search
Collections
Categories

Featured Security & Compliance

  1. Afi.ai

    afi.ai

    Afi.ai goes beyond basic access control by providing a unified management experience. You can manage everything from a single, intuitive interface, eliminating the need to switch between platforms for different cloud services. Adding new clients is a breeze – the software streamlines user onboarding, allowing you to set up new clients in under a minute without requiring them to create an account within your domain. Managing backups and restores for all your clients becomes effortless. Afi.ai consolidates everything into a single platform, eliminating the need to juggle multiple admin accounts across different cloud services. To give you complete visibility, the software offers centralized monitoring of your clients' protection status and license usage. Beyond the robust feature set, the company boasts exceptional partner support.

  2. Sendmarc

    Sendmarc: Email Security and DMARC Compliance Made Easy

    Sendmarc empowers organizations to secure their email domains, protect against phishing, and ensure DMARC compliance. With an intuitive dashboard, Sendmarc provides insights, implementation guidance, and reporting tools to prevent email fraud, safeguard brand reputation, and boost email deliverability.

  3. Symbol Security

    Symbol Security

    In today's digital landscape, a staggering 90% of security breaches stem from phishing emails. Despite this alarming statistic, many businesses underinvest in training employees to identify and avoid these threats. Symbol Security believes a more proactive approach is crucial. We offer a comprehensive solution for Managed Security Service Providers (MSSPs), Virtual Chief Information Security Officers (vCISOs), and businesses of all sizes. Our approach combines engaging security awareness training, gamified learning elements, and simulations to educate employees. Additionally, we leverage dark web and registry data to provide targeted training and insights. This multi-pronged approach empowers organizations to significantly reduce their cyber risk exposure.

All Security & Compliance

  1. Hook Security

    Phishing Testing & Security Training

    Cyberattacks are on the rise despite increased security budgets, and it's time for a change. The numbers don't lie - boring training programs lead to higher levels of cybercrime damage because employees don't retain the training when it's too technical, punitive, and not relatable. Hook Security is a people-first company that uses psychological security training to help companies create a security-aware culture. Our awareness training helps mitigate risk while entertaining employees. It is designed to help companies establish policies for email and provide on-demand fake social engineering cyber attacks on employees with micro-learning and training.

  2. A-LIGN

    Security Compliance Automation

    Through A-LIGN’s Startup Partnership Program, portfolio companies of Incubators, Accelerators, Venture funds, etc. will be given access to a number of pricing and service-related benefits, including: • One Free Year of A-SCEND, A-LIGN’s compliance automation software • Type 2 SOC 2 Audit starting at $15,000 • Significant Discounting on all other Cyber/Compliance Assessments (ISO, SOC, HIPAA, HITRUST, FedRAMP, Pen Test, and more) • Access to a dedicated SME to serve as a resource for all Cyber/Compliance questions available on-demand

  3. Lumen

    Lumen Adaptive Network Security

    Lumen Adaptive Network Security is a network-based layer of protection against an increasingly complicated threat landscape. The Lumen network acts as a sensor, giving you the visibility and control needed to monitor, block, and report attempts to break into your network. Delivered as a combination of service-chained functions in the cloud, it can quickly adapt to new threats without requiring huge customer investments and new expertise. By moving protection physically closer to the origins of threats, we’re able to neutralize threats more efficiently and effectively. Adaptive Network Security is carrier agnostic, allowing customers to protect internet connections with Lumen, hybrid environments, and third-party networks.

  4. Mimecast

    Mimecast Email Security and Resilience

    Get world-class advanced email security with total deployment flexibility and block all email-based threats. As the top attack vector, email demands the strongest possible protection. Defend against even the most sophisticated attacks and stay one step ahead of threats with Mimecast Email Security. From phishing and ransomware to social engineering, payment fraud, and impersonation, we block the most dangerous attacks.

  5. Mimecast

    Mimecast Security Awareness and User Behavior

    When successful cyberattacks are analyzed, they often have one thing in common – some user, somewhere, did something that could have been avoided. Even with today’s most advanced protection, organizations remain vulnerable because of one key factor: human error. The truth is if your employees aren’t ready for a cyberattack, neither is your organization. Fortunately, continuous security awareness transforms employees into a trusted first line of defense. With Mimecast Awareness Training, you can measurably reduce risk while winning new and unexpected allies in the struggle to keep your organization’s work protected.

  6. New Horizon Communications

    NHC Managed Security

    Managed security that safeguards networks in the digital age NHC’s CloudSecure™ and EdgeSecure™ with SD-WAN bring next-generation cloud-native protections for businesses that use the cloud. These new platforms deliver enterprise-grade security fortified with top-rated threat prevention, speedy deployment, and unified management. Modern security requirements are steadily growing more complex as organizations incorporate cloud-based platforms. Security solutions are a vital part of the Communications Stack and offer everything businesses need to ensure their networks and customer data stay safe – even as cyberattacks mount in frequency and potency.

  7. Nitel

    Nitel Managed SD Security

    Businesses are faced with a never-ending barrage of cyber threats. From hackers to viruses and malware to data leaks caused by your own staff, there’s no end to the ways security breaches can compromise your network, data, and your business. Companies that succumb to threats can suffer dire consequences. Protect your network with an integrated SD-Security solution from Nitel. You’ll be able to safely enable applications, users, and content while reducing your threat footprint. And using the same platform as your Nitel SD-WAN, you’ll manage your network performance and security, all from a single, easy-to-use administrator console.

  8. ReadyNetworks

    ReadyNetworks

    ReadyNetworks is a global Cloud MSP focused on multi-channel partner and B2B service delivery models in the public cloud market. Our relationships, disciplines, and intellectual property are within Amazon AWS, Microsoft Azure, and Google Cloud platforms while our approach to cloud adoption centers around Advisory, Transformation, Support, and Optimization for scale-out / scale-up business models. We are uniquely positioned in-house to drive cloud adoption around Consulting, Managed Services.

  9. XeneX

    XeneX

    XeneX provides comprehensive AI-enabled Security Operations Center (SOC) as a Service (SOC-as-a- Service) called xenexSOC. Our suite of robust and scalable solutions eliminates the challenges of deploying enterprise-class security solutions including costs, risks, resources, time-to-market, and administration. By integrating and centralizing the collective intelligence from several integrated security tools, xenexSOC offers cost-effective, high-performance solutions controlled and managed from the cloud that meet compliance requirements, diverse business needs, and ensure the necessary protection of your IT assets.

  10. eSentire

    eSentire Managed Detection and Response

    Our 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates and responds in real-time to known and unknown threats before they become business disrupting events. eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.

  11. WAN Dynamics

    WAN Dynamics DynaSecure Fully Managed Network Security

    To have a great workplace experience and create an exceptional customer experience, you need to have exceptionally secure connectivity. Our remote work-from-anywhere business world creates more opportunities for cyber security risks and threats. WAN Dynamics' DynaSecure Cloud Firewall Service is designed to keep your organization connected while also safeguarding employees and your business from potential security threats. We provide custom solutions that identify and eliminate security threats, maintain strong connectivity, and deliver unparalleled technical support. Whether your employees are working at an office, factory, retail or residential location, we’ve got you covered.

  12. Warner Telecomm

    Warner Telecomm connects, validates, and manages landline, mobile, cloud, and software services. Over the last 25 years, we have worked together with our clients to understand current network requirements and implement budgetary and network service consolidations. With our advanced machine-learning algorithms, our systems and people, we solve for many of the challenges our customers see on a daily basis in managing networks.

  13. HarborShield Cybersecurity

    HarborShield Cybersecurity Incident Response

    Respond, identify and direct the containment of an attack If you experience a cyber incident that’s disrupting your business operations, it’s critical that you quickly identify the source and type of threat that’s impacting the operational and functional aspects of your network and neutralize the threat. HarborShield Cybersecurity offers Incident Response services to its clients on a 24/7/365 basis. Our team has extensive experience in responding, identifying and directing the containment of an attack. We also provide comprehensive documentation that directs your containment and remediation activities, all with the option of integrating external legal counsel to protect our response and your company's crisis under attorney-client privilege.

  14. HarborShield Cybersecurity

    HarborShield Cybersecurity vCISO Program

    HarborShield Managed Cybersecurity vCISO Program helps with these problems. Engaging as much, or as little as you want, our vCISO can be dedicated to scale to your needs. All without the usual headaches, and for less than the cost of retaining a full-time CISO. There are many challenges organizations face with this role including: • Ever-changing regulatory requirements • Lack available cybersecurity talent • Skyrocketing cybersecurity salaries • Limited operating budgets

  15. Vertek

    Vertek Managed Cybersecurity

    Many organizations are looking for solutions that are beyond basic security monitoring and alerting that are often found in Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) solutions. If this statement describes you, Vertek Managed Cybersecurity has you covered. We leverage a robust, world-class SIEM (Security Information Event Management) platform, to ingest security-related event data from across your enterprise. But we do more than leverage security technology to just monitor traffic, authenticate users, protect data, and prevent cyber-attacks. We normalize vulnerability and threat data into actionable intelligence and provides response services that eliminate threats to your business.

  16. Vigilant Technology Solutions

    Vigilant Technology Solutions Managed Security

    Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles. Vigilant's CyberDNA platform gives its customers real-time cyber threat alerts, policy adherence, malware analysis, & immediate correlation of logging against our distributed cyber intelligence network. It lets you know who is attacking, from where they are attacking & exactly what they are up to. Information security programs must find the right balance of controls to help companies reduce overall risk to an acceptable level, in a financially responsible manner. Our platform seeks to put cyber intelligence & the tools necessary to protect business infrastructure into the hands of its customers.

  17. ThreatAdvice

    ThreatAdvice's affordable cyber education platform empowers you to grasp these risks and provides the necessary tools for safeguarding your business.

  18. Stratus Technologies

    Stratus Technologies

    Stratus Technologies collects and analyzes data at the source – the "edge" of your core business processes. Whether you manage an assembly line, an oil and gas pipeline, a water treatment plant, a smart building process, or a biotechnology and device organization, you need to turn data into actionable results. Far from the cloud or your data center, decisions and actions need to be made at the edge, in real time with the right information, in the right place. Our solutions and platforms are simple to install and implement, they operate autonomously with constant availability in rugged environments, and can protect your data, security, and reputation – at the Edge of your business.

  19. Banyax

    Managed Awareness Training

    Banyax Managed Awareness Training is powered by KnowBe4 Security Awareness Training software. We provide managed cybersecurity awareness to our clients, helping them to identify cyberattacks and be less prone to falling victim to them. Our focus is on educating and sharing cybersecurity best practices with your users, as 93% of cyber threats originate from human error. Using the latest sophisticated social engineering tactics, we establish a baseline of propensity with simulated phishing to assess the risk and provide user evaluation in terms of cyber awareness. We then deploy training strategies to end-users to mitigate those identified risks. Finally, we continue to measure the results, assess the risk points, and inform additional actions to protect your user community.

  20. Cato Networks

    Cato Networks Security as a Service

    Cato, the cloud-native carrier, provides the only secure managed SD-WAN service built with a global reach, self-service, and agility of the cloud. We replace security point solutions with a converged, uniform security stack built for the digital business. Our security as a service is a set of tools built directly into our cloud network as part of a tightly integrated software stack. Because of this, it can be applied consistently across all traffic traversing the network, eliminating the need for disparate edge security devices. Security services cover access control and threat prevention and are powered by our security research labs.

  21. Comcast Business

    Comcast Business SecurityEdge

    Comcast Business SecurityEdge is a simple, yet powerful first line of defense against malicious activity and threats: malware, ransomware, phishing, and botnet infections. It helps make sure employee and guest devices are secure when connected to your network. Our cloud-based solution automatically scans and refreshes every 10 minutes to identify new risks. It helps block employees and guests from accessing suspicious websites and clicking infected links on smartphones, tablets, and other devices connected to your network.

  22. Comcast Business

    Masergy Managed Security

    Masergy’s Managed Security Services gives you comprehensive managed detection and response services on a global scale, tailored to meet any budget. You get unified enterprise security that uses machine learning to identify sophisticated attack patterns and respond quickly. Masergy works with your existing technology investments and takes the workload off of your staff, helping you optimize your resources while widening your security coverage.

  23. Coro

    Coro SASE Suite

    Coro scans your networks for weaknesses and suspicious activity. We automatically remediate 95% of threats before you lift a finger. This drastically cuts the time your IT team spends managing network security. We protect your organization's data, communications, and peace of mind. The Secure Access Service Edge (SASE) Suite includes Coro's Network Security and Cloud Security modules and also offers add-ons like a Secure Web Gateway.

  24. Coro

    Coro Email Protection Suite

    Even with the best email protections in place, some suspicious emails still get through. Coro Email Protection Suite conducts email scans for potential threats like phishing, malware, and ransomware, and automatically remediates any identified threats. This drastically cuts the time your IT security team needs to spend managing email security. It is built on our email security and data governance modules.

  • 1