Direction

Opportunities

The rapid development of modern threats make to the constant updating of security solutions. To be safe means to be one step ahead of the attackers and to be in the know. Softprom is the largest distributor in the field of IT Security.

40+

specialists

20+

vendors

200+

solutions

Solutions

AIOps Platform

Centerity | IT Infrastructure

Collect and correlate business, application and operational analytics to ensure SLAs and business performance.

Request

Technical platform Cyberbit Range

Cyberbit | Attack Simulation and Vulnerability Management

Cyberbit Range is the most widely deployed cyber security training and simulation platform

Request

2FA and MFA Authentication Tools

ProID | Multi-factor Authentication

Request

Advanced Bot Protection

Imperva | SaaS Web/Email

Protects your websites, mobile applications, and APIs from automated threats without affecting the flow of business-critical traffic.

Request

Anti-Fraud Suite

ThreatMark | Digital Risk Protection

Innovative modular Fraud Detection Solution for Digital Banking and Payments featuring behavioral profiling incl. behavioral biometrics, transaction...

Request

Anti-Phishing

BrandShield | Digital Risk Protection

Comprehensive brand protection against counterfeiting, phishing, and other online threats

Request

AppGuard Enterprise — Endpoint Protection

AppGuard | Endpoint and IoT Security

AppGuard Enterprise is a centrally managed host-based endpoint protection solution that prevents malware and all advanced attacks from harming the system. ...

Request

AppGuard Solo - Protection for Small and Medium Businesses

AppGuard | Endpoint and IoT Security

Preventing intrusion with a three-step defense tactic

Request

Attack Surface Management

Bugcrowd |

Bugcrowd External Attack Surface Management (EASM; formerly Informer EASM) offers a complete, accurate view of your external risk exposure. It continuously...

Request

AuditReady

CybeReady | Attack Simulation and Vulnerability Management

The perfect add-on to CybeReady’s autonomous training platform.

Request

BLAST - Behavioral adaptive phishing simulation & training

CybeReady | Attack Simulation and Vulnerability Management

Phishing simulations and short learning sessions in one integrative experience ensure learning 'in the golden moment' and eliminate friction with employees. ...

Request

Brand Protection

BrandShield | Network Protection

detects and eliminates cybersquatting when registering domain names containing a trademark owned by another person

Request

Breach and Attack Simulation Platform

Cymulate | Attack Simulation and Vulnerability Management

Fully automated and customizable, Cymulate challenges your security controls against the full attack kill chain with thousands of simulated cyber attacks,...

Request

Bug Bounty

Bugcrowd |

Managed Bug Bounty engagements on the Bugcrowd Platform source and incentivize skilled, trusted hackers (the Crowd) to find hidden vulnerabilities that...

Request

CorreAssess Full Platform

Correlata | CASB

The daily advanced data collection, allows IT leaders to get detailed insights and accurate KPIs that enable them to maximize management and operational...

Request

CorreAssess One Time Assessment

Correlata | CASB

The One Time Assessment is the perfect tool for a FAST, ACCURATE AUDIT diagnostic of your entire data center infrastructure environment  

Request

Cyber Terrain Analytics Platform

RedSeal | Network Protection

RedSeal’s cyber terrain analytics platform shows what’s on your network, how it’s connected and the associated risk.

Request

CyberAIOps

Centerity | CASB

Evaluate risk information from cyber-oriented layers that may impact your critical business services.

Request

Cyberbit Range: Hyper-Realistic Simulation

Cyberbit | Security Awareness

Cyberbit Range is the most widely deployed Cyber Security Training and simulation platform.

Request

Cyberquest

Nextgen Software | SaaS DDoS/WAF

Cyberquest is a sophisticated platform that sits on top of all security-related data/applications/sensors/servers, Defined as a Security-Driven Analytics...

Request

Data Classification

Infognito | Database Security

Get up to date and accurate view of the organization's sensetive data

Request

Data Masking

Infognito | Database Security

Preventing Organization’s Sensitive Data Leaking to Unauthorized Personnel

Request

Data Migration

Infognito | Data Loss Prevention (DLP)

Secure Data Migration to The Cloud

Request

DeceptionGrid

TrapX Security | Deception Technology

DeceptionGrid provides powerful automated protection against attacks. TrapX DeceptionGrid protects your valuable assets from the many attacks of malicious...

Request

Fortanix Data Security Manager

Fortanix | Database Security

Fortanix Data Security Manager (DSM) is the Unified Data Security Platform. It is the world’s first solution to provide HSM grade security with software-like...

Request

Imperva DDoS Protection

Imperva | SaaS DDoS/WAF

Imperva DDoS protection mitigates the largest attacks within 3 seconds without interfering with legitimate users.

Request

Insider Threat Protection Platform

Ekran System | Network Protection

Ekran System is an on-premises agent-based software product supporting various deployment options. It delivers monitoring and protects Clients for different...

Request

Intrusion Detection Systems

Waterfall Security | OT/ICS/SCADA/IoT Security

Waterfall for intrusion detection systems for safe OT-network intrusion detection

Request

LiveNX

LiveAction |

Easily obtain network-wide observability, advanced analytics, and comprehensive reporting so you can optimize your network performance everywhere.   ...

Request

LiveWire

LiveAction |

LiveWire records network packets to provide in-depth network and application performance insights.  

Request

Logsign Next-Gen SIEM Platform

Logsign | Threat Intelligence

Designed to be the Ultimate SIEM.

Request

Logsign SOAR

Logsign | Threat Intelligence

Move your SecOps forward with automated workflows, better investigation and faster incident response on a single, effective platform.

Request

Omnipeek®

LiveAction |

Get network protocol analyzer capabilities, on your Windows machine, to quickly conduct deep packet analysis to resolve network and security issues.   ...

Request

OnDMARC

Red Sift | Digital Risk Protection

A global leader in DMARC automation

Request

OnDOMAIN

Red Sift | Digital Risk Protection

OnDOMAIN rapidly uncovers and takes down impersonation domains.

Request

Penetration testing

Bugcrowd |

The Bugcrowd Platform‘s modern Pen Testing as a Service (PTaaS) suite delivers high-velocity, high-impact results for both compliance and risk reduction...

Request

PineApp Mail Secure

Cybonet | Email Security

Mail Secure neutralizes advanced threats with a multi-layer anti-spam and anti-virus system, enforced user defined policy controls, automated virus updates...

Request

PORTNOX CLEAR

Portnox | Network Access Control

The first in the industry cloud NAC / NAM solution Portnox CLEAR, which can be deployed quickly in any infrastructure with minimal costs

Request

PORTNOX CORE

Portnox | Network Access Control

Portnox CORE is a software platform for network access control (NAM), which allows you to easily and effectively solve tasks related to compliance with...

Request

Privacy Management

OneTrust | Digital Risk Protection

Comply with CCPA, GDPR, LPPD, and other privacy laws and frameworks

Request

Privileged Access Management (PAM)

Ekran System | Privileged Account Management

Manage access. Audit activity. Respond to incidents.

Request

Rhebo Industrial Protector

Rhebo | OT/ICS/SCADA/IoT Security

Industrial network monitoring with real-time anomaly detection

Request

Rhebo Industry 4.0 Stability and Security Audit

Rhebo | OT/ICS/SCADA/IoT Security

Risk Analysis & Industrial Security Audit

Request

Rhebo IoT Device Protection

Rhebo | OT/ICS/SCADA/IoT Security

Embedded Cybersecurity Automation for IoT Networks

Request

Rhebo Managed Protection

Rhebo | OT/ICS/SCADA/IoT Security

Operational Support And Managed Detection & Response

Request

Runtime Application Self-Protection (RASP)

Imperva | Web Application Firewall / Fraud Detection

Imperva RASP keeps applications safe by default

Request

Secure File Access (SFA)

Safe-T | File & Systems Security

Prevent Data Leakage and Ransomware Across Your Files and Transfers with SFA

Request

Security Awareness (CAB)

CybeReady | Security Awareness

CAB takes a new training approach that tackles the challenges involved with awareness training events and low employee engagemen.

Request

Senhasegura PAM

Senhasegura | Privileged Account Management

The Senhasegura Privileged Access Management solution is built to keep your business and its most valuable assets secure. Prevent malicious account or...

Request

Server & Application Monitor (APM)

SolarWinds | Monitoring and security

Comprehensive server and application monitoring made simple

Request

SigaGuard

Siga | OT/ICS/SCADA/IoT Security

Total cyber resilience for your mission-critical operational assets

Request

SOAR Platform

Siemplify | Security Awareness

The Siemplify SOAR platform combines security orchestration, automation, and response with end-to-end security operations management to make analysts...

Request

SolarWinds Network Performance Monitor (NPM)

SolarWinds | Monitoring and security

SolarWinds Network Performance Monitor (NPM) is a powerful and affordable network monitoring software that enables you to quickly detect, diagnose, and...

Request

Teramind DLP | Employee Monitoring Software

Teramind | Data Loss Prevention (DLP)

Teramind UAM plus content-based data exfiltration rules

Request

Teramind Starter Employee Monitoring Software DLP | UAM

Teramind | Data Loss Prevention (DLP)

Screen recording and live view, website and apps tracking

Request

Teramind UAM | Employee Monitoring Software

Teramind | Digital Risk Protection

User activity monitoring, audit, forensics, UBA, policies and rules  

Request

The Bugcrowd Platform

Bugcrowd |

Unleash human ingenuity at scale for continuous risk reduction. The Bugcrowd Platform unleashes the ingenuity of skilled, trusted hackers and pentesters...

Request

Threat Intelligence Platform

ThreatQuotient | Threat Intelligence

for Threat-Centric Security Operations

Request

ThreatQ Investigations

ThreatQuotient | Security Awareness

ThreatQ Investigations embeds visualization and documentation in a shared environment for a greater understanding and focus throughout the analysis process. ...

Request

Traffic Analyzer

Centerity | CASB

Evaluate and manage network data-flow across complex, distributed, and hybrid networks.

Request

Unidirectional Security Gateways

Waterfall Security | OT/ICS/SCADA/IoT Security

Waterfall Unidirectional Security Gateways enable safe IT/OT integration, disciplined control, and real-time industrial network monitoring.

Request

Web Application Firewall (WAF)

Imperva | SaaS DDoS/WAF

Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications...

Request

Vendors

Acalvio
AppGuard
Automox
BrandShield
Bugcrowd
Centerity
Correlata
Cyberbit
CybeReady
Cybonet
Deceptive Bytes
Ekran System
ERMETIX (former Xnoova)
Fortanix
GoTo
Gytpol
Imperva
Infognito
KELA
LiveAction
Logsign
NanoLock Security
Nextgen Software
Niagara Networks
OneTrust
Portnox
Profitap
ProID
Red Sift
RedSeal
Rhebo
Senhasegura
Siemplify
Siga
SolarWinds
Sycope
Teramind
ThreatMark
ThreatQuotient
TrapX Security
Veracode
Votiro
Waterfall Security

Contact us

We are open to new cooperation. Our certified experts'll hold a consultation and demonstration. To start cooperation send a request.

Learn how to secure the infrastructure of a new era and win the war for safety. Request consultation of expert.

The benefits of working with us:

  • Wide geographical coverage of Eastern European and CIS countries
  • Lead generation for partners and preselling
  • No limits on the minimum volume of purchase
  • Deal protection (registration program of deals)
  • Transparent scheme of supply in accordance with legislation
  • Credite line for regular partners
  • Consulting and technical support of highly qualified specialists
  • Training and certification of IT - specialists on the own training center
  • Network of representative offices, a high level of service in any country
  • Marketing support and assistance in lead generation