Business Software for Check Point IPS - Page 4

Top Software that integrates with Check Point IPS as of July 2025 - Page 4

  • 1
    Tufin

    Tufin

    Tufin

    Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment. Customers gain visibility and control across their network, ensure continuous compliance with security standards and embed security enforcement into workflows and development pipelines. Eliminate the security bottleneck and increase the business agility of your organization. Existing manual approaches to managing network changes can take weeks and introduce errors resulting in potential security risks. Organizations across the world rely on Tufin’s policy-based automation to automate visibility and provisioning and maximize business agility and security. Maintaining and demonstrating compliance with industry regulations and internal policies is difficult within today’s complex and fragmented networks. Tufin enables enterprises to ensure continuous compliance and maintain audit readiness.
  • 2
    SentryBay Armored Client
    The missing piece in the security stack jigsaw, easily downloaded in one-click to complete your armored shield against cyberattacks. ‍The Armored Client provides real time patented protection to applications and data without needing to detect and respond to threats. It does this by using kernel level prevention of data exfiltration, even if threats exist, combined with the secure wrapping of applications and injected security. ‍ The Armored Client takes a layered approach to protecting endpoint devices being used remotely to access your applications and data and to support secure online browsing. Whether your employees are using unmanaged, BYOD or managed endpoint devices, all your corporate apps are targeted on the endpoint and run in a secure session.
  • 3
    L7 Defense

    L7 Defense

    L7 Defense

    L7 Defense helps organizations protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. APIs have become critical for data sharing and applications integration - as well as an attractive path for malicious attacks that expose organizations to new, continuously evolving threats. With a team of experienced leaders and innovators, L7 Defense revolutionizes the way organizations protect their APIs from attacks and exposure using disruptive, AI-based technology. Ammune(TM). L7 Defense’s core technology, received in 2020 a Product Leadership Award by Frost & Sullivan, thanks to its novel unsupervised learning AI-based approach regarding applicative protection at the API resolution. Cloud frontend with legacy (on premise) backend tiers through APIs exposes financial institutions to cybersecurity risk.
  • 4
    Aviatrix

    Aviatrix

    Aviatrix

    Aviatrix® is the cloud network security company trusted by more than 500 of the world’s leading enterprises. As cloud infrastructures become more complex and costly, the Aviatrix Cloud Network Security platform gives companies back the power, control, security, and simplicity they need to modernize their cloud strategies. Aviatrix is the only secure networking solution built specifically for the cloud, that ensures companies are ready for AI and what’s next. Combined with the Aviatrix Certified Engineer (ACE) Program, the industry’s leading secure multicloud networking certification, Aviatrix unifies cloud, networking, and security teams and unlocks greater potential across any cloud.​
  • 5
    SAP Cloud Platform
    Extend your business processes in the cloud. Extend SAP solutions in a fast and agile way without disrupting key business processes - leveraging existing investments and expertise. Rapidly develop robust and scalable cloud-native applications. Leverage your existing ABAP expertise to create new extensions or renovate existing custom apps. Innovate for business agility with cloud-native, low-code, and responsive event-driven applications. Accelerate outcomes with intelligent business process optimization. Discover, configure, extend and optimize business processes, connecting experience data to operational workflows. Gain impactful and actionable insights to anticipate business outcomes and uncover new revenue and growth opportunities. Harness the power of predictive analytics and machine learning capabilities. Embed real-time intelligence into your business applications. Advance and personalize the user experience for your customers, partners and employees.
  • 6
    Radware Alteon
    Alteon is Radware’s next-generation application delivery controller (ADC) and the only network load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications. Alteon load balancer/ADC combines best-of-breed application delivery capabilities, market-leading SSL performance that supports all of the latest encryption protocols, and advanced services to companies with ongoing application lifecycle management challenges that impact the performance of web applications (such as heavier, more complex web content); mobility, and the migration to the cloud. Alteon is Radware’s next-generation application delivery controller (ADC) and the only network load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications.
  • 7
    Matrix42 Software Asset Management
    The requirements for digital work have fundamentally changed. Employees decide for themselves when, where, and with which devices they are productive. That's why they expect services on demand at the push of a button. It sounds complex, but it's not. With Matrix42, your IT orchestrates all endpoints, applications, and services in one solution. At the same time, you ensure cost transparency and compliance. Fast, simple, and secure. Employees expect positive experiences in their working environment. That includes self-paced working from the device of their choice, with a digital service offering, and supported by artificial intelligence. At the same time, IT guarantees data protection on devices and compliant operation. Our software creates this balance between business and IT. ITIL Best Practices and the Self-Service Portal automate order, approval and provisioning processes. Costs and licenses are booked automatically to the right cost unit, and your compliance is ensured.
  • 8
    RedSeal

    RedSeal

    RedSeal Networks

    Secure all your network environments—public clouds, private clouds, and on premises— in one comprehensive, dynamic visualization. Trusted by all four branches of the military, the world’s most trusted financial institutions, power grid companies, and mission-critical government agencies. A digital transformation is accelerating migration to the cloud, especially as so many people work remotely. Security teams are scrambling to manage security for resources in one, two or more public clouds as well as for resources remaining on premises. Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • 9
    ClearPass

    ClearPass

    Alcatel-Lucent Enterprise

    Easily roll out BYOD services and control devices on your enterprise network with powerful network policy management. Create and enforce policies across devices and apps with the ClearPass Policy Management System. ClearPass gives you total control over your enterprise network, offering a simpler way to roll out BYOD services. You’ll be able to offload routine tasks to users through guest self-registration portals and self-service employee portals. And leverage contextual data about user roles, devices, application use, location and time of day to streamline network operations across your networks and VPNs.Create and enforce policies across your entire network. Enable users to provision and register their own devices. Use a single view to manage policies, on-board devices, admit users, manage apps and more. Advanced endpoint posture assessments and health checks ensure security compliance and network protection before devices connect and while connected.
  • 10
    SecureTrack+
    Secure your network and cloud environments, and deploy a Zero Trust Architecture with the industry's most powerful security policy automation technology. Achieve end-to-end network security across your hybrid enterprise infrastructure, powered by a single solution designed for both network and cloud security teams. Gain visibility into the security controls across on-premises, hybrid, and multi-cloud environments, and deploy security policy throughout your infrastructure to establish a Zero Trust model - without compromising business agility or developer productivity. Enable cloud migration, inject security into DevOps pipelines, and centrally manage security policies across complex environments. Manual approaches to managing network changes and deploying security policies within your DevOps pipelines is burdensome and can introduce errors and potential security risks.
  • 11
    RSA eBusiness Solutions
    RSA eBusiness Solutions is a Supply Chain, Service Billing and Financial Management solution available in two flavours, a traditional Server based solution or from the Cloud. RSA ON-SITE is a complete turnkey solution, where we take care of the hardware (Dell Server with 3 year service contract) and software configuration. Find a power outlet, plug in a network cable, point to a web browser and you are up and running. Want no hardware or network headaches, then sign-up for our RSA CLOUD, a cloud based application that has the same features as its RSA ON-SITE brother. RSA becomes your ONE data and software source for all your Financials and Supply Chain Management. No more messy integration between multiple IT systems. RSA SOFTWARE (originally Randy Soule & Associates) was formed in 1990 and was created to primarily develop its own accounting software. Our mission has always been to provide innovative and creative web-enabled Enterprise class business solutions built upon "open-source".
    Starting Price: $12995.00/one-time
  • 12
    CyBlock

    CyBlock

    Wavecrest Computing

    Easy-to-launch cloud-based service applied regardless of employee location. Provides perimeter-less filtering and reporting coverage for all users - remote, roaming, flexible, and transitioning. Making this a popular choice for today’s distributed workforce environment. Secure Web filtering appliances for those that prefer, or are required to have, onsite hardware. The choice of IT rack mount or tabletop design makes this deployment suitable for SMBs to large organizations. Application and Website report with a rollup of time spent. See time online by friendly Website name, not by ambiguous Domain Name. Accurately identify actual user clicks, providing managers with clear, useful data. Easy-to-use solutions for efficient and proactive monitoring of Web usage. Solutions built to address government agency challenges in Internet usage.
  • 13
    Syntegra

    Syntegra

    Syntegra

    Our MVNO, Internet of Things (IoT), Wi-Fi Solutions empower people, businesses, and devices to deliver unique Mobile and Connectivity experiences. Syntegra gives our customers the control to create, manage, and scale the innovative digital and mobile services they want to deliver. The Syntegra Cloud platform is perfect Mobile Virtual Network Operators (MVNO), and enterprises and organizations of all sorts. It’s flexible enough to address service wholesale and enterprise application-based solutions and our elite global team understands the mobility market better than anyone. Syntegra offers a global connectivity platform that provides access the largest aggregated network on the planet, with coverage in 200+ countries and territories. With a specialized Business Support System (BSS), Syntegra enables service providers of all shapes and sizes to manage their mobility services, network connectivity, and day to day operations.
  • 14
    Tripwire

    Tripwire

    Fortra

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 15
    Savvius Omnipeek
    Omnipeek® delivers visual packet intelligence with sophisticated deep packet analysis for faster mean time to resolution of network and security issues. Enterprises and service providers depend on reliable network performance. Configuration errors, network or application faults, and security attacks can jeopardize operations, user experience, and the bottom line. To keep networks performing optimally, engineers need to be able to continuously monitor their networks and quickly troubleshoot problems wherever they occur. They need real-time analysis for every type of network segment—1/10/40/100 Gigabit, 802.11, and voice and video over IP—and for every level of network traffic. Omnipeek, a best-in-class suite of network analytics software, delivers intuitive visualization and effective forensics for faster resolution of network and application performance issues and security investigations. Omnipeek builds on years of LiveAction packet intelligence with customizable workflows.
  • 16
    SAASPASS

    SAASPASS

    SAASPASS

    Move Beyond Passwords with The Only Full-Stack Identity & Access Management Solution. SAASPASS is Your Key to the World. Say Goodbye to Passwords EVERYWHERE. Secure Authentication Made Magical. Personal Use. Protect Yourself. Company Admins. Protect Your Employees. Developers. Protect Your End Users. Control and instantaneously manage network access by employees and partners. Eliminate the manual typing of passwords and the resources involved with password complexity rules and resets. Replace ID cards, single sign-on products, and password managers with a single, easy-to-use solution. Secure every access point to your corporate network, personal data, physical door, or IoT device using out-of-band MFA with dynamic passcodes. Login to your Mac or PC instantly, with full MFA, even when offline. Authenticate to cloud-based and on-premise apps securely and seamlessly. Eliminate password & data breaches and their impact on you or your organization. Eliminate the costs and risks
    Starting Price: $10 per month
  • 17
    GlobalSign

    GlobalSign

    GlobalSign

    GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption.
  • 18
    Arista Converged Cloud Fabric
    Converged Cloud Fabric (CCF)™ is an automated fabric built with cloud networking design principles. CCF leverages VPC/VNet constructs on-prem to deliver a cloud Network-as-a-Service operational model. CCF automates networking for multiple private cloud platforms, enabling the network to operate at the speed of VMs and Containers. With built-in analytics and telemetry, CCF provides real-time contextual visibility across the fabric and one-click troubleshooting workflows. With CCF, NetOps, DevOps and CloudOps teams can effectively collaborate, and rapidly on-board applications and tenants. CCF enables mainstream and midsize organizations to leverage network as a strategic pillar of the digital transformation strategy. With CCF's self-service networking and contextual intelligence, NetOps team can focus on innovations such as new services and analytics, instead of time-consuming manual tasks.
  • 19
    Claroty

    Claroty

    Claroty

    Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk.
  • 20
    Wind River Helix Virtualization Platform
    Wind River® Helix™ Virtualization Platform consolidates multi-OS and mixed-criticality applications onto a single edge compute software platform, simplifying, securing, and future-proofing critical infrastructure solutions in the aerospace, defense, industrial, medical, and automotive markets. The demand for more intelligence at the edge while supporting legacy applications requires industries to adapt quickly to modern software and cloud deployment practices while maintaining dedicated, long-standing software. To meet these challenges, Helix Platform allows legacy software to remain unchanged while running alongside new applications, and it provides all the benefits of a consistent, scalable, and agile platform across a wide range of edge devices. Highly regulated applications requiring robust time and space partitioning. Combining multiple workloads without certification requirements.
  • 21
    Cisco Secure Malware Analytics
    Secure Malware Analytics (formerly Threat Grid) combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it. Secure Malware Analytics rapidly analyzes files and suspicious behavior across your environment. Your security teams get context-rich malware analytics and threat intelligence, so they’re armed with insight into what a file is doing and can quickly respond to threats. Secure Malware Analytics analyzes the behavior of a file against millions of samples and billions of malware artifacts. Secure Malware Analytics identifies key behavioral indicators of malware and their associated campaigns. Take advantage of Secure Malware Analytics's robust search capabilities, correlations, and detailed static and dynamic analyses.
  • 22
    Cynerio

    Cynerio

    Cynerio

    We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too.
  • 23
    AlgoSec

    AlgoSec

    AlgoSec

    Discover, map and migrate business application connectivity to the cloud. Proactively analyze security risk from the business perspective Automate network security policy changes - with zero touch Link cyber-attacks to business processes. Automatically discover, map, and securely provision network connectivity for business applications. Manage on-premise firewalls and cloud security groups in a single pane of glass. Automate the security policy change process – from planning through risk analysis, implementation and validation. Proactively assess every security policy change to minimize risk, avoid outages and ensure compliance. Automatically generate audit-ready reports and reduce audit preparation efforts and costs by up to 80%. Clean up firewall rules and reduce risk – without impacting business requirements.
  • 24
    OpenText Enterprise Security Manager
    OpenText™ Enterprise Security Manager (ESM) is a robust Security Information and Event Management (SIEM) solution designed to provide comprehensive real-time threat detection and automated response. It features an industry-leading correlation engine that alerts analysts instantly to threat-correlated events, dramatically reducing the time required to detect and respond to cyber threats. ESM integrates native Security Orchestration, Automation, and Response (SOAR) capabilities, enabling organizations to streamline their security operations and lower total cost of ownership. With the ability to analyze over 100,000 events per second and support more than 450 event sources, it delivers enterprise-wide event visibility and enhanced threat intelligence. The platform’s scalable architecture supports customization through rulesets, dashboards, and reports tailored to unique security needs. It also offers multi-tenancy capabilities for centralized management across distributed business units.
  • 25
    OneSpan Authentication Servers
    Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale​. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management​. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications.
  • 26
    Siemplify

    Siemplify

    Siemplify

    Manage Security Operations from a Single Platform. From case creation, through investigation to remediation – Siemplify provides the intuitive, cloud-native workbench security operations teams have been craving to effectively respond at scale. Build playbooks that orchestrate over 200 of the tools you rely on with simple drag and drop. Automate repetitive tasks to free up your time for higher value work and slash response times. Rise above the daily firefighting to make data-informed decisions that drive continuous improvement with machine-learning based recommendations and advanced analytics for complete visibility of SOC activity. Siemplify provides an unrivaled intuitive analyst experience that boosts productivity with powerful customization capabilities that security engineers rave about. Not convinced? Start a free trial today.
  • 27
    KnowledgeSync

    KnowledgeSync

    ECI Software Solutions

    Become more agile and customer-centric while improving productivity and maximizing revenues. Combine business intelligence, alerts, and workflow  to keep you informed on what matters most. More than 10,000 customers worldwide and over one million users, KnowledgeSync, a business activity monitoring solution, increases employee efficiency, boosts corporate profitability, and reduces organizational costs by ensuring that businesses no longer have to say “if only we had known!”
  • 28
    CyberArk Conjur
    A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
  • 29
    Versa Cloud ERP

    Versa Cloud ERP

    Versa Cloud ERP

    Get the Best Cloud ERP for Fast Growing Businesses Today! Every successful business eventually outgrows Excel spreadsheets and old software. If you are looking for new software that eliminates post-it notes, spreadsheets, and add-ons consider Versa Cloud ERP. Versa is modern all-in-one software created for fast growing inventory heavy manufacturing, distribution, and e-commerce businesses moving to the next level. It is more powerful than old software used by your larger competitors, yet simple and affordable enough for use in businesses like yours. Yearly fees start at USD $1,800 per year for all of the capabilities included in the Versa software including financials, AR/AP, manufacturing, inventory, warehouse, shipping/receiving, logistics, projects, CRM, B2B/B2C e-Commerce and more. Winner: 2018 Stevie Gold , 2017 Best in Biz - Silver, 2017-FinancesOnline-Rising Star & Great User Experience , 2018 Software Advice-Front Runners
    Starting Price: $1800 per year
  • 30
    IBM MaaS360
    Seamlessly manage and protect your devices across all operating systems (OS). IBM® MaaS360® is uniquely equipped to help IT professionals manage a wide variety of endpoints, apps, and data, and protect them efficiently and productively. MaaS360 offers unified endpoint management (UEM) capabilities such as: Streamlined enrollment: IT pros don’t need to touch devices to enroll them. The device setup is already configured in the MaaS360 pre-deployment phase, and corporate resources are handled by over-the-air provisioning. Simplified endpoint management: Manage virtually all device types and the main OS, such as Apple iOS, Android, iPadOS, Microsoft Windows, and Google ChromeOS, from a single console. Take advantage of the simple self-service provisioning process, same-day OS support for the latest platform and 24x7 support by chat, phone, and email.
    Starting Price: $5/device and $10/user/month