Loading
Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
89 products
Security
Clear filters
M365 Security & Compliance Packs
Cooper Parry IT Ltd

At Bam Boom Cloud we don’t believe in complicating things with bespoke scoping exercises and drawn out implementations, that’s why we’ve created our one-off, fixed-price, fixed-scope M365 Security & Compliance Packs which unlock the functionality within Enterprise Mobility + Security (EMS) needed to help protect your business.

MDR for Endpoints
OBRELA SECURITY INDUSTRIES Integrated with our Managed Detection and Response (MDR) service, the EndPoint solution – powered by Microsoft Defender for Endpoint - provides advanced threat detection and is combined with incident response and remediation including 24×7 monitoring and proactive threat hunting, when needed, in order to significantly reduce the mean time to detect and respond to cyberattacks.
MDR for IT monitoring
OBRELA SECURITY INDUSTRIES Obrela’s Managed Detection & Response (MDR) service for Azure Sentinel combines collective intelligence practices and methods with leading edge security analytics and sophisticated risk management technology to identify, analyze, predict and prevent cyber-security threats in real time. Azure Lighthouse allows Obrela to expand the Sentinel ecosystem to a powerful multi-tenant SIEM while data is persisted and analyzed on the Client tenant.
MDR for OT and IoT
OBRELA SECURITY INDUSTRIES Integrated with our Managed Detection and Response (MDR) service, the OT solution – powered by Azure Defender for IoT/OT - provides advanced threat detection and incident response with remediation including 24×7 monitoring and proactive threat hunting, when needed, in order to significantly reduce the mean time to detect and respond to cyberattacks.
Mimecast MSP
Mimecast The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
Modshield SB
StrongBox IT LLC

Modshield SB, a custom-built and affordable Web Application Firewall (WAF) protects your web and mobile applications from security threats and comes equipped with premium features that include a built-in load balancer, Data loss protection and Analytics. The Modshield SB WAF is an easy to implement, plug and play device that is powered by Modsecurity and the OWASP Core Rule Set to protect you from a wide range of threat vectors.

NetConnect
Northbridge Secure Systems NetConnect is a secure remote access solution which can be used to quickly enable a sustainable, managed Work From Home solution for any business. With NetConnect, service providers can stay relevant to their customers needs by offering a single solution for Work From Home, BYOD, mobility and new ways of working in a highly secure, user-friendly and efficient manner.
Netsweeper Internet Tools
Netsweeper Inc

Netsweeper allows organisation to control internet access, review online activity, and protect their network from harmful content. Netsweeper delivers Internet filtering, protection from phishing attacks and corporate internet governance. Our software only tool works online and offline capabilities ensure machines are constantly covered. It can also monitor screen usage, looking for harmful content and suspicious activity. Works as standard through VPN and HTTPS protocols.

Network Defense as a Service (NDaaS)
CyGlass Inc.

Network Defense as a Service: CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Network Security Audits
Guardian360 BV The Guardian360 platform provides insights on the security of an organization's applications and infrastructure with continuous scanning and live reporting.
Nodeware – Vulnerability Management – Cyber Security
IGI Cyber Nodeware provides complete and continuous visibility of your network, its assets, and the vulnerabilities that put your business at risk—all while running silently in the background during normal business hours. Nodeware was developed by cybersecurity practitioners and combines new device recognition with vulnerability scanning. It enables businesses to easily monitor their network, identify security gaps, and access detailed reports in order to achieve security compliance and protect their networks.
NordLayer Reseller
Nord Security NordLayer is a network security, threat detection, and response platform that integrates seamlessly with any technology stack and comes with unmatched support.
NordPass Reseller
Nord Security NordPass is an end-to-end encryption password manager that ensures businesses' finest privacy and security standards.
NordVPN
Nord Security

NordVPN is the world’s most trusted online security solution, used by over 14 million users worldwide. Since 2012, we have been creating and building a service that offers next-generation encryption with advanced privacy solutions to ensure secure access to online resources for everyone.

Percept EDR
Sequretek Inc. Ensure end-to-end detection, protection and response with AI-based EDR for endpoints, servers and cloud environments
Percept IGA
Sequretek Inc. Cloud-native zero-trust-centric user identity and access governance along with user lifecycle management across the enterprise
Percept XDR
Sequretek Inc. AI based turnkey solution for end-to-end enterprise security monitoring, threat detection and incident response for cloud and on-premise enterprise environments
Perimeter 81
Perimeter 81 Perimeter 81 is a Zero Trust Network as a service that secures network, cloud and application access, and protects an organization's most valuable resources—all with one unified platform.
Phishing As A Service
Guardian360 BV Guardian360's Phishing as a Service provides phishing awareness to help keep businesses safe from phishing scams.
Pixm Anti-Phishing
Pixm, Inc. Pixm Anti-Phishing is the world's first, device-based, real-time phishing prevention to shut down phishing attacks at the point of click using AI computer vision.
Probe
Guardian360 BV To scan ip-addresses and web applications that are not internet facing we need a Probe inside the network
Proofpoint Essentials
Proofpoint

Proofpoint Essentials is a cybersecurity solution providing you with enterprise-class, people-centric protection and visibility. And it gives you a modern, simplified management experience.

RMail & RSign by RPost
RPost RMail & RSign: All-in-One E-Sign, Email Encryption, Registered Email Track & Prove, Large File Share, and more; runs in Microsoft 365 Outlook, Gmail, Salesforce, any web/mobile browser. RMail & RSign automate cybersecurity, simplify privacy compliance, digitize workflows with e-signatures. RMail email encryption is easy for recipients, includes auditable proof of privacy compliance. RSign makes e-sign simple, controlled, automated & affordable. RPosts award-winning services used worldwide, since 2003.
Sophos Central
Sophos Central

With Sophos MSP Connect, say goodbye to managing complex security from multiple vendors and embrace the power of one. With one vendor, one program and one security portfolio, you can provide your customers with proven and comprehensive protection that is managed from one simple management platform.

Sophos Central – Connect Flex – Subscription
Sophos Central The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
Sophos Central – MSP Connect Flex – Usage
Sophos Central With Sophos MSP Connect, say goodbye to managing complex security from multiple vendors and embrace the power of one. With one vendor, one program and one security portfolio, you can provide your customers with proven and comprehensive protection that is managed from one simple management platform.
SSL TLS CERTIFICATES
The SSL Store

Seamlessly sell SSL certificates to your customers, allowing them to purchase, generate, and issue—all within your branded CloudBlue portal.

Storage Bridge for XProtect
Tiger Technology AD

Tiger Technology Storage Bridge Plug-in for Milestone XProtect. Enables seamless integration of XProtect with any cloud provider. Dramatically reduce storage costs and increase data protection.

Symantec A Division of Broadcom
Symantec Corporation

Broadcom Inc. is a global infrastructure technology leader built on 50 years of innovation, collaboration and engineering excellence. Through the combination of industry leaders Broadcom, LSI, Broadcom Corporation, Brocade, CA Technologies and Symantec, the company has the size, scope and engineering talent to lead the industry into the future.

SyncDog Secure Systems
SyncDog, Inc.

The SyncDog Trusted Mobile Platform finally gives resellers & service providers the mobile security solution they want - A complete solution from a single vendor that offers all the mobile security tools a company needs : Mobile Device Management (MDM), Containerization, Mobile Threat Defense (MTD), Anti Phishing, Anti-Malware, Private App Store and new productivity tools that all work equally well on company issued devices or personal devices (BYOD). GDPR, CMMC/800-171, CCPA, SAMA etc. Compliant !

Systancia Cleanroom Session
Systancia

The Privileged Access Management (PAM) solution in public cloud service which allows to define administration accesses to resources by controlling the accounts used to authenticate on the resource and by finely tracing all the actions performed.

Systancia Workroom Session
Systancia

Secure remote access solution to enable workforces to fully access their digital workplace with trust and empowerment, in all circumstances (work from home, on call, on travel, working for third party service providers, etc.).

Thales SafeNet Trusted Access (STA)
THALES

Building on Thales’s award winning authentication service, SafeNet Trusted Access lets you operate securely in the cloud by preventing data breaches, simplifying access, and enabling compliance.

The Preference Hub
Dazzle Technologies Ltd

The Preference Hub is a partner branded managed mobility platform that provides Android mobile device services including EMM capability, device insights, content management and service ticket management all for a low monthly subscription. Unlike SOTI and other EMM providers, you brand this solution as your own system drive great recurring revenue streams.

TransientAccess
Transientx TransientAccess is a zero trust network access (ZTNA) solution which uses an application networking paradigm to simplify and secure remote access, revolutionizing the way enterprises implement zero trust networks. It couples zero trust architecture with granular access control policies, application segmentation and full visibility. TransientAccess is a cloud-native alternative to VPNs for MSPs, enabling them to deliver remote access securely, with no performance hit.
Trend Micro Cloud App Security
Trend Micro (CloudBlue Managed) Trend Micro Cloud App Security offers advanced threat detection and data loss provention (DLP) for Microsoft Office 365.
Revolutionize your business

Talk with a CloudBlue expert today to get started