Loading...
Browse 197 cloud tools
Cloud-based phishing simulation platform for employee security training
Cloud-based phishing simulation platform for employee security training
Cloud-based email archiving solution for compliance and e-discovery
Cloud-based email archiving solution for compliance and e-discovery
SIM-based identity verification for touchless check-in and authentication
SIM-based identity verification for touchless check-in and authentication
Adaptive phishing simulation platform with AI-generated attacks and training.
Adaptive phishing simulation platform with AI-generated attacks and training.
Managed log aggregation system for storing and querying application logs
Managed log aggregation system for storing and querying application logs
Digital transformation consulting services for government and enterprise clients
Digital transformation consulting services for government and enterprise clients
Third-party patch management extension for Microsoft Intune
Third-party patch management extension for Microsoft Intune
Mobile threat defense solution for iOS, Android, and iPadOS devices
Mobile threat defense solution for iOS, Android, and iPadOS devices
Cloud-based MDM for iOS, Android, macOS, Windows, ChromeOS & watchOS devices
Cloud-based MDM for iOS, Android, macOS, Windows, ChromeOS & watchOS devices
Application control and privilege management for endpoint security
Application control and privilege management for endpoint security
Data management platform for data quality, migration, and governance
Data management platform for data quality, migration, and governance
Cloud migration accelerator for database migration with automation support
Cloud migration accelerator for database migration with automation support
Remote connection mgmt for RDP and SSH sessions with PAM integration
Remote connection mgmt for RDP and SSH sessions with PAM integration
IT service management platform with workflow automation and self-service
IT service management platform with workflow automation and self-service
Docker-based SSO solution with SaaS license mgmt and identity lifecycle integration
Docker-based SSO solution with SaaS license mgmt and identity lifecycle integration
AI-powered identity lifecycle mgmt with self-service access requests & provisioning
AI-powered identity lifecycle mgmt with self-service access requests & provisioning
Cloud-based GRC platform for governance, risk mgmt, and compliance operations
Cloud-based GRC platform for governance, risk mgmt, and compliance operations
Security awareness training platform with phishing simulations and micro-learning
Security awareness training platform with phishing simulations and micro-learning
Phishing simulation & security awareness training platform for organizations
Phishing simulation & security awareness training platform for organizations
Cloud-based LMS for security awareness training with SCORM compliance
Cloud-based LMS for security awareness training with SCORM compliance
Security awareness training and phishing simulation platform
Security awareness training and phishing simulation platform
Cloud-based log management platform with AI-driven analysis and observability
Cloud-based log management platform with AI-driven analysis and observability
Cloud storage solution for enterprise data backup, archival, and file transfer
Cloud storage solution for enterprise data backup, archival, and file transfer
Communication platform for customer and employee interactions via multiple channels
Communication platform for customer and employee interactions via multiple channels
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.