Security Product Brands
Security Product Categories
- Next-Generation Firewalls
- Targeted Attack Countermeasures
- Cloud Security / Virtualization
- Mobile Endpoint Security Solution
- Email Security
- Phishing Protection
(e.g., Business Email Compromise) - Application Security
- Server Security
- Sandbox
- Malware Sanitization
- Log Analysis
- Server Monitoring
- Encryption
- Security Policy
- Industrial Control systems (ICS) Security
- Connected Car Security
- WAAP
- Browser Security
- Cloud Backup
- SASE
- Vulnerability Management
Next-Generation Firewalls
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Quantum Force Security Gateway
|
A next-generation firewall that consolidates comprehensive defenses against all forms of targeted cyberattacks and continuously evolves to address emerging threats. |
|
Check Point Quantum Spark Series
|
A next generation firewall tailored for SMB environments, delivering the same enterprise-grade security as the proven “Quantum Security Gateway”, refined through years of deployment in large-scale enterprise infrastructure. | |
|
Check Point Quantum Smart-1
|
A purpose-built security management appliance designed to centrally managed and orchestrate Check Point gateways, ensuring consistent policy enforcement and operational efficiency at scale. | |
Check Point Quantum Maestro
|
Welcome to the Future of Network Security Platforms. An industry-first hyperscale network security solution, implemented entirely on-premises. | |
|
Check Point Software Blade
|
Security Licensing for Open Servers and Virtualized Environments. | |
|
Check Point CloudGuard Network
|
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways. |
Targeted Attack Countermeasures
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Quantum Force Security Gateway
|
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies. |
|
Check Point SandBlast TE Appliances
|
A next-generation threat prevention appliance that detects and blocks unknown malware (virtual sandbox & content disarm and reconstruction solution). | |
|
Check Point Quantum Spark Series
|
A next generation firewall tailored for SMB environments, delivering the same enterprise-grade security as the proven “Quantum Security Gateway”, refined through years of deployment in large-scale enterprise infrastructure. | |
Check Point Virtual Systems
|
Virtualized security gateway solution. | |
Check Point Quantum Maestro
|
Welcome to the Future of Network Security Platforms. An industry-first hyperscale network security solution, implemented entirely on-premises. | |
|
Check Point Software Blade
|
Security Licensing for Open Servers and Virtualized Environments. | |
|
Check Point CloudGuard Network
|
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways. | |
| IRONSCALES |
IRONSCALES
|
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level. |
Cloud Security / Virtualization
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point CloudGuard Network
|
A Next-Generation Virtual Firewall Solution that deliveres consistent, enterprise grade protection across public and private clouds, using the same security architecture as on-premises gateways |
Check Point Virtual Systems
|
Virtualized security gateway solution. | |
| Trend Micro |
Deep Security
|
Next-generation host-based server security solution. |
Mobile Endpoint Security Solution
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Harmony Mobile
|
An integrated mobile security solution that delivers multi-layered protection against sophisticated mobile threats that MDM alone cannot address. |
|
Check Point
Check Point Product Overview |
Check Point Harmony Endpoint
|
A next-generation endpoint security solution that protects both remote and on-premises devices and is highly effective against ransomware. |
| LayerX Security Ltd. |
SecureLayer Browser Extension
|
A next-generation browser extension that strengthens browser security simply by being added as a plug-in. |
| Acronis |
Acronis Cyber Protect Cloud
|
An integrated solution that combines backup and security capabilities with unified endpoint management. |
Email Security
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Harmony Email & Collaboration
|
An integrated security solution for cloud email, collaboration tools, and cloud storage services. |
| OrangeSoft |
BRODIAEA safeAttach
|
Email mis-delivery protection solution. |
| IRONSCALES |
IRONSCALES
|
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level. |
| Votiro |
Secure File Gateway
|
SaaS-ready file sanitization solution that enables easy deployment of Votiro’s proven content disarm and reconstruction technology. |
Disarmer
|
File sanitization solution. | |
| Acronis |
Acronis Cyber Protect Cloud
|
An integrated solution that combines backup and security capabilities with unified endpoint management. |
Phishing Protection (e.g., Business Email Compromise)
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Harmony Email & Collaboration
|
An integrated security solution for cloud email, collaboration tools, and cloud storage services. |
| IRONSCALES |
IRONSCALES
|
A next-generation Business Email Compromise (BEC) protection solution leveraging machine learning and automated remediation at the mailbox level. |
Application Security
| Vendor | Product | Key Features |
|---|---|---|
| Digital.ai |
Application Protection
|
An application protection solution that safeguards software against intellectual property theft and information leakage by hardening code against reverse engineering and related attacks. |
Key & Data Protection
|
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations. |
Server Security
| Vendor | Product | Key Features |
|---|---|---|
| Trend Micro |
Deep Security
|
Next-generation host-based server security solution. |
Sandbox
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point SandBlast TE Appliances
|
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies. |
Malware Sanitization
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point SandBlast TE Appliances
|
A Next-generation threat prevention appliances that detect and block unknown malware leveraging virtual sandboxing and advanced threat sanitization technologies. |
| Votiro |
Secure File Gateway
|
SaaS-ready file sanitization solution that enables easy deployment of Votiro’s proven content disarm and reconstruction technology.. |
Disarmer
|
File sanitization solution. |
Log Analysis
| Vendor | Product | Key Features |
|---|---|---|
|
Hitachi Solutions |
NetInsight II
|
A firewall log analysis tool. |
Server Monitoring
| Vendor | Product | Key Features |
|---|---|---|
| Micro Focus |
SiteScope |
An gentless monitoring tool. |
Encryption
| Vendor | Product | Key Features |
|---|---|---|
| Digital.ai |
Key & Data Protection
|
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations. |
Security Policy
| Vendor | Product | Key Features |
|---|---|---|
| Asgent |
M@gicPolicyCoSMO
|
Information security management system (ISMS) designed to systematically manage and improve information security. tool. |
Industrial Control systems (ICS) Security
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point 1570R Appliance
|
Industrial Control System Security |
Connected Car Security
| Vendor | Product | Key Features |
|---|---|---|
| Digital.ai |
Application Protection
|
An application protection solution that safeguards software against intellectual property theft and information leakage by hardening code against reverse engineering and related attacks. |
Key & Data Protection
|
A security solution that keeps cryptographic keys used by software hidden in system memory while still enabling encryption, decryption, and signing operations. | |
| Karamba Security |
XGuard Integrity
|
An autonomous security solution that protects connected cars and IoT devices against cyberattacks. |
| Karamba Security |
SafeCAN
|
An ultra-lightweight network security solution for in-vehicle networks. |
| Karamba Security |
ThreatHive
|
An early detection platform for ECU vulnerabilities. | Karamba Security |
Karamba's Total IoT Security
|
Delivers end-to-end security across the entire lifecycle of IoT products, from development and testing through to operation. |
WAAP
| Vendor | Product | Key Features |
|---|---|---|
| Radware |
Cloud DDoS Protection Services
|
A cloud-based DDoS protection solution that shields organizations from all types of DDoS attacks using unique real-time signatures. |
| Radware |
Cloud Application Protection Services
|
A cloud-based WAAP solution that uses proprietary machine-learning algorithms to provide comprehensive protection, from zero-day attacks to API security. |
Browser Security
| Vendor | Product | Key Features |
|---|---|---|
| LayerX Security Ltd. |
SecureLayer Browser Extension
|
A next-generation browser extension that strengthens browser security simply by being added as a plug-in. |
Cloud Backup
| Vendor | Product | Key Features |
|---|---|---|
| Acronis |
Acronis Cyber Protect Cloud
|
An integrated solution that combines backup and security capabilities with unified endpoint management. |
SASE
| Vendor | Product | Key Features |
|---|---|---|
|
Check Point
Check Point Product Overview |
Check Point Harmony SASE
|
A SASE solution that combines Secure Web Gateway (SWG) and Zero Trust Network Access (ZTNA) to deliver optimal user experience with strong network security. |
Vulnerability Management
| Vendor | Product | Key Features |
|---|---|---|
| Vicarius |
Vicarius VRX
|
A CTER solution that mitigates vulnerabilities even when corrective vendor patches are not yet available. |













