Suggested Categories:

Military and Defense Software
Military and defense software supports critical operations, logistics, and decision-making within military and defense organizations, enhancing strategic planning and mission execution. This software manages a range of functions, from intelligence gathering and data analysis to equipment maintenance and supply chain management. Advanced features, such as real-time situational awareness, threat detection, and secure communication, enable rapid response and coordination across units. Often incorporating encryption and compliance protocols, military software ensures the security of sensitive information and adheres to strict regulatory standards. Ultimately, military and defense software increases operational efficiency, strengthens defense capabilities, and enables informed decision-making in high-stakes environments.
Mobile Threat Defense Software
Mobile threat defense software protects mobile devices such as smartphones and tablets from cyber threats by detecting, preventing, and responding to security risks. It safeguards against malware, phishing attacks, network vulnerabilities, device misconfigurations, and unauthorized access. The software continuously monitors device behavior, application activity, and network connections to identify suspicious actions in real time. Integration with mobile device management and security information systems allows centralized control and rapid incident response. Ultimately, mobile threat defense software enhances the security posture of mobile environments, protecting sensitive data and ensuring compliance.
Social Engineering Defense Software
Social engineering defense platforms are security solutions designed to prevent, detect, and mitigate social engineering attacks, which manipulate individuals into disclosing confidential information or performing actions that compromise security. These platforms provide features such as phishing simulations, training modules to educate employees on recognizing suspicious behavior, and tools for analyzing and identifying potential threats. By educating users and continuously testing their awareness through simulated attacks, social engineering defense platforms help organizations build a more resilient workforce.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.

102 Products for "defense" with 1 filter applied:

  • 1
    ContraForce

    ContraForce

    ContraForce

    ... defense for customers from endpoint to cloud, with no scripting, agents, or coding needed. One place to manage multiple Microsoft Defender and Sentinel customer tenants while managing Incidents and cases from other XDR, SIEM, and ticketing tools. You'll see your security alerts and data in one unified investigation experience. You can operate your threat detection, investigations, and response workflows all within ContraForce.
  • 2
    Hexamail Guard
    Hexamail Guard is your ultimate defense against email-based threats. With an array of advanced security features, it ensures that your inbox remains secure and your business stays protected. Protect your email infrastructure with our innovative multi-layer filtering technology. Secure your business communications, enhance productivity, and achieve peace of mind with Hexamail Guard. Intelligent Threat Detection:Hexamail Guard employs cutting-edge algorithms to proactively identify and block...
    Starting Price: $224/10 users
  • 3
    ESET PROTECT Complete
    ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email...
    Starting Price: $287.72 one-time payment
  • 4
    Applied Intuition Vehicle OS
    Applied Intuition Vehicle OS is a scalable, modular platform that enables automakers, commercial fleets, and defense integrators to develop, deploy, and update comprehensive vehicle software, hardware, and AI applications across all domains, from ADAS and infotainment to autonomy and digital services. The on-board SDK provides embedded real-time OS, drivers, middleware, and reference compute architecture for safety-critical and consumer‑facing functions, while the off-board platform supports...
  • 5
    NetkaView Logger (NLG)
    .... The platform also provides real-time visibility into IT environments, helping teams identify risks, optimize performance, and maintain compliance. Netka’s offerings include both cloud-based and appliance-based deployments, giving businesses flexibility in scaling and managing their IT operations. By combining centralized log management with proactive defense, Netka helps organizations maximize security and efficiency.
    Starting Price: $149.99/month
  • 6
    safes3

    safes3

    Wodanio Group

    safes3 is a fully GDPR-compliant, S3-compatible object storage solution hosted exclusively on servers in Germany. It offers secure, transparent, and fair data storage at only EUR 0.025 per GB per month, with no setup fees, minimum contract term, or hidden costs. All data is end-to-end encrypted (SSL/TLS), stored redundantly, and protected by advanced DDoS defense systems. With a 99.5% uptime guarantee and German-based technical support via email and phone, safes3 ensures reliability and trust...
    Starting Price: $0
  • 7
    ClearML

    ClearML

    ClearML

    ... and monitoring in production. Use all of our modules for a complete ecosystem or plug in and play with the tools you have. ClearML is trusted by more than 150,000 forward-thinking Data Scientists, Data Engineers, ML Engineers, DevOps, Product Managers and business unit decision makers at leading Fortune 500 companies, enterprises, academia, and innovative start-ups worldwide within industries such as gaming, biotech , defense, healthcare, CPG, retail, financial services, among others.
    Starting Price: $15
  • 8
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings...
    Starting Price: $3 per user per month
  • 9
    Fingerprint

    Fingerprint

    Fingerprint

    Stop fraud, spam, and account takeovers with 99.5% accurate browser fingerprinting as a service. Access suspicious visitor activity and geolocation at lightspeed. Integrate our API into your server-side business rules or signup process. Receive instant notifications delivered securely to your backend systems, ideal for building scalable and asynchronous processes. Powerful account takeover protection for any web application. Keep your customers' accounts safe by accurately identifying...
    Starting Price: $80 per month
  • 10
    Trend Vision One

    Trend Vision One

    Trend Micro

    Stopping adversaries faster and taking control of your cyber risks starts with a single platform. Manage security holistically with comprehensive prevention, detection, and response capabilities powered by AI, leading threat research and intelligence. Trend Vision One supports diverse hybrid IT environments, automates and orchestrates workflows, and delivers expert cybersecurity services, so you can simplify and converge your security operations. The growing attack surface is challenging....
  • 11
    FileCloud

    FileCloud

    FileCloud

    FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000...
    Starting Price: $6.00/month/user
  • 12
    Fortinet

    Fortinet

    Fortinet

    ..., automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.