Computer Security Software
Computer Security software automates the security and monitoring of computer systems. These applications scan and monitor an organization's computer network to evaluate potential vulnerabilities. Additionally, Computer Security solutions provide customizable network security solutions as well as those preconfigured for a variety of regulatory standards. Computer Security software provides for real-time reporting on network security as well as incident reports for potential security breaches. Computer Security software is related to Network Security software.
- Cloud, SaaS, Web (91)
- Geïnstalleerd - Mac (49)
- Geïnstalleerd - Windows (104)
- Mobiel - Android native (26)
- Mobiel - iOS native (22)
- Antivirus (47)
- Audittrail (49)
- Beheer van webdreigingen (23)
- Bescherming van kwetsbaarheden (57)
- Beveiliging van financiële gegevens (37)
- Beveiligingsgebeurtenissen registreren (54)
- Compliancebeheer (68)
- Controle van databasebeveiliging (30)
- Realtime controle (75)
- Toegangsbeheer voor bestanden (45)
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Meer informatie over Veriato RansomSafe Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. Meer informatie over Veriato RansomSafe
Netsparker Security Scanner is een accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Met de unieke scanning-technologie op basis van bewijs van Netsparker kun je meer tijd besteden aan het verhelpen van de gemelde fouten door de geïdentificeerde kwetsbaarheden automatisch op een "alleen-lezen" en veilige manier te bekijken. De software produceert ook een bewijs van exploitatie. Daarom kun je meteen de impact van kwetsbaarheid zien en hoef je het niet handmatig te verifiëren. Meer informatie over Netsparker Security Scanner Accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Meer informatie over Netsparker Security Scanner
Avast Business Antivirus Pro Plus 2019 is een alles-in-één pakket met krachtige bescherming van endpoint, e-mail, server en netwerk voor kleine en middelgrote bedrijven (met name geschikt voor bedrijven met 1 tot 500 werknemers). Werkt op pc's, Macs en Windows-servers. Het is verrijkt met 18 geavanceerde functies om je bedrijf volledig veilig te houden. Bevat krachtige antivirus-, server-, e-mail- en netwerkbeveiliging, CyberCapture, firewall, wachtwoordmanager, VPN en nog veel meer. Het kan zowel met als zonder cloudconsole worden gebruikt. Meer informatie over Avast Business Antivirus Pro Plus Bekroonde alles-in-één antivirusoplossing om elk onderdeel van je bedrijf te beschermen. Beschikbaar voor pc's, Macs en servers. Meer informatie over Avast Business Antivirus Pro Plus
Met WipeDrive kunnen bedrijven, overheidsinstanties en particulieren permanent en veilig gegevens wissen van harde schijven, verwijderbare media en mobiele apparaten. Dit product biedt een kosteneffectieve, veilige en sociaal verantwoorde manier om computers en computeropslag te recyclen en buiten gebruik te stellen. WipeDrive is de wereldleider in beveiligde gegevensvernietiging. Meer informatie over WipeDrive Dit bedrijf biedt een kosteneffectieve, veilige en sociaal verantwoorde manier om IT-middelen, computers en computeropslag te recyclen en buiten gebruik te stellen. Meer informatie over WipeDrive
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. Meer informatie over LanScope Cat A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data. Meer informatie over LanScope Cat
Multi-vector bescherming tegen virussen en malware voor volledige bescherming tegen alle geavanceerde malwarebedreigingen van vandaag, waaronder Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day en geavanceerde aanhoudende bedreigingen. Ingebouwd Identity en Privacy Shield voorkomt dat gegevens worden gestolen of vastgelegd bij gebruik van internet, en de uitgaande firewall voorkomt dat gegevens worden gestolen door malware. Je hoeft je niet druk te maken om updates. Cloudgestuurde beveiliging betekent dat eindpunten altijd up-to-date zijn. Meer informatie over Webroot SecureAnywhere Endpoint Protection Multi-vector bescherming tegen virussen en malware, voor volledige bescherming tegen alle geavanceerde malware bedreigingen van vandaag. Meer informatie over Webroot SecureAnywhere Endpoint Protection
ManageEngine ADAudit Plus is een oplossing voor IT-beveiliging en naleving. Met meer dan 200 rapporten en realtime waarschuwingen biedt het kennis over wijzigingen die zijn aangebracht in de content en configuratie van Active Directory, Azure AD en Windows-servers. Daarnaast geeft het inzicht in de toegang tot werkstations en bestandsservers (inclusief NetApp en EMC). ADAudit Plus helpt je bij het bijhouden van aan- en -afmeldingen van gebruikers; het analyseren van accountvergrendelingen; het controleren van ADFS, ADLDS en printers; het doorsturen van logs naar SIEM-tools en nog veel meer. Meer informatie over ADAudit Plus ADAudit Plus is een Active Directory, Azure AD, bestandsserver (inclusief NetApp en EMC) en software voor het bewaken van werkstationwijzigingen. Meer informatie over ADAudit Plus
PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren, de server kunt beschermen tegen ransomware-aanvallen en waarmee je kunt controleren wie er belangrijke bestanden leest, schrijft en verwijdert. Het kan ook zien wie er mappen verwijdert of verplaatst. Als de gebruiker het optionele File Sight-Endpoint heeft geïnstalleerd, kun je ook op de hoogte worden gesteld van het kopiëren van bestanden. Het gebruikersaccount en het bijbehorende IP-adres worden gerapporteerd. Meer informatie over PA File Sight PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren en de server kunt beschermen tegen ransomware-aanvallen. Meer informatie over PA File Sight
Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources for their employees, partners, contractors, and outsourcers. Meer informatie over Fyde Secure access to Internet and corporate resources with a single solution. Meer informatie over Fyde
DNS-gebaseerde webcontentfilter die malware, ransomware en phishing blokkeert en controle van webcontent biedt. De oplossing filtert meer dan een half miljard DNS-verzoeken per dag, identificeert elke dag 60.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter nu je netwerk- en computerbeveiliging. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan
EventLog Analyzer is een allesomvattende oplossing voor logbeheer met realtime detectie en analyse van dreigingen. Het correleert uiteenlopende gebeurtenissen die plaatsvinden binnen je netwerk en heeft ook een ingebouwd platform voor bedreigingsinformatie en incidentbeheer. Het biedt voorgedefinieerde auditrapporten om te helpen bij het volgen van activiteiten in databases, webservers, Windows-apparaten, netwerkperimeterapparaten en meer. Ook draagt het bij aan de naleving van voorschriften zoals de PCI DSS, SOX, HIPAA, FISMA en AVG. Meer informatie over EventLog Analyzer EventLog Analyzer is een allesomvattende oplossing voor logbeheer die meerdere beveiligingsmogelijkheden biedt in één verenigd platform. Meer informatie over EventLog Analyzer
Cloud Management Suite is een cloudgebaseerde oplossing voor IT-management en beveiliging waarmee IT-afdelingen onmiddellijk kunnen reageren op beveiligingsincidenten. Of het nu gaat om een ransomware-aanval of het ondersteunen van gebruikers op elk moment, met Cloud Management Suite Realtime Security kun je je omgeving gemakkelijk beheren, patchen en herstellen. Meer informatie over Realtime Security Stop inbreuken in realtime en herstel kwetsbaarheden allemaal vanuit één console. Ontvang live gegevens van duizenden apparaten binnen 10 seconden. Meer informatie over Realtime Security
Let's face it, passwords aren't going anywhere for a while, and as an MSP you've got a LOT of them! If we can be frank, it's time our industry retired password spreadsheets. This is why Passportal introduced Ocular as a Password Management solution tailor built for the way an IT Service Provider operates their business. We have created a world where passwords change themselves, related configurations update automatically, and techs need to know fewer and fewer passwords to do their jobs Meer informatie over Solarwinds Passportal Providing technicians rapid access to the privileged information and knowledge they need to effectively support clients Meer informatie over Solarwinds Passportal
AVG Antivirus Business Edition 2018 beschermt de gegevens van je bedrijf en je klanten tegen actuele ransomware, virussen, malware en uitbraken in realtime. Het wordt aangedreven door nieuwe cloudgebaseerde functies zoals CyberCapture, verbeterde malwaredetectie en verbeterd webshield. Dit product bevat ook gratis beheer op afstand en geweldige rapportage. De gebruikersinterface van de client is ook bijgewerkt. Beschikbaar voor Windows-pc's, desktops en servers. AVG biedt klanten 24/7 gratis telefonische ondersteuning. Meer informatie over AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 beschermt de gegevens van je MKB-bedrijf en klanten in realtime tegen online bedreigingen. Meer informatie over AVG Antivirus Business Edition
Teramind biedt een gebruikersgerichte beveiligingsaanpak om het pc-gedrag van werknemers te controleren. Deze software stroomlijnt het verzamelen van werknemersgegevens om verdachte activiteiten te identificeren, mogelijke dreigingen te detecteren, de efficiëntie van medewerkers te controleren en naleving van de regelgeving te waarborgen. Dit product helpt beveiligingsincidenten te verminderen door realtime toegang te bieden tot gebruikersactiviteiten met alarmmeldingen, waarschuwingen, omleidingen en blokkeringen van gebruikers, zodat jij je bedrijf zo efficiënt en veilig mogelijk kan laten draaien. Meer informatie over Teramind Probeer de gratis proefversie om te zien waar iedereen zo enthousiast over is. Het volgen van gebruikersactiviteiten en preventie van gegevensdiefstal gemakkelijk gemaakt met Teramind. Meer informatie over Teramind
OneLogin is ontworpen voor bedrijven met meer dan 100 gebruikers en levert een cloudgebaseerde oplossing voor identiteits- en toegangsbeheer (IAM) die eenvoudige single sign-on (SSO) biedt, waardoor bedrijven moeiteloos toegang tot webapplicaties kunnen beveiligen en beheren, zowel in de cloud als achter de firewall. Heeft je bedrijf drie of meer SaaS of interne web-apps? Zo ja, dan kun je profiteren van de beveiliging van OneLogins cloudgebaseerde single sign-on oplossing. Meer informatie over OneLogin Oplossing voor identiteitsbeheer (IAM) en Single Sign-On (SSO) voor bedrijven van elke omvang. Ga direct aan de slag met de gratis proefversie. Meer informatie over OneLogin
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Meer informatie over GlassWire GlassWire is a modern network monitor & security tool with a built in firewall. Meer informatie over GlassWire
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Meer informatie over EventSentry Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring. Meer informatie over EventSentry
Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. Meer informatie over Passworks Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. Meer informatie over Passworks
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Meer informatie over DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Meer informatie over DriveStrike
strongDM works out of the box with any database or server in any environment. strongDM easily integrates with any identity provider, log aggregator, and change management system to onboard, offboard, and audit staff's access to databases and servers. Meer informatie over strongDM Companies like Hearst, SoFi, and Peloton rely on strongDM to secure staff's access to databases and servers. Meer informatie over strongDM
Malware security tool that helps protect personal and private files through hacker attacks protection and payment security. Malware security tool that helps protect personal and private files through hacker attacks protection and payment security.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online. Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Certain software owns comprehensive disk partition management functions such as Merge Partition, Move/Resize Partition, Copy Partition, Create Partition, Split Partition, Delete Partition, Format Partition, and Convert File System. MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications. On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more. Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Hushmail is a secure email and web form service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and an iPhone app, there's no complicated installation process. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance and include the required BAA and an archive account. A secure email and web form service that lets you send and receive private, encrypted emails, attachments and web form submissions.
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules. Secure password management, end-user dashboards and SSO to thousands of cloud applications!
Probely finds vulnerabilities or security issues in web applications and provides guidance on how to fix them. Probely was built having developers in mind. Despite its sleek and intuitive web interface, Probely follows an API-First development approach, providing all features through an API. Get Secure! Cloud-based tool that helps manage vulnerabilities and security issues in web applications and provides guidance on how to fix them.
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM
Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Enables secure system administration, secure file transfer and secure application connectivity with centralized control.
Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network. On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring. Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Bodi is a complete end-point security platform encompassing... Phishing prevention- prevents users from accidentally clicking on malicious links Insider threat detection stop data theft with real time alerts based on defined rules Usage analysis detailed analysis of app usage, web browsing, printing, activity Forensic evidence full recording and keyword search for detailed investigations Remediation full remote control capabilities to correct device related issues Integrate- API Support Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements.
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor de cloud (AWS); detecteren en waarschuwen over inbraken en verdachte activiteiten; controle van uitgaand verkeer en detectie van gegevenslekken; toegangscontrole en uitgebreide analyse van IP-adressen voor onderzoek van incidenten; bijhouden van aangepaste gebeurtenissen die met name belangrijk zijn voor je online bedrijf. Dhound is een tool voor beveiligingscontrole en inbraakdetectie voor op het internet gerichte servers, clouds en webtoepassingen.
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.
Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.
Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.
On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web. On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web.
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
Network security audit system designed to audit network and detect available security vulnerabilities in the network. Network security audit system designed to audit network and detect available security vulnerabilities in the network.
On demand biometric security solution for any type of internet application requiring security of confidential information. On demand biometric security solution for any type of internet application requiring security of confidential information.
ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI. Comprehensive computer security incident management system.
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.
Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity. Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.
Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Solution that automatically locks the system without requiring any keystrokes from the user.
Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.
Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.
Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software. Secures the Windows Operating System from unwanted or malicious writes.
Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.
Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network. Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.
Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.
Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.
Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.
Specops Password Sync simplifies password management for users by allowing them to use one password across multiple systems- including on-premises and SaaS targets. Specops Password Sync instantly synchronizes Active Directory passwords to other systems, which ensures complexity is applied to all business systems. Fights password fatigue by reducing number of passwords to remember
Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.
The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, the Clearswift SEG incorporates the latest in inbound threat protection (Sophos and/or Kaspersky AV), a multi-layer spam defence mechanism, multiple encryption options, deep content inspection control on size and types of attachments and Adaptive Redaction features The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss
Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica. Now NexVue makes 2FA available for Acumatica.
A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.
AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage for all important and business critical information. AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Any other programs - whether they are unwanted, unlicensed, or simply unnecessary - are blocked from ever executing. Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server.
We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.
Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables you to securely share sensitive information through a one-time use link.
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. On-premise solution that provides real-time protection of user data from malware and phishing attacks
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.
A computer security solution that limits incorrect employee access privileges and responds to malicious activity. A computer security solution that limits incorrect employee access privileges and responds to malicious activity.
GridinSoft Anti-Malware targets all kinds of threats on your Windows PC including malware, adware and PUPs. Cure your computer & keep your privacy safe! Defeat viruses within few clicks instead of long-lasting and really boring manual procedures and get the help of security experts whenever you need it. A network security solution to clean system of viruses, help restore computer performance, and more.
In a simple and fast way, send your sensible data with full confidentiality. With the BlueFiles virtual printer, send an encrypted copy of your native files with permanent control over printing, download, access period, recipients, even after dispatch, or simply right click on your original files or folders to transfer them. BlueFiles ensures the highest degree of confidentiality until reception of your data with a simple and user-friendly interface. In a simple and fast way, send you sensible data with full confidentiality
It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm. BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cloud & on-premise tool that helps manage file transfer across servers with multi-layer security, collaboration & automation.
The first security product designed to meet the challenges of securing & managing unstructured data in a zero-trust word. Unlike existing technologies, SecureCircle provides a transparent solution which is always encrypted, trackable, and retractable. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. Tool that helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure. Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points
SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.
Automatic driver detection: - Schedule the analysis of your drivers - Have Notifications for the new drivers Download: - Download and automatically install from a database of more than 600.000 drivers Backup: - Have a complete history of your drivers - Save your PC drivers - Choose a download location for your drivers - Clone your drivers in an auto-installation file Cleaning and optimisation: - Uninstall the unwanted drivers: - Identify the devices which are not working Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.
RollBack Rx is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses or even botched software installations can be easily and absolutely reversed in a fast and efficient way. A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.
VMRay Analyzer is an automated malware analysis and detection product with a revolutionary agentless, hypervisor-centric dynamic analysis engine at its core. Combined with rapid static analysis and reputation engines, it enables malware analysts and incident response professionals to monitor, analyze and identify threats and extract indicators of compromise (IOCs). VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.
The R&SWeb Application Firewall is the holistic security suite for web applications, web services and APIs. The R&SWeb Application Firewall plays an important role in setting up and implementing an application security strategy. It blocks application-level attacks, including the OWASP Top 10, monitors the use of Web applications to guard against insider threats, is highly scalable and available for local deployment as well as cloud environments. R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP
DataSecurity Plus is a data visibility and security solution that offers data discovery, le storage analysis, and real-time Windows le server auditing, alerting & reporting. Furthermore, it monitors le integrity; streamlines compliance requirements; generates instant, user-dened email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.