---
description: Page 16 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 16 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software) > [Page 16](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16)

# Cybersecurity Software

Canonical: https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software

Page: 16 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=17)

-----

## Products

1. [HTTPCS Cyber Vigilance](https://www.softwareadvice.co.nz/software/285714/httpc-cyber-vigilance) (0 reviews) — Data leaks monitoring and cyber threats detection solution. Your real-time malicious network monitoring solution (web...
2. [RedShield](https://www.softwareadvice.co.nz/software/220609/redshield) (0 reviews) — RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government a...
3. [Panzura](https://www.softwareadvice.co.nz/software/369180/panzura) (0 reviews) — Panzura provides unstructured file data mobility, access, security, and control through a single, global file system—...
4. [iQ.Suite aaS](https://www.softwareadvice.co.nz/software/357153/iq-suite-aas) (0 reviews) — iQ.Suite aaS is a comprehensive email management solution that provides enterprises using Microsoft 365 with email se...
5. [Alice](https://www.softwareadvice.co.nz/software/366970/activefence) (0 reviews) — Alice is a trust, safety, and security company built for the AI era. Alice helps organizations deploy, operate, and s...
6. [iManage Threat Manager](https://www.softwareadvice.co.nz/software/298339/imanage-threat-manager) (0 reviews) — iManage Threat Manager offers threat detection, intervention, analytics and data governance to protect sensitive cont...
7. [Clario](https://www.softwareadvice.co.nz/software/374699/clario) (0 reviews) — Clario is an all-in-one cybersecurity solution with built-in 24/7 live chat. Key features include: Automatic public W...
8. [ThreatAdvice Breach Prevention](https://www.softwareadvice.co.nz/software/378180/threatadvice-breach-prevention) (0 reviews) — ThreatAdvice vCISO is a cybersecurity solution, which enables businesses to manage data security by assessing risks a...
9. [BroShield](https://www.softwareadvice.co.nz/software/241598/broshield) (0 reviews) — BroShield is an endpoint protection and anti-spam platform that helps users streamline processes related to content r...
10. [Tripwire Enterprise](https://www.softwareadvice.co.nz/software/434417/tripwire-enterprise) (0 reviews) — Fortra's Tripwire Enterprise is a proven solution for policy compliance, system integrity, and remediation management...
11. [Cytellix](https://www.softwareadvice.co.nz/software/235576/cytellix) (0 reviews) — www.cytellix.com Cytellix is a cloud-based solution that manages, plans, and executes the ongoing IT Security activit...
12. [STORM](https://www.softwareadvice.co.nz/software/224635/storm) (0 reviews) — STORM is a cybersecurity software designed to help security operation centers identify, prioritize and resolve incide...
13. [FortMesa](https://www.softwareadvice.co.nz/software/315674/fortmesa) (0 reviews) — FortMesa can transform an MSP into a cybersecurity powerhouse. By delivering cybersecurity programs based on industry...
14. [UnderDefense MAXI](https://www.softwareadvice.co.nz/software/419277/underdefense-mdr) (0 reviews) — UnderDefense MAXI is a holistic security-as-a-service powerhouse that combines AI-native technology with expert-led, ...
15. [SURFSecurity](https://www.softwareadvice.co.nz/software/389335/surfsecurity) (0 reviews) — SURFSecurity is a browser solution that helps small to large businesses streamline cybersecurity via endpoint data en...
16. [ManageEngine Endpoint DLP Plus](https://www.softwareadvice.co.nz/software/435323/manageengine-endpoint-dlp-plus) (0 reviews) — ManageEngine's Endpoint DLP Plus is an enterprise-ready solution that helps IT administrators set up DLP policies tha...
17. [Revulytics Compliance Intelligence](https://www.softwareadvice.co.nz/software/262447/revulytics-compliance-intelligence) (0 reviews) — Revulytics Compliance Intelligence is a cyber-solutions platform that provides automated solutions for identifying an...
18. [Flusk Vault](https://www.softwareadvice.co.nz/software/396178/flusk-vault) (0 reviews) — Elevate the safety of your Bubble application, minimize mistakes made by humans, and preserve precious time when face...
19. [Hackuity](https://www.softwareadvice.co.nz/software/369630/hackuity) (0 reviews) — Hackuity is not a simple vulnerability detection tool. It intervenes between detection and remediation to allow CISOs...
20. [EncryptRIGHT](https://www.softwareadvice.co.nz/software/346042/encryptright) (0 reviews) — EncryptRIGHT simplifies application level data protection by abstracting data protection policies from application pr...
21. [Magnet AXIOM Cyber](https://www.softwareadvice.co.nz/software/205339/magnet-axiom-cyber) (0 reviews) — Magnet AXIOM Cyber is a incident response and digital forensics software solution. It was specifically created for bu...
22. [MailGuard](https://www.softwareadvice.co.nz/software/148012/mailguard) (0 reviews) — MailGuard is a leading email security service that protects businesses against email-borne cyber threats, including p...
23. [CimTrak Integrity Suite](https://www.softwareadvice.co.nz/software/273682/cimtrak-integrity-suite) (0 reviews) — CimTrak Integrity Suite is a database monitoring software designed to help businesses identify and remediate unauthor...
24. [Cerberus](https://www.softwareadvice.co.nz/software/430726/cerberus) (0 reviews) — Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, ar...
25. [Cyver Core](https://www.softwareadvice.co.nz/software/191308/cyver) (0 reviews) — Cyver is a cloud-based pentest management platform enabling businesses to deliver cybersecurity through client and vu...

-----

Page: 16 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=15)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=17)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 16 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16","about":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"inLanguage":"en-NZ","isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"}},{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"Page 16","position":3,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 16 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=16#itemlist","@type":"ItemList","itemListElement":[{"name":"HTTPCS Cyber Vigilance","position":1,"description":"Data leaks monitoring and cyber threats detection solution. \nYour real-time malicious network monitoring solution (web, deepweb and darknet) to protect your company from cyberattacks. \n\nBased on the development of virtual agents capable of scanning hundreds of thousands of sources daily and OSINT teams that integrate the most restricted sources, CyberVigilance infiltrates the clear and the dark web to alert you in case of cyber threats on your organization (attack notification, phishing threat, domain squatting, ransomware...) or information leaks (Data Leak, file leak, compromised email from an employee).\n\nThe platform gives you visibility into threats that might otherwise go unnoticed. \n\nIn addition to monitoring external web servers for potential threats, it also tracks company and employee information. \n\nHTTPCS Cyber Vigilance also monitors social networks (SOCMINT) and instant messaging services to let you know what is being said about your organization.\n\nIdentify threats that could affect your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c4c56178-9e61-4b35-b9ed-58dfb97572bc.webp","url":"https://www.softwareadvice.co.nz/software/285714/httpc-cyber-vigilance","@type":"ListItem"},{"name":"RedShield","position":2,"description":"RedShield is a cybersecurity solution that helps businesses across finance and healthcare industries and government agencies proactively discover and remediate application and API vulnerabilities using artificial intelligence (AI) technology. The application allows DevOps teams to streamline network security, vulnerability scanning and risk management operations.\n\nProfessionals can select various shields or object codes from a built-in library to protect applications from multiple web and distributed denial-of-service (DDoS) attacks. Features of RedShield include firewall protection, patch management, reporting, an activity dashboard and more. Additionally, it enables administrators to identify and fix common vulnerabilities in penetration tests.\n\nRedShield lets organizations monitor the application development cycle and find remediations for software defects discovered after the release. Pricing is available on request and support is extended via phone, email, knowledge base, webinars and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9b1b9f34-27df-4b87-b92e-f9f141626626.png","url":"https://www.softwareadvice.co.nz/software/220609/redshield","@type":"ListItem"},{"name":"Panzura","position":3,"description":"Panzura provides unstructured file data mobility, access, security, and control through a single, global file system—native to the cloud—to simplify IT infrastructure and file storage. Our award-winning hybrid cloud platform supports migrating file workloads to the cloud and digital transformation. The Panzura Platform comprises CloudFS (the heart of the platform), Data Services (CloudFS file visibility, auditability, and governance through a single pane of glass dashboard), and Edge (anytime, anywhere secure access to CloudFS files). \n\nWith the patented innovations behind the Panzura Platform, you can: \n- Migrate more workloads to the cloud, whether public or private cloud. \n- Find, track and restore millions of files in minutes. \n- Slash duplicate file data costs and infrastructure overhead.\n- Isolate file data threats with military-grade, air-gapped data protection. \n- Ensure your file data is immutable to cyber-threats. \n- Monitor suspicious activity with user behavior auditing as well as file accessibility tracking.\n- Analyze all of your unstructured data instantly. \n- Empower your teams to collaborate globally without latency or data corruption. \n- Save 1000s of IT hours with fast, efficient file search functionality.\n- Leverage actionable intelligence to increase time-to-value from internal data.\n\nSee why organizations like AFRY, Fluor, Milwaukee Tool, Goop, and many others trust Panzura to radically improve file data access, security, management, and storage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5417912f-6ccc-4d35-a23d-3ac40abd2f41.png","url":"https://www.softwareadvice.co.nz/software/369180/panzura","@type":"ListItem"},{"name":"iQ.Suite aaS","position":4,"description":"iQ.Suite aaS is a comprehensive email management solution that provides enterprises using Microsoft 365 with email security capabilities. Designed to ensure email communications within an organization are secure, this solution offers features such as insider threat detection, retroactive scanning, wrong recipient protection, spam detection, and more. Additionally, iQ.Suite aaS can encrypt communications based on the content or data found within emails.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/20b965e0-dddc-4c1c-ab5f-7d41f0c9061c.png","url":"https://www.softwareadvice.co.nz/software/357153/iq-suite-aas","@type":"ListItem"},{"name":"Alice","position":5,"description":"Alice is a trust, safety, and security company built for the AI era.\n\nAlice helps organizations deploy, operate, and scale GenAI and Agentic systems responsibly by providing lifecycle-wide evaluation, protection, and governance. Trusted by leading technology platforms and foundation model providers, Alice delivers visibility into how AI systems behave — before launch, in production, and as they evolve over time.\n\nPowered by Rabbit Hole, Alice’s adversarial intelligence engine built on billions of real-world data samples and expert analysis, Alice surfaces emerging risks, detects drift and regressions, and applies policy-aligned protections in real time.\n\nWith multimodal and multilingual coverage, ultra-low-latency enforcement, and deeply customizable governance controls, Alice enables teams to strengthen robustness, maintain compliance, and advance AI innovation with confidence.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81e2e164-ec49-4cfb-9add-295e4241827e.jpeg","url":"https://www.softwareadvice.co.nz/software/366970/activefence","@type":"ListItem"},{"name":"iManage Threat Manager","position":6,"description":"iManage Threat Manager offers threat detection, intervention, analytics and data governance to protect sensitive content with compliance monitoring.\n\nThe system protects sensitive information from internal and external threat vectors using technology including adaptive behavior modeling and machine learning to continuously monitor, alert and secure critical assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/04160c26-2eab-4f15-b64c-dc97f5703d82.png","url":"https://www.softwareadvice.co.nz/software/298339/imanage-threat-manager","@type":"ListItem"},{"name":"Clario","position":7,"description":"Clario is an all-in-one cybersecurity solution with built-in 24/7 live chat. Key features include:\n\nAutomatic public Wi-Fi security\n24/7 security expert help\nSpyware detector (Android)\nDaily malware scan (Android and macOS)\nFraud link checker (iOS and macOS)\nBuilt-in ad blocker (iOS and macOS) \n\nClario combines VPN, data breach monitoring and antivirus. With built-in live chat, users can have a personal expert to help with their security or privacy issues.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0a823ed9-4eec-428e-9d46-e68f6d2daaac.jpeg","url":"https://www.softwareadvice.co.nz/software/374699/clario","@type":"ListItem"},{"name":"ThreatAdvice Breach Prevention","position":8,"description":"ThreatAdvice vCISO is a cybersecurity solution, which enables businesses to manage data security by assessing risks and tracking vulnerabilities. Organizations can educate and train employees about cyber threats and store security information within a centralized warehouse.\n\nThreatAdvice vCISO ensures that specific protocols and solutions and deployed to minimize cybersecurity risks. It offers a centralized dashboard, which lets businesses communicate with team members, view upcoming tasks, access policies and more. Additionally, managers can conduct external or internal vulnerability scans, maintain a disaster recovery questionnaire and use reports to gain insights into risks, scans and patches, among other metrics.\n\nThreatAdvice vCISO integrates with various third-party platforms such as Perch, Beachhead, Alienvault and more. Pricing is available on request and support is extended via phone, live chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ebd17831-03f1-4711-8ae7-0d7bbf5c09b7.png","url":"https://www.softwareadvice.co.nz/software/378180/threatadvice-breach-prevention","@type":"ListItem"},{"name":"BroShield","position":9,"description":"BroShield is an endpoint protection and anti-spam platform that helps users streamline processes related to content restriction, live activity monitoring, content censorship, application blocking, and more on a centralized platform. It allows parents and guardians to set up web firewalls, set internet browsing time limits, automatically detect viruses, and manage other operations. It is available on annual subscriptions and support is extended via phone, email, FAQs, and other online measurs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3eec855f-ccf2-469f-9c94-2880a1e6b9e8.png","url":"https://www.softwareadvice.co.nz/software/241598/broshield","@type":"ListItem"},{"name":"Tripwire Enterprise","position":10,"description":"Fortra's Tripwire Enterprise is a proven solution for policy compliance, system integrity, and remediation management that reaches far beyond simple compliance. It helps organizations quickly identify security misconfigurations and indicators of compromise for increased levels of security across the entire enterprise, including on-premises, cloud, and industrial assets.\n\nMonitoring file change history (file integrity monitoring or FIM) is a great way to quickly see and verify unauthorized changes which is a key indicator of compromise. ​\n\nFortra's ​Tripwire solution also monitors security configurations, ensuring that your covered assets are still adhering to your set – and secure – configuration. Assets often move out of compliance over time, and Tripwire Enterprise's secure configuration management (SCM) provides fast insight to this, thereby helping keep your ecosystem secure. ​\n\n​These two key capabilities, plus Tripwire Enterprise's additional advanced use cases give you the power to not only meet compliance requirements but enable security beyond compliance. ​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f1bf8ba0-c979-4e7c-ba31-902487508edd.png","url":"https://www.softwareadvice.co.nz/software/434417/tripwire-enterprise","@type":"ListItem"},{"name":"Cytellix","position":11,"description":"www.cytellix.com\n\nCytellix is a cloud-based solution that manages, plans, and executes the ongoing IT Security activities of service providers, enterprises, and small and medium businesses. It is transforming the security industry by changing how they monitor, manage and enforce their cyber-security postures with our unique platform. The technology emphasizes prevention through automation, anomaly detection, and machine learning over signatures in a way that drives cost savings to organizations in this space.\n\nUnlike other cybersecurity vendors, Cytellix® “single pane of glass” capabilities can help your organization offload the expensive and complex requirements for risk management and threat detection and response. The Cytellix® platform is not a “rip and replace” approach to cybersecurity. It is a platform that evolves as your business, security objectives, budgets and risks change.\n\nThe Cytellix® solution has a patented and unique approach to understanding when a threat is legitimate and when action should be taken. The technology developed by our world-class engineers adapts to the changing landscape, cyber-posture, threat intelligence and compliance requirements. There is no requirement to install agents or appliances with Cytellix®, we manage, plan and execute an integrated Cyber-SaaS Solution without displacing or compromising the security, privacy and integrity of existing infrastructure and tools.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6bec6d18-2043-4163-8e68-7444096cd711.png","url":"https://www.softwareadvice.co.nz/software/235576/cytellix","@type":"ListItem"},{"name":"STORM","position":12,"description":"STORM is a cybersecurity software designed to help security operation centers identify, prioritize and resolve incidents. The platform enables administrators to collect and analyze cybersecurity incident-related data and automatically create new cases.\n\nManagers can prioritize and categorize cases and manage incoming alerts based on threat levels on a unified interface. STORM allows teams to organize data regarding malware information sharing platforms (MISP), diagnose issues and notify stakeholders regarding the incident. Additionally, supervisors can encrypt ticket notifications and outgoing emails and decrypt incoming emails to streamline communication processes.\n\nSTORM lets businesses record response activities and conduct forensic evaluation using the collected data. Pricing is available on request and support is extended via FAQs, knowledge base, chatbot, phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d0c2ca4-db73-4e71-9711-51037d679b01.png","url":"https://www.softwareadvice.co.nz/software/224635/storm","@type":"ListItem"},{"name":"FortMesa","position":13,"description":"FortMesa can transform an MSP into a cybersecurity powerhouse. By delivering cybersecurity programs based on industry standards (NIST, ISO, SOC2, CIS, CMMC, Fedramp, CJIS, and more) MSPs take command of their customers cyber needs. Fortmesa uses a combination of automation, MSP tool integration, and MSP non-cyber labor, to assess and close gaps. MSPs get recurring revenue and a clear, consistent forecast of labor utilization, paramount to driving profitability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4d45a516-3d05-417b-983f-8c68131bf29e.png","url":"https://www.softwareadvice.co.nz/software/315674/fortmesa","@type":"ListItem"},{"name":"UnderDefense MAXI","position":14,"description":"UnderDefense MAXI is a holistic security-as-a-service powerhouse that combines AI-native technology with expert-led, proactive threat hunting to stop stealthy threats like supply chain attacks, ransomware, and cloud compromises. The platform is developed for teams of any size to efficiently monitor, detect, and respond to threats 24/7 across cloud, hybrid, and on-premise environments. By consolidating all tools into one interface, we've achieved a 100% success rate against ransomware and reduced mean-time-to-contain to 15 minutes. Our award-winning MDR service provides full threat context in 2 minutes, eliminating the alert fatigue and false positives that overwhelm security teams.\nMAXI AI SOC: 24/7 continuous monitoring with 1500+ pre-built correlation rules, automated threat detection across networks, endpoints, cloud, and users. Reduces false positives by 90% while catching stealthy threats like lateral movement, privilege escalation, and data exfiltration.\nMAXI AI Pentest: Continuous vulnerability discovery combining automated scanning with certified ethical hackers for deep security assessments. Identifies and remediates weaknesses in applications, infrastructure, and cloud environments before attackers exploit them.\nMAXI Compliance: Helps clients achieve and maintain ISO 27001 and SOC 2 certification on autopilot. Automated evidence collection, continuous control monitoring, and always-audit-ready documentation eliminate the regulatory burden and manual compliance work.\nCustomer support is ensured by professional SOC specialists 24/7 via live chat and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/801f8138-c7e6-4fc8-bd54-90a9bae613a7.png","url":"https://www.softwareadvice.co.nz/software/419277/underdefense-mdr","@type":"ListItem"},{"name":"SURFSecurity","position":15,"description":"SURFSecurity is a browser solution that helps small to large businesses streamline cybersecurity via endpoint data encryption, phishing protection, employee privacy settings, extension management and risk assessment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/60aab919-0178-4a80-8b1b-350655d8bb4e.png","url":"https://www.softwareadvice.co.nz/software/389335/surfsecurity","@type":"ListItem"},{"name":"ManageEngine Endpoint DLP Plus","position":16,"description":"ManageEngine's Endpoint DLP Plus is an enterprise-ready solution that helps IT administrators set up DLP policies that closely monitor the three important types of data, which are Data-in-motion, Data-at-rest, and Data-in-use, from a centralized console. The solution has advanced mechanisms such as Regex, Fingerprint, Document, and Keyword matching techniques in place to identify sensitive data across endpoints. \n\nEndpoint DLP Plus actively prevents the unauthorized transfer of classified files outside the business network through the different physical and digital communication channels. The solution blocks unauthorized print operations concerning sensitive data and places clipboard restrictions on sensitive data blocks. Emails carrying sensitive data alongside a fully functional external device control module.\n\nFurthermore, Endpoint DLP Plus is equipped with predefined templates that help IT admins adhere to policies with regulatory mandates such as GDPR, PCI-DSS & HIPAA and ensures that with Endpoint DLP Plus, application security can be implemented by labeling select applications approved for office-related tasks, as trusted so that all data originating from or contained within trusted applications will be automatically be marked as sensitive and users will be prohibited from transferring any information from trusted applications to unverified ones. \n\nTo ensure flexibility from onboarding to long-term implementation, Endpoint DLP Plus allows trusted users to override policies by offering business justifications and it also provides easy steps to remediate false positives. Extensive reports and audit data also provided for in-depth analysis and actionable insights for further enhancing data defense measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/602faf68-f9ed-4d71-9726-162cf3b2e8f0.jpeg","url":"https://www.softwareadvice.co.nz/software/435323/manageengine-endpoint-dlp-plus","@type":"ListItem"},{"name":"Revulytics Compliance Intelligence","position":17,"description":"Revulytics Compliance Intelligence is a cyber-solutions platform that provides automated solutions for identifying and monetizing the unpaid use of software applications. RCI's patented approach combines internal and external data sources to provide actionable insights to enterprise sales, contracts and compliance teams.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ea554d00-6723-4caf-8d2c-a7b7a9c1a055.png","url":"https://www.softwareadvice.co.nz/software/262447/revulytics-compliance-intelligence","@type":"ListItem"},{"name":"Flusk Vault","position":18,"description":"Elevate the safety of your Bubble application, minimize mistakes made by humans, and preserve precious time when faced with potential security threats.\n\nThe platform includes advanced automated detection algorithms that expertly eradicate all vulnerable areas in your application's protection.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/be4d614d-afee-4b1b-ac2d-5cd3033ca521.png","url":"https://www.softwareadvice.co.nz/software/396178/flusk-vault","@type":"ListItem"},{"name":"Hackuity","position":19,"description":"Hackuity is not a simple vulnerability detection tool. It intervenes between detection and remediation to allow CISOs to optimize the remediation of the various vulnerabilities identified. \n\nIt is thus possible to centralize all the vulnerabilities detected by the different tools in the detection arsenal and to normalize them in order to prioritize them and highlight only those that deserve to be addressed. \n\nThis allows you to focus on the most important issues and not on the noise, freeing up resources and saving valuable time for CISOs and remediation teams. \n\nHackuity proposes the right offer regarding the company's experience in vulnerability management and field of activity :\n- Risk-based vulnerability management\n- Continuous Monitoring\n- Augmented pentest\n- Hackuity for MSSP","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17c9109b-5538-49cf-96a5-ed2758f78250.png","url":"https://www.softwareadvice.co.nz/software/369630/hackuity","@type":"ListItem"},{"name":"EncryptRIGHT","position":20,"description":"EncryptRIGHT simplifies application level data protection by abstracting data protection policies from application programming, while providing a complete separation of duties between information security and application programming.  Leveraging a Data Security Governance approach, EncryptRIGHT defines and enforces how data is protected, who may access specific data, and what format that data will take when access is granted (unrestricted, partially masked or fully restricted).\n\nA unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy. EncryptRIGHT protects the data at the application layer with the encryption or tokenization techniques, formats and methodologies defined in the data protection policy. Role-based access controls are applied to unsecure data in the exact format authorized for specific applications or users – fully restricted, unrestricted or partially concealed with the appropriate data mask dynamically applied. Managing cryptographic keys in and across applications can be very complicated, but EncryptRIGHT centralizes and automates cryptographic key management.\n\nData protection policies are automatically and uniformly enforced, and built-in audit and reporting functionality provides traceability and alerting to assure that data is secured, privacy is protected, and compliance is met. Support for a variety of interfaces, from COBOL to C# and Java, from CLI to Web API, allows programmers to connect using the interfaces with which they are most comfortable, and out-of-the-box functionality for every common enterprise operating system, from IBM mainframe to Windows, means less customization and quicker implementations wherever enterprise applications run, on premise or in the cloud. With EncryptRIGHT, protecting data where it is most exposed and susceptible to risk has never been so easy.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/26d8b7be-cadd-4200-9928-14dd00d24d14.png","url":"https://www.softwareadvice.co.nz/software/346042/encryptright","@type":"ListItem"},{"name":"Magnet AXIOM Cyber","position":21,"description":"Magnet AXIOM Cyber is a incident response and digital forensics software solution. It was specifically created for businesses that require performing acquisitions remotely and that need to analyze as well as collect evidence from the cloud, mobile devices and computers.\n\nThe software offers features such as off-network collection, advanced cloud support, case intelligence, eDiscovery support, cloud computing and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ce5a1e09-0dd0-421d-bc42-eb8b0bf20ab7.png","url":"https://www.softwareadvice.co.nz/software/205339/magnet-axiom-cyber","@type":"ListItem"},{"name":"MailGuard","position":22,"description":"MailGuard is a leading email security service that protects businesses against email-borne cyber threats, including phishing attacks, ransomware, business email compromise (BEC) and other malicious content. The platform leverages cutting-edge technology to safeguard emails, ensuring businesses can communicate securely with their clients, partners, and stakeholders and protect their people, data and brands.\n\n\nOne key feature that sets MailGuard apart from other email security providers is its speed advantage. This system is designed to stop zero-day email threats up to 48 hours ahead of its competitors, giving businesses a critical edge in the fight against cybercrime. The system uses proprietary IP threat detection engines to analyse incoming emails and identifies patterns that may indicate malicious intent. If a threat is detected, the system will block it before it can do any damage.\n\nMailGuard's cybersecurity mesh defence-in-depth strategy is another powerful tool that helps safeguard businesses. This strategy is based on the principle of layered security, where multiple layers of protection are used to guard against different types of threats. MailGuard's cybersecurity mesh consists of numerous layers of security that work together to protect businesses from the most prevalent types of email security threats, including phishing, ransomware, and business email compromise (BEC).\n\nWith MailGuard, businesses do not need to worry about installing additional software or hardware. The service is cloud-based and operates on a subscription model, making it easy to scale up or down as business needs change. In addition, the platform integrates seamlessly with a wide range of email clients, including Microsoft Exchange, Microsoft 365, and Google Workspace, among others.\n\nIn addition to its cutting-edge technology and ease of use, MailGuard boasts a team of expert security professionals available 24/7 to help businesses around the clock. The company's support team comprises experienced cybersecurity experts dedicated to providing timely assistance for companies that need it most.\n\nRegarding pricing, MailGuard offers businesses a range of options depending on their specific needs. The pricing model is based on a per-user-per-month basis, with discounts available for businesses that sign up for longer contracts.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a7b67cf6-caf6-4f28-a3c9-710ae36538e6.png","url":"https://www.softwareadvice.co.nz/software/148012/mailguard","@type":"ListItem"},{"name":"CimTrak Integrity Suite","position":23,"description":"CimTrak Integrity Suite is a database monitoring software designed to help businesses identify and remediate unauthorized changes across files to secure critical assets. The platform offers dynamic version control capability, which enables managers to analyze changes between snapshots and restore previous baselines.\n\nAdministrators can detect and reverse changes across logs in real-time. Additionally, CimTrak Integrity Suite lets stakeholders ensure compliance in accordance with HIPAA, NERC-CIP, FISMA, and PCI-DSS protocols.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/571430bb-2f9f-49ff-ab51-a03652a89573.png","url":"https://www.softwareadvice.co.nz/software/273682/cimtrak-integrity-suite","@type":"ListItem"},{"name":"Cerberus","position":24,"description":"Cerberus is a threat intelligence software that helps businesses identify and preserve dark web evidence on drugs, arms, ransomware, and CSEA.\n\nTrusted globally by law enforcement and government agencies, Cerberus uses proprietary techniques developed by world-leading researchers to deliver the most comprehensive dark web dataset on the market, providing access to intelligence that was previously unobtainable. Teams can explore live and historic dark web data without putting employees or infrastructure at risk. It enables managers to identify, gather, and preserve evidence on ransomware, criminal, and threat group activity\n\nAdministrators get alerted whenever a malicious actor or ransomware group is active on the dark web. Operators can share intelligence with case management, deconfliction, and case note annotations. Additionally, it lets supervisors seamlessly conduct investigations between the online and physical world to unmask cybercriminals","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c1d66f3-f532-455c-ba43-74e0432c8b6e.jpeg","url":"https://www.softwareadvice.co.nz/software/430726/cerberus","@type":"ListItem"},{"name":"Cyver Core","position":25,"description":"Cyver is a cloud-based pentest management platform enabling businesses to deliver cybersecurity through client and vulnerability findings management, report automation and tool integration capabilities, Key features include compliance management, dashboard, team collaboration and real-time alerts.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1e04e49d-eb65-4200-a154-ece733b30216.png","url":"https://www.softwareadvice.co.nz/software/191308/cyver","@type":"ListItem"}],"numberOfItems":25}
</script>
