Loading
Browse catalog
  • Collections

  • Categories

  • Availability

Browse catalog
89 products
Security
Clear filters
Alsid for AD
Alsid Inc.

With Alsid's premium active directory monitoring, security breaches don't stand a chance. Detect infrastructure breaches before they impact your business.

Balbix BreachControl
Balbix, Inc.

Balbix uses specialized AI algorithms to discover and analyze the enterprise attack surface to give a 100x more accurate view of breach risk, providing prioritized actions that you can take to transform your cybersecurity posture and reduce cyber-risk by 95% or more.

bluedog Microsoft 365 Monitoring
Bluedog Security Monitoring Limited

Security Monitoring service for Microsoft 365 tenancy backed by a 24/7/365 fully staffed SOC. Managed Detection and Response for the cloud.

Bufferzone Enterprise
Bufferzone Security Ltd.

The BUFFERZONE container protects insecure applications such as web browsers, email, Zoom, FTP and even USB removable storage. BUFFERZONE is transparent to both the application and the end-user, yet completely seals off threats from the rest of the computer. Unlike conventional endpoint detection solutions that depend on signatures or behavioral profiles to detect malicious activity, BUFFERZONE simply isolates malware regardless of whether it is known or new, and prevents it from doing any harm.

Bufferzone Standalone
Bufferzone Security Ltd.

BUFFERZONE is the only containment solution that is designed to address the real needs of both end users and IT. With BUFFERZONE Endpoint Protection Software, employees can safely browse the internet and open attachments in a virtual environment, and then securely remove files that they need from the container and share them with the rest of the organization.

Check Point CloudGuard Network Security Gateway
Check Point Software Technologies Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.
Check Point CloudGuard Network Security PAYG
Check Point Software Technologies Check Point CloudGuard Network Security is a cloud-native security gateway which delivers industry-leading advanced threat prevention and cloud network security for hybrid clouds. Integrated with configuration management tools, it enables rapid deployment and supports automation of CI/CD processes. Unified Security Management provides consistent visibility, policy management, logging and reporting across hybrid clouds and on-premises deployments.
Citrix Endpoint Management
Citrix Systems Citrix Endpoint Management (CEM) delivers device management and application management alongside business class productivity apps (including secure email) that enhance security and the user experience. CEM integrates with Workspace, giving IT the ability to deliver a complete experience to any device, anywhere at any time.
Cloud Intelligence & Threat Hunting
Check Point Software Technologies CloudGuard Cloud Intelligence and Threat Hunting, part of the CloudGuard Cloud Native Security platform, provides cloud-native threat prevention and security intelligence for the public cloud. CloudGuard uses machine learning and threat research to detect activity anomalies, and with its intuitive visualization tool, provides intrusion alerts and rapid remediation.
Cloud Security Posture Management
Check Point Software Technologies

CloudGuard Cloud Security Posture Management automates governance across assets and services including the visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. Through enriched security context and high fidelity posture management, CloudGuard detects compliance misconfigurations and violations automatically, and remediates threats and non-compliance.

Cyber Security Assessment Tool
QS solutions The Cyber Security Assessment Tool (CSAT) from QS solutions provides recommendations and an action plan to improve security based on facts from the customer's hybrid IT environment. It’s the perfect way to maximize security and to become your customer's trusted security advisor.
CyberSmart
CyberSmart Ltd CyberSmart is your business’ cyber security team in one product. Our streamlined platform makes it easy to achieve the UK government-backed security certifications including Cyber Essentials, Cyber Essentials Plus, and IASME-GDPR. After you’re certified, install our compliance app on any device to ensure your entire business is always secure. Our goal at CyberSmart is to make security simple so you can focus on your business.
DigiCert Secure Site SSL-TLS Certificates
DigiCert, Inc. DigiCert Secure Site SSL/TLS is the new standard for businesses who take securing their data and identity seriously. With prioritized validation and support, the most recognized trust mark on the web, and the industry-leading management platform, DigiCert provides the best in SSL/TLS solutions.
DigiCert SSL Solutions
The SSL Store Purchase and issue SSL/TLS certificates from DigiCert, the global leader in PKI & digital certificates, without ever leaving CloudBlue.
ESET Security Solutions
ESET Security Solutions ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years!
ESET Security Solutions EMA2
ESET Security Solutions

ESET knows and understands that IT security is not solely about detection. It's about achieving the best combination of detection, speed and usability. As our awards show, ESET has excelled in all three for the last 30 years.

FileWall for Microsoft 365
odix

Smarter Protection Against Microsoft 365 Email-Based Ransomware and Malware Attacks.

Protect Yourself. Protect Your Clients.

Email is the number one attack channel, representing over 94% of malware attacks. To protect SMBs from email attachment-based cyberattacks, we created FileWall.

Hackers often target MSPs and CSPs to gain access to their SMB clients, so it is essential that they are protected. We are now offering free NFR licenses to MSPs and CSPs to protect their internal Microsoft 365 mailboxes.

Fortinet Cloud Security Marketplace
Fortinet Fortinet Cloud Security secures any application on any cloud. The most effective security requires cross-cloud visibility. Fortinet Cloud Security Solutions allow you the necessary visibility and control across cloud infrastructures, enabling secure applications and connectivity in your data center and across your cloud resources while maximizing the benefits of cloud computing.​ ​
GravityZone Security for MSPs
Bitdefender Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions to thousands of organizations in 170 countries globally. Bitdefender technology is licensed by more than 150 of the world’s most recognized technology brands.
Hacker Alert
Guardian360 BV Despite all the measures taken, the chance of an intruder hacking your network still exists. Whether it's a vindictive (ex-)employee, a competitor or a criminal organization, virtually every company could be a potential victim.
Harmony Email & Office
Check Point Software Technologies **Over 90% of attacks against organizations start from malicious emails.** Harmony Email & Office provides organizations with all the protection they need for Office 365 and G Suite email and productivity apps. The solution’s security capabilities include advanced phishing, malware, data leak prevention, and account-takeover, all from a single, easy to manage, and cost-effective security solution.
Harmony Endpoint
Check Point Software Technologies Harmony Endpoint is the industry’s most comprehensive security solution for endpoint devices, protecting users wherever they go. Combining advanced behavioral analysis and machine learning, and powered by the largest threat intelligence hub in the world, SandBlast Agent proactively prevents, detects, remediates even the most evasive malware attacks and delivers the highest catch rates as seen in third-party lab testing, and lowest false positives.
Harmony Mobile
Check Point Software Technologies Harmony Mobile offers comprehensive, enterprise-grade mobile security that protects iOS and Android devices, apps, and the networks they depend on from advanced mobile threats.
IBM MaaS360 With Watson
IBM Offerings IBM MaaS360 with Watson simplifies the management and security of smartphones, tablets, laptops, wearables and loT.
IBM Security Verify for Consumer IAM
IBM Offerings Protect and maintain brand trust with your customers when you deliver a seamless, omnichannel experience using progressive profiling, strong privacy and consent management, and frictionless access for low-risk users. IBM Security Verify for Consumer IAM provides identity-as-a-service that scales for external users, including consent management, broad authentication options, and guided developer experiences.
IBM Security Verify for Workforce IAM
IBM Offerings Accelerate workforce productivity, use context and intelligence for access decisions, and integrate IAM with threat management and incident response to protect your enterprise. IBM Security Verify for Workforce IAM provides identity-as-a-service for every user, including SSO, MFA, passwordless authentication, adaptive access, lifecycle management, and identity analytics.
IBM Security Verify SaaS
IBM Offerings Centralize workforce and consumer identity and access management in a single, cloud-native identity solution
ITsMine Beyond DLP
ITsMine TsMine provides a simple and cost-effective solution for ensuring persistent document security by enforcing access permissions (including policy-based expiration) and functional controls on highly confidential information, while tracking the circulation as well. ITsMine eliminates the unintended propagation of content by ensuring that clients remain in control of their documents, regardless of where they may travel.
Jamf Now
Jamf Jamf Now provides the simplest and easiest tools to manage Apple devices in the workplace. Deploy settings, apps, restrictions and more for groups of devices in minutes and all from one place.
Jamf Pro
Jamf

Give employees and students the tools they need to have more profound moments at work and in the classroom. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Enterprise Mobility Management tool that empowers IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.

Knox Configure (KC)
Samsung Electronics America, Inc.

Remotely configure Samsung phones and tablets in bulk and tailor them to specific needs. Create custom devices with unique profiles, settings, restrictions, apps, and other content. Enrolled devices will automatically receive them via WiFi and mobile data.

Knox E-FOTA
Samsung Electronics America, Inc.

Knox Enterprise Firmware-Over-The-Air is a business solution that allows you to manage firmware versions on Samsung mobile devices to maximize cost efficiency. Ensure latest security patches are deployed to devices on schedule. IT admins can test updates before deployment, ensuring compatibility between in-house apps and new OS versions.

Knox Manage (KM)
Samsung Electronics America, Inc.

Manage a fleet of devices with a cloud-based EMM solution that increases business efficiency and secures corporate data. Knox Manage can manage any Android, iOS or Windows 10 device, but is most secure on Samsung Galaxy devices integrated with the Knox platform.

LastPass
LogMeIn LastPass by LogMeIn is a new-generation identity platform. It combines password management and single sign-on functionality with adaptive multi-factor authentication (MFA) to secure access to applications, providing granular control for IT teams and easy access for users.
LastPass MSP
LogMeIn

The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.

Lookout
Lookout Lookout Mobile Enterprise Security solution provides security protection against all iOS, Android and Chrome threats.
1 2 3
Revolutionize your business

Talk with a CloudBlue expert today to get started