Suggested Categories:

Military and Defense Software
Military and defense software supports critical operations, logistics, and decision-making within military and defense organizations, enhancing strategic planning and mission execution. This software manages a range of functions, from intelligence gathering and data analysis to equipment maintenance and supply chain management. Advanced features, such as real-time situational awareness, threat detection, and secure communication, enable rapid response and coordination across units. Often incorporating encryption and compliance protocols, military software ensures the security of sensitive information and adheres to strict regulatory standards. Ultimately, military and defense software increases operational efficiency, strengthens defense capabilities, and enables informed decision-making in high-stakes environments.
Mobile Threat Defense Software
Mobile threat defense software protects mobile devices such as smartphones and tablets from cyber threats by detecting, preventing, and responding to security risks. It safeguards against malware, phishing attacks, network vulnerabilities, device misconfigurations, and unauthorized access. The software continuously monitors device behavior, application activity, and network connections to identify suspicious actions in real time. Integration with mobile device management and security information systems allows centralized control and rapid incident response. Ultimately, mobile threat defense software enhances the security posture of mobile environments, protecting sensitive data and ensuring compliance.
Social Engineering Defense Software
Social engineering defense platforms are security solutions designed to prevent, detect, and mitigate social engineering attacks, which manipulate individuals into disclosing confidential information or performing actions that compromise security. These platforms provide features such as phishing simulations, training modules to educate employees on recognizing suspicious behavior, and tools for analyzing and identifying potential threats. By educating users and continuously testing their awareness through simulated attacks, social engineering defense platforms help organizations build a more resilient workforce.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.

102 Products for "defense" with 1 filter applied:

  • 1
    IBM MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are...
    Starting Price: $5/device and $10/user/month
  • 2
    Intrinsic ID

    Intrinsic ID

    Intrinsic ID

    ..., and protect sensitive government and military systems. Intrinsic ID technology has been deployed in more than 150 million devices. Award recognition includes the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, IoT Security Excellence Award, the Frost & Sullivan Technology Leadership Award and the EU Innovation Radar Prize. Intrinsic ID security has been proven in millions of devices certified by Common Criteria, EMVCo, Visa and multiple governments.
  • 3
    APPVISORY

    APPVISORY

    mediaTest digital

    APPVISORY is Europe’s leading Mobile Threat Defense Software. In combination with leading mobile device management systems (such as MobileIron, Workspace ONE, Microsoft Intune, Sophos, etc.) or as a stand-alone solution, the SaaS solution ensures the protection of sensitive company data by using mobile devices. You can enforce your individual IT security guidelines and requirements according to the GDPR on your employee devices. APPVISORY‘s App-Client contributes to the users‘ education...
    Starting Price: 490€ per year
  • 4
    GlobalProtect

    GlobalProtect

    Palo Alto Networks

    The modern workforce is more mobile than ever, accessing the network from any place on any device, at any time. Endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By extending next-generation firewall capabilities through the GlobalProtect subscription, you can gain greater visibility into all traffic, users, devices, and applications. With GlobalProtect, organizations can extend consistent security policies to all users, while eliminating remote access...
  • 5
    SilverSky Email Protection Suite
    Email is the number one threat vector for cybersecurity attacks. Signature-based anti-virus and standard reputation-based anti-spam solutions are no longer sufficient to secure email against today’s sophisticated payloads and social engineering attacks. Protect yourself from ransomware, malware, phishing campaigns, and business email compromise. As compliance requirements become more stringent, you need email security best practices to protect both internal and customer data and maintain...
  • 6
    WatchWave

    WatchWave

    ScanWave CTS

    WatchWave Security operations center provides a complete view of all the relevant data from the organization's systems, devices, and their interactions with real-time security insights for immediate action that scales the resources and reduces exposure to risk. WatchWave provides security professionals with comprehensive capabilities that accelerate threat detection, investigation, and response — modernizing security operations and strengthening cyber defenses. WatchWave Security operations...
  • 7
    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets since 2011. Unlike most of other companies, we provide services using our own network of scrubbing centers having sufficient channel and computing capacities to process high volumes of traffic. We do not resell other companies' services claiming them as our own. Today's digital world shows us ever-increasing number of cyber threats. Abreast of the latest trends, the number of DDoS...
    Starting Price: $30/month
  • 8
    Hanzo

    Hanzo

    Hanzo

    ... sophisticated platform, you are empowered with the tools you need to capture and preserve team messaging data, social media engagement, and interactive web content then replicate it in legally-defensible native format for analysis and review. Hanzo serves government agencies, enterprises, and top law firms across the globe. Technology that ediscovery and compliance teams rely on to manage tomorrow’s biggest data challenges today.
  • 9
    BitNinja

    BitNinja

    BitNinja.com

    BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. It requires...
    Starting Price: $10 per server
  • 10
    DuoCircle

    DuoCircle

    DuoCircle

    ... Protection, a part of the Advanced Threat Defense Suite. You’re covered with Link Click Protection even if site content changes between clicks. You get total protection from phishing and your confidential corporate information is secured because your employees are simply prevented from visiting sites that misuse such information. You get instant feedback in the form of an alert when a suspicious link is about to be visited.
  • 11
    GitGuardian

    GitGuardian

    GitGuardian

    .... The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.
    Leader badge
    Starting Price: $0
  • 12
    AWS GovCloud
    ... of Defense (DoD) Cloud Computing Security Requirements Guide (SRG) for Impact Levels 2, 4 and 5; FIPS 140-2; IRS-1075; and other compliance regimes. AWS GovCloud (US-East) and (US-West) Regions are operated by employees who are U.S. citizens on U.S. soil. AWS GovCloud (US) is only accessible to U.S. entities and root account holders who pass a screening process. AWS GovCloud (US) Regions can help customers address compliance at every stage of their cloud journey.
    Starting Price: $0.02 per GB
  • 13
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets...
  • 14
    ScanMail

    ScanMail

    Trend Micro

    ... threats (APTs). ScanMail™ Suite for Microsoft® Exchange™ stops highly targeted email attacks and spear phishing by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense, protection you don’t get with other solutions. In addition, only ScanMail blocks traditional malware with email, file, and web reputation technology and correlated global threat intelligence from Trend Micro™ Smart Protection Network™ cloud-based security.
  • 15
    BlackBerry Protect
    AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites. It prevents, detects and remediates advanced malicious threats at the device and application levels. Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints...
  • 16
    Zorin OS

    Zorin OS

    Zorin OS

    Zorin OS is designed to be easy, so you won't need to learn anything to get started. The Zorin Appearance app lets you change the desktop to resemble the environment you're familiar with, whether it's Windows, macOS, or Linux. Built on an Ubuntu & Linux foundation, Zorin OS runs on the same Open Source software that powers the U.S. Department of Defense, NASA, and more. Thanks to Linux's advanced security features, Zorin OS is resistant to viruses. Security patches and software updates...
    Starting Price: Free
  • 17
    Diamond IP

    Diamond IP

    Cygna Labs

    ...-cloud IPAM with virtual appliances for AWS, Azure, Oracle VM, VMware, Hyper-V and others. And our cloud automation appliance dynamically automates the assignment and tracking of private and public cloud instance IP addresses and DNS names. Our DNS security products supplement your defense in depth security strategy at the DNS layer. We serve global multinational organizations around the world with our security, cloud and networking services.
  • 18
    FireCompass

    FireCompass

    FireCompass

    FireCompass runs continuously and indexes the deep, dark and surface web using elaborate recon techniques as threat actors. The platform then automatically discovers an organization's dynamic digital attack surface, including unknown exposed databases, cloud buckets, code leaks, exposed credentials, risky cloud assets, and open ports & more. FireCompass provides the ability to launch safe-attacks on your most critical applications and assets. Once you approve the scope on which the attacks...
  • 19
    IBM Rhapsody
    IBM® Engineering Systems Design Rhapsody® (Rational Rhapsody) and its family of products offers a proven solution for modeling and systems design activities that allows you to manage the complexity many organizations face with product and systems development. Rhapsody is part of the IBM Engineering portfolio that provides a collaborative design development, and test environment for systems engineers that supports UML, SysML, UAF and AUTOSAR. The solution also allows for control of defense...
  • 20
    Siteage

    Siteage

    Siteage

    ... force. Our goal is to provide your highly secure cloud application environment with success by dint of technology. Protected Banking system of the endpoint security defenses by proving secure network and data-center services. With a presence on 3 continents, we provide a dedicated server adapted to professionals, startups, small and large companies and large accounts. More than 80K customers in 102 countries already rely on our infrastructures.
    Starting Price: $70 per month
  • 21
    Vawlt

    Vawlt

    Vawlt

    Vawlt is an all-in-one SaaS solution for data storage in a multicloud journey that simplifies the transition to the cloud, improves data security standards and optimizes usage of storage resources. Vawlt enables the creation of virtual storage services adapted to customers’ specifications, which are easy to integrate with both new or existing data storage strategies. The data is stored in multiple cloud providers simultaneously, ensuring the best levels of security and...
    Starting Price: €12.90/TB/month + VAT
  • 22
    StorCentric Retrospect
    ... countries. Immutable backups create a tamper-proof backup copy by locking it down for a designated period ensuring you are protected if hit by ransomware. Anomaly detection uses machine learning to detect changes in the source volume that is outside of expected variance to detect ransomware infections earlier. This multi-pronged defense, which is fully customizable, provides businesses with the tools needed to remediate an attack and move on.
  • 23
    Avast Ultimate
    As one of today’s most pressing cyberthreats, ransomware kidnaps your sensitive files and holds them hostage unless you pay up. To keep your files and data safe, learn what ransomware is, how it works, and how you can prevent it from infecting your devices with a world-class anti-malware tool like Avast One. Our most advanced protection is your lightest, toughest defense against viruses, ransomware, spyware, zero-second threats, home Wi-Fi network vulnerabilities, and more. Protect all of your...
    Starting Price: $69 .99 per device per year
  • 24
    Huntress

    Huntress

    Huntress

    Huntress delivers a powerful suite of endpoint protection, detection and response capabilities—backed by a team of 24/7 threat hunters—to protect your business from today’s determined cybercriminals. Huntress protects your business throughout the modern attack lifecycle—defending against threats like ransomware, malicious footholds, and more. Our security experts take care of the heavy lifting with 24/7 threat hunting, world-class support and step-by-step instructions to stop advanced...
  • 25
    Trend Micro Internet Security
    ... with confidence that you and your devices are protected by world-class protection against the latest malware, fraud, and scams.​ Cybercrime never sleeps and neither should your defenses. Secure your PC with around-the-clock protection against ransomware, invasions of privacy, and online scams. Strong protection shouldn’t slow you down. Enjoy a minimal performance impact and fixes for common problems to start moving at top speed.
    Starting Price: $39.95 per year
  • 26
    Kombyne

    Kombyne

    Kombyne

    Kombyne™ is an innovative new SaaS high-performance computing (HPC) workflow tool, initially developed for customers in the defense, automotive, and aerospace industries and academic research. It allows users to subscribe to a range of workflow solutions for HPC CFD jobs, from on-the-fly extract generation and rendering to simulation steering. Interactive monitoring and control are also available, all with minimal simulation disruption and no reliance on VTK. The need for large files...
  • 27
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    End-to-end mobile security is made simple. Get the protection you need for your growing business in two simple steps. Cubed Mobile frees your employees from the need for a second device and/or second SIM while creating a secured separation between personal and business workspaces. Keep sensitive data safe and isolated in a secure environment. Ensure employees only connect to secure Wi-Fi networks. Empower your team to access the Internet securely. Protect against network, apps, privilege...
    Starting Price: Free
  • 28
    Signiant Jet
    Jet employs our new, patented intelligent transport mechanism capable of multi-Gbps transfer speeds. The transport can move any size file and data set over any IP network taking full advantage of all available bandwidth. Jet adheres to the information assurance principle of defense-in-depth, incorporating multiple layers of security controls. Signiant was awarded the DPP ‘Committed to Security’ helping make Signiant a preferred choice by the world’s top studios, broadcasters, sports leagues...
  • 29
    Wing Security

    Wing Security

    Wing Security

    Wing empowers organizations to harness the full potential of SaaS while ensuring a robust security posture. In addition to a free version that provides a list of an organization's SaaS inventory, with insightful details regarding application usage and user information, Wing’s complete SSPM solution offers unparalleled visibility, control, and compliance capabilities, strengthening any organization's defense against modern SaaS-related threats. With Wing’s automated security capabilities, CISOs...
    Starting Price: Free
  • 30
    CyberTOOLBELT

    CyberTOOLBELT

    CyberTOOLBELT

    Our patented technology helps you find the information you need, so that you can act quickly and confidently. Use CyberTOOLBELT for cybercrime and digital investigations, fraud prevention, legal research and due diligence, brand protection, and more. CyberTOOLBELT puts billions of data points at your fingertips. Our web-based interface provides 40+ tools that make the data easy to search and understand. Customers can use our API to perform automated analysis and feed big data applications...
    Starting Price: $49.95 per month