- A secure alternative to FTP
- Anti-fraud
- Antimalware
- Asset inventory
- Authentication
- Backing up data
- Biometric identification
- Cloud access control
- Cloud monitoring software
- Data loss prevention (DLP)
- Data protection and recovery
- Database protection
- E-signature
- Endpoint compliance
- Enterprise File Synchronization and Sharing (EFSS)
- Extended detection and response (XDR)
- File manager
- ICS and OT network security
- IoT security
- Malicious files in-transit prevention
- Mobile application security
- Monitoring file activity
- Multi-factor authentication (MFA)
- Network access control (NAC)
- Network infrastructure
- Network security policy management (NSPM)
- Network visibility
- Networking software
- Orchestration and security automation (SOAR)
- Penetration testing
- Privilege management in cloud
- Privileged access management (PAM)
- Privileged session manager (PSM)
- Protecting confidential information from internal threats
- Ransomware protection
- Remote network access (ZTNA; SDP)
- Safe corporate messenger
- Safe file sharing
- Security Information and Event Management (SIEM)
- Single Sign-On (SSO)
- Software defined perimeter (SDP)
- Team collaboration apps
- User Activity Monitoring
- User and entity behavior analytics (UEBA)