

dynatrace.com

Dynatrace exists to make software work perfectly. Our platform combines broad and deep observability and continuous runtime application security with advanced AIOps to provide answers and intelligent automation from data. This enables innovators to modernize and automate cloud operations, deliver software faster and more securely, and ensure flawless digital experiences.

Coralogix

Coralogix

coralogix.com

Coralogix is a full-stack observability platform that provides infinite insights for logs, metrics, tracing, and security data when and where you need them. Unique Streama© technology is used to analyze observability data in-stream without relying on indexing, meaning that your data — all of it — informs your product, operations, and business. Components within the stream store the system state to provide stateful insights and real-time alerting without ever needing to index the data — so there are never any trade-offs to achieve observability. Once ingested, parsed, and enriched, data is written remotely to an archive bucket controlled by the client. The archive can be queried directly at any time, from the platform UI or via CLI, giving users infinite retention with full control over, and access to, their data. View and query your data from any dashboard using any syntax. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.

Lockwell

Lockwell

lockwell.co

Lockwell is the easiest and most affordable way to secure your small business from cyber threats. In an age where cyber threats lurk behind every digital corner, businesses require a robust, integrated security solution that safeguards every aspect of their online presence. Enter Lockwell, a comprehensive cybersecurity suite meticulously designed to offer unparalleled protection in a rapidly evolving digital landscape. Encrypted Password Vault: At the heart of every security strategy lies the safeguarding of accounts. Lockwell's end-to-end encrypted password vault isn't just a secure storage solution; it's a digital fortress. Whether you're importing or manually adding account details, every piece of data is enveloped in layers of encryption. Integrated 2FA ensures an added layer of security, while custom fields allow for tailored data storage. Plus, the built-in team collaboration feature ensures that work accounts and sensitive company data can be seamlessly and safely shared among team members. Device Protection with Anti-Malware: In today's world, malware threats evolve daily. Lockwell's next-gen Anti-Malware tool is ever-vigilant, ensuring your company's devices remain impervious to ransomware, viruses, and other malicious entities. Real-time protection means that the moment a user encounters a potentially harmful file, our system springs into action, identifying and neutralizing the threat. Users can also initiate manual scans, providing peace of mind that their devices remain uncompromised. VPN for Secure Browsing: The internet, vast and invaluable, is also a realm of lurking threats. With Lockwell's VPN, your team can securely traverse the digital highways. Every byte of data is encrypted, ensuring protection against unsecured networks, man-in-the-middle attacks, and intrusive data snooping. Whether accessing sensitive company data or just browsing, our VPN ensures a cloak of invisibility against prying eyes. 24/7 Dark Web Monitoring: The underbelly of the internet, the dark web, is a marketplace for compromised credentials. Lockwell's round-the-clock monitoring scours this hidden realm, ensuring that if your data is ever found here, you'll be the first to know. Instant alerts are dispatched the moment a potential breach is detected, allowing for swift corrective action. Automated Security Center: Perhaps the crown jewel of Lockwell's suite, the Automated Security Center, is a testament to our commitment to proactive protection. This autonomous entity constantly monitors the cyber realm, identifying threats even before they materialize. If a vulnerability is detected, be it a weak password, malware presence, or any other threat, instant alerts are dispatched via email and desktop notifications. This ensures that your team is always one step ahead of potential breaches. Why Choose Lockwell? Automated by Default: Cyber threats are identified in real-time, with coordinated alerts ensuring prompt action. Time & Cost Efficiency: Regular monitoring identifies unused software or devices, translating to tangible time and cost savings. Autonomous Operation: The Automated Security Center operates independently, integrating seamlessly with all security tools, minimizing oversight needs. No IT Staff Required: Enjoy the luxury of top-tier protection without the need for a dedicated IT team or extensive training. Lockwell isn’t just cybersecurity; it's a promise—a promise of uncompromised protection, seamless integration, and the peace of mind that every business deserves. When it comes to defending against relentless cyberattacks, Lock up. Lockwell.

DOCGuard

DOCGuard

docguard.io

DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office documents, PDFs, and other file types, providing detailed reports to enhance security measures. Our innovative technology ensures rapid detection with high accuracy, helping organizations protect against evolving cyber threats. Inline SMTP Integration: DOCGuard can be integrated with email systems to analyze incoming and outgoing emails for malicious content. By adding an additional SMTP header with the email's verdict, DOCGuard ensures that only secure emails reach the recipients, while suspicious emails trigger alerts and are blocked if necessary. BCC Integration: DOCGuard can use BCC (Blind Carbon Copy) to analyze emails without interrupting the normal email flow. This allows for continuous monitoring of all emails, providing an additional layer of security by detecting and blocking malicious content before it reaches the intended recipient. SOAR Integration: Security Orchestration, Automation, and Response (SOAR) platforms can leverage DOCGuard's API to validate alerts and enhance incident response. DOCGuard can provide detailed analysis of suspicious files, helping security teams respond more effectively to threats. Incident Response: During digital forensics and incident response (DFIR), DOCGuard can be used to analyze compromised documents and identify indicators of compromise (IOCs). This helps in tracing the source of an attack and understanding the tactics used by threat actors. File Sharing Platforms Integration: DOCGuard can be integrated with file-sharing platforms to ensure that shared documents

Mandiant

Mandiant

mandiant.com

Mandiant provides solutions that protect organizations against cyber security attacks, leveraging innovative technology and expertise from the frontlines.

Secureworks

Secureworks

secureworks.com

We protect organizations by providing battle-tested cybersecurity solutions to reduce risks, improve security operations & accelerate ROI for Security & IT teams.

Deepwatch

Deepwatch

deepwatch.com

Deepwatch® is the leading managed security platform for the cyber resilient enterprise. The Deepwatch Managed Security Platform and security experts provide enterprises with 24x7x365 cyber resilience, rapid detections, high fidelity alerts, reduced false positives, and automated actions. We operate as an extension of cybersecurity teams by delivering unrivaled security expertise, unparalleled visibility across your attack surface, precision response to threats, and the best return on your security investments. The Deepwatch Managed Security Platform is trusted by many of the world’s leading brands to improve their security posture, cyber resilience, and peace of mind. Deepwatch is: - Splunk AMER Marketing Partner of the Year 2023 - CRN Tech Innovators Winner 2023 - Great Place to Work® Certified 2020-2023 - Forbes 2023 Best Startup Employers - Equity Investments and Strategic Financing from Springcoast Capital Partners, Splunk Ventures and Vista Credit Partners: $180 million in 2023 - Goldman Sachs portfolio company: $53m Series B investment 2020 What We Do The Deepwatch Managed Security Platform combines the most comprehensive advanced threat detection and response capabilities backed by security experts. Deepwatch experts include Deepwatch Squads for around the clock monitoring and support as well as our Deepwatch ATI (Adversary Tactics and Intelligence) team who continually hunt for adversarial tactics and actionable threat intelligence. With our platform, you get more value from your existing tools, increased visibility across your attack surface, reduced alert volume and false positives, and continually improved security posture to maximize your cyber resilience.

Heimdal

Heimdal

heimdalsecurity.com

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layered security suite that combines threat prevention, patch and asset management, endpoint rights management, and antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses Threat Prevention Endpoint, Threat Prevention Network, Patch & Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection & Response, as well as eXtended Detection & Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.

Recorded Future

Recorded Future

recordedfuture.com

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,800 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.

DoControl

DoControl

docontrol.io

DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.

DATEV

DATEV

datev.de

DATEV in one sentence: tax consultants, lawyers, auditors, small and medium-sized enterprises, municipalities, and founders using DATEV software that meets all requirements at high standards regarding reliability, topicality, data protection, and data security portrait DATEV’s history is a story of persistent expansion: founded in Nuremberg, Germany in 1966, DATEV consistently developed from a national service provider to one operating throughout Europe. With increasing globalization, DATEV fulfills the task according to its statutes, namely supporting its members domestically and abroad. DATEV has its headquarters in Nuremberg, Germany, an Information Office in Brussels, Belgium, and associated companies in Italy, Austria, Poland, the Czech Republic, Hungary, and Slovakia. The DATEV principle Each auditor and tax consultant has his or her own performance profile, different clients, personal requirements and individual working practice. Therefore, DATEV's offer is a flexible modular concept made up of software, services and knowledge, open for every specialization, office size and structure. Entrepreneur and tax consultant DATEV supports the cooperation of auditors'​ and tax consultants'​ offices and companies. An individually adjusted distribution and interlocking of working processes develops synergy potentials; for example in the accounting sector. DATEV provides the ideal software for task sharing. The DATEV computer center works as a data turntable.

Threat Zone

Threat Zone

threat.zone

Threat.Zone is a hypervisor-based, automated and interactive tool for analyzing malware , you can fight new generation malwares.

Pendulums

Pendulums

pendulums.io

Manage and track your time more efficiently using a modern time tracking tool. Pendulums is a free time tracking tool which helps you to manage your time in a better manner with an easy to use interface and useful statistics.

Brandefense

Brandefense

brandefense.io

Brandefense is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark, deep and surface web, to discover unknown events, automatically prioritize risks and deliver actionable intelligence you can use instantly to improve security.

Coro

Coro

coro.net

Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity. With Coro, everybody can be a cybersecurity expert. Coro takes minutes to master and is designed to remove cybersecurity from your to-do list. Coro is powered by artificial intelligence that does the work for you. Our AI remediates 95% of threats, the rest you can handle with Coro’s unique One-Click-Resolve. Coro believes you have a right to enterprise-grade cybersecurity, regardless of your size. Get cybersecurity like you've never seen. Try Coro today.

CrowdStrike

CrowdStrike

crowdstrike.com

Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection. We protect your cloud. You run your business.

PhishLabs

PhishLabs

phishlabs.com

Fortra's PhishLabs is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, account takeover, data leakage and social media threat protection in one complete solution for the world’s leading brands and companies. For more information, visit https://www.phishlabs.com. A Key Part of Fortra (the new face of HelpSystems) PhishLabs is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of powerful protection from PhishLabs and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.

Dispel

Dispel

dispel.com

Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session recording; disposable systems to protect from ransomware and malware; Moving Target Defense-based SD-WAN connections to facilities; and access control list (ACL) enforcement. Together, the Dispel remote access platform gives utilities, manufacturing, and other OT operators control over third-party and internal employee access to their systems.

Pentera

Pentera

pentera.io

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. Its customers include Casey's General Stores, Emeria, LuLu International Exchange, IP Telecom PT, BrewDog, City National Bank, Schmitz Cargobull, and MBC Group. Pentera is backed by leading investors such as K1 Investment Management, Insight Partners, Blackstone, Evolution Equity Partners, and AWZ. Visit https://pentera.io/ for more information.

Defense.com

Defense.com

defense.com

Defense.com is an XDR platform that contains everything your organisation needs to detect and respond to cyber threats across all areas of your network, without the enterprise price tag or complexity. Without a solution like Defense.com, you can spend a lot of time and resources manually correlating data from multiple, disparate security tools in order to identify and remediate cyber threats. Defense.com ingests and correlates native and third-party security data from all areas of your environment into a single detection and response platform, helping you to quickly identify threats and prevent breaches. In addition to threat detection and response, the Defense.com platform also helps your organisation strengthen its security posture with built-in vulnerability scanning, endpoint protection, external attack surface monitoring and security awareness training. Managed services Small and medium sized organisations often lack the time or resources to properly monitor their environment, forcing them to settle for just business hours coverage. Defense.com solves this challenge with a 24/7 Managed SIEM service, backed by our in-house SOC analysts and our advanced log monitoring technology. We can take the pressure off your team by monitoring your organisation's environment on your behalf, alerting you to genuine threats and providing detailed remediation advice to help fix issues fast. Why choose Defense.com? Unlike many other providers on the market that operate as MSSPs with third party technology, Defense.com has developed a proprietary SIEM platform that delivers advanced threat detection capabilities and can ingest logs from any system or vendor. This enables organisations to make the most out of their existing security investments, break free from vendor lock-in, and monitor everything in their environment for security threats. We also operate our own in-house SOC team, who provide 24/7 proactive threat detection and log monitoring. Our managed services alleviate the pressure on IT teams by proactively looking for malicious activity in their networks and raising security alerts to their attention, saving them time and ensuring that they only focus on genuine risks. Existing vendors on the market provide complex and expensive solutions that are usually tailored to enterprise organisations with in-house SecOps teams. Defense.com stands out as a more accessible alternative for SMEs in comparison to the current MDR and XDR category leaders.

Rapid7

Rapid7

rapid7.com

Accelerate cloud transformation with practitioner-first cybersecurity solutions. Level up SecOps capabilities with MDR, XDR, SIEM, threat intel, and VM. Confidently act to prevent breaches with a leading MDR partner. Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.

Phish.Report

Phish.Report

phish.report

Phish.Report lets you quickly report any phishing site with an interactive guide. The abuse contact database means you're always reporting to the right place.

Reflectiz

Reflectiz

reflectiz.com

Reflectiz keeps online businesses safe by mitigating security and privacy risks resulting from next generation third-party threats on your website, without adding a single line of code.

Blumira

Blumira

blumira.com

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platform. Our all-in-one solution combines SIEM, endpoint visibility and automated response to reduce complexity, provide broad visibility and speed up our time to respond. Our automated platform detects and immediately contains threats, alleviating the burden on IT teams that can’t work around the clock. The platform includes: - Managed detections for automated threat hunting to identify attacks early - Automated response to contain and block threats immediately - One year of data retention and option to extend to satisfy compliance - Advanced reporting and dashboards for forensics and easy investigation - Lightweight agent for endpoint visibility and response - 24/7 Security Operations (SecOps) support for critical priority issues

Devo EU

Devo EU

devo.com

Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most.

Devo US

Devo US

devo.com

Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most.

Shuffle

Shuffle

shuffler.io

Shuffle is an open source automation platform for security professionals (SOAR). Run it locally: https://github.com/frikky/shuffle Try it out here: https://shuffler.io/register Join the community: https://discord.gg/B2CBzUm

RocketCyber

RocketCyber

rocketcyber.com

RocketCyber’s Managed SOC (security operation center) is a managed detection and response service that leverages RocketCyber’s Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint | Network | Cloud. This service is comprised of an elite team of security veterans and experts who proactively hunt and investigate threat activity, perform the triage of detections, and work with your team on the remediation when an actionable threat is discovered.

UnderDefense

UnderDefense

underdefense.com

Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate you security stack Why UnderDefense is your vendor of choice? Seamless integration with your current security stack Don’t waste money and time on redevelopment or purchasing new security tools imposed on you by service providers. Benefit from a product-agnostic approach and the fastest time to value. Choose security tech, and we will make it work better for your business 24/7. 24/7 protection and proactive threat hunting Our SOC never sleeps. We hunt for threats around the clock and notify you about necessary security measures proactively. Use enriched threat tickets and detailed incident timelines to know the what and when of an attack and intuit the where and why of what may happen next. Reduction of alert fatigue and employee burnout Save your team’s time wasted on false alerts and low risks. Reduce alert noise by 80% through professional software fine-tuning performed by our experts. Enable your internal security resources to focus on proactive security measures and complex problems that only people can solve. We make cybersecurity simple, affordable, and consistent. Try UnderDefense MAXI for free today.

© 2025 WebCatalog, Inc.