Loading
Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
89 products
Security
Clear filters
Trend Micro Email Security
Trend Micro (CloudBlue Managed) Stop more phishing, ransomware, and fraud attacks by using a cross-generational blend of threat techniques
Trend Micro Maximum Security
TrendMicro Trend Micro™ Maximum Security secures your connected world by providing protection against malware, ransomware and online banking threats, by using advanced artificial intelligence. It helps protect you from identity theft, viruses, online scams, and emerging threats.
Trend Micro Worry-Free Services
Trend Micro (CloudBlue Managed) Trend Micro Worry-Free Services provides enterprise-class protection for for your business devices and email. It protects against viruses, dangerous websites and other threats.
Unified Endpoint Security
Check Point Software Technologies To address the massive reshaping of the modern workforce, endpoint security solutions play the critical role in protecting against today’s threats. Harmony Endpoint and Harmony Mobile deliver comprehensive security to all endpoints in the organization, so employees can efficiently and securely access corporate data while roaming outside of the IT perimeter.
V-OS Trusted Identity
V-Key Pte. Ltd.

V-OS Trusted Identity combines various technologies to provide multiple factors of verification & authentication when employees log in to their systems. We ensure the integrity of the mobile app & the digital identity of employees. Using just Username & Password is insufficient to guarantee authentication & grant access, especially for web browsers. We enhance cybersecurity, protect corporate data theft from lost or stolen credentials, password fatigue, leaked shared secrets, phishing & even keyloggers.

Vulnerability scanner
Guardian360 BV

The Guardian360 vulnerability scanner consists of multiple scanners, which are constantly scanning and monitoring Internet facing IP-addresses for weak spots, vulnerabilities and misconfigurations.

Vulnerability Scanner IP-Addresses
Guardian360 BV Every month over a thousand new vulnerabilities are discovered in all kinds of network devices. By using multiple scanners, daily scanning from the outside in and inside out the Guardian360 platform gives you almost real-time insights in weak spots in your network assets. We present the scan results in clear language for managers and auditors. We provide engineers with all details to understand the severity of the issue(s). Off course we also provide them with solutions to mitigate the risks.
Web Application Security
Guardian360 BV The Guardian360 Web Application Security constantly scans and monitors websites and web applications for weak spots, vulnerabilities and misconfigurations.
WedgeARP Secure Home Office
Wedge Networks Inc.

WedgeARP Secure Home Office (WedgeSHO™) - powered by the Wedge Absolute Real-time Protection (WedgeARP™) platform - is a cloud-managed, cloud-enforced secure VPN offering that provides a high-quality VPN service with a vast array of optimized Security-as-a-Service (SECaaS) features not typically available to SMEs and work from home (WFH) users.

White Shark MSS
White Hat IT Security Kft.

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

Zero Trust based Unified Secure Access
Block Armour Pte Ltd

Blockchain-powered & SDP-architectured Secure and Compliant remote access based on Zero Trust ; Unification platform with single pane of glass visibility across users, devices, workloads from anywhere to anywhere.

Zerospam Cloud Email Security
ZEROSPAM Security Inc Zerospam is a cloud-based, AI-driven email security solution that is deadly accurate and utterly simple. It provides built-in and highly efficient protection against all email-borne threats, including the most dangerous ransomware and spearphishing.
BlockDrive
BlockDrive, LLC

BlockDrive SaaS gives companies the ability to audit, track and protect their most valuable data using the power of blockchain.

Holmes Software
Holmes Software B.V.

The weakest link in the security of company data and IT are your colleagues. You can install as many spam filters and firewalls as you want. Only one employee has to click on a link in a phishing email and your company is in danger. So don't get swindled. Get Holmes—the human phishing firewall.

InfoSaaS
InfoSaaS Ltd

InfoSaaS is leading U.K. platform that manages business compliance and control risk. We help organizations of all sizes to streamline workloads, prevent human error and gain control across information security, risk management and data protection.

Retruster Phishing Protection
Retruster Ltd

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

SureMDM
42Gears Mobility Systems Inc.

SureMDM by 42Gears is a mobility management solution that enables companies to secure, monitor and manage all kinds of company- or employee-owned devices, including tablets, smartphones, PCs, wearable devices, VR devices, POS, printers and more.

Revolutionize your business

Talk with a CloudBlue expert today to get started