[go: up one dir, main page]

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
Security Compliance Software
Security compliance software enables organizations to manage, track, and comply with cybersecurity compliance regulations and frameworks. Security compliance software provides tools for companies to audit their security posture and policies and achieve compliance certifications such as ISO 27001, ISO 27002, ISO 27017, CSA STAR, SOC 2, PCI DSS, FedRAMP, NIST 800-171, NIST 800-53, and more.

127 Products for "security" with 1 filter applied:

  • 1
    Upfort

    Upfort

    Upfort

    ...Insurers powered by Upfort deliver market-leading value and robust coverage with hassle-free underwriting. Catch dangerous links that are used to steal information, automatically download malicious software, and compromise security. Warn users about suspicious financial requests and scams before funds are transferred. Highlight impersonation attempts that often trick users into taking unauthorized action. Whether you’re early in your security journey or have extensive controls in place, Upfort’s proprietary AI-powered solutions add an effective layer of protection.
  • 2
    Coalition

    Coalition

    Coalition

    ...Coalition protects your business by preventing incidents before they occur. Our proactive cybersecurity platform saves your business time, money, and headaches. We provide our security tools at no additional cost to our insurance customers. We alert you when your employees’ credentials, passwords, and data have been compromised in 3rd party data breaches. Over 90% of security incidents are caused by human error. Train your employees to avoid mishaps with our engaging, story-based employee training platform and simulated phishing emails. ...
  • 3
    Elpha Secure

    Elpha Secure

    Elpha Secure

    ...The solution is all-in-one software that’s easy to implement and to use. Finally, advanced security software embedded in a cyber insurance policy for critical coverage that actually helps manage your cyber risk. Elpha Secure is one elephant you need in your room. Full coverage plus first-rate software offers more robust protection for less. Streamlined AI-powered underwriting process to deliver a quote on the spot.
  • 4
    Chubb

    Chubb

    Chubb

    With DigiTech® ERM and Chubb’s approach to Widespread Events coverage, businesses can tailor coverage to their unique exposures and needs, providing for greater coverage certainty and also providing long-term stability in the cyber insurance marketplace. Market-leading, highly customizable solutions to address clients’ unique needs, regardless of size, industry or type of risk. Broadened definition of protected Information includes biometrics, internet browsing history and personally...
  • 5
    Hiscox

    Hiscox

    Hiscox

    Hiscox can help you protect your business from malware and hackers with cyber security insurance for small businesses. Cyber security insurance protects businesses against computer-related crimes and losses. This can include targeted attacks, such as malware and phishing, as well as the occasional misplaced laptop containing confidential material. If your business computer system is compromised by a targeted or an accidental attack, you may be liable for the cost to notify the affected parties and provide credit monitoring, even if the data is not exploited. ...
  • 6
    Corvus Insurance

    Corvus Insurance

    Corvus Insurance

    ...This intelligence enables our team to deliver optimal pricing and coverage options within minutes. Each policy includes a Dynamic Loss Prevention™ report with detailed IT security recommendations, access to our Risk & Response Services for proactive risk management, and ongoing vulnerability alerting. Our proprietary underwriting process leverages new sources of data analyzed with machine learning to quote cyber insurance coverage for most accounts within minutes, while also providing our experienced underwriting team with tools and insights to work on complex risks. ...
  • 7
    OpenPM

    OpenPM

    OpenPractice

    ...The result is highly automated accounts receivables management for optimized cash flow, and extensive reporting to help you proactively manage your organization. All of this control is securely hosted and delivered through the browser you already have, providing the perfect combination of security and availability. Medical billing software, revenue cycle management solutions, practice management software, practice management system, medical practice management, EMR integration, EHR integration, practice management scheduling, patient scheduling, online patient billing, patient billing, automatic patient billing and payments, patient payments, electronic patient payments.
  • 8
    Predict360

    Predict360

    360factors

    Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments,...
    Leader badge">
    Starting Price: $1,500/month
    Partner badge
  • 9
    LMS Suite

    LMS Suite

    Street Solutions

    ...Sellers can lock and price loans on a flow or bulk basis that fit your product’s eligibility guidelines through our portal. They can upload credit documents and satisfy conditions raised during reviews. Securely upload and store credit documents at a trade, pool, and loan level. Exchange documents with third-party vendors through secure integrations. Direct orders to appropriate diligence vendors based on product & volume. View & resolve third-party reviewer’s results using automated vendor data feeds. Generate funding schedules with amortized balances, calculated interest and fees.
  • 10
    Embroker

    Embroker

    Embroker

    ...A cyber insurance policy, also referred to as “cyber risk insurance” or “cyber liability insurance” coverage, is a financial product that enables businesses to transfer the costs involved with recovery from a cyber-related security breach or similar events. Typically, the most important aspect of cyber insurance will be network security coverage. This coverage will respond in the event of a network security failure – such as data breaches, malware, ransomware attacks and business account, and email compromises. However, the policy will also respond to liability claims and ancillary expenses of an attack or breach.
  • 11
    Resilience Insurance
    At Resilience, we offer a fresh approach to the middle market in cyber insurance backed by a top-rated carrier and an in-house claims team. With services ranging from holistic insurance coverage at bind to loss mitigation services post-bind, to custom, ongoing security services throughout the lifecycle of the policy, your cyber resilience is our business. We bring together a full ecosystem of security, insurance, and claims—all supported by superior data gathering and analytics—to provide highly tailored defense, coverage, and support for mid-market companies. As organizations everywhere shift to remote work, we help manage your increasing reliance on cloud systems and new risks, from misconfigured services to perilous home network security.
  • 12
    InsurLink

    InsurLink

    Vertafore

    ...Higher client satisfaction, lower E&O risk, and more time to advise clients and grow your business. In this success story, learn how InsurLink helped Amaden Gay Agencies significantly reduce time responding to simple inquiries, increase the security of document sharing practices, and improve the agency-client relationship by offering self-service capabilities. Your clients expect to have their needs met quickly, when and where it is convenient for them. A modern, intuitive client digital experience is key to providing the 24/7, mobile, and secure service clients are looking for—boosting your profitability and client retention. ...
  • 13
    Insuraxe Solutions
    We have developed our system using top security methods in use from Encrypted Databases, extensive testing, EVSSL Certificate to our securely hosted servers with Azure Platform to maximize the availability and reliability to all our clients through auto-scaling. We are confident that we HIPAA compliance. we keep a log of all and every action through out the system and monitor all database abnormalities.
    Starting Price: $4999 per month
  • 14
    Symplast

    Symplast

    Symplast

    ...Speed things up by writing or dictating EHR notes from customizable templates or add your own. Free up hours of time across your practice with online appointment requests, a digital new patient intake portal, and HIPAA- secure automated appointment reminders. Give your patients peace of mind by staying in touch with them through real-time, two-way, HIPAA-secure messaging, media sharing, appointment reminders, and more. Doctors, patients, and staff alike can securely share images, videos, and files with the push of a button. Easily tag media for marketing purposes and keep it all organized with a global catalog.
  • 15
    AXIS Cyber Insurance
    ...Today, the threat of a cyber incident is real regardless of industry sector, size or geographic location. Cyber insurance and risk mitigation are critical to help protect businesses from financial loss and provide them with cyber security services that help them manage and recover from the effects of cyber attacks and cyber data incidents. We offer brokers and clients deep expertise in managing data security, guidance on preparing for an incident and guidance on preparing for a cyber incident response. AXIS Cyber insurance for large global and large middle-market businesses.
  • 16
    Travelers

    Travelers

    Travelers

    ...As technology becomes more complex and sophisticated, so do the threats that businesses face. This is why every business and organization needs to be prepared with both cyber liability insurance and an effective cyber security plan to manage and mitigate cyber risk. At Travelers, we understand the complexity of cyber threats. We have solutions to help insure and protect your business assets. Cyber liability insurance is an insurance policy that provides businesses with a combination of coverage options to help protect the company from data breaches and other cyber security issues. ...
  • 17
    USI Affinity

    USI Affinity

    USI Affinity

    If your law firm relies on the Internet, wireless connections, mobile devices, laptop computers, and/or other technology, it is increasingly vulnerable to potentially costly cyber exposures. Furthermore, your law firm’s exposure to a data security breach could be worse than you ever imagined. Learn more about Cyber coverage built for law firms! As an attorney, you have an obligation to protect client information and therefore need to secure your computers and computer systems. USI Affinity is excited to bring to law firms coverage designed just for you with Crum & Forster. ...
  • 18
    Applied Pay

    Applied Pay

    Applied Pay

    ...It seamlessly integrates with Applied Epic, Applied CSR24, and EZLynx, automating payment collection, processing, and reconciliation. This integration enables agencies to offer clients a secure, convenient way to pay premiums online from any device. Applied Pay supports various payment methods, including ACH, credit and debit cards, and eWallet options, providing flexibility to insureds. Features such as next-day funding, the ability to pay multiple invoices simultaneously, and the option to set up recurring payments enhance the payment experience. ...
  • 19
    Eligible

    Eligible

    Eligible

    Eligible's powerful APIs are the easiest way to add insurance billing experiences into your applications. These accreditations assure patients and providers that Eligible has accomplished the strictest compliance with privacy and security best practices while processing millions of healthcare cases each month. We fully understand the role of a mature and proven information security program in meeting Eligible and customer goals. We are happy to announce the successful completion of our Type II SOC2 review. Achieving this certification helps us assure our customers and the companies with which we interact that we understand our responsibilities in keeping protected health information safe. ...
    Starting Price: 3% Fee
  • 20
    CyberCube

    CyberCube

    CyberCube

    ...An active and trusted contributor in the industry, we work with multiple stakeholders to build world-class solutions. Unlock the business value in cyber insurance from our team of 100’s of world-leading experts from data science, cyber security, artificial intelligence, threat intelligence, actuarial science, software engineering and insurance. Enable a detailed view of enterprise risk profiles for individual risk underwriting. Power portfolio-level decision-making through forward-looking models.
  • 21
    Arch

    Arch

    Arch Insurance Group

    Arch’s experienced underwriting team takes a forward looking approach to writing network security, privacy and media liability. The Arch Netsafe® 2.0 Policy ensures that its coverage offerings are able to evolve and address the new exposures that spawn from an increasingly technology dependent society. Pursuing Better Together encapsulates how we do business at Arch Insurance. It is an approach that is based on collaboration, responsiveness and a genuine commitment to continually raising the bar.
  • 22
    Berkley Cyber Risk Protect

    Berkley Cyber Risk Protect

    Berkley Cyber Risk Solutions

    Berkley Cyber Risk ProtectSM provides expansive first and third party cyber coverage that provides options for separate limits and retentions, subject to an annual policy aggregate, allowing flexibility to choose only coverages meeting policyholders’ needs. Reimbursement for costs to replace, remediate and improve computer systems and establish and improve data security practices and policies.
  • 23
    PDSpectrum

    PDSpectrum

    Priority Data

    PDSpectrum is a web-based modern policy processing software solution that enables users to manage sales, billing, claims, and accounting. PDSpectrum features include accounting, claims, rating, underwriting, administration, document management, and more. PDSpectrum is accessible via a secure web-browser connection. PDSpectrum also provides full data connections and integrations to its partners such as LexisNexis, InsVista, and more.
  • 24
    samedi

    samedi

    samedi

    samedi is a web software solution for cost-saving and service-increasing patient coordination. The secure networking solution can be used in medical practices, clinics and operating theaters. The work processes are optimized through effective and efficient resource planning, process control, online appointment booking and assignments. With the help of video consultation hours and online forms, processes can be mapped more flexibly, of course, while guaranteeing the highest data security. ...
    Starting Price: $45 per user per month
  • 25
    Aithent

    Aithent

    Aithent

    Companies and governments of all sizes trust Aithent’s expertise and solutions to solve their operational challenges and meet their digital transformation needs. Streamline operations and mitigate risks associated with fraud, AML, and disputes. Aithent has helped advance operational efficiency and performance by developing and applying technology in uniquely effective ways. Aithent Dispute Manager can be shared by geographically dispersed branches and call centers ensuring that...
  • 26
    RiskVille

    RiskVille

    RiskVille

    ...We understand your business and know how important it is to see not only the whole picture of the business results but also to carry out carefully and accurately daily operations. Free up your people from doing monkey jobs and let RiskVille automate their routine. We all have audits and want to meet auditors with a smile feeling secure and compliant. Improve compliance by making audit processes more straightforward. RiskVille is GDPR compliant and hosted on the safe and secure Microsoft Azure platform ensuring safety and security for your data and processes. You can exceed clients' expectations by providing access to policies and claims via a simple online interface or friendly remind them about renewals.
  • 27
    Liberty Mutual

    Liberty Mutual

    Liberty Mutual Global Risk Solutions

    ...Without the right insurance protection, responding to an event could be devastating to a company’s finances and reputation. Our cyber liability solution, Data Insure, from Ironshore helps protect companies against a variety of network security and privacy exposures resulting from data breaches and other cyber events. The fallout from a cyber incident can be significant, costing businesses time, money, and valued customer relationships.
  • 28
    Supercede

    Supercede

    Supercede

    ...Recognized for improving operational efficiency and delivering strategic growth, Supercede is trusted by top reinsurance teams globally. The platform maintains high-security standards, holds ISO 27001 certification, and ensures complete vendor neutrality.
  • 29
    NowCerts

    NowCerts

    NowCerts

    NowCerts is a secure, intelligent, and intuitive agency management system (AMS) cloud-based that features self-serve certificates, commissions tracking, and automate updates of policy information from carrier databases. Hosted in a secure server environment, NowCerts is intelligently designed and engineered to include a number of artificial intelligence features that help increase Agency IQ.
    Starting Price: $49.00/month
  • 30
    Ace Fleet Insurance Rating

    Ace Fleet Insurance Rating

    Ace Actuarial Consulting

    ...Some features of the fleet software: The fleet software allows policies to be added, populated, deleted, copied, rerated, exported, imported and accessed from any online PC. The fleet software is downloaded from the web while the policy data is stored on the web for easy access from any PC. Policy data can be placed on secured-access external servers or can be customized to be placed on the insurer's intranet. The fleet software can be customized and integrated in the insurer's policy management system. The fleet software calculates the manual premium and the fleet-rated premium.
    Starting Price: $1000.00/month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next