---
description: Page 10 - Discover the best Cybersecurity Software in Ireland. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 10 - Best Cybersecurity Software in Ireland - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.softwareadvice.ie/directory/4643/cybersecurity/software) > [Page 10](https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10)

# Cybersecurity Software

Canonical: https://www.softwareadvice.ie/directory/4643/cybersecurity/software

Page: 10 / 20\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=9)\
Next: [Next page](https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=11)

-----

## Products

1. [Nanitor](https://www.softwareadvice.ie/software/394078/nanitor) — 5.0/5 (4 reviews) — The Nanitor vulnerability management solution is designed to simplify the process of real-time detection and proactiv...
2. [BIMA](https://www.softwareadvice.ie/software/442516/bima) — 5.0/5 (4 reviews) — BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart in...
3. [Alyne](https://www.softwareadvice.ie/software/363034/alyne) — 5.0/5 (4 reviews) — The Alyne platform for governance, risk and compliance (GRC) provides intuitive, AI-enabled capabilities to dynamic e...
4. [CloudConnexa](https://www.softwareadvice.ie/software/506382/Cloud-Connexa) — 4.0/5 (4 reviews) — CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexibl...
5. [UpGuard](https://www.softwareadvice.ie/software/471657/UpGuard) — 4.5/5 (4 reviews) — UpGuard is a cloud-based cybersecurity platform that helps organizations manage their third-party risks and external ...
6. [TrustMAPP Platform](https://www.softwareadvice.ie/software/477156/TrustMAPP) — 5.0/5 (4 reviews) — TrustMAPP Platform is a cybersecurity risk assessment software designed to help organizations gauge and manage their ...
7. [Detectify](https://www.softwareadvice.ie/software/231004/detectify) — 4.7/5 (3 reviews) — Detectify is a vulnerability management software designed to help security teams and developers automate asset monito...
8. [UNGUESS](https://www.softwareadvice.ie/software/417037/unguess) — 5.0/5 (3 reviews) — AppQuality is built on 4 main assets: the community of testers, a team of Quality Leaders, a network of UX Researcher...
9. [Lightspin](https://www.softwareadvice.ie/software/242111/lightspin) — 4.7/5 (3 reviews) — Lightspin offers an application programming interface (API) for integrations. It also provides behavioral analytics, ...
10. [condignum](https://www.softwareadvice.ie/software/383453/condignum) — 5.0/5 (3 reviews) — condignum is a SaaS solution, which enables businesses to manage compliance, risks and security requirements from wit...
11. [Risk Ident](https://www.softwareadvice.ie/software/246039/risk-ident) — 4.0/5 (3 reviews) — Risk Ident is an online fraud prevention software solution that's designed to help companies identify, prevent and pr...
12. [CODA Footprint](https://www.softwareadvice.ie/software/331197/coda-footprint) — 5.0/5 (3 reviews) — CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimize...
13. [QSEC](https://www.softwareadvice.ie/software/230956/qsec) — 4.3/5 (3 reviews) — QSEC - The software for GRC, ISMS and data protection - complete, sustainable, effective and cost-efficient\! QSEC is ...
14. [VaultCore](https://www.softwareadvice.ie/software/267971/vaultcore) — 5.0/5 (3 reviews) — VaultCore is an encryption key management software designed to help businesses and government administrations secure ...
15. [ISS](https://www.softwareadvice.ie/software/418019/iss) — 4.3/5 (3 reviews) — INSSIDE Security Suite is a leading platform in regulatory compliance solutions, designed by collaborators, allowing ...
16. [PC Matic PRO](https://www.softwareadvice.ie/software/358484/pc-matic-pro) — 5.0/5 (3 reviews) — PC Matic PRO is an endpoint security suite that provides application whitelisting, endpoint protection, endpoint dete...
17. [SEKOIA.IO](https://www.softwareadvice.ie/software/366386/sekoia-io) — 4.7/5 (3 reviews) — Sekoia.IO is a cloud-based cybersecurity platform designed to help organizations anticipate, detect and respond to cy...
18. [TEHTRIS XDR Platform](https://www.softwareadvice.ie/software/421726/tehtris-xdr) — 4.3/5 (3 reviews) — Create your playbooks and interconnect your cyber solutions: Orchestrate all your cyber tools from a single console a...
19. [Fraudlogix](https://www.softwareadvice.ie/software/441725/fraudlogix) — 5.0/5 (3 reviews) — Fraudlogix is a fraud detection and prevention platform designed for businesses that want to safeguard their digital ...
20. [InsightIDR](https://www.softwareadvice.ie/software/98135/insightidr) — 4.3/5 (3 reviews) — insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to stre...
21. [Exabeam New-Scale Fusion](https://www.softwareadvice.ie/software/307624/exabeam) — 5.0/5 (3 reviews) — New-Scale Fusion combines New-Scale SIEM and New-Scale Analytics to form the cloud-native New-Scale Security Operatio...
22. [calQrisk](https://www.softwareadvice.ie/software/346859/calqrisk) — 4.3/5 (3 reviews) — calQrisk is an integrated governance, risk and compliance platform designed to help organisations manage operational ...
23. [Naq Cyber](https://www.softwareadvice.ie/software/322312/naq-cyber) — 5.0/5 (3 reviews) — Naq Cyber is an automated healthcare compliance platform enabling healthcare innovators to bring solutions to the mar...
24. [Seqrite Centralized Security Management](https://www.softwareadvice.ie/software/423077/hawkkeye) — 3.7/5 (3 reviews) — HawkkEye serves as a centralized security management platform, consolidating various endpoint security products into ...
25. [Prophaze WAF](https://www.softwareadvice.ie/software/185797/prophaze-waf) — 5.0/5 (2 reviews) — Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcar...

-----

Page: 10 / 20\
Prev: [Previous page](https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=9)\
Next: [Next page](https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=11)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.ie/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.ie/directory/4528/security/software)
- [Endpoint Protection Software](https://www.softwareadvice.ie/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.ie/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/directory/4643/cybersecurity/software)
- [All Categories](https://www.softwareadvice.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"SoftwareAdvice Ireland","url":"https://www.softwareadvice.ie/","@id":"https://www.softwareadvice.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 10 - Discover the best Cybersecurity Software in Ireland. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10","about":{"@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#breadcrumblist"},"@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"inLanguage":"en-IE"},{"@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"Page 10","position":3,"item":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 10 - Best Cybersecurity Software in Ireland - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.ie/directory/4643/cybersecurity/software?page=10#itemlist","@type":"ItemList","itemListElement":[{"name":"Nanitor","position":1,"description":"The Nanitor vulnerability management solution is designed to simplify the process of real-time detection and proactive response to cybersecurity issues. It focuses on strengthening the security fundamentals of an organization's global IT infrastructure. The platform offers stakeholders unique visibility and control over security challenges, providing a trustworthy solution that is both cost-effective and time-saving compared to alternatives.\n\nWith the Nanitor platform, organizations can develop a comprehensive understanding of their fundamental security challenges and quantify their cyber-risk. It serves as a foundation for a long-term security strategy, taking into account the organization's technical policy and compliance requirements. This helps avoid potential information loss, service disruption, and reputational damage from the continuously evolving cybersecurity threat landscape.\n\nThe platform's discovery engine collects real-time data on all assets, which is then filtered through the organization's technical policy and compliance frameworks to generate detailed information on a wide range of security issues. The Nanitor Diamond™ feature presents a prioritized visual overview of these issues, facilitating collaboration in addressing security concerns across the entire organization. Printable reports and managed projects are available to track teams' progress in resolving their assigned issues, ensuring a holistic improvement in the organization's security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8383ed11-8196-4130-91b3-e86dd31622e9.png","url":"https://www.softwareadvice.ie/software/394078/nanitor","@type":"ListItem"},{"name":"BIMA","position":2,"description":"BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart integration ensures a proactive shield against cyber threats, boosting organizational resilience. \n\nWith streamlined operations and quicker incident responses, BIMA crafts a secure, vibrant digital space.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7367a3f6-d166-4e8b-90a3-ebc9cf001fd1.png","url":"https://www.softwareadvice.ie/software/442516/bima","@type":"ListItem"},{"name":"Alyne","position":3,"description":"The Alyne platform for governance, risk and compliance (GRC) provides intuitive, AI-enabled capabilities to dynamic enterprises across the globe. Mitratech’s GRC platform enables organizations of all sizes to transform their GRC processes, by enabling actionable insights through structured controls and risk information – all mapped to relevant laws, regulations, industry standards. Risk mitigation and the ability to be compliant with rapidly evolving regulations used to take weeks, months or often years. With Alyne's AI-powered platform, companies can execute audits, new regulatory compliance, data privacy and cyber security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5b64de7f-d551-491f-93ec-8b9db1daca53.png","url":"https://www.softwareadvice.ie/software/363034/alyne","@type":"ListItem"},{"name":"CloudConnexa","position":4,"description":"CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexible and isolated private cloud networks under a singular owner account for streamlined management. Notably, CloudConnexa supports various use cases such as secure site-to-site networking, IoT communications, and safe remote workforce access. With this model, the service empowers businesses to maintain secure internet access points, leverage domain-based routing, and apply cybersecurity measures, all while avoiding the pitfalls of traditional VPN server installation and management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7401dd2-15d4-415c-b3bc-95e583892263.jpeg","url":"https://www.softwareadvice.ie/software/506382/Cloud-Connexa","@type":"ListItem"},{"name":"UpGuard","position":5,"description":"UpGuard is a cloud-based cybersecurity platform that helps organizations manage their third-party risks and external attack surfaces. It provides continuous monitoring of vendor security posture, alerting users to any changes or risks associated with third-party vendors. The solution offers 360-degree risk assessments that combine automated scanning, evidence analysis and security questionnaire insights.\n\nUpGuard's end-to-end workflows enable users to streamline the process of identifying, managing and remediating third-party and attack surface risks. Additionally, its real-time scanning and instant alert features provide organizations with information about their external attack surface. The app also continuously monitors domains, IPs and other external assets and immediately notifies users of any detected security threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2b043470-0d95-4c09-949e-89e5efbbe5cc.png","url":"https://www.softwareadvice.ie/software/471657/UpGuard","@type":"ListItem"},{"name":"TrustMAPP Platform","position":6,"description":"TrustMAPP Platform is a cybersecurity risk assessment software designed to help organizations gauge and manage their security stance. It serves a variety of industries, assisting them in understanding and enhancing their cybersecurity maturity and compliance.\n\nThe platform conducts maturity and compliance assessments to appraise an organization's cybersecurity controls. It also produces automated suggestions to steer security enhancements. TrustMAPP incorporates comprehensive reporting and analytics that convert raw data into practical insights. These insights play a crucial role in shaping cybersecurity strategy, planning, and decision-making at the executive and board levels.\n\nTrustMAPP is offered in three versions - Core, Flex, and Enterprise - to accommodate diverse organizational requirements. Larger implementations can benefit from TrustMAPP's scalable features such as assessment groups, risk registers, and consolidated insights dashboards. TrustMAPP allows organizations to persistently monitor their cybersecurity performance and make informed decisions to manage risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/824384ae-ed53-4ac1-8706-8d4ecc0534ea.png","url":"https://www.softwareadvice.ie/software/477156/TrustMAPP","@type":"ListItem"},{"name":"Detectify","position":7,"description":"Detectify is a vulnerability management software designed to help security teams and developers automate asset monitoring processes to secure web applications. Businesses can scan crawled URLs to identify security threats and manage remediation processes in a centralized dashboard.\n\n\nThe platform allows administrators to detect issues including server-side request forgery, SQL injections, directory traversal attack, DNS misconfigurations and cross-site scripting across web applications. Detectify lets managers login across applications using single sign-on and secure accounts through two-factor authentication or role-based configurations. Additionally, it enables developers to protect confidential data across internal or in-house applications and page responses including passwords from being exposed.\n\n\nDetectify offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including JIRA, Slack, Splunk, Zapier, PagerDuty and Trello. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, phone, knowledgebase, email and live chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f9a350c-9c53-4fa9-918f-9e8022f9eb54.png","url":"https://www.softwareadvice.ie/software/231004/detectify","@type":"ListItem"},{"name":"UNGUESS","position":8,"description":"AppQuality is built on 4 main assets: the community of testers, a team of Quality Leaders, a network of UX Researchers, and the cloud platform. AppQuality, together with its 250,000+ reachable testers worldwide, offers a diversified suite of services to help companies build defect-free digital products. Its solutions vary from functional testing to experience testing and deliver quick, reliable, and uninfluenced results. \n\nHow? Thanks to advanced management algorithms, the testers’ fresh eyes and their commission-driven approach. The main benefit is the improvement of the perceived user experience, which leads to an overall improvement of the digital product’s performance and the users’ satisfaction. On top of that, testers work when developers don’t: during weekends, holidays, summer, at night, etc. and it takes less time: in a couple of days, crowd testing can produce a report on the status of the product and indications on how to improve the service/ product. AppQuality works with B2B and B2C companies from many different industries (such as e-commerce, retail, banking, insurance, etc) and has already managed more than 2500 projects and identified more than 150.000 bugs in its own cloud platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/643caf05-cf4d-4c72-b47c-ce0565645b8c.jpeg","url":"https://www.softwareadvice.ie/software/417037/unguess","@type":"ListItem"},{"name":"Lightspin","position":9,"description":"Lightspin offers an application programming interface (API) for integrations. It also provides behavioral analytics, data visualization, incident management, vulnerability scanning protection, antivirus, security auditing, and visual analytics. Lightspin software is a cloud security posture management (CSPM) system that enables organizations to visualize their current security position and eliminate potential risks. The system portrays cloud assets and relationships from the perspective of the attacker. \n\nThe attack path-based cloud security platform displays critical security problems from the attacker's point of view in order of importance. It also utilizes Infrastructure as Code (IaC) to deliver simple mitigation remedies. Lightspin can integrate with existing security systems and DevOps workflows, helping streamline data visualization and assessment. It enables users to detect hidden attack vectors or unknown risks and visualize cloud computing stacks from the infrastructure to a single micro-service level.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae22aae1-ed1f-47f4-9ad4-4f88c12c1d5a.png","url":"https://www.softwareadvice.ie/software/242111/lightspin","@type":"ListItem"},{"name":"condignum","position":10,"description":"condignum is a SaaS solution, which enables businesses to manage compliance, risks and security requirements from within a unified platform. Supervisors can add widgets and track the status of iterations using a centralized dashboard.\n\ncondignum allows organizations to automatically evaluate complex issues using knowledge databases. Professionals can manage users and utilize reporting capabilities to track progress and gain insights into actionable security requirements.\n\ncondignum's pricing is available on request and support is extended via email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0a7e21f6-caf5-4fb1-b65f-ad4a20cdea9b.png","url":"https://www.softwareadvice.ie/software/383453/condignum","@type":"ListItem"},{"name":"Risk Ident","position":11,"description":"Risk Ident is an online fraud prevention software solution that's designed to help companies identify, prevent and protect themselves against fraud. Risk Ident software automatically evaluates data points and calculates results, enabling users to take quick action against fraud. With Risk Ident, users can be sure that transactions are protected from hackers and other cyber threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0bf211f8-f256-44ca-ae39-949e46dc0cf8.png","url":"https://www.softwareadvice.ie/software/246039/risk-ident","@type":"ListItem"},{"name":"CODA Footprint","position":12,"description":"CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimizes both discovery and evaluation of active software vulnerabilities.\n\nThe CODA Footprint platform offers a comprehensive and optimized view of the critical assets and calculates effective remediation paths to reduce overall organizational risk score and exposure to cyber-attacks. \n\nThe all-in-one software offers a reporting interface that reduces the overall time and effort of performing security assurance in order to allow valuable manpower resources to be allocated to more critical areas such as incident response and remediation rather than the tedious vulnerability scanning and manual asset risk prioritization calculation tasks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e6f7da51-d70e-4a67-86ed-95658f9b49ee.jpeg","url":"https://www.softwareadvice.ie/software/331197/coda-footprint","@type":"ListItem"},{"name":"QSEC","position":13,"description":"QSEC - The software for GRC, ISMS and data protection - complete, sustainable, effective and cost-efficient!\n \nQSEC is a multi-compliance solution for Governance Risk Compliance, Information Security and Data Protection.\n\nIn addition to working according to the specifications of standards such as ISO 27001, BSI IT-Grundschutz (suitable for the succession of a GS tool) and EU DSGVO, it is possible with QSEC to work according to a wide variety of specifications, such as ISO 9001, BAIT/ KAIT/ VAIT, TISAX as well as industry-specific or company-specific internal standards and to establish an integrated management system. Thus, QSEC offers a common data basis for all management systems.\n\nThe database-driven web application is multilingual, multi-client capable, flexible and adaptable to customer requirements without programming knowledge and enables comfortable and intuitive work with extensive reporting functions via integrated workflows.\nQSEC has convenient user modes for experts and users from the specialist departments and integrates into the existing IT infrastructure via interfaces. \n\nQSEC offers:\n- a uniform methodical approach \n- the connection of legal requirements and national as well as international standards with business processes and IT assets\n- Dashboard with just-in-time listing of risks including financial impacts\n- valid, comparable, meaningful data collection as a basis for management decisions\n- Documentability of compliance activities and complete, audit-proof historization\n- Extensive, customizable, and generable meaningful reports that can be output in a variety of formats\n- Effective management of measures and targeted control of IT investments\n- User acceptance through usability (different user modes for experts and business users, intuitive operation, guided workflow support)\n- Permanent software maintenance and further development\n\nQSEC comprises the modules:\n- Compliance Management\n- data protection management\n- Document Management\n- Information Assets\n- IT Risk Management \n- Measures Management \n- Reporting/Dashboard\n- Security Incident Management\n- Master Data Management\n- Business Impact Analysis /Business Continuity Management\nQSEC Workflows/Wizards:\n- Interview Wizard\n- Interview Acceptance Wizard\n- Risk Assessment Wizard\n- Measures Assessment Wizard\n- Security Level Wizard\n- Compliance Wizard\n\nQSEC Other Tools:\n- Catalog entry and maintenance tool\n- Advanced Administration\n\n\nQSEC is 100% developed and programmed in Germany and fulfills all criteria of the trust mark \"IT-Security made in Germany\". \n\nAs specialists for holistic compliance, data protection, risk management and information security, our consultants have many years of implementation experience from worldwide projects. Furthermore, we also offer the complete operation of QSEC by our employees in your data center or in your cloud environment, if desired.\n\nArrange a non-binding web demo appointment and test QSEC via test access afterwards.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bf0d57b4-e4b3-457e-8a3b-78a8b7875037.png","url":"https://www.softwareadvice.ie/software/230956/qsec","@type":"ListItem"},{"name":"VaultCore","position":14,"description":"VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. With VaultCore, administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Vaultcore can also automate the encryption of databases, backups, virtual machines, cloud services, IoT endpoints,  end-user hardware, certificates, SSH, and more. VaultCore includes process automation, integrated policy engine, access controls, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e451f486-6ff9-4eaa-8432-43fc9f4d1ccb.png","url":"https://www.softwareadvice.ie/software/267971/vaultcore","@type":"ListItem"},{"name":"ISS","position":15,"description":"INSSIDE Security Suite is a leading platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes. In addition, ISS is a highly customizable platform and can be adapted to the specific needs of each company, which guarantees a unique and effective solution for each case.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f29459a-66d2-4eef-806d-ba859aa849e7.jpeg","url":"https://www.softwareadvice.ie/software/418019/iss","@type":"ListItem"},{"name":"PC Matic PRO","position":16,"description":"PC Matic PRO is an endpoint security suite that provides application whitelisting, endpoint protection, endpoint detection and response, and remote monitoring and management capabilities. The solution targets IT departments and managed service providers seeking to secure endpoints across various industries and organizations.\n\nPC Matic PRO leverages application whitelisting to allow only approved applications to run on endpoints. This zero-trust approach aligns with NIST SP 800 standards for information security. Application whitelisting prevents malware, ransomware, and non-compliant software from executing. The solution offers real-time protection by blocking cyber threats before they can infect endpoints.  \n\nKey capabilities include antivirus, anti-malware, and other endpoint protection features to defend against known threats. PC Matic PRO also provides endpoint detection and response powered by behavioral analysis to identify advanced and unknown threats. This allows detection and response to sophisticated attacks aligned to the MITRE ATT&CK framework. The suite enables remote monitoring and management of Windows, Mac, Linux, iOS, and Android devices from a central interface.  \n\nPC Matic PRO serves as an endpoint platform securing diverse enterprise environments. The solution provides layered zero-trust security via application whitelisting, endpoint protection, and endpoint detection and response. Companies can leverage these capabilities to monitor and control endpoint activity while preventing infections across operating systems.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c710d8f7-b233-4c23-b76b-c5c8610ae6ce.png","url":"https://www.softwareadvice.ie/software/358484/pc-matic-pro","@type":"ListItem"},{"name":"SEKOIA.IO","position":17,"description":"Sekoia.IO is a cloud-based cybersecurity platform designed to help organizations anticipate, detect and respond to cyber threats. The platform caters to security teams across industries looking to improve their defense capabilities. \n\nThe solution provides a Sekoia.IO XDR (Extended Detection and Response) module that combines real-time threat intelligence with automation. This allows the system to identify and react to attacks faster. Its CTI (Cyber Threat Intelligence) module provides actionable intelligence on emerging and known threats targeting the organization.\n\nSekoia.IO also offers TIP (Threat Intelligence Platform) that manages the entire threat intelligence lifecycle. The platform has a catalog of integrations with various security tools to consolidate alerts and data. Companies of all sizes use Sekoia.IO globally to gain visibility across their environment, accelerate threat detection and response, and empower security teams.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81db853a-e6ff-409a-bf93-b48401671d56.jpeg","url":"https://www.softwareadvice.ie/software/366386/sekoia-io","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":18,"description":"Create your playbooks and interconnect your cyber solutions: \n\nOrchestrate all your cyber tools from a single console and get quicker responses to attacks. Automate your processes, create on-call scenarios, and group your alerts into single incidents.\n\nUnmatched detection of known and unknown threats: \n\nDetect all types of threats, even threats from weak signals or spotted by different solutions with the TEHTRIS XDR Platform and prevent security breaches.\n\nReal-time remediation: \n\nThe TEHTRIS XDR Platform hyperautomates your response to attacks and coordinates all your solutions, in addition to ingesting your security events.\n\nAll your cybersecurity in a single console: \n\nUnify your cybersecurity by bringing together all your solutions in a single console for hyperautomated detections and responses. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.\nOrchestrate all your cybersecurity tools simultaneously, including your existing solutions such as Zscaler and Proofpoint, with the TEHTRIS XDR Platform. Our platform is available in our secured cloud or on-prem. Easily deploy it in your ecosystem with in & out APIs. With its customizable playbooks and its hyperautomation capabilities you will get immediate responses to cyberattacks.\n\nAll of TEHTRIS’ augmented technology included:\n\nGet all of TEHTRIS’ augmented technology directly with our XDR Platform. In addition to unifying all your cyber solutions to accelerate your detections and responses to attacks, the TEHTRIS XDR Platform offers you all its analytic intelligence. Each module of the TEHTRIS XDR Platform uses the TEHTRIS augmented technology to achieve quicker detections, investigations and remediations. You will get: \n\n- Our CTI (Cyber Threat Intelligence): a continuously updated Cyber Warehouse. With it, you will have the right tools for instant analysis, sandboxing and hunting.\n- XDR / SOAR: to orchestrate all your cyber solutions, including partners of the TEHTRIS XDR Platform. It lets you create your own playbooks to get hyperautomated detections and responses. \n- Our artificial intelligence Cyberia: developed and edited directly by TEHTRIS, it works with all the modules of the platform to get you the most effective detection and response, thanks to its neural network (Deep Learning). \n- Our UEBA: a behavioral analysis engine based on Machine Learning, integrated in XDR / SIEM. It automatically detects irregular behaviors. \n- Our Soc in the box: prioritizes EDR alerts, detects anomalies and automatically groups events to facilitate the work of your analysts. \n\nStrengthened collaboration within your teams:\n\nYour team responsiveness is the key to a successful protection. At TEHTRIS, we believe that this needed reactivity comes from a close-knit team, which has been given the best technical tools to collaborate easily, quickly, and effectively in the event of an alert. To support your teams, address the current shortage of analysts and reduce MTTD and MTTR, the TEHTRIS XDR Platform offers several features: \n- Hyperautomated response to attacks \n- Contextualization of events directly on the platform \n- Alerts for your analysts during an attack \n- Possibility to create investigative groups within the XDR Platform \n- Enhanced filter management and co-publishing capabilities\n\nStay in control of your data:\n\nMore and more customers are alerting us: competing cyber solutions are retrieving and backing up all their data. To protect your company against industrial espionage, wherever you are, we have designed the TEHTRIS XDR Platform and its modules in a way that ensures that your files cannot be accessed. Choosing a cybersecurity solution that protects your data has become a strategic decision for business leaders in today's cyber and geopolitical context.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.softwareadvice.ie/software/421726/tehtris-xdr","@type":"ListItem"},{"name":"Fraudlogix","position":19,"description":"Fraudlogix is a fraud detection and prevention platform designed for businesses that want to safeguard their digital operations against evolving threats. Built for developers and decision-makers in industries such as Ad Tech, E-commerce, Banking, Affiliate Marketing, and Cybersecurity, Fraudlogix provides personalized, scalable tools to detect bots, proxies, VPNs, high-risk users, and other forms of fraud in real time.\n\nWhether you’re a startup looking to secure your platform or an enterprise managing high volumes of traffic, Fraudlogix offers a tailored solution to suit your needs. Our flagship Bot & Fraud API delivers actionable fraud insights and can be seamlessly integrated into your systems to maintain user trust and operational efficiency.\n\nWho Is Fraudlogix For?\nFraudlogix is perfect for businesses and developers seeking robust fraud prevention solutions that are easy to implement and effective at scale. If you’re in Ad Tech and struggling with click fraud, an e-commerce platform tackling fake registrations, or a financial institution combating account takeovers, Fraudlogix is designed for you.\n\nWhat Makes Fraudlogix Unique?\n\nDeveloper-Friendly APIs: Simple to integrate and highly configurable, Fraudlogix’s APIs make fraud prevention quick and hassle-free.\nProprietary Intelligence Network: Gain access to insights powered by over 300 million URLs and apps, ensuring unparalleled fraud detection accuracy.\nScalability for All Business Sizes: From small businesses to enterprises, our solutions grow with you, adapting to your unique needs.\nReal-Time Detection: Identify threats like bots, proxies, VPNs, and high-risk users instantly, enabling you to take proactive measures.\nFree to Get Started: Enjoy 1,000 free IP lookups monthly with no commitment, making it easy to test our tools before investing.\nCore Features:\n\nBot & Fraud API: Delivers real-time insights for fraud prevention, helping businesses mitigate risks such as invalid traffic (IVT), click fraud, gaming abuse, and identity theft.\nCustomizable Integration: Choose between single IP-based API calls or more detailed pixel-level tracking based on your business requirements.\nBehavioral Data-Driven Accuracy: Backed by a global sensor network, our solutions deliver actionable insights that evolve with changing fraud tactics.\nEnterprise-Level Security: Fraudlogix is built with security in mind, ensuring sensitive data is protected while offering seamless integration with major platforms.\nHow Does Fraudlogix Support You?\nAt Fraudlogix, we don’t just provide tools; we provide a partnership. Our support team is here to guide you through integration, troubleshooting, and maximizing the value of your fraud prevention strategy. Detailed documentation, live demos, and responsive customer support ensure that you always have the help you need.\n\nUse Cases Include:\n\nBlocking bots, proxies, and VPNs in digital advertising campaigns.\nSecuring e-commerce platforms from fake accounts and fraudulent transactions.\nDetecting affiliate fraud to ensure accurate campaign tracking.\nMitigating account takeovers and protecting sensitive customer data.\nFraudlogix also caters to industries like Gaming, Travel & Hospitality, Telecommunications, and SaaS, offering a versatile solution to address diverse fraud prevention challenges.\n\nWhy Choose Fraudlogix?\nFraudlogix simplifies fraud detection for businesses of all sizes. Whether you’re securing ad campaigns, protecting e-commerce platforms, or maintaining trust in financial transactions, our real-time solutions provide unmatched accuracy and efficiency. With no upfront commitment and 1,000 free IP lookups per month, getting started has never been easier.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/76f2d1e5-ce02-4656-96d6-3f15eee8b24e.png","url":"https://www.softwareadvice.ie/software/441725/fraudlogix","@type":"ListItem"},{"name":"InsightIDR","position":20,"description":"insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can utilize log entry query language (LEQL), visual charts/graphs to find and view anomalies.\n\n\nKey features of insightIDR include file integrity or network monitoring, auditing, threat intelligence and compliance management. It allows businesses to analyze data, manage logs and detect risks or threats using attacker behavior analytics. Additionally, it helps users secure credentials or detect insider threats using machine learning technologies and user behavior analytics (UBA).\n\n\ninsightIDR facilitates integration with various third-party systems such as Microsoft Azure, Microsoft Office 365, Amazon Web Services (AWS), FireEye, Salesforce and more. The solution is available on monthly subscriptions and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e882035b-e2b2-4909-94fa-0ec411f53ff7.png","url":"https://www.softwareadvice.ie/software/98135/insightidr","@type":"ListItem"},{"name":"Exabeam New-Scale Fusion","position":21,"description":"New-Scale Fusion combines New-Scale SIEM and New-Scale Analytics to form the cloud-native New-Scale Security Operations Platform. Fusion applies AI and automation to security operations workflows to deliver the industry’s premier platform for threat detection, investigation and response (TDIR).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/db7e6c86-5bac-493d-9bf9-35c40325b3cf.png","url":"https://www.softwareadvice.ie/software/307624/exabeam","@type":"ListItem"},{"name":"calQrisk","position":22,"description":"calQrisk is an integrated governance, risk and compliance platform designed to help organisations manage operational resilience, regulatory obligations and sustainability performance in one connected environment.\n\nDeveloped by risk specialists and used by organisations across financial services, public sector and regulated industries worldwide, calQrisk enables teams to move beyond siloed risk processes and gain a clear, real-time view of organisational exposure, performance and accountability.\n\nAlongside core GRC capabilities, calQrisk includes sustainability and ESG functionality through its GreenFeet solution. \n\nThis enables organisations to calculate and manage carbon emissions, track progress against science-based targets and produce structured sustainability reporting aligned to evolving frameworks and stakeholder expectations.\n\ncalQrisk is modular, configurable and scalable; it grows with your organisational needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/48340004-c687-427e-a594-afdbcf55de19.png","url":"https://www.softwareadvice.ie/software/346859/calqrisk","@type":"ListItem"},{"name":"Naq Cyber","position":23,"description":"Naq Cyber is an automated healthcare compliance platform enabling healthcare innovators to bring solutions to the market by automating compliance with the frameworks required to grow. \n\nNaq's automated platform streamlines compliance with essential frameworks, including NHS DSPT, DTAC, DCB 0129, and global standards, such as ISO 27001, ISO 9001, and HIPAA. Designed for both emerging innovators and established healthcare entities, Naq offers a unified platform for managing risk, information governance,  quality, clinical safety and maintaining continuous compliance with the frameworks needed to work within the healthcare industry.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4a6ee68b-ac14-4029-8dca-5f9204084780.png","url":"https://www.softwareadvice.ie/software/322312/naq-cyber","@type":"ListItem"},{"name":"Seqrite Centralized Security Management","position":24,"description":"HawkkEye serves as a centralized security management platform, consolidating various endpoint security products into a single cloud-based console. It aims to help users simplify security monitoring, control, and management for businesses. The platform caters to organizations utilizing multiple cybersecurity tools, offering a unified view for improved visibility and coordinated actions across products.\n\nIncorporating analytics features, HawkkEye delivers real-time insights and threat intelligence. It allows users to correlate data and alerts, providing actionable insights that can guide security teams in making informed decisions. The platform also aids in preventing zero-day attacks by streamlining workflows, thus speeding up incident response. This allows teams to act promptly and effectively to potential threats.\n\nHawkkEye employs artificial intelligence and deep predictive malware-hunting technology for enhanced threat protection. Its AI-driven threat detection identifies suspicious activities across endpoints and facilitates automated prevention and response capabilities. HawkkEye simplifies security operations by combining crucial capabilities such as extended detection and response, next-gen antivirus, enterprise mobility management, and data privacy management. With extensive visibility and control, security teams can safeguard all endpoint types from cyberattacks through a single integrated platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4de0ecc9-6f80-4762-bff4-22829eff543e.png","url":"https://www.softwareadvice.ie/software/423077/hawkkeye","@type":"ListItem"},{"name":"Prophaze WAF","position":25,"description":"Prophaze WAF is a cloud security software designed to help businesses in various sectors such as education, healthcare, manufacturing, fintech and more protect Kubernetes clusters on-premise and on the cloud. Key features include AI firewall, DDoS protection, compliance management, virtual patching, incident management and API security. \n\n\nDevOps teams using Prophaze WAF can receive holistic protection from application vulnerabilities such as data leaks, rate anomaly, malware attacks, exploit bots, zero-day attacks, misconfigured servers, fileless attacks, and scraping bots among others. The system detects anomalies and protocol IPs in traffic flows via machine language behavior analysis and block DDoS traffic whilst letting valid requests flow through. Additionally, it automatically deploys virtual patching to API, web applications and microservices. \n\n\nProphaze WAF offers multi-tenancy capabilities, which allow organizations to secure data of multiple users on a database and shared application. The system can be deployed in private clouds or on-premise on AWS, Microsoft Azure and Google Cloud. Support is extended via an online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e689cbe6-8218-48e6-836c-5b4edeff0ef4.png","url":"https://www.softwareadvice.ie/software/185797/prophaze-waf","@type":"ListItem"}],"numberOfItems":25}
</script>
