Cybersecurity Software in Middle East and Africa

Comparing 62 vendors in Cybersecurity Software across 130 criteria.
2 Experts are advising 60 buyers
Filters
Reset
1
2
8
2
8
10
1
6
5
6
4
11
8
10
13
13
13
3
8
14
7
15
11
12
10
15
15
4

IBM offers category-wise products which include endpoint protection, network protection, mainframe security, application security, data security, security intelligence and operations, advanced fraud detection, cloud, and mobile security and IAM. IBM Identity and access management services help in protecting an organization from breaches, enhances productivity and competitiveness, and achieves and maintains regulatory compliance. It helps in increasing the maturity of the program with identity and access management services from IBM Security. IBM solutions help in detecting and stopping advanced threats. It automates threat detection and response across the enterprise. 

Read less Read more
62 Buyers Negotiating
“Group Buying Deal”
For IBM CORPORATION
GET PRICING Free Demo

HPE security protects digital assets with reassurance from the HPE risk management and digital protection service. HPE offers a different product such as security management, threat, and vulnerability defense. Security Information and Event Management (SIEM), security monitoring, data encryption, and key management, and data protection products included in the security management category. HPE security services provide comprehensive, redundant protection that guides servers and data from threats that exist and threats for the future. Its security risk management workshops, assessments, architecture, design and integration services accelerate digital transformation. HPE addresses vulnerabilities in applications and connection and builds security and compliance into the business.

Read less Read more
88 Buyers Negotiating
“Group Buying Deal”
For HPE
GET PRICING Free Demo
McAfee’s strong portfolio of solutions and services, and the ability to serve a wide customer base has helped the company build a strong customer base across multiple regions. McAfee’s innovative offerings make it one of the most trusted and deployed solution providers in the market. The company plans to develop new business models and integrate multi-application solutions as a part of its future strategy. Furthermore, the company plans to expand its presence and strengthen its market position by adopting effective partnership strategies.
Read less Read more
64 Buyers Negotiating
“Group Buying Deal”
For McAfee
GET PRICING Free Demo
Cisco offers products for a different category such as networking, wireless and mobility, security, collaboration, data center, analytics, video, IoT, and software. Security technology helps IT by simplifying security complexity. Small and mid-sized businesses use networking products of Cisco that secure the organization network architecture, manage connected devices, and make business decisions faster.
Read less Read more
88 Buyers Negotiating
“Group Buying Deal”
For CISCO SYSTEMS INC
GET PRICING Free Demo
Through Cloud Migration, Trend Micro provides businesses with flexibility in protecting their cloud throughout the migration and expansion process. It facilitates businesses to gain better visibility and provides constant security throughout their cloud environments. The company's cybersecurity solution has the ability to collaborate with leading SIEM platforms to analyze telemetry data for advanced threat detection.
Read less Read more
77 Buyers Negotiating
“Group Buying Deal”
For Trend Micro Cloud App Security
GET PRICING Free Demo
Check Point is one of the renowned security software solution vendors. The company is actively focused on providing advanced security solutions for web, data, endpoints, and mobile devices. The cybersecurity solutions offered by Check Point help customers enhance the security layers of external and internal networks. The company provides security offerings that include security management, cloud security, endpoint security, data security, Unified Threat Management (UTM), mobile threat prevention, and network security. The company delivers IT services and security solutions, globally. Moreover, it is a provider of complete security architecture for protecting SMEs and large enterprises from ransomware, malware, and other types of sophisticated fifth generation cyber-attacks.
Read less Read more
82 Buyers Negotiating
“Group Buying Deal”
For CHECK POINT SOFTWARE TECHNOLOGIES LTD
GET PRICING Free Demo
Symantec offers category-wise products offerings, which include endpoint and hybrid cloud security, information protection, messaging security, website security, small and mid-sized Business Security Solutions (SMB). Symantec's Website Security offers SSL, Code Signing, and Complete Website Security. SMB offers products such as Endpoint Protection Cloud and Encryption. It protects SMB by securing their website and products.
Read less Read more
74 Buyers Negotiating
“Group Buying Deal”
For SYMANTEC CORPORATION
GET PRICING Free Demo

Trustwave Managed Detection services analyses the log and event information coming from devices and applications. It helps fast and efficiently make sense of data by providing the platform, processes and people to monitor, detect and alert on threats. It also develop and maintain threat indicators and use cases focused on up-to-the-minute intelligence for both regional and global threats, all delivered by elite SpiderLabs team.

Read less Read more
65 Buyers Negotiating
“Group Buying Deal”
For TRUSTWAVE HOLDINGS INC
GET PRICING Free Demo

TAP cybersecurity software is a cloud-based platform built by cybersecurity experts to protect a company’s valuable data from various threats. It enables a company to meet its security needs. TAP cybersecurity software is a revered name in the field of cyber threat intelligence and aims to take detection and event investigation to higher levels. Through its integrated threat insight, flexible cloud-based infrastructure and codified detection expertise, it has managed to make a mark in the industry. It also has the ability to adapt with seasonal changes of the business to suit and fulfil its needs wholly. TAP pricing is affordable.

Read less Read more
64 Buyers Negotiating
“Group Buying Deal”
For TAP
GET PRICING Free Demo

Cortex cybersecurity software solves problems like security orchestration and automation, ML-based threat detection, investigation, and response. Real-time collaboration is available with Cortex. There is reduction in threat alerts, faster investigations are done, and the costs are reduced by 44%. Cortex ceases attacks with the power of good data. Cortex cybersecurity software has its own four products, Cortex XDR, Cortex XSOAR, Cortex Data, and Lake AutoFocus. All these four together make Cortex the most extensive product in the market that ensures high-class security.

Read less Read more
86 Buyers Negotiating
“Group Buying Deal”
For Cortex
GET PRICING Free Demo

Kaspersky Lab Threat Intelligence Services provide access to the intelligence that need to mitigate the threats, provided by world-leading team of researchers and analysts. Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs.

Read less Read more
81 Buyers Negotiating
“Group Buying Deal”
For KASPERSKY LAB
GET PRICING Free Demo
The company offers products for networking security, routing, switching, application management and orchestration, software defined networking, network management, network edge services, network operating system, identity and policy control, and packet optical. In February 2017, the company partnered with Affirmed Networks to develop solutions.
Read less Read more
70 Buyers Negotiating
“Group Buying Deal”
For JUNIPER NETWORKS INC
GET PRICING Free Demo
Fortinet has large category of product offerings such as next-generation Firewall, sandbox, endpoint security, Wi-Fi applications, switching, SIEM, web application firewall, cloud access security, email gateway, DDoS, IAM, and network testing. The company offers high-performance network security solutions to secure organization network, users, and data from threats.
Read less Read more
85 Buyers Negotiating
“Group Buying Deal”
For FORTINET INC
GET PRICING Free Demo
Sophos is a global leader in the network and endpoint security and helps the organization in data security. The company offers product offerings for network, end-user, and server categories with professional services. The company's cyber security solutions are powered by deep learning and Synchronized Security. Sophos Home leverages AI to detect and manage advanced viruses, malware, exploits, and ransomware attacks.
Read less Read more
61 Buyers Negotiating
“Group Buying Deal”
For SOPHOS LTD
GET PRICING Free Demo

Proofpoint Targeted Attack Protection (TAP) is advanced software that comes with innovative approach that senses, examines and restrict advanced threats before it reaches inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs polymorphic malware, weaponized documents and phishing attacks. It also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.

Read less Read more
77 Buyers Negotiating
“Group Buying Deal”
For PROOFPOINT INC
GET PRICING Free Demo
Cybersecurity Software Related Articles