Suggested Categories:

Military and Defense Software
Military and defense software supports critical operations, logistics, and decision-making within military and defense organizations, enhancing strategic planning and mission execution. This software manages a range of functions, from intelligence gathering and data analysis to equipment maintenance and supply chain management. Advanced features, such as real-time situational awareness, threat detection, and secure communication, enable rapid response and coordination across units. Often incorporating encryption and compliance protocols, military software ensures the security of sensitive information and adheres to strict regulatory standards. Ultimately, military and defense software increases operational efficiency, strengthens defense capabilities, and enables informed decision-making in high-stakes environments.
Mobile Threat Defense Software
Mobile threat defense software protects mobile devices such as smartphones and tablets from cyber threats by detecting, preventing, and responding to security risks. It safeguards against malware, phishing attacks, network vulnerabilities, device misconfigurations, and unauthorized access. The software continuously monitors device behavior, application activity, and network connections to identify suspicious actions in real time. Integration with mobile device management and security information systems allows centralized control and rapid incident response. Ultimately, mobile threat defense software enhances the security posture of mobile environments, protecting sensitive data and ensuring compliance.
Social Engineering Defense Software
Social engineering defense platforms are security solutions designed to prevent, detect, and mitigate social engineering attacks, which manipulate individuals into disclosing confidential information or performing actions that compromise security. These platforms provide features such as phishing simulations, training modules to educate employees on recognizing suspicious behavior, and tools for analyzing and identifying potential threats. By educating users and continuously testing their awareness through simulated attacks, social engineering defense platforms help organizations build a more resilient workforce.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.

102 Products for "defense" with 1 filter applied:

  • 1
    True Defense

    True Defense

    True Defense

    True Defense is a leading provider of comprehensive, integrated and secure business solutions. We provide comprehensive business services such as audits, process mapping, strategic planning, policy making, documentation, compliance, design, business system integration, implementation, training, secure networking, and business continuity (disaster recovery). True Defense specializes in providing efficient, cost effective, solutions for our customers by integrating our design capabilities...
    Starting Price: $19.95/month
  • 2
    BloxOne Threat Defense
    BloxOne Threat Defense maximizes brand protection by working with your existing defenses to protect your network and automatically extend security to your digital imperatives, including SD-WAN, IoT and the cloud. It powers security orchestration, automation and response (SOAR) solutions, slashes the time to investigate and remediate cyberthreats, optimizes the performance of the entire security ecosystem and reduces the total cost of enterprise threat defense. The solution turns the core...
  • 3
    Cisco Secure Email Threat Defense
    Advanced protection to safeguard your inboxes. Email is still the No. 1 threat vector. Expand the scope of your defenses to detect dangerous threats and rapidly respond to and remediate new threats in real time. Identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack. AI-driven threat detection uses multiple detection...
  • 4
    Epicor Kinetic

    Epicor Kinetic

    Epicor Software

    ...-to-order, and mixed-mode manufacturers in the small and mid-market space. Kinetic supports the needs of leading manufacturers across multiple industries, including Industrial Machinery, Fabricated Metals, Electronics and High Tech, Plastics and Rubber, Automotive, Aerospace and Defense, Medical Device, Consumer Products, Furniture and Fixtures, Measuring and Controlling Devices, and more. Embrace future-ready business, digital transformation, and flexible deployment with this singular, AI-powered ERP solution.
  • 5
    ManageEngine Endpoint Central
    ... exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Starting Price: $795.00/one-time
  • 6
    Cynet All-in-One Cybersecurity Platform
    Cynet empowers MSPs and MSSPs with a comprehensive, fully managed cybersecurity platform that consolidates essential security functions into a single, easy-to-use solution. Cynet simplifies cybersecurity management, reduces operational overhead, and lowers costs by eliminating the need for multiple vendors and complex integrations. The platform provides multi-layered breach protection, offering robust security for endpoints, networks, and SaaS/Cloud environments. Cynet’s advanced...
  • 7
    FastPass SSPR

    FastPass SSPR

    FastPassCorp

    ... verification. Tailored to individual user groups based on security policies, this solution incorporates information about the user's device usage and multi-factor authentication (MFAs), creating a robust defense against hackers. FastPass SSPR provides an advanced self-service solution for password resets and unlocks. It seamlessly supports passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems. All types of MFA and manager approval for verification.
    Starting Price: $0.20/user/month
  • 8
    IPVanish

    IPVanish

    IPVanish

    ... a private internet browser to go incognito. Keep your internet activity private with our anonymous IP addresses, and we’ll help keep network hackers, ISPs, and advertisers out of your connection. Secure your Wi-Fi connection and armor your location data with VPN. The best data defense pairs security with convenience. Safeguard access to your most important files with encrypted backup, automated syncing, and remote wiping controls.
    Starting Price: $3.99 per month
  • 9
    Nasdaq Boardvantage
    The board portal platform and collaboration solution for boards and senior executives. Learn how Nasdaq Boardvantage helps make board processes paperless and can reduce meeting preparation from hours to minutes. Create single or multi-day meetings in seconds, add details, attach files, track board member attendance, and initiate remote meetings. Protect information with encryption and multiple layers of defense to protect the confidentiality, integrity, and availability of data. Quickly build...
  • 10
    PowerDMARC

    PowerDMARC

    PowerDMARC

    PowerDMARC is a comprehensive email security solution designed to protect your brand reputation and safeguard your email communications. By leveraging advanced technologies such as DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT, PowerDMARC offers a robust defense against email threats like spoofing, phishing, and ransomware. Our user-friendly platform simplifies complex configurations, empowering you to easily manage and monitor your email security posture. With AI-powered threat intelligence...
    Starting Price: $8 per month
    Partner badge
  • 11
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally...
    Starting Price: From $49/asset/month
  • 12
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and...
    Leader badge
    Starting Price: $2.00 per user, per month
  • 13
    XGen Security

    XGen Security

    Trend Micro

    Go beyond next-gen with XGen™ security, a new class of security software that addresses the full range of ever-changing threats—now and in the future. Instead of using separate, siloed security solutions that don’t share information, XGen™ security provides a cross-generational blend of threat defense techniques and a connected threat defense that can protect your organization from all of the unseen threats.
  • 14
    Fortifyedge IoT Platform
    ... AFWERX SBIR Awardee, USAF TechStars Accelerator Alumni Company and Multi Award winner for Cyber and Physical security for defense, critical infrastructure and NIST, Behavioral Authentication for first responders. Protecting your critical infrastructure Fortifyedge IoT Platform. Improved situational awareness of responding personnel for incident awareness and analysis. Positive identification at entry control points and then track individual personnel in the secure zone
  • 15
    Abusix Mail Intelligence
    Abusix Mail Intelligence is an innovative set of blocklists (RBL/DNSBL) that adds real-time threat data to your existing email protection. Considered as the first line of defense, blocklists help to prevent email-borne threats such as spam and malware from entering your network. We’re the first line of defense for your mail servers which allows you to save bandwidth and CPU caused by the more costly in-depth spam and virus analysis required for later content filtering. Abusix Mail Intelligence...
  • 16
    11:11 Cloud Backup

    11:11 Cloud Backup

    11:11 Systems

    Internal and external threats to data are on the rise. This is why smart organizations are deploying “defense in depth” strategies to ensure quick recovery of data. iland Secure Cloud Backup provides integrated, secure, and cost-effective protection for your on-premises and cloud data, including Microsoft 365 data, to ensure you are back online following a data loss event. With multiple layers of defense including security, cloud backup, and air-gapped Insider Protection, iland Secure Cloud...
  • 17
    Game Warden

    Game Warden

    Second Front Systems

    Meeting the security and compliance requirements to deliver SaaS solutions to the Department of Defense is a daunting task, often taking years and costing millions of dollars to accomplish. This barrier drives away countless commercial software companies from working with the DoD, and prevents the military, the world’s largest procurer of IT, from buying high quality commercial SaaS products. Second Front Systems’ Game Warden DevSecOps platform and secure cloud hosting environment removes...
  • 18
    Infocon Systems

    Infocon Systems

    Infocon Systems

    ... your business EDI compliant! Our user-friendly web service and our team of EDI specialists will ensure that your EDI experience is easy, simple, and painless. We provide EDI services for companies in all sectors of the global economy . These industries include retail, grocery, automobile, transportation, defense, healthcare, pharmaceuticals, and agriculture to name a few. Specifically, in the Defense industry, we provide EDI services with trading partners such as the Army Airforce Exchange.
  • 19
    CMstat

    CMstat

    CMstat

    Configuration Management and Data Management software solutions and consulting services for the Aviation, Aerospace & Defense, Naval & Marine, Transportation Mobility, Industrial Automation and Heavy Equipment industries. CMstat’s EPOCH CM configuration management software was created to enable program managers, project leads, product engineers, supply chain contractors and MRO / sustainment operators to quickly deploy an instantly usable web-based asset lifecycle configuration management tool...
    Starting Price: $60,000 one-time payment
  • 20
    MonoDefense

    MonoDefense

    KeepSolid

    Protect your online data, privacy, and way of life in one hit of a button. MonoDefense is a bundle of security apps that aim to protect all areas of your digital life. Store your account credentials, safeguard browsing activity, defend against suspicious DNS traffic, and unblock access to the desired content with these 4 ultimate solutions. Render any online surveillance and spying after you is impossible. Ensure secure web-surfing, untraceable data exchange, and anonymous communications...
    Starting Price: $11.99 per month
  • 21
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on...
    Starting Price: Free
  • 22
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full...
    Starting Price: $275 one-time payment
  • 23
    Datto SIRIS

    Datto SIRIS

    Datto, a Kaseya company

    ... Cloud make SIRIS your best line of defense against ransomware. Patented Inverse Chain Technology™ fundamentally changes the way backup and recovery is done allowing for every incremental snapshot to be a fully constructed recovery point. Does deleting backups either accidentally or maliciously mean you can’t recover? Think again with Cloud Deletion Defense™ that undeletes the unthinkable.
  • 24
    AMPRO

    AMPRO

    AMPRO Software

    The AMPRO suite of products is Australian-made and owned maintenance software solutions servicing a diverse range of industries. These industries include water treatment, electricity distribution, food production, mining, drilling, farming, hotels and resorts, defense departments and companies servicing the department of defense, marine and facilities to name just a few. AMPRO Applications offers the stress-free hosting solution, allowing you to concentrate on what you do and we worry about...
    Starting Price: $2675 one-time payment
  • 25
    AssetSmart

    AssetSmart

    AssetSmart

    Founded in 1971, AssetSmart provides a comprehensive suite of integrated asset management, service management, and material management solutions for aerospace, defense, electronics, manufacturing, and government organizations. AssetSmart is owned by PMSC and is based at 31355 Oak Crest Drive, Suite 100, Westlake Village, CA 91361. AssetSmart has been supporting some of the largest defense and IT integrators for over 30 years. Leveraging forty years of asset management solutions experience...
  • 26
    Proofpoint Email Protection
    ... or on premises. It catches both known and unknown threats that others miss. Powered by NexusAI, our advanced machine learning technology, Email Protection accurately classifies various types of email. And it detects and blocks threats that don’t involve malicious payload, such as impostor email—also known as business email compromise (BEC)—using our Advanced BEC Defense. You can also automatically tag suspicious email to help raise user awareness. And you can track down any email in seconds.
  • 27
    Shield34

    Shield34

    Shield34

    Shield34 is the ONLY web automation framework that: Is 100% Selenium compatible! Continue working with your existing Selenium scripts. Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests...
  • 28
    Trellix ePolicy Orchestrator (ePO)
    Benefit from a centralized security management platform that helps orchestrate and manage all your endpoints, from a single console. Unify defense strategy, bring together different endpoints with native controls and reduce security operations dependency on multiple tools. Comprehensive platform, helps security operations teams to plan and scale their operations model all while benefiting from true API integrations. Threat Intelligence Exchange (TIE) and Advanced Threat Defense (ATP...
  • 29
    ijura

    ijura

    ijura

    Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end...
  • 30
    ESET Cloud Office Security
    Preventive protection for cloud-based applications such as email, collaboration, and storage. A powerful combination of spam filtering, anti‑malware scanning, anti‑phishing, and advanced threat defense capabilities. Equip your Microsoft 365 Exchange Online, OneDrive, Teams, and SharePoint Online with an extra layer of advanced protection. Helps eliminate unsolicited emails, targeted attacks, and ransomware, allowing employees to focus on their jobs and ensure business continuity. Get immediate...
    Starting Price: $119.50 per year
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next