Preloader
Vendors
Solution
news
Distribution of solutions for cyber security, development and optimization of IT technologies for organizations of any size
Oberig IT keeps its finger on the pulse of the IT world and offers the most current cyber security news
Distribution of solutions in the field of cybersecurity, automation and IT development

Distribution of solutions in the field of cybersecurity, automation and IT development

Distribution of solutions in the field of cybersecurity, automation and IT development
Distribution of solutions in the field of cybersecurity, automation and IT development
Tenable One
Tenable One
Tenable One is an exposure management platform that combines risk-based vulnerability management, web application security, cloud security and identity security.
VM
Symantec Endpoint Protection
Symantec Endpoint Protection
Symantec Endpoint Protection is an indispensable tool that provides proactive detection of information security threats.
EndpointSec
Symantec Data Loss Prevention
Symantec Data Loss Prevention
Mitigate data breach and compliance risks with the industry-leading data loss prevention solution from Symantec.
DLP
Forcepoint ONE
Forcepoint ONE
Forcepoint ONE is an all-in-one cloud service that makes security simple for distributed businesses and government agencies that need to adapt quickly to changing remote and hybrid workforces.
UCSP
Secret Server
Secret Server
Privileged Access Management software
PAM
SolarWinds Observability Self-Hosted 
SolarWinds Observability Self-Hosted 
Visualize, observe, remediate, and automate your environment with a solution built to ensure availability and drive actionable insights.
Network Monitoring
Intelligent Adaptive Authentication
Intelligent Adaptive Authentication
Drive down fraud, improve the customer experience, and meet compliance requirements with Intelligent Adaptive Authentication.
MFA
Fudo Privileged Access Management
Fudo Privileged Access Management
A solution that allows you to monitor, control and record all remote access sessions to the IT infrastructure.
PAM
Network Packet Broker
Network Packet Broker
Niagara's Packet Brokers deliver access to network data to NetOps & SecOps to enable detection, investigation and response to threats in real-time.
NIP
Fidelis Network
Fidelis Network
Fidelis Network is a proactive network detection and response (NDR) solution that provides unmatched visibility, advanced threat detection, and faster response to cyber threats.
NTA
Nessus Professional
Nessus Professional
Nessus is the ultimate time saver for vulnerability scanning.
VM
Symantec DLP Cloud
Symantec DLP Cloud
Symantec DLP Cloud provides comprehensive cloud security.
DLP
Forcepoint Cloud Access Security Broker (CASB)
Forcepoint Cloud Access Security Broker (CASB)
Request Pricing Extend best-in-class data security to all your cloud applications.
DLP
Forcepoint ONE
Forcepoint ONE
Forcepoint ONE is an all-in-one cloud service that makes security simple for distributed businesses and government agencies that need to adapt quickly to changing remote and hybrid workforces.
UCSP
SolarWinds Observability Self-Hosted 
SolarWinds Observability Self-Hosted 
Visualize, observe, remediate, and automate your environment with a solution built to ensure availability and drive actionable insights.
Network Monitoring
SolarWinds Network Performance Monitor (NPM)
SolarWinds Network Performance Monitor (NPM)
Multi-vendor network monitoring built to scale and expand with the needs of your network.
Network Monitoring
Tenable One
Tenable One
Tenable One is an exposure management platform that combines risk-based vulnerability management, web application security, cloud security and identity security.
VM
Server Suite
Server Suite
Enforce just-in-time and just-enough privileges for Linux, Unix, and Windows servers and centrally manage policies from Active Directory.
PAM
Secret Server
Secret Server
Privileged Access Management software
PAM
Control and monitoring of privileged users
Technologies that allow you to track, monitor, and record all remote access sessions to your IT infrastructure.
12 solutions
PAM
Endpoint protection
Protect processes, business data, and confidential information stored or transmitted through devices connected to your network.
9 solutions
EndpointSec
Protection and control of information leakage
Technologies for preventing the leakage of confidential information from the information system to the outside, as well as technical devices for such leakage prevention.
5 solutions
DLP
Protection of web traffic
Web Security solutions provide effective protection of your corporate network from viruses and attacks.
2 solution
WebSec
Vulnerability management
Vulnerability Management solutions are software tools or systems that help identify, assess, and manage vulnerabilities in information systems to improve their security.
12 solutions
VM
About Oberig IT
About Oberig IT
Oberig IT is a distributor of effective cyber security solutions, IT development and optimisation solutions for businesses and organisations of all sizes.
For partners
For partners
Oberig IT provides its partners with a wide range of professional services and support at all stages of agreements. We have an individual approach to each partner and are always ready to help.
Contact us
Feedback from the speaker