Nucleus Security References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (2639)
    Verified34+ References
  • 4.8 / 5.0 (1642)
    Verified35+ References
  • 4.8 / 5.0 (2795)
    Premium93+ References

Nucleus Security Case Studies

  • Large Australian Government Logistics Enterprise - Customer Case Study

  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References34 total
    About

    Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the industry’s most accurate detection of threats entering and operating within your network, both on premises and in the cloud. The company’s software protects network, email, cloud, and web infrastructures, minimizing the risk of a damaging and costly breach that results in the loss of data, customers, and reputation.

  • Reference Rating
    4.7 / 5.0
    Customer References35 total
    About

    What is Perimeter 81? Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide. From small businesses to large enterprises, Perimeter 81 is the go-to network security solution for thousands of companies. Perimeter 81 seamlessly integrates with major cloud service providers (Azure, AWS, GCP), enabling you to secure resources in the cloud and on-premises. With Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks.

  • Reference Rating
    4.7 / 5.0
    Customer References93 total
    About

    Red Canary was founded in 2013 with a single purpose: improve security for organizations of all sizes by detecting cyber threats and providing intelligence and tools to respond. Backed by a security operations team using unrivaled detection technology, Red Canary reinforces security teams on day one and eliminates the need for companies to build their security from scratch.

  • currently locked