Asia-Pacific

APAC is highly alarmed with the increase in security spending, owing to the ever-growing threat landscape. The APAC market is witnessing high growth at an exponential rate. Although initially, the APAC region was outsourcing its network infrastructure security, as it was not in a position to handle complex and multiple cyber threats. The situation is changing progressively due to the advent of a wide range of security players, high penetration of cloud-based services, and improved cloud security offerings by vendors in the region. The verticals such as BFSI, government and defense, and IT and Telecom sectors are extensively implementing the cloud-based applications to reduce their overall cost, which is driving the demand for a cloud-based security solution. Due to the increasing sophistication levels of threats, countries such as India, Japan, and Singapore have all updated or introduced new national cybersecurity policies. With the increasing number of cyber-attacks and the increasing cyber war between organizations and hackers, organizations and governments in the region are becoming conscious of the need for robust cyber defense.

Security as a Service Startups in Asia-Pacific

Comparing 50 vendors in Security as a Service Startups across 139 criteria.
All vendors(7)
Filters
Reset
3
3
3
3
7
6
3
2
5
2
4
3
2
1
1
1
2.1
Solutions from InstaSafe enforce stringent cybersecurity inside and outside office premises. The company offers simplified multifactor authentication, a single-pane view with detailed reporting, and the freedom to use any device without compromising on security.
Read less Read more
scoutTHREAT offers e-mail and machine-to-machine STIX-based reporting to commercial, government, and community partners in order to share actionable information without manual conversion. It is a secure platform that allows authorized users to access specific case details based on predefined roles.scoutPRIME provides automated collection, correlation, and reporting of threat intelligence, allowing cybersecurity staff to engage in higher-value activities.scoutSHIELD eliminates the need to maintain long-term policies and avoids the complexity around changing rule sets by using automated rule sets derived from industry-standard LookingGlass threat intelligence.
Read less Read more
1.8
Airloom's cloud access security brokers (CASBs) provide information security professionals with a critical control point for the secure and compliant use of cloud services across multiple cloud providers. Many SaaS apps have limited visibility and control options, however SaaS adoption is becoming pervasive in enterprises, which exacerbates the frustration of security teams looking for visibility and control. CASB solutions fill many of the gaps in individual cloud services and allow enterprise security teams to simultaneously have control across a growing set of cloud services.
Read less Read more
Aqueduct's security as a service has unique features which offer a lot of benefits to the users. These include: Deep security insights: - Threat visibility across application stack - Security content mapped to the stages of an attack - Continuously updated threat intelligence and security content - Continuous protection: 24×7 security monitoring - Expert-assisted remediation - Quick incident response - Lower total cost: Pay-as-you-go pricing model - No 24×7 staffing required - No expensive software licenses, maintenance or hardware to purchase
Read less Read more
Obrela exposure management assesses IT components by leveraging long-term agreements that provide for annualized professional testing services. Pricing is flexible and is based on the depth, scope, and frequency of testing. Obrela risk management services make use of SWORDFISH to reduce development and deployment times for cybersecurity programs, improve context and content dissemination, and lower cybersecurity OPEX. Obrela threat management services consist of threat intelligence, threat analytics, threat detection, and threat prevention solutions that leverage shared and extensible core services and a highly scalable multi-tenant cloud infrastructure.
Read less Read more
1.5
Kisi Access Control allows users to manage doors, share and revoke access, and see door events in real time. This solution can be configured through the cloud. The Kisi Controller is tamperproof and supports cloud-based configuration.
Read less Read more
1.3
Coronet Access Control allows users to exercise control over anything that tries to access their data and services. It offers full visibility into the security of user services and works with all popular SaaS applications. The secure analysis of its application code is based on the OWASP 10 and compliance objectives such as PCI, SSAE18 SOC1/2, and FISMA/FedRAMP.
Read less Read more