Vendors
Analysis and filtering of network traffic (including NTA)
Open
Cyber Fraud Protection
Open
Cyber Intelligence platforms
Open
Data Leak Prevention (DLP)
Open
Database and file storage protection
Open
DDoS Attack Prevention
Open
DevSecOps
Open
HCLSoftware
Encryption tools
Open
Endpoint protection (EPP, EDR)
Open
Extended Detection and Response (XDR)
Open
Firewall (NGFW/UTM)
Open
Ideco
UserGate
Identity Governance and Access Rights Management (IDM, IAM, IGA)
Open
Mail server protection
Open
Means of protecting information from unauthorized access
Open
Microsoft
Protect of an Industrial Automatic Control System (IACS)
Open
Protecting Cloud and Virtual Environments
Open
Protection against targeted attacks (Sandbox)
Open
Protection of remote workstations and mobile devices
Open
Security information and event management (SIEM)
Open
UserGate
Security Orchestration, Automation and Response (SOAR)
Open
UserGate
Security Web Gateway (SWG)
Open
Training of personnel to protect against cyberthreats
Open
Vulnerability Scanner
Open
Web Application Firewall (WAF)
Open