Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
73 products
Security
Clear filters
Alsid for AD
Alsid Inc.

With Alsid's premium active directory monitoring, security breaches don't stand a chance. Detect infrastructure breaches before they impact your business.

Balbix BreachControl
Balbix, Inc.

Balbix uses specialized AI algorithms to discover and analyze the enterprise attack surface to give a 100x more accurate view of breach risk, providing prioritized actions that you can take to transform your cybersecurity posture and reduce cyber-risk by 95% or more.

bluedog Microsoft 365 Monitoring
Bluedog Security Monitoring Limited

Security Monitoring service for Microsoft 365 tenancy backed by a 24/7/365 fully staffed SOC. Managed Detection and Response for the cloud.

Bufferzone Enterprise
Bufferzone Security Ltd.

The BUFFERZONE container protects insecure applications such as web browsers, email, Zoom, FTP and even USB removable storage. BUFFERZONE is transparent to both the application and the end-user, yet completely seals off threats from the rest of the computer. Unlike conventional endpoint detection solutions that depend on signatures or behavioral profiles to detect malicious activity, BUFFERZONE simply isolates malware regardless of whether it is known or new, and prevents it from doing any harm.

Bufferzone Standalone
Bufferzone Security Ltd.

BUFFERZONE is the only containment solution that is designed to address the real needs of both end users and IT. With BUFFERZONE Endpoint Protection Software, employees can safely browse the internet and open attachments in a virtual environment, and then securely remove files that they need from the container and share them with the rest of the organization.

Check Point CloudGuard Network Security Gateway
Check Point Software Technologies

Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.

Check Point CloudGuard Network Security PAYG
Check Point Software Technologies

Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.

Cisco DNA Spaces
Cisco Systems, Inc.

Cisco DNA Spaces by IM is the next-gen indoor location services platform. Our cloud transforms your Wi-Fi into a powerful sensor, unlocking insights and trends from the behavior of people and things in your buildings.

Cisco Secure Email Cloud Mailbox
Cisco Systems, Inc.

Cisco Secure Email Cloud Mailbox is an integrated, cloud-native security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, superior visibility, and best-in-class efficacy from Cisco Talos. It augments native Microsoft 365 security and provides complete visibility into inbound, outbound, and internal user-to-user messages.

Cisco Stealthwatch
Cisco Systems, Inc.

Cisco Stealthwatch Cloud by IM improves security and incident response across the distributed network, from the private network and branch office to the public cloud.

Cisco Umbrella
Cisco Systems, Inc.

Cisco Umbrella by IM provides the first line of defense against threats on the internet wherever users go. Umbrella delivers complete visibility into internet activity across all locations, devices and users, and it blocks threats before they ever reach your network or endpoints.

Citrix Endpoint Management
Citrix Systems Citrix Endpoint Management (CEM) delivers device management and application management alongside business class productivity apps (including secure email) that enhance security and the user experience. CEM integrates with Workspace, giving IT the ability to deliver a complete experience to any device, anywhere at any time.
Cloud Intelligence & Threat Hunting
Check Point Software Technologies

CloudGuard Cloud Intelligence and Threat Hunting, part of the CloudGuard Cloud Native Security platform, provides cloud-native threat prevention and security intelligence for the public cloud. CloudGuard uses machine learning and threat research to detect activity anomalies, and with its intuitive visualization tool, provides intrusion alerts and rapid remediation.

Cloud Security Posture Management
Check Point Software Technologies

CloudGuard Cloud Security Posture Management automates governance across assets and services including the visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. Through enriched security context and high fidelity posture management, CloudGuard detects compliance misconfigurations and violations automatically, and remediates threats and non-compliance.

CloudGuard SaaS & Cloud Email Security
Check Point Software Technologies

Over 90% of attacks against organizations start from a malicious email. CloudGuard SaaS & Cloud Email Security provides organizations with all the protection they need for Office 365 and G Suite email and productivity apps. The solution’s security capabilities include advanced phishing, malware, data leak prevention and account-takeover, all from a single, easy to manage and cost-effective security solution.

Cyber Security Assessment Tool
QS solutions

The Cyber Security Assessment Tool (CSAT) from QS solutions provides recommendations and an action plan to improve security based on facts from the customer's hybrid IT environment. It’s the perfect way to maximize security and to become your customer's trusted security advisor.

CyberSmart
CyberSmart Ltd

CyberSmart is your business’ cyber security team in one product. Our streamlined platform makes it easy to achieve the UK government-backed security certifications including Cyber Essentials, Cyber Essentials Plus, and IASME-GDPR. After you’re certified, install our compliance app on any device to ensure your entire business is always secure. Our goal at CyberSmart is to make security simple so you can focus on your business.

ESET Security Solutions
ESET Security Solutions

ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years.

ESET Security Solutions EMA2
ESET Security Solutions

ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years.

FileWall for Microsoft 365
odix

Smarter Protection Against Microsoft 365 Email-Based Ransomware and Malware Attacks.

Protect Yourself. Protect Your Clients.

Email is the number one attack channel, representing over 94% of malware attacks. To protect SMBs from email attachment-based cyberattacks, we created FileWall.

Hackers often target MSPs and CSPs to gain access to their SMB clients, so it is essential that they are protected. We are now offering free NFR licenses to MSPs and CSPs to protect their internal Microsoft 365 mailboxes.

IBM MaaS360 With Watson
IBM Offerings

IBM MaaS360 with Watson simplifies the management and security of smartphones, tablets, laptops, wearables and loT.

ITsMine Beyond DLP
ITsMine

Ingram Micro’s IaaS Managed Services eases the challenges of running your public infrastructure. With three levels of support services—standard, professional, and premium—you’ll have certified cloud professionals managing and maintaining your cloud infrastructure. From basic help desk support to a set of comprehensive services, we can provide around the clock services to ensure your cloud environment is always up and running, allowing you to focus on your applications and building your business.

Jamf Now
Jamf

Jamf Now provides the simplest and easiest tools to manage Apple devices in the workplace. Deploy settings, apps, restrictions and more for groups of devices in minutes and all from one place.

Jamf Pro
Jamf

Give employees and students the tools they need to have more profound moments at work and in the classroom. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Enterprise Mobility Management tool that empowers IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.

Kaspersky
Kaspersky

Kaspersky Lab is a global cybersecurity company that has been operating in the market for over 20 years.

Knox Configure (KC)
Samsung Electronics America, Inc.

Remotely configure Samsung phones and tablets in bulk and tailor them to specific needs. Create custom devices with unique profiles, settings, restrictions, apps, and other content. Enrolled devices will automatically receive them via WiFi and mobile data.

Knox E-FOTA
Samsung Electronics America, Inc.

Knox Enterprise Firmware-Over-The-Air is a business solution that allows you to manage firmware versions on Samsung mobile devices to maximize cost efficiency. Ensure latest security patches are deployed to devices on schedule. IT admins can test updates before deployment, ensuring compatibility between in-house apps and new OS versions.

Knox Manage (KM)
Samsung Electronics America, Inc.

Manage a fleet of devices with a cloud-based EMM solution that increases business efficiency and secures corporate data. Knox Manage can manage any Android, iOS or Windows 10 device, but is most secure on Samsung Galaxy devices integrated with the Knox platform.

LastPass
LogMeIn

LastPass by LogMeIn is a new-generation identity platform. It combines password management and single sign-on functionality with adaptive multi-factor authentication (MFA) to secure access to applications, providing granular control for IT teams and easy access for users.

LastPass MSP
LogMeIn

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

M365 Security & Compliance Packs
Cooper Parry IT Ltd

At Bam Boom Cloud we don’t believe in complicating things with bespoke scoping exercises and drawn out implementations, that’s why we’ve created our one-off, fixed-price, fixed-scope M365 Security & Compliance Packs which unlock the functionality within Enterprise Mobility + Security (EMS) needed to help protect your business.

Mimecast MSP
Mimecast

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

Modshield SB
StrongBox IT LLC

Modshield SB, a custom-built and affordable Web Application Firewall (WAF) protects your web and mobile applications from security threats and comes equipped with premium features that include a built-in load balancer, Data loss protection and Analytics. The Modshield SB WAF is an easy to implement, plug and play device that is powered by Modsecurity and the OWASP Core Rule Set to protect you from a wide range of threat vectors.

NetConnect
Northbridge Secure Systems NetConnect is a secure remote access solution which can be used to quickly enable a sustainable, managed Work From Home solution for any business. With NetConnect, service providers can stay relevant to their customers needs by offering a single solution for Work From Home, BYOD, mobility and new ways of working in a highly secure, user-friendly and efficient manner.
Netsweeper Internet Tools
Netsweeper Inc

Netsweeper allows organisation to control internet access, review online activity, and protect their network from harmful content. Netsweeper delivers Internet filtering, protection from phishing attacks and corporate internet governance. Our software only tool works online and offline capabilities ensure machines are constantly covered. It can also monitor screen usage, looking for harmful content and suspicious activity. Works as standard through VPN and HTTPS protocols.

Network Defense as a Service (NDaaS)
CyGlass Inc.

Network Defense as a Service: CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

1 2 3
Revolutionize your business

Talk with a CloudBlue expert today to get started