Direction

Opportunities

The rapid development of modern threats make to the constant updating of security solutions. To be safe means to be one step ahead of the attackers and to be in the know. Softprom is the largest distributor in the field of IT Security.

40+

specialists

20+

vendors

200+

solutions

Solutions

Behavioral Adaptive Simulation & Training

CybeReady | Network and Application Security

The only autonomous phishing simulations and training program for enterprises, CybeReady’s award-winning solution guarantees to change employee behaviour...

Request

Citrix Endpoint Management

Citrix | Mobile Security

Manage all your endpoints in a complete enterprise mobility management solution

Request

Cybowall

Cybonet | Endpoint Security

breach detection, network visibility and vulnerability management for small and medium sized organizations to quickly detect potential vulnerabilities...

Request

DeceptionGrid

TrapX Security | Cyber Deception Technology

DeceptionGrid provides powerful automated protection against attacks. TrapX DeceptionGrid protects your valuable assets from the many attacks of malicious...

Request

FireEye Email Security (EX)

FireEye Inc. | Cyber Deception Technology

Traditional security solutions simply can’t stop today’s advanced email attacks such as zero-day exploits, malware hidden in attachments, malicious URLs...

Request

FireEye Endpoint Security (HX)

FireEye Inc. | Database Security

FireEye Endpoint Security is an integrated endpoint solution that detects, prevents and responds effectively to known malware and threats traditional...

Request

FireEye Threat Analytics Platform (AX)

FireEye Inc. | Database Security

FireEye is transforming detection and incident investigation with our cloud-based Threat Analytics Platform (TAP).

Request

Forcepoint Data Loss Prevention

Forcepoint | Data Loss Prevention (DLP)

Gain The Visibility And Data Controls To Keep Critical Data Secure

Request

Forcepoint Email Security

Forcepoint | Database Security

Protecting from spam, phishing & ransomware attacks wherever email is accessed

Request

Forcepoint Mobile Security

Forcepoint | Mobile Security

Extend Existing Security Protection to Mobile Devices via the Cloud

Request

Forcepoint Web Security

Forcepoint | Network and Application Security

Delivering premier cloud security to protect users and data everywhere

Request

GigaSECURE

Gigamon | Complex Security Solution

The industry's first Security Delivery Platform

Request

GigaVUE TA Series

Gigamon | Complex Security Solution

Edge traffic aggregation nodes

Request

GigaVUE Visibility Appliances (H Series)

Gigamon | Complex Security Solution

High-performance, modular, extensible appliances—the foundation of the Gigamon Visibility Platform.

Request

Hideez Key

Hideez Technology | Database Security

Hideez Key will become a daily companion to your computer, smartphone and tablet. Forget having to type passwords for apps, websites and services.

Request

Imperva DDoS Protection

Imperva | IT Security

Imperva DDoS protection mitigates the largest attacks within 3 seconds without interfering with legitimate users.

Request

Netsparker Web Application Security Scanner

Netsparker | Vulnerability Management

An enterprise & scalable solution that enables organisations to easily find vulnerabilities in their web applications & web services, and ensure...

Request

Networking

Citrix | Load Balancer

NetScaler ADC is an application delivery controller that provides flexible delivery services for traditional, containerized and microservice applications...

Request

Password Director

Ivanti | IT Security

Discover a secure, self-service password reset manager

Request

PineApp Mail Secure

Cybonet | Endpoint Security

PineApp Mail Secure - neutralizes advanced threats with a multi-layer anti-spam and anti-virus system, enforced user defined policy controls, automated...

Request

PORTNOX CLEAR

Portnox | Network and Application Security

The first in the industry cloud NAC / NAM solution Portnox CLEAR, which can be deployed quickly in any infrastructure with minimal costs

Request

PORTNOX CORE

Portnox | Network and Application Security

Portnox CORE is a software platform for network access control (NAM), which allows you to easily and effectively solve tasks related to compliance with...

Request

Privileged Account Security Solution

CyberArk Software | Access control to Information system

A complete solution to protect, monitor, detect, alert, and respond to privileged account activity. The CyberArk Privileged Account Security Solution...

Request

Rapid7 AppSpider

Rapid7 | Vulnerability Management

Web application security testing to close the gaps in your apps

Request

Rapid7 Metasploit

Rapid7 | Vulnerability Management

Penetration testing software for offensive security teams.

Request

Rapid7 Nexpose

Rapid7 | Vulnerability Management

Vulnerability management software to help you act at the moment of impact

Request

Rhebo Industrial Protector

Rhebo | IT Security

ICS Monitoring - Continous ICS CyberSecurity

Request

Rhebo ReadyNow

Rhebo | IT Security

Managed Services - Industrial Security Services

Request

Secure Site Pro с EV

DigiCert | Network and Application Security

Website Security Solution Supports Extended Validation (EV), Green Address Bar, and Norton Secured Printing

Request

Secure Site SSL

DigiCert | Network and Application Security

protection of confidential data during its transmission on websites, on the internal network or external network

Request

Secure Site Wildcard SSL

DigiCert | Network and Application Security

solution for protecting the transfer of sensitive data in several subdomains of the same domain on your server

Request

Secure Site с EV

DigiCert | Network and Application Security

website security solution additionally provides Norton Secured printing

Request

Sensitive Information Management Suite (SIM)

CyberArk Software | Access control to Information system

Securely store and share sensitive files and business passwords. The CyberArk Sensitive Information Management Solution is a complete platform for...

Request

SNYPR Security Analytics Platform

Securonix | Database Security

SNYPR® is a next-generation security analytics platform that transforms big data into actionable security intelligence.

Request

SNYPR Security Data Lake

Securonix | Database Security

Uncover Actionable Intelligence Through Super Enrichment, Search And Visualization

Request

SOAR Platform

Siemplify | Complex Security Solution

The Siemplify SOAR platform combines security orchestration, automation, and response with end-to-end security operations management to make analysts...

Request

Teramind DLP

Teramind | Data Loss Prevention (DLP)

Teramind UAM plus content-based data exfiltration rules.

Request

Teramind Starter

Teramind | Monitoring and security

Screen recording and live view, website and apps tracking.

Request

Teramind UAM

Teramind | Data Loss Prevention (DLP)

User activity monitoring, audit, forensics, UBA, policies and rules.  

Request

UEBA Bolt 6.0

Securonix | Database Security

Powered by Machine Learning That Detects Any Threat, Anytime, Anywhere.

Request

Web Application Firewall (WAF)

Imperva | Network and Application Security

Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications...

Request

Vendors

AppGuard
Armis
Barracuda Networks
Citrix
CyberArk Software
Cyberbit
CybeReady
Cybonet
Cymulate
DigiCert
Ericom
FireEye Inc.
Forcepoint
Gigamon
Guardicore
Hideez Technology
ImmuniWeb
Imperva
Ivanti
LogMeIn
Netsparker
Portnox
Rapid7
RedSeal
Rhebo
Safe-T
Securonix
Siemplify
Teramind
ThreatMark
TrapX Security
Tripwire
VMware

Contact us

We are open to new cooperation. Our certified experts'll hold a consultation and demonstration. To start cooperation send a request.

Learn how to secure the infrastructure of a new era and win the war for safety. Request consultation of expert.

The benefits of working with us:

  • Wide geographical coverage of Eastern European and CIS countries
  • Lead generation for partners and preselling
  • No limits on the minimum volume of purchase
  • Deal protection (registration program of deals)
  • Transparent scheme of supply in accordance with legislation
  • Credite line for regular partners
  • Consulting and technical support of highly qualified specialists
  • Training and certification of IT - specialists on the own training center
  • Network of representative offices, a high level of service in any country
  • Marketing support and assistance in lead generation
Contact us Facebook Linkedin Youtube