Loading
Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
114 products
Security
Clear filters
Pixm Anti-Phishing
Pixm, Inc. Pixm Anti-Phishing is the world's first, device-based, real-time phishing prevention to shut down phishing attacks at the point of click using AI computer vision.
Probe
Guardian360 BV

To scan ip-addresses and web applications that are not internet facing we need a Probe inside the network

Proofpoint Essentials
Proofpoint

Proofpoint Essentials is a cybersecurity solution providing you with enterprise-class, people-centric protection and visibility. And it gives you a modern, simplified management experience.

Reblaze WAAP
Reblaze Technologies Ltd [Fast-Track product] Reblaze provides a unified and comprehensive, cloud-based, protection shield for web platforms (websites/web apps/API), together with a full visibility, 24/7 monitoring and managed service. A ‘Reblazed’ site inhabits its own private, secure cloud, fully accessible to legitimate traffic but invisible to assailants. Reblaze offers an all-in-one private virtual cloud-based solution (VPC) including IPS/WAF, DoS/DDoS protection, BOT detection and exclusion, anti-scraping, CDN and more.
Reflectiz – Digital Security for Websites
Reflectiz Ltd [Fast-Track product] Reflectiz offers a zero-touch B2B SaaS solution that helps organizations mitigate security and privacy risks that are created by installed third-party apps on their websites.
Retail in-store Analytics with Asset Protection Video Security
RetailNext, Inc. [Fast-Track product] RetailNext has partnered with global retail brands to help them measure store performance, identify opportunities for growth, implement strategies that drive results, increase capital savings, and boost bottom-line sales. Robust and scalable, the patented RetailNext platform uses best-in-class video analytics, Wi-Fi detection of mobile devices (including Bluetooth), data from point-of-sale systems, and other sources to inform retailers about how customers engage with their stores.
RMail & RSign by RPost
RPost RMail & RSign: All-in-One E-Sign, Email Encryption, Registered Email Track & Prove, Large File Share, and more; runs in Microsoft 365 Outlook, Gmail, Salesforce, any web/mobile browser. RMail & RSign automate cybersecurity, simplify privacy compliance, digitize workflows with e-signatures. RMail email encryption is easy for recipients, includes auditable proof of privacy compliance. RSign makes e-sign simple, controlled, automated & affordable. RPosts award-winning services used worldwide, since 2003.
Scribe TrustHub
Scribe Security Ltd. [Fast-Track product] Scribe is a solution for organizations that are concerned about threats from their software supply chain. Security and Compliance officers can use Scribe to validate the compliance and integrity of software that their organization either produces or consumes. DevSecOps teams securing software builds and security teams responsible for software in-use can use Scribe as a means to continuously assure this software is secure.
Secure Email & Collaboration
Virtru Corporation [Fast-Track product] At Virtru, we have an ambitious mission: to unlock the power of data by helping create a world where it is always under your control. Everywhere. Our flexible, easy to use, and trusted privacy technologies govern access to data throughout its full lifecycle – from creation through sharing, storage, analysis, and action.
SlashNext
SlashNext, Inc. [Fast-Track product] Multi-Channel Cloud Communication Security Platform for the Modern Workforce. Stop smishing, business text compromise, social engineering and advanced zero-hour phishing attacks in Microsoft 365, Zoom, SMS, LinkedIn, WhatsApp and other messaging channels.
Sophos Central
Sophos Central

With Sophos MSP Connect, say goodbye to managing complex security from multiple vendors and embrace the power of one. With one vendor, one program and one security portfolio, you can provide your customers with proven and comprehensive protection that is managed from one simple management platform.

Sophos Central – Connect Flex – Subscription
Sophos Central The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
Sophos Central – MSP Connect Flex – Usage
Sophos Central With Sophos MSP Connect, say goodbye to managing complex security from multiple vendors and embrace the power of one. With one vendor, one program and one security portfolio, you can provide your customers with proven and comprehensive protection that is managed from one simple management platform.
SSL TLS CERTIFICATES
The SSL Store

Seamlessly sell SSL certificates to your customers, allowing them to purchase, generate, and issue—all within your branded CloudBlue portal.

Storage Bridge for XProtect
Tiger Technology AD

Tiger Technology Storage Bridge Plug-in for Milestone XProtect. Enables seamless integration of XProtect with any cloud provider. Dramatically reduce storage costs and increase data protection.

Symantec A Division of Broadcom
Symantec Corporation

Broadcom Inc. is a global infrastructure technology leader built on 50 years of innovation, collaboration and engineering excellence. Through the combination of industry leaders Broadcom, LSI, Broadcom Corporation, Brocade, CA Technologies and Symantec, the company has the size, scope and engineering talent to lead the industry into the future.

SyncDog Secure Systems
SyncDog, Inc.

The SyncDog Trusted Mobile Platform finally gives resellers & service providers the mobile security solution they want - A complete solution from a single vendor that offers all the mobile security tools a company needs : Mobile Device Management (MDM), Containerization, Mobile Threat Defense (MTD), Anti Phishing, Anti-Malware, Private App Store and new productivity tools that all work equally well on company issued devices or personal devices (BYOD). GDPR, CMMC/800-171, CCPA, SAMA etc. Compliant !

Systancia Cleanroom Session
Systancia

The Privileged Access Management (PAM) solution in public cloud service which allows to define administration accesses to resources by controlling the accounts used to authenticate on the resource and by finely tracing all the actions performed.

Systancia Workroom Session
Systancia

Secure remote access solution to enable workforces to fully access their digital workplace with trust and empowerment, in all circumstances (work from home, on call, on travel, working for third party service providers, etc.).

Thales SafeNet Trusted Access (STA)
THALES

Building on Thales’s award winning authentication service, SafeNet Trusted Access lets you operate securely in the cloud by preventing data breaches, simplifying access, and enabling compliance.

The Preference Hub
Dazzle Technologies Ltd

The Preference Hub is a partner branded managed mobility platform that provides Android mobile device services including EMM capability, device insights, content management and service ticket management all for a low monthly subscription. Unlike SOTI and other EMM providers, you brand this solution as your own system drive great recurring revenue streams.

Topia
Vicarius Ltd. [Fast-Track product] TOPIA is an automated vulnerability remediation platform that proactively and continuously discovers, prioritizes, and remediates known and unknown vulnerabilities. TOPIA can predict vulnerabilities and protect software even when configuration changes and security patches are not available or can’t be deployed. For each risk it analyzes, TOPIA provides a list of recommended actions to eliminate it and enables you to stay safe and resilient no matter what risks you’re confronting.
TransientAccess
Transientx TransientAccess is a zero trust network access (ZTNA) solution which uses an application networking paradigm to simplify and secure remote access, revolutionizing the way enterprises implement zero trust networks. It couples zero trust architecture with granular access control policies, application segmentation and full visibility. TransientAccess is a cloud-native alternative to VPNs for MSPs, enabling them to deliver remote access securely, with no performance hit.
Trend Micro Cloud App Security
Trend Micro

Trend Micro Cloud App Security offers advanced threat detection and data loss provention (DLP) for Microsoft Office 365.

Trend Micro Email Security
Trend Micro

Stop more phishing, ransomware, and fraud attacks by using a cross-generational blend of threat techniques

Trend Micro Maximum Security
TrendMicro Trend Micro™ Maximum Security secures your connected world by providing protection against malware, ransomware and online banking threats, by using advanced artificial intelligence. It helps protect you from identity theft, viruses, online scams, and emerging threats.
Trend Micro Worry-Free Services
Trend Micro

Trend Micro Worry-Free Services provides enterprise-class protection for for your business devices and email. It protects against viruses, dangerous websites and other threats.

Unified Endpoint Security
Check Point Software Technologies

To address the massive reshaping of the modern workforce, endpoint security solutions play the critical role in protecting against today’s threats. SandBlast Agent and SandBlast Mobile deliver comprehensive security to all endpoints in the organization, so employees can efficiently and securely access corporate data while roaming outside of the IT perimeter.

V-OS Trusted Identity
V-Key Pte. Ltd.

V-OS Trusted Identity combines various technologies to provide multiple factors of verification & authentication when employees log in to their systems. We ensure the integrity of the mobile app & the digital identity of employees. Using just Username & Password is insufficient to guarantee authentication & grant access, especially for web browsers. We enhance cybersecurity, protect corporate data theft from lost or stolen credentials, password fatigue, leaked shared secrets, phishing & even keyloggers.

Valimail Enforce
Valimail Inc. [Fast-Track product] Valimail, the global leader in zero-trust email authentication security, invented hosted DMARC in 2015. The company’s cloud-native solutions authenticate sender identity to stop phishing, protect brands, and ensure compliance. Valimail holds the most robust portfolio of patents that unlock DMARC for businesses at scale and is the only DMARC solution to earn FedRAMP certification.
Vulnerability scanner
Guardian360 BV

The Guardian360 vulnerability scanner consists of multiple scanners, which are constantly scanning and monitoring Internet facing IP-addresses for weak spots, vulnerabilities and misconfigurations.

Vulnerability Scanner IP-Addresses
Guardian360 BV

Every month over a thousand new vulnerabilities are discovered in all kinds of network devices. By using multiple scanners, daily scanning from the outside in and inside out the Guardian360 platform gives you almost real-time insights in weak spots in your network assets. We present the scan results in clear language for managers and auditors. We provide engineers with all details to understand the severity of the issue(s). Off course we also provide them with solutions to mitigate the risks.

Web Application Security
Guardian360 BV

The Guardian360 Web Application Security constantly scans and monitors websites and web applications for weak spots, vulnerabilities and misconfigurations.

WedgeARP Secure Home Office
Wedge Networks Inc.

WedgeARP Secure Home Office (WedgeSHO™) - powered by the Wedge Absolute Real-time Protection (WedgeARP™) platform - is a cloud-managed, cloud-enforced secure VPN offering that provides a high-quality VPN service with a vast array of optimized Security-as-a-Service (SECaaS) features not typically available to SMEs and work from home (WFH) users.

White Shark MSS
White Hat IT Security Kft.

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

Zero Trust based Unified Secure Access
Block Armour Pte Ltd

Blockchain-powered & SDP-architectured Secure and Compliant remote access based on Zero Trust ; Unification platform with single pane of glass visibility across users, devices, workloads from anywhere to anywhere.

Revolutionize your business

Talk with a CloudBlue expert today to get started