Suggested Categories:

Military and Defense Software
Military and defense software supports critical operations, logistics, and decision-making within military and defense organizations, enhancing strategic planning and mission execution. This software manages a range of functions, from intelligence gathering and data analysis to equipment maintenance and supply chain management. Advanced features, such as real-time situational awareness, threat detection, and secure communication, enable rapid response and coordination across units. Often incorporating encryption and compliance protocols, military software ensures the security of sensitive information and adheres to strict regulatory standards. Ultimately, military and defense software increases operational efficiency, strengthens defense capabilities, and enables informed decision-making in high-stakes environments.
Mobile Threat Defense Software
Mobile threat defense software protects mobile devices such as smartphones and tablets from cyber threats by detecting, preventing, and responding to security risks. It safeguards against malware, phishing attacks, network vulnerabilities, device misconfigurations, and unauthorized access. The software continuously monitors device behavior, application activity, and network connections to identify suspicious actions in real time. Integration with mobile device management and security information systems allows centralized control and rapid incident response. Ultimately, mobile threat defense software enhances the security posture of mobile environments, protecting sensitive data and ensuring compliance.
Social Engineering Defense Software
Social engineering defense platforms are security solutions designed to prevent, detect, and mitigate social engineering attacks, which manipulate individuals into disclosing confidential information or performing actions that compromise security. These platforms provide features such as phishing simulations, training modules to educate employees on recognizing suspicious behavior, and tools for analyzing and identifying potential threats. By educating users and continuously testing their awareness through simulated attacks, social engineering defense platforms help organizations build a more resilient workforce.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.

102 Products for "defense" with 1 filter applied:

  • 1
    iRise

    iRise

    iRise

    Quickly build responsive website and mobile prototypes with iRise, an innovative prototyping and wireframing platform. iRise features a unique combination of prototyping and requirements management tools that enables users to create and review high-fidelity prototypes of apps. Top features include backlog and story management, online reviews and discussions, instant documentation, interactive diagrams, and more.
    Starting Price: $19.00/month
  • 2
    ZEROSPAM

    ZEROSPAM

    ZEROSPAM

    ZEROSPAM allows organizations of all sizes to defend against email ransomware, spearphishing, and other general threats. ZEROSPAM is a simple to use email security product that has a threat defense rate of 99.9% against threats via email. ZEROSPAM integrates with Office 365, and features a very low false positive rate.
  • 3
    Panda Fusion 360

    Panda Fusion 360

    WatchGuard Technologies

    Fusion 360 combines our Systems Management and Adaptive Defense 360 solutions to unify RMM with EPP and EDR capabilities. This holistic solution combines the best of two worlds to provide advanced endpoint security, centralized IT management, monitoring and remote support capabilities. Fusion 360 ensures the classification of 100% of the running processes on all your endpoints with our Zero-Trust and Threat Hunting services. Cloud-based centralized management for devices and systems, with real...
  • 4
    Barracuda Email Security Gateway
    With the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages. Email is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud...
  • 5
    OpenFusion

    OpenFusion

    OpenText

    ... offer large-scale integration solutions for key application verticals, such as telecommunications, defense, aerospace, manufacturing, and finance. For applications that require high performance, massive scalability, high availability, predictable end-to-end QoS, security, and with the ability to be easily configured and managed, OpenFusion Enterprise products continue to be the leading choice in many of the world’s largest integration projects.
  • 6
    CopperheadOS

    CopperheadOS

    Copperhead

    CopperheadOS is a Secure Android built for encrypted and secure phones by a privacy focused company. Available as security-centric and privacy focused Google-free Android for the latest Pixel devices. Develop or include a secure phone in your businesses mobile security program. CopperheadOS integrates with the latest and greatest mobile security solutions. Mobile devices are easy targets for hackers so we developed the most secure android, CopperheadOS, to protect against a variety of attack...
  • 7
    CyberSense

    CyberSense

    INDEX ENGINES

    Cyberattacks will occur, even with the most advanced security applications in place. Organizations need to be smarter. Smart enough to know when their core infrastructure, user data and key production databases are corrupted due to ransomware. CyberSense® monitors backup data to understand how data changes over time including changes that are indicative of a cyberattack. As a last line of defense, CyberSense will then alert when data is corrupted allowing for an intelligent recovery plan...
  • 8
    Syook Insite
    Syook’s Insite RTLS platform helps companies build their digital map of ongoing operations. The real-time view of assets and people provides visibility at all times. The platform is supported by a compliance engine that alerts users of any breaches. Automated reports and dashboards help track necessary metrics. The platform also helps monitor and receive data on the hardware health and status for tags, gateways, anchors, system health, system uptime, battery levels and active hardware. Syook...
  • 9
    NoSky

    NoSky

    NoSky

    ... to the forces of evil. Highlighted Features: Shield of Security: NoSky's impenetrable shield shields your data from relentless hackers, leaving them powerless against its robust defenses. Virus-Vanquishing Abilities: Armed with the latest antivirus capabilities, NoSky annihilates viruses and keeps your data fortress free from any malicious intrusions.
    Starting Price: $2.43
  • 10
    Align Financials

    Align Financials

    Align Financials

    ...-effective, defensible bill of IT. Real-time visibility via dashboards reaps rapid ROI with periodic wins and seamless integration with your existing systems. We work with you hand-in-hand from an early stage so you learn the ropes and can run the show yourself. Empower your organization with a consolidated, holistic, real-time view of all your IT assets across their entire lifecycles. This leads to ongoing recovery of hard dollars year after year, not just a one-time payoff.
  • 11
    Q-CTRL

    Q-CTRL

    Q-CTRL

    Infrastructure software to power the quantum future. Quantum technology promises to transform the economy. We expand the utility of quantum computers and deliver new quantum sensing capabilities, all through software. Quantum infrastructure software transforms bare-metal quantum processors into useful computational tools. Our technology unleashes the hidden performance inside of the most powerful computers so you can achieve more. Add automation and performance management to my QC platform....
  • 12
    Open-E JovianVHR
    Open-E JovianVHR is a cyber-resilient, software-defined storage platform built for maximum data security and durability. It acts as a second defense layer for Hardened Repository feature from Veeam. Utilizing the ZFS file system and its native snapshots integrated with Veeam's features, it protects vital data from insider threats, accidental deletion, and sophisticated ransomware. This essential tool guarantees rapid, reliable data restoration, ensuring business continuity and peace of mind...
  • 13
    Assertible

    Assertible

    Assertible

    The easiest way to test and monitor your web services. Gain confidence in critical infrastructure by using Assertible's automated QA tools to test and monitor your web services across deployments and environments. Assertible provides a reliable first line of defense against web service failures by providing simple and powerful assertions to test and monitor your APIs and websites. Lower the number of false positives in your automated QA tests and be confident your APIs are healthy. Keeping your...
    Starting Price: $25 per month
  • 14
    Sharetru

    Sharetru

    Sharetru

    ... courier for our clients. We put people’s minds at ease by making it simple for them to keep their data safe and stay compliant, so they can expand their business. Built and hosted entirely within the United States, our private cloud-based platform is trusted by hundreds of organizations in: Aerospace, Defense & Government Healthcare Financial Services Information Technology Manufacturing & Engineering And many other industries
    Starting Price: $120
  • 15
    Vade

    Vade

    Vade Secure

    Vade is a global leader in predictive email defense, protecting 1 billion mailboxes in 76 countries. We help MSPs and SMBs protect their Microsoft 365 users from advanced email security threats, including phishing, spear phishing, and malware. ISPs, MSPs, and SMBs choose Vade's email security solutions to protect their users and their businesses from advanced cybersecurity threats, including phishing, spear phishing, and malware. Whether we’re protecting consumers through leading ISPs...
  • 16
    ExtraHop RevealX

    ExtraHop RevealX

    ExtraHop Networks

    Fight advanced threats with a covert defense. ExtraHop eliminates blindspots and detects threats that other tools miss. ExtraHop gives you the perspective you need to understand your hybrid attack surface from the inside out. Our industry-leading network detection and response platform is purpose-built to help you rise above the noise of alerts, silos, and runaway technology so you can secure your future in the cloud.
  • 17
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection against...
    Starting Price: $85
  • 18
    Pagefreezer

    Pagefreezer

    Pagefreezer Software

    ... with. Archive social media and never miss an edited post or deleted comment. Our social media and enterprise collaboration archiving solutions actively monitor and collect your data in real-time to help you keep track of the conversation and capture all activity on your platforms. Get alerted whenever inappropriate content is posted and capture it in defensible quality before it’s deleted.
  • 19
    ePrism Email Security
    ePrism is a comprehensive email security gateway that provides unrivaled email defense against internal and external threats such as spam, viruses, spyware, phishing schemes, identity theft, and other dangerous or offensive content. Our services include industry leading inbound/outbound spam and antivirus filtering, category based policy and automated seamless directory integration in a hosted SaaS solution that can be provisioned immediately, without having to install any hardware or software...
  • 20
    Trend Micro Worry-Free
    Shield against ransomware with complete user protection designed for small business. Since users are your biggest weakness when it comes to security, it’s important that you stop threats from getting to them. Worry-Free Advanced protects email, web, and file sharing and filters URLs by blocking access to inappropriate websites. Spam is blocked and phishing and social engineering attacks are staved off, so your employees don’t have to worry about security problems and can focus on their work....
  • 21
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends...
  • 22
    Kentik

    Kentik

    Kentik

    Kentik delivers the insight and network analytics you need to run all of your networks. Old and new. The ones you own and the ones you don't. Monitor your traffic from your network to the cloud to the internet on one screen. We provide: - Network Performance Analytics - Hybrid and Multi-Cloud Analytics (GCP, AWS, Azure) - Internet and Edge Performance Monitoring - Infrastructure Visibility - DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance...
  • 23
    Symantec Email Security.cloud
    ... awareness, education tools, and more. Block the latest ransomware with content defense, sandboxing, and link protection technologies that detect emerging, stealthy, and zero-day attacks. Defeat business email compromise with impersonation protection, sender authentication enforcement and brand protection controls. Protect your brand reputation by using automation to solve the practical issues of enforcing sender authentication (DMARC, DKIM and SPF) with Symantec Email Fraud Protection.
  • 24
    Comodo Dragon Platform
    Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering...
  • 25
    EDEXLite

    EDEXLite

    EdexCloud

    Collecting the right information of a patient is quite difficult when you need to file a claim to payer and want to get success in first go. We enable our client to request and receive, via secure electronic transmissions, summary data of Workers' Compensation Appeals Board (WCAB) cases. We operate as a secure user interface synchronizing data between WCAB and end users in a relational database format. In addition to its use by insurers, employers, defense attorneys, applicants' attorneys...
  • 26
    Barracuda Sentinel
    Business email compromise (BEC), spear phishing, and account takeover are rapidly becoming the most significant security threats facing organizations. These hyper-targeted attacks use socially engineered tactics designed to deceive employees and can be devastating to your business and brand. Barracuda Sentinel combines artificial intelligence, deep integration with Microsoft Office 365, and brand protection into a comprehensive cloud-based solution that guards against business email...
  • 27
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device....
  • 28
    Akamai

    Akamai

    Akamai Technologies

    Akamai keeps digital experiences closer to users than anyone — and keeps attacks and threats farther away. Powering the next frontier in digital transformation, the Akamai Intelligent Edge Platform is the defensive shield that can surround and protect everything — sites, users, devices, data centers, clouds. It is the technology that eliminates friction and enables immersion. A quarter of a million edge servers, deployed in thousands of locations around the world ingest 2.5 exabytes of data per...
  • 29
    Enginsight

    Enginsight

    Enginsight

    Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities. The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface. Scan your systems automatically and immediately recognize the security status of your IT infrastructure...
    Starting Price: $12.99 per month
  • 30
    Barracuda Message Archiver
    ... server can slash costs dramatically while increasing operational efficiency. Users stay within storage limits without exporting PST files or purging data, possibly putting your regulatory status at risk. Our policy-based approach uses granular retention policies to ensure that you automatically retain each item of data securely for as long as it is needed. This means you can confidently demonstrate you are meeting government and regulatory requirements and operating defensible deletion policies.