Security Configuration

Browse 0 cybersecurity solutions, with 0 security professionals searching monthly

MSP-focused tool automating M365 security policy enforcement and drift remediation.

Managed Intune deployment & config automation service for MSPs.

Automated threat exposure remediation platform fixing misconfigs across security tools.

FIM and config change monitoring tool with baseline deviation detection.

Automates Microsoft 365 security policy application across multi-tenant MSP envs.

Optimizes security tool configs by fixing misconfigs & activating unused features.

Optimizes Microsoft E3/E5 security configs using real-world attack data.

AI platform that analyzes & hardens security tool configs across the stack.

Centralized platform for continuous security posture visibility and control.

Automated, agent-less firmware patch management for xIoT/OT devices at scale.

Automates SaaS compliance tracking, gap detection, and audit reporting.

Centralized endpoint security policy mgmt via JumpCloud integration.

Configuration risk management platform for IT, security, and DevOps teams.

AI-driven control assessment, asset mgmt & dashboarding for Bitdefender.

AI-driven platform to optimize, assess, and automate Mimecast email security controls.

Automates system hardening against CIS Benchmarks and DISA STIGs.

File integrity monitoring & system hardening solution with auto-remediation.

Automates MS SQL Server hardening for secure config & compliance.

Automated hardening and compliance management tool for Microsoft IIS servers.

Automates server hardening with zero-downtime policy enforcement for Windows & Linux.

Checks device config settings against standards to detect misconfigurations

Automated Microsoft 365 security configuration management and remediation tool

A legacy web application security and performance optimization solution that combines security controls with performance enhancement features.

A cloud-based web application firewall service that protects web applications from malicious traffic through threat intelligence, access controls, and bot management capabilities.