Loading
Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
113 products
Security
Clear filters
1Password Business
Agilebits, dba. 1Password [Fast-Track product] 1Password provides a place for users to store various passwords, software licenses, and other sensitive information, securely in a virtual vault.
ActZero Managed Detection & Response MDR
ActZero, Inc. [Fast-Track product] ActZero delivers an outcome-focused Managed Detection & Response solution. We use dozens of machine learning detections to automate threat identification & response; finding, containing & remediating threats faster. With intelligent response automation & 24/7 SOC, we block fast-moving ransomware attacks, filter out false positives and white noise, escalating only critical alerts. We give clients the visibility & security guidance needed to prioritize threat and vulnerability management.
Alsid for AD
Alsid Inc.

With Alsid's premium active directory monitoring, security breaches don't stand a chance. Detect infrastructure breaches before they impact your business.

Axonius
Axonius, Inc. [Fast-Track product] By connecting to hundreds of data sources, Axonius gives IT and security teams a comprehensive inventory, uncovers gaps, and triggers automated response actions whenever devices, users, and SaaS apps deviate from policies, controls, and expectations.
Balbix BreachControl
Balbix, Inc.

Balbix uses specialized AI algorithms to discover and analyze the enterprise attack surface to give a 100x more accurate view of breach risk, providing prioritized actions that you can take to transform your cybersecurity posture and reduce cyber-risk by 95% or more.

bluedog Microsoft 365 Monitoring
Bluedog Security Monitoring Limited

Security Monitoring service for Microsoft 365 tenancy backed by a 24/7/365 fully staffed SOC. Managed Detection and Response for the cloud.

Bufferzone Enterprise
Bufferzone Security Ltd.

The BUFFERZONE container protects insecure applications such as web browsers, email, Zoom, FTP and even USB removable storage. BUFFERZONE is transparent to both the application and the end-user, yet completely seals off threats from the rest of the computer. Unlike conventional endpoint detection solutions that depend on signatures or behavioral profiles to detect malicious activity, BUFFERZONE simply isolates malware regardless of whether it is known or new, and prevents it from doing any harm.

Bufferzone Standalone
Bufferzone Security Ltd.

BUFFERZONE is the only containment solution that is designed to address the real needs of both end users and IT. With BUFFERZONE Endpoint Protection Software, employees can safely browse the internet and open attachments in a virtual environment, and then securely remove files that they need from the container and share them with the rest of the organization.

Carbide
Securicy Data Solutions Ltd. dba Carbide [Fast-Track product] Carbide’s information security and privacy management platform, geared toward high-growth businesses, takes the guesswork and pain out of building, proving, and sustaining a security and privacy program strong enough to satisfy both today’s compliance expectations and tomorrow’s threats.
Check Point CloudGuard Network Security Gateway
Check Point Software Technologies

Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.

Check Point CloudGuard Network Security PAYG
Check Point Software Technologies

Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.

Cisco DNA Spaces
Cisco Systems, Inc. Cisco DNA Spaces by IM is the next-gen indoor location services platform. Our cloud transforms your Wi-Fi into a powerful sensor, unlocking insights and trends from the behavior of people and things in your buildings.
Cisco Secure Access by DUO
Cisco Systems, Inc. Realize adaptive, multi-factor authentication (MFA) and proactively reduce the risk of a data breach with Duo from Cisco. Verify users’ identities, gain visibility into every device, and enforce adaptive policies to secure access to every application.
Cisco Secure Email Cloud Mailbox
Cisco Systems, Inc. Cisco Secure Email Cloud Mailbox is an integrated, cloud-native security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, superior visibility, and best-in-class efficacy from Cisco Talos. It augments native Microsoft 365 security and provides complete visibility into inbound, outbound, and internal user-to-user messages.
Cisco Secure Endpoint (AMP4E)
Cisco Systems, Inc. Cisco Secure Endpoint is a next generation endpoint security solution that prevents, detects, and responds to threats. A cloud managed solution, Cisco Secure Endpoint:
Cisco Stealthwatch
Cisco Systems, Inc. Cisco Stealthwatch Cloud by IM improves security and incident response across the distributed network, from the private network and branch office to the public cloud.
Cisco Umbrella
Cisco Systems, Inc. Cisco Umbrella by IM provides the first line of defense against threats on the internet wherever users go. Umbrella delivers complete visibility into internet activity across all locations, devices and users, and it blocks threats before they ever reach your network or endpoints.
Citrix Endpoint Management
Citrix Systems Citrix Endpoint Management (CEM) delivers device management and application management alongside business class productivity apps (including secure email) that enhance security and the user experience. CEM integrates with Workspace, giving IT the ability to deliver a complete experience to any device, anywhere at any time.
Cloud Intelligence & Threat Hunting
Check Point Software Technologies

CloudGuard Cloud Intelligence and Threat Hunting, part of the CloudGuard Cloud Native Security platform, provides cloud-native threat prevention and security intelligence for the public cloud. CloudGuard uses machine learning and threat research to detect activity anomalies, and with its intuitive visualization tool, provides intrusion alerts and rapid remediation.

Cloud Security Posture Management
Check Point Software Technologies

CloudGuard Cloud Security Posture Management automates governance across assets and services including the visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. Through enriched security context and high fidelity posture management, CloudGuard detects compliance misconfigurations and violations automatically, and remediates threats and non-compliance.

Conceal Browse
Conceal Inc. [Fast-Track product] ConcealBrowse protects every endpoint and every user from malicious, unknown URLs and sends them to remote isolation, while allowing known ‘good’ URLs to continue down their normal path. ConcealBrowse makes proactive decisions about the security risk associated with internet use and automatically isolates risky transactions.
Cyber Security Assessment Tool
QS solutions The Cyber Security Assessment Tool (CSAT) from QS solutions provides recommendations and an action plan to improve security based on facts from the customer's hybrid IT environment. It’s the perfect way to maximize security and to become your customer's trusted security advisor.
CyberSmart
CyberSmart Ltd CyberSmart is your business’ cyber security team in one product. Our streamlined platform makes it easy to achieve the UK government-backed security certifications including Cyber Essentials, Cyber Essentials Plus, and IASME-GDPR. After you’re certified, install our compliance app on any device to ensure your entire business is always secure. Our goal at CyberSmart is to make security simple so you can focus on your business.
DigiCert Secure Site SSL-TLS Certificates
DigiCert, Inc. DigiCert Secure Site SSL/TLS is the new standard for businesses who take securing their data and identity seriously. With prioritized validation and support, the most recognized trust mark on the web, and the industry-leading management platform, DigiCert provides the best in SSL/TLS solutions.
DigiCert SSL Solutions
The SSL Store Purchase and issue SSL/TLS certificates from DigiCert, the global leader in PKI & digital certificates, without ever leaving CloudBlue.
ESET Security Solutions
ESET Security Solutions ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years!
ESET Security Solutions EMA2
ESET Security Solutions

ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years.

FileFlex
Qnext Corp. [Fast-Track product] FileFlex is a zero trust data access control overlay service that brings IT control and audit over unstructured data access to reduce the risk of ransomware and provides users remote access, sharing, collaboration and management of files and folders located anywhere on the corporate hybrid-IT, multi-cloud storage infrastructure with no duplication, over the Internet, without using a VPN.
FileWall for Microsoft 365
odix

Smarter Protection Against Microsoft 365 Email-Based Ransomware and Malware Attacks.

Protect Yourself. Protect Your Clients.

Email is the number one attack channel, representing over 94% of malware attacks. To protect SMBs from email attachment-based cyberattacks, we created FileWall.

Hackers often target MSPs and CSPs to gain access to their SMB clients, so it is essential that they are protected. We are now offering free NFR licenses to MSPs and CSPs to protect their internal Microsoft 365 mailboxes.

Fortinet Cloud Security Marketplace
Fortinet Fortinet Cloud Security secures any application on any cloud. The most effective security requires cross-cloud visibility. Fortinet Cloud Security Solutions allow you the necessary visibility and control across cloud infrastructures, enabling secure applications and connectivity in your data center and across your cloud resources while maximizing the benefits of cloud computing.​ ​
GravityZone Security for MSPs
Bitdefender Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions to thousands of organizations in 170 countries globally. Bitdefender technology is licensed by more than 150 of the world’s most recognized technology brands.
Hacker Alert
Guardian360 BV

Despite all the measures taken, the chance of an intruder hacking your network still exists. Whether it's a vindictive (ex-)employee, a competitor or a criminal organization, virtually every company could be a potential victim.

Harmony Email & Office
Check Point Software Technologies

Over 90% of attacks against organizations start from malicious emails. Harmony Email & Office provides organizations with all the protection they need for Office 365 and G Suite email and productivity apps. The solution’s security capabilities include advanced phishing, malware, data leak prevention, and account-takeover, all from a single, easy to manage, and cost-effective security solution.

Harmony Endpoint
Check Point Software Technologies

Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. This way, organizations get all the endpoint protection needed, at the quality they deserve, in a single, efficient, and cost-effective solution.

Harmony Mobile
Check Point Software Technologies

Check Point Harmony Mobile offers comprehensive, enterprise-grade mobile security that protects iOS and Android devices, apps, and the networks they depend on from advanced mobile threats.

IBM MaaS360 With Watson
IBM Offerings IBM MaaS360 with Watson simplifies the management and security of smartphones, tablets, laptops, wearables and loT.
1 2 3 4
Revolutionize your business

Talk with a CloudBlue expert today to get started