Vendors
Accounting & Documentation Management
Open
Games & Entertainment
Open
Information Security
Open
InfoSec. Analysis and filtering of network traffic (including NTA)
Open
InfoSec. Cyber Fraud Protection
Open
InfoSec. Data Leak Prevention (DLP)
Open
InfoSec. DDoS Attack Prevention
Open
InfoSec. DevSecOps
Open
InfoSec. Encryption tools
Open
InfoSec. Endpoint protection (EPP, EDR)
Open
InfoSec. Firewall (NGFW/UTM)
Open
InfoSec. Identity Governance and Access Rights Management (IDM, IAM, IGA)
Open
InfoSec. Mail server protection
Open
InfoSec. Means of protecting information from unauthorized access
Open
InfoSec. Protect of an Industrial Automatic Control System (IACS)
Open
InfoSec. Protecting Cloud and Virtual Environments
Open
InfoSec. Protection against targeted attacks (Sandbox)
Open
InfoSec. Protection of remote workstations and mobile devices
Open
InfoSec. Security information and event management (SIEM)
Open
InfoSec. Security Orchestration, Automation and Response (SOAR)
Open
InfoSec. Training of personnel to protect against cyberthreats
Open
InfoSec. Vulnerability Scanner
Open
InfoSec. Web Application Firewall (WAF)
Open
Mac OS Software
Open
Operating Systems (OS)
Open
Science & Education
Open
Video calling and web conferencing
Open
Visualization and data analysis
Open