Home / Network and Infrastructure Security

Network and Infrastructure Security

Secure your network and infrastructure with robust protection.

Sweet Security
Free

Sweet Security View Sweet Security

Sweet Security provides advanced Runtime Attack Security for cloud workloads, empowering security teams to achieve comprehensive visibility and proactively thwart attacks at every stage. Leveraging a team with deep expertise in offensive and defensive cloud security, Sweet's innovative suite offers precise, rapid threat mitigation with minimal impact on business operations. Our mission is to provide cloud security that is effective, efficient, and perfectly tuned to your environment.

Comprehensive Cloud Runtime Security Suite
Full Environment Discovery and Visibility
Proactive Multi-Stage Attack Mitigation
Zymr
Free

Zymr View Zymr

Zymr is a premier provider of comprehensive cloud computing solutions, specializing in Cloud Security, Mobility, Applications, Infrastructure, and Orchestration. Leveraging deep partnerships with leading cloud security innovators, Zymr designs and implements bespoke security solutions, including Cloud Access Security Brokers (CASB), Data Leakage Prevention (DLP), and advanced encryption, ensuring robust protection and compliance with standards like PCI and HIPAA.

Custom Cloud Access Security Broker (CASB) development
Data Leakage Prevention (DLP) implementation
Advanced Data Encryption solutions
Zscaler
Free

Zscaler View Zscaler

Zscaler empowers leading global organizations to securely modernize their network and application infrastructure for the era of mobility and cloud adoption. Our cloud-native Zscaler Internet Access and Zscaler Private Access services deliver seamless, high-performance, and secure connectivity between users and applications, irrespective of device, location, or network. Built on the world's largest cloud security platform, Zscaler offers unmatched simplicity, robust protection against cyber threats and data loss, and a superior user experience compared to traditional appliance-based solutions, operating in over 185 countries.

100% Cloud-Native Architecture
Unified Internet and Private Application Access
Global Scale Security Platform

Critical Infrastructure Protection

Zymbit
Free

Zymbit View Zymbit

Zymbit delivers robust hardware security modules (HSM) designed to protect the critical vulnerability points at the edge of innovation for IoT and embedded systems. By integrating Zymbit's specialized, easy-to-deploy embedded security modules, developers can safeguard their devices against sophisticated cyber threats and gain the confidence to accelerate innovation without compromising security. Our solutions provide an impenetrable layer of defense, enabling the secure convergence of cyber and physical realms.

Hardware Security Modules (HSM) for IoT and Edge Devices
Designed for Raspberry Pi and Single Board Computers
Easy Integration for Developers
Zuul IoT
Free

Zuul IoT View Zuul IoT

Zuul IoT offers a comprehensive, asset-centric Industrial Operations Technology (OT) cybersecurity platform designed to safeguard critical IIoT/IoT devices. By providing centralized and contextual security orchestration, Zuul empowers security teams to defend against cyber threats in vital sectors like transportation, building automation, and industrial control systems. This scalable solution minimizes risks from digital transformation and the growing number of connected OT devices, enhancing operational resilience.

Asset-centric OT security approach
Protection for IIoT/IoT devices
Centralized security orchestration
ZIUR Industrial Cybersecurity Center
Free

ZIUR Industrial Cybersecurity Center View ZIUR Industrial Cybersecurity Center

ZIUR, the Industrial Cybersecurity Center of Gipuzkoa, is a public initiative dedicated to bolstering the cyber defenses of industrial companies and their offerings. As a leading reference center in industrial cybersecurity, ZIUR empowers businesses of all sizes and sectors to integrate robust cybersecurity as a core operational process. We foster innovation and sector growth by collaborating with a dynamic ecosystem of companies, universities, and research centers to develop cutting-edge solutions and specialized knowledge.

Public initiative for industrial cybersecurity
Reinforcement of protection for companies and products/services
Tailored cybersecurity solutions for all industrial sectors and sizes
Zyxel Networks
Free

Zyxel Networks View Zyxel Networks

Zyxel Networks delivers intelligent, AI-powered networking solutions designed to secure and connect businesses of all sizes. Leveraging over three decades of industry expertise, we provide seamless connectivity and robust management platforms, from traditional on-premises hardware to cloud-managed services. Our commitment to innovation ensures your network infrastructure is not only reliable but also proactively protected against evolving cyber threats, enabling enhanced productivity and operational efficiency.

AI-Powered Cybersecurity
Secure Network Connectivity
Cloud-Managed Networking Solutions
Zayo
Free

Zayo View Zayo

Zayo is a premier global provider of essential bandwidth infrastructure, delivering high-performance connectivity, secure colocation, and flexible cloud services. With a legacy rooted in the foundational development of the internet, Zayo offers a comprehensive suite of lit services and dark fiber solutions across over 300 markets in the US and Europe, empowering businesses and government agencies with robust, scalable network capabilities.

Global Bandwidth Infrastructure Services
High-Performance Connectivity
Secure Colocation Facilities
Xtel Communications
Free

Xtel Communications View Xtel Communications

Xtel Communications is a premier provider of integrated voice and data solutions, specializing in Unified Communications, Network Security, Cybersecurity, Network Connectivity, and expert Voice services. We deliver robust, layered security strategies and resilient network infrastructure, expertly tailored to protect your valuable assets and ensure swift recovery from digital threats, establishing you as a secure and agile entity in the modern digital landscape.

Unified Communications Expertise
Advanced Cybersecurity Strategies
Resilient Network Security Infrastructure
Zero Networks
Free

Zero Networks View Zero Networks

Zero Networks delivers scalable, cost-effective, and air-tight network access security by enabling a true zero trust model. Our platform empowers organizations to enforce granular user and machine-level access policies across their entire network with a single click, fundamentally shifting from traditional perimeter-based security. We eliminate implicit trust within the network, ensuring that only authorized users and machines can access necessary resources, thereby preventing lateral movement and mitigating risks associated with breaches.

Automated Zero Trust Network Model Deployment
Granular User & Machine Access Control
Scalable Network-Wide Security
Zerify
Free

Zerify View Zerify

Zerify provides an unparalleled video conferencing solution, architected with a robust zero-trust framework to ensure meeting security, privacy, and unwavering business compliance. Its powerful API facilitates seamless integration of secure video conferencing into any business application, empowering organizations of all sizes to collaborate and conduct operations with confidence and ease. Complementing its core offering, Zerify also integrates advanced cloud backup and data protection services to safeguard critical information against modern cyber threats.

Zero-Trust Architecture for enhanced security
Secure and private video conferencing
Business compliance assurance
XONA Systems
Free

XONA Systems View XONA Systems

XONA Systems provides a Zero Trust user access platform engineered specifically for the unique demands of OT environments and critical infrastructure. It ensures secure, seamless access to operational systems from any location or device, powered by proprietary protocol isolation and a robust zero-trust architecture that immediately neutralizes common attack vectors. With comprehensive security features like MFA, granular user-to-asset controls, and session analytics, XONA acts as the secure gateway connecting the cyber-physical world, enabling confident and trusted operations anywhere.

Zero Trust Architecture for OT environments
Proprietary Protocol Isolation
Frictionless and Seamless User Access