Vendors

Analysis and filtering of network traffic (including NTA)

Open

Cyber Fraud Protection

Open

Cyber Intelligence platforms

Open

Data Leak Prevention (DLP)

Open

Database and file storage protection

Open

DDoS Attack Prevention

Open

DevSecOps

Open

Endpoint protection (EPP, EDR)

Open

Extended Detection and Response (XDR)

Open

Firewall (NGFW/UTM)

Open

Identity Governance and Access Rights Management (IDM, IAM, IGA)

Open

Mail server protection

Open

Means of protecting information from unauthorized access

Open

Protect of an Industrial Automatic Control System (IACS)

Open

Protecting Cloud and Virtual Environments

Open

Protection against targeted attacks (Sandbox)

Open

Protection of remote workstations and mobile devices

Open

Security information and event management (SIEM)

Open

Security Orchestration, Automation and Response (SOAR)

Open

Security Web Gateway (SWG)

Open

Training of personnel to protect against cyberthreats

Open

Vulnerability Scanner

Open

Web Application Firewall (WAF)

Open

Become a vendor

* Required to fill

Surname, name *
Company name *
Website
E-mail *
Telephone *
Your message *

Add two numbers and enter the result in digits