---
description: Page 15 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 15 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software) > [Page 15](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15)

# Cybersecurity Software

Canonical: https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software

Page: 15 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=14)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16)

-----

## Products

1. [swIDch Auth SDK](https://www.softwareadvice.co.nz/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
2. [Volterra](https://www.softwareadvice.co.nz/software/318237/volterra) (0 reviews) — F5's Volterra is a distributed cloud platform to deploy, connect, secure, and manage applications and data across mul...
3. [Crowdsec](https://www.softwareadvice.co.nz/software/267630/crowdsec) (0 reviews) — CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributi...
4. [Lepide Data Security Platform](https://www.softwareadvice.co.nz/software/248829/lepide-data-security-platform) (0 reviews) — Lepide Data Security Platform is a software solution created for all data security cases and across all data sources....
5. [Octiga](https://www.softwareadvice.co.nz/software/333959/octiga) (0 reviews) — Octiga applies coherent best practice security posture for Office 365 through automation. As a result, clients achiev...
6. [CybelAngel](https://www.softwareadvice.co.nz/software/205279/cybelangel) (0 reviews) — CybelAngel is an enterprise-grade data leak detection platform. It is designed to help businesses ensure confidential...
7. [FileFlex](https://www.softwareadvice.co.nz/software/289128/fileflex) (0 reviews) — FileFlex Enterprise is a service that allows users to remotely access and share files and folders located anywhere on...
8. [CLAW](https://www.softwareadvice.co.nz/software/341001/claw) (0 reviews) — CLAW is a cybersecurity platform that helps businesses identify real-time threats and assess network's gaps. Organiza...
9. [CTM360](https://www.softwareadvice.co.nz/software/353055/ctm360) (0 reviews) — CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities acros...
10. [SpamTitan Plus](https://www.softwareadvice.co.nz/software/336936/spamtitan-plus) (0 reviews) — SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspic...
11. [HighGround](https://www.softwareadvice.co.nz/software/357559/highground) (0 reviews) — HighGround offers a range of technology capabilities that allow IT and security managers to take control of their sec...
12. [Fortra’s DMARC Protection](https://www.softwareadvice.co.nz/software/346151/agari-brand-protection) (0 reviews) — Agari Brand Protection allows organizations to ensure security from email spoofing, phishing, and other online threat...
13. [Chariot](https://www.softwareadvice.co.nz/software/362257/chariot-attack) (0 reviews) — The Chariot Platform enables organizations to identify, assess and reduce vulnerabilities in their networks as well a...
14. [AirCISO](https://www.softwareadvice.co.nz/software/362012/airciso) (0 reviews) — AirCISO is a free extended detection and response (XDR) security platform that provides a unified view across your en...
15. [Asimily Insight](https://www.softwareadvice.co.nz/software/329315/asimily-insight) (0 reviews) — Asimily’s best-in-class Insight IoMT and IoT risk remediation platform, developed specifically for medical devices, i...
16. [Netwrix Threat Manager](https://www.softwareadvice.co.nz/software/362254/netwrix-stealthdefend) (0 reviews) — Netwrix StealthDEFEND protects critical Active Directory and file system data. Detect even highly sophisticated threa...
17. [tbSIEM](https://www.softwareadvice.co.nz/software/353544/tbsiem) (0 reviews) — tbSIEM is a log management solution that helps businesses manage multiple data sources and network performances. The ...
18. [Armor](https://www.softwareadvice.co.nz/software/361032/armor) (0 reviews) — Minerva Armor is the industry's first multi-layered anti-ransomware solution, built to completely prevent ransomware ...
19. [ThreatX](https://www.softwareadvice.co.nz/software/360194/threat-x) (0 reviews) — ThreatX is an enterprise-level security platform that helps businesses protect their data and systems from cyber thre...
20. [Phalanx GRC](https://www.softwareadvice.co.nz/software/365203/phalanx-grc) (0 reviews) — Build a world-class security and compliance program with Phalanx GRC. The platform, which you can start using today f...
21. [Wallarm API Security](https://www.softwareadvice.co.nz/software/324747/wallarm-api-security) (0 reviews) — Wallarm API Security platform provides visibility, robust protection and automated incident response across your enti...
22. [ShadowHQ](https://www.softwareadvice.co.nz/software/364412/shadowhq) (0 reviews) — ShadowHQ is a mobile and desktop application. When a cyber threat or attack is detected by the IT team, users in the ...
23. [Integrite](https://www.softwareadvice.co.nz/software/248110/integrite) (0 reviews) — Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI ...
24. [HTTPCS Cyber Vigilance](https://www.softwareadvice.co.nz/software/285714/httpc-cyber-vigilance) (0 reviews) — Data leaks monitoring and cyber threats detection solution. Your real-time malicious network monitoring solution (web...
25. [RedShield](https://www.softwareadvice.co.nz/software/220609/redshield) (0 reviews) — RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government a...

-----

Page: 15 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=14)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 15 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15","about":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"Page 15","position":3,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 15 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15#itemlist","@type":"ItemList","itemListElement":[{"name":"swIDch Auth SDK","position":1,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.co.nz/software/320674/otac","@type":"ListItem"},{"name":"Volterra","position":2,"description":"F5's Volterra is a distributed cloud platform to deploy, connect, secure, and manage applications and data across multiple clouds, private and public, and at edge locations. Volterra’s global network allows you to secure cloud applications and put critical transactions and workloads closer to end users for a faster and safer digital experience.\n\nVolterra assists DevOps and NetOps teams ease operations, security, and performance challenges with two primary products:\n\nVoltMesh – SaaS-based offering consolidating networking and security services across cloud and edge sites along with the ability to offload applications to Volterra’s global network.\n\nVoltStack – SaaS solution automating deployment, security, and operations of distributed apps and infrastructure across edge, public/private clouds and Volterra’s global application delivery network.\n\nVolterra’s solutions solve for:\n\nMulti-Cloud\n•\tConsolidate networking, security, and application delivery across cloud providers\n•\tAdvanced Kubernetes gateway with integrated security and API services across one or more clusters\n•\tGlobally distributed application gateway to deliver fast performing SaaS apps\n\nNetwork Cloud\n•\tSecure and accelerate private, hybrid or multi-cloud web applications and APIs\n•\tNetwork-hosted workloads to improve end user static and dynamic content experiences\n•\tDDoS, advanced security, and IP transit services for private or hybrid clouds\n\nEdge Cloud\n•\tCloud-native compute, storage, network, and security services across edge sites\n•\tSecure edge gateway to consolidate SDWAN, security, and API gateways\n•\tVolterra’s global network to securely connect distributed edge sites to cloud providers\n\nVolterra helps NetOps and DevOps teams improve the performance and security of their critical apps – both modern microservices-based and distributed ones, as well as traditionally designed web apps. Volterra’s architecture and solutions provide the operational simplicity, visibility, and infrastructure abstraction requires by today’s faster IT organizations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b44eb074-8d2f-4a1f-8b47-b3f69fa989af.png","url":"https://www.softwareadvice.co.nz/software/318237/volterra","@type":"ListItem"},{"name":"Crowdsec","position":3,"description":"CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors within its user network.\n\nThis platform uses a decoupled approach (detect here, remedy there) and an inference engine that leverages leaky buckets, YAML & Grok patterns to identify aggressive behaviors. It acquires signals from various data sources like logs or cloud trails, Kafka, etc., normalizes them, enriches them to apply heuristics and triggers a bouncer to deal with the threat, if need be. Since it’s written in Go, it’s compatible with almost any environment, fast in execution, and resource conservative.\n\nCrowdSec captures all aggression signals (timestamp, IP, behavior) and sends them for curation. That way, it establishes a reliable IP blacklist that is constantly redistributed to the network members in order to achieve a form of digital herd Immunity. An IP caught aggressing WordPress sites will quickly be banned by all members using CrowdSec that subscribed to the WordPress defense collection.\n\nWhile CrowdSec is in charge of the detection, the reaction is performed by “bouncers” that aim to be deployable at any level of the applicative / infrastructure stack:\n- via Nftables/Iptables/Pf based on an IP set \n- via Nginx LUA scripting\n- via WordPress plugin\nOr GCP/AWS/Azure firewall, slack or scripting, notifications, etc.\n\nBouncers can enforce several types of remediation such as blocking, sending a captcha, notifying, lower rights, speed, send a 2FA request, etc. Chained leaky buckets can help sort opportunistic attacks from targeted ones. \n\nThis approach, combined with a declarative configuration and a stateless behavior, makes it an efficient tool to enhance the security of modern stacks (containers, k8s, serverless and more generally automatically deployed infrastructures).\n\nWhenever an attack is locally blocked/detected by Crowd watch, the “meta” information of the attack is shared amongst participants (source IP, date, and triggered scenario) for redistribution to network members.\n\nSome other notable features include:\n- a public hub to find, share and amend parsers, scenarios, and blockers\n- permissive open-source license (MIT) to stay business-friendly\n- Communication channels to interact with each other","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5360345c-9716-4719-bc5b-e72bada903c2.png","url":"https://www.softwareadvice.co.nz/software/267630/crowdsec","@type":"ListItem"},{"name":"Lepide Data Security Platform","position":4,"description":"Lepide Data Security Platform is a software solution created for all data security cases and across all data sources. The platform helps users protect their sensitive data from corrupt user accounts as well as from any unknown and rogue users. The software provides users with the following data protection tools: an active directory for tracking movement, threat identification and detection, data auditing, content scanning and more. Users can use the platform to analyzes threats in real-time and to integrate with other softwares such as splunk, Radar, FireEye and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/061ce824-f569-43e5-8b7b-3aebbc625076.png","url":"https://www.softwareadvice.co.nz/software/248829/lepide-data-security-platform","@type":"ListItem"},{"name":"Octiga","position":5,"description":"Octiga applies coherent best practice security posture for Office 365 through automation. \n\nAs a result, clients achieve Instant corporate-wide security for config, users, azureAD groups, mailboxes, teams, SharePoint, intune and everything 365.  \n\nQuickly achieve and maintain best-practice security across Office 365.  Cover the entire security cycle; identity, protect, detect and remediate, continuously, and all in one easy to use and understand dashboard. In addition, the platform enables businesses to achieve alignment with the CIS security standard benchmark for Office 365.\n\nSave on time and know-how while gaining confidence that your security posture is best-practice and automated continuously.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1b8a180-8336-4fda-a2de-c118afb77701.png","url":"https://www.softwareadvice.co.nz/software/333959/octiga","@type":"ListItem"},{"name":"CybelAngel","position":6,"description":"CybelAngel is an enterprise-grade data leak detection platform. It is designed to help businesses ensure confidential digital assets remain secure. The application has functions to scan all layers of the IoT for potential security risks. If a threat is uncovered, the application can instantly alert businesses about the risk.\n\nCybelAngel can also provide suggestions on remedial steps that users can take to contain the threat. The application uses a combination of artificial intelligence and human analysis to detect threats. It also prevents false positives from being sent to IT system administrators. The software continuously scans the IoT in the background to help reduce the risk of undetected data leaks. \n\nThe application is designed to detect minute data breaches and pinpoint sources of data leaks. Users can configure CybelAngel to generate threat reports based on the severity, and it suggests corrective actions to initiate from the application to mitigate the threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/820b1cec-b364-46e3-b1b0-ade1a11af9ba.png","url":"https://www.softwareadvice.co.nz/software/205279/cybelangel","@type":"ListItem"},{"name":"FileFlex","position":7,"description":"FileFlex Enterprise is a service that allows users to remotely access and share files and folders located anywhere on an organization’s storage structure over the internet - without the need for a VPN.  This makes it ideal not just for employees, but a great productivity tool for contractors and gig-workers.  \n\nThe files could be located in on-premises storage such as servers, server-attached, network-attached and PC devices, in cloud-hosted storage such as Microsoft Azure, Amazon S3 or Google cloud, as well as enterprise and consumer-oriented clouds such as Box, Dropbox, OneDrive and Google Drive or it could be on SharePoint storage.\n\nRemote access and sharing is protected with the highest level of security via a zero trust architecture.  Zero trust is a new approach that first identifies and authenticates the user who wants access, then only allows requests per the permission sets dictated by the IT department, and then only allow access to the files and folders permitted.\n\nIt allows the IT department the ability to control remote access on a user-by-user basis right down to the file level and gives them a log and visibility to every remote access and sharing activity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8dfcdeb8-574a-41e3-a608-9f90c083184f.png","url":"https://www.softwareadvice.co.nz/software/289128/fileflex","@type":"ListItem"},{"name":"CLAW","position":8,"description":"CLAW is a cybersecurity platform that helps businesses identify real-time threats and assess network's gaps. Organizations can build composite datasets that quickly identify false positives. \n\nUsing CLAW, businesses can enhance snapshots with data to spot sophisticated patterns and threats. The system includes tools, visibility and context required to improve an organization's cybersecurity posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/34de4624-eab1-4e33-b4c4-e54a5b5d9b34.png","url":"https://www.softwareadvice.co.nz/software/341001/claw","@type":"ListItem"},{"name":"CTM360","position":9,"description":"CTM360 is a digital risk protection platform that detects, manages, and responds to threats and vulnerabilities across the Surface, Deep & Dark web. Subscribers of the CTM360 platform get access to external attack surface management, cyber threat intelligence, cybersecurity risk scorecards, third-party vendor assessments, brand protection / anti-phishing, data leakage protection, social media monitoring, and takedowns on an unlimited basis.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3754c96a-09da-4a96-97cc-b5d5398aa57f.png","url":"https://www.softwareadvice.co.nz/software/353055/ctm360","@type":"ListItem"},{"name":"SpamTitan Plus","position":10,"description":"SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspicious or malicious links. The main features of SpamTitan Plus include time-of-click analysis, malicious link neutralization, URL inspection, and URL rewriting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63a0fb5e-2805-4807-88a8-86141963bd37.png","url":"https://www.softwareadvice.co.nz/software/336936/spamtitan-plus","@type":"ListItem"},{"name":"HighGround","position":11,"description":"HighGround offers a range of technology capabilities that allow IT and security managers to take control of their security experience. It allows them to have full visibility and control of their security posture and gives them the capability to implement additional products and services as their needs change. Reporting and scoring tools allow IT and security managers to understand how they are performing against best practices, and offer an ROI model that helps to maximize the value of their investment in security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad4cdd0d-49f3-4649-bab9-c951b1afb3d5.jpeg","url":"https://www.softwareadvice.co.nz/software/357559/highground","@type":"ListItem"},{"name":"Fortra’s DMARC Protection","position":12,"description":"Agari Brand Protection allows organizations to ensure security from email spoofing, phishing, and other online threats.  A cloud-based solution, Agari provides DMARC email authentication, enterprise-grade SPF and DKIM that help prevent email fraud at the mailbox.\n\nAgari Brand Protection provides customizable security measures against all forms of email spoofing including phishing and ransomware attacks. Pricing details are available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/562e7e01-4a38-4587-a314-29dfdd89deaa.webp","url":"https://www.softwareadvice.co.nz/software/346151/agari-brand-protection","@type":"ListItem"},{"name":"Chariot","position":13,"description":"The Chariot Platform enables organizations to identify, assess and reduce vulnerabilities in their networks as well as rapidly respond to real-time attacks. The platform’s unique approach to attacking cyber threats provides customers with visibility into even the most complex networks and helps them understand how attacks work so they can mitigate vulnerabilities before they become exploits.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8b4b482-0919-42b9-8652-a432138741b5.jpeg","url":"https://www.softwareadvice.co.nz/software/362257/chariot-attack","@type":"ListItem"},{"name":"AirCISO","position":14,"description":"AirCISO is a free extended detection and response (XDR) security platform that provides a unified view across your entire IT landscape, including endpoints, email, servers, cloud, network, third parties, and IoT. This view provides insights that simplify and expedite the detection and isolation of threats. \n\nAiriam believes that the power of XDR not only applies to the technology landscape but also benefits people and processes across an organization. That is why AirCISO provides a platform that allows for the correlation of security processes to span across IT operations and other departments.  \n\nAirCISO serves as the single source of truth for your teams and tools. The platform provides actionable prioritized information that is aligned with your business. Security teams are able to prioritize and filter out noise, view custom and enriched data from all sources, and share knowledge internally or cross-functionally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9eea468-52c6-47d3-b3f8-2f6926e82053.jpeg","url":"https://www.softwareadvice.co.nz/software/362012/airciso","@type":"ListItem"},{"name":"Asimily Insight","position":15,"description":"Asimily’s best-in-class Insight IoMT and IoT risk remediation platform, developed specifically for medical devices, is designed to meet the latest data security and data privacy compliance requirements, continuously monitors, identifies, and suggests remediations to keep devices operational while protecting connected networks and systems against attack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/848736db-1598-418c-968c-7445bcfbd847.png","url":"https://www.softwareadvice.co.nz/software/329315/asimily-insight","@type":"ListItem"},{"name":"Netwrix Threat Manager","position":16,"description":"Netwrix StealthDEFEND protects critical Active Directory and file system data. Detect even highly sophisticated threats in real-time. Respond automatically to attacks and abnormal behavior. Send threat data to ServiceNow, Slack, Microsoft Teams or any SIEM.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e7c0d412-6957-4507-8b77-d31a2c54924c.png","url":"https://www.softwareadvice.co.nz/software/362254/netwrix-stealthdefend","@type":"ListItem"},{"name":"tbSIEM","position":17,"description":"tbSIEM is a log management solution that helps businesses manage multiple data sources and network performances. The platform enables managers to monitor, analyze and investigate the data collected by various security tools, including IDS/IPS, SIEM and firewall logs. \n\nThe software can be used to detect cyber attacks in real-time and collect evidence for forensic investigations. Additionally, tbSIEM allows teams to create reports for compliance management, incident response and forensic investigations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4576e6f2-df9d-4fe5-9c76-61d83b8dd2bb.png","url":"https://www.softwareadvice.co.nz/software/353544/tbsiem","@type":"ListItem"},{"name":"Armor","position":18,"description":"Minerva Armor is the industry's first multi-layered anti-ransomware solution, built to completely prevent ransomware at the earliest stage of the attack, often months before other solutions can even detect them.\n\nMinerva Armor works alongside existing EDR/XDR/EPP solutions without causing any degradation to the endpoints, and can even protect your EDR agent from being abused.\n\nMinerva Armor takes the very part of ransomware and turns it against itself. With Minerva, you'll be able to break through ransomware encryption for a deeper investigation into what happened and how to stop it from happening again.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/063f9c14-9dc0-48db-8550-e8f2727c915b.jpeg","url":"https://www.softwareadvice.co.nz/software/361032/armor","@type":"ListItem"},{"name":"ThreatX","position":19,"description":"ThreatX is an enterprise-level security platform that helps businesses protect their data and systems from cyber threats. It is designed to protect web applications and APIs from bot-based attacks, zero-day attacks, malware communications, and other types of threats. The platform provides tools for behavior analysis of attacker activity, suspicious entity tracking, automated blocking, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/54e67720-a97d-4a23-b63c-d49b2a7a09c3.png","url":"https://www.softwareadvice.co.nz/software/360194/threat-x","@type":"ListItem"},{"name":"Phalanx GRC","position":20,"description":"Build a world-class security and compliance program with Phalanx GRC. The platform, which you can start using today for free, helps organizations build, manage, and maintain various compliance programs including ISO 27001, SOC 2, and more.\n\nBenefits of leveraging this all-in-one platform include: \n- Increased visibility into your security program\n- The ability to achieve and maintain your certifications\n- Quick and easy reporting\n- Access to a team of cybersecurity professionals who are there to help if you need them.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f2e71ddf-d38f-44be-92fd-a6237f45d037.jpeg","url":"https://www.softwareadvice.co.nz/software/365203/phalanx-grc","@type":"ListItem"},{"name":"Wallarm API Security","position":21,"description":"Wallarm API Security platform provides visibility, robust protection and automated incident response across your entire API portfolio. Wallarm API security provides robust protection for APIs, microservices and serverless workloads running in cloud-native environments. \n\nHundreds of Security and DevOps teams choose Wallarm for total visibility into malicious traffic, robust protection across their API portfolio and automated incident response against attacks. Wallarm supports modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and provides a full cloud solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/26b4d826-a44a-4bfa-84a5-7f2108eb1512.png","url":"https://www.softwareadvice.co.nz/software/324747/wallarm-api-security","@type":"ListItem"},{"name":"ShadowHQ","position":22,"description":"ShadowHQ is a mobile and desktop application. When a cyber threat or attack is detected by the IT team, users in the organization can open ShadowHQ and activate an incident. That incident will send out an alert to everyone in your company who plays a role in cyber response. \n\nPrimarily it will notify executive leadership and IT teams, but most companies will include public relations or communications, sales, marketing, HR, outside legal counsel, third-party consultants, and other team members. They can communicate, see real-time updates on the situation, and access all critical documents playbooks, pre-drafted statements, and contact lists.\n\nShadowHQ includes real-time text message updates, multi-person video calls, audio-only calls, pre-built user groups that share a set of responsibilities, focused communications, and document storage. It also offers a secure file cabinet for critical documents and pre-labeled drawers that help teams know what types of documents should be included and stored.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17e8fd2a-1bd8-4bfc-9af4-94273fd547b0.jpeg","url":"https://www.softwareadvice.co.nz/software/364412/shadowhq","@type":"ListItem"},{"name":"Integrite","position":23,"description":"Integrite is a SaaS Digital Risk Monitoring Platform that works in hand with our proprietary technology backed by AI and ML. The data gathered is used to derive actionable intelligence, and is presented on an insightful dashboard and through APIs.\nIntegrite is equipped with a robust dashboard that offers a simple and user-friendly interface. We specialize in presenting data in the simplest format, that is derived from complex big data. This actionable intel is the ultimate deliverable of Integrite.\n\nIntegrite combines Threat Intelligence along with Asset Discovery and Risk Monitoring to prove 360 degree visibility of digital risks faced by organisations who are connected to internet.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/05a4baae-b169-4edf-9c80-e7a0033508f3.png","url":"https://www.softwareadvice.co.nz/software/248110/integrite","@type":"ListItem"},{"name":"HTTPCS Cyber Vigilance","position":24,"description":"Data leaks monitoring and cyber threats detection solution. \nYour real-time malicious network monitoring solution (web, deepweb and darknet) to protect your company from cyberattacks. \n\nBased on the development of virtual agents capable of scanning hundreds of thousands of sources daily and OSINT teams that integrate the most restricted sources, CyberVigilance infiltrates the clear and the dark web to alert you in case of cyber threats on your organization (attack notification, phishing threat, domain squatting, ransomware...) or information leaks (Data Leak, file leak, compromised email from an employee).\n\nThe platform gives you visibility into threats that might otherwise go unnoticed. \n\nIn addition to monitoring external web servers for potential threats, it also tracks company and employee information. \n\nHTTPCS Cyber Vigilance also monitors social networks (SOCMINT) and instant messaging services to let you know what is being said about your organization.\n\nIdentify threats that could affect your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c4c56178-9e61-4b35-b9ed-58dfb97572bc.webp","url":"https://www.softwareadvice.co.nz/software/285714/httpc-cyber-vigilance","@type":"ListItem"},{"name":"RedShield","position":25,"description":"RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government agencies proactively discover and remediate application and API vulnerabilities using artificial intelligence (AI) technology. The application allows DevOps teams to streamline network security, vulnerability scanning and risk management operations.\n\nProfessionals can select various shields or object codes from a built-in library to protect applications from multiple web and distributed denial-of-service (DDoS) attacks. Features of RedShield include firewall protection, patch management, reporting, an activity dashboard and more. Additionally, it enables administrators to identify and fix common vulnerabilities in penetration tests.\n\nRedShield lets organizations monitor the application development cycle and find remediations for software defects discovered after the release. Pricing is available on request and support is extended via phone, email, knowledge base, webinars and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9b1b9f34-27df-4b87-b92e-f9f141626626.png","url":"https://www.softwareadvice.co.nz/software/220609/redshield","@type":"ListItem"}],"numberOfItems":25}
</script>
