Netwerkbeveiliging software

Gebruik Capterra in Nederland om de beste Netwerkbeveiliging software voor je bedrijf te vinden.

Waarom Capterra gratis is
DNS-gebaseerde webcontentfilter die malware, ransomware en phishing blokkeert en controle van webcontent biedt. De oplossing filtert meer dan een half miljard DNS-verzoeken per dag, identificeert elke dag 60.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter nu je netwerkbeveiliging. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan
Acunetix is marktleider in automatische beveiligingssoftware voor webtoepassingen. Het scant je website op kwetsbaarheden zoals SQL-injectie en XSS. De Acunetix Online-oplossing omvat gratis scannen van netwerkbeveiliging gedurende maximaal een jaar. Meer informatie over Acunetix Acunetix Online omvat gratis scannen van netwerkbeveiliging gedurende maximaal een jaar. Meer informatie over Acunetix
Perimeter 81 is de ultieme veilige netwerktoegangsdienst voor je organisatie. Zeg vaarwel tegen dure hardware, moeizame installaties en urenlange helpdeskondersteuning. Geef werknemers onmiddellijk veilige toegang tot essentiële bedrijfsmiddelen op basis van on-premise, op het web of in de cloud. Implementeer private VPN-servers met statische IP's binnen enkele seconden en verkrijg ongeëvenaarde netwerkzichtbaarheid met een complete beheerportal. Inclusief apps met één klik voor elk apparaat. Meer informatie over Perimeter 81 Een kosteneffectieve cloud-VPN met één klik die zorgt voor vereenvoudigde veilige netwerktoegang en SaaS-resourcetoegang voor bedrijven van elke omvang. Meer informatie over Perimeter 81
Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Meer informatie over Alert Logic Network Security Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Meer informatie over Alert Logic Network Security
NetFlow Analyzer maakt gebruik van flow-technologie om je netwerkbandbreedtegebruik te controleren en analyseren. Het helpt je om bandbreedtevertragingen en knelpunten te identificeren en te voorkomen met aangepaste rapporten, en om e-mail-/sms-waarschuwingen met grenswaarden in te stellen om de ernst van een probleem te begrijpen. Deze gebruiksvriendelijke analysetool detecteert, diagnosticeert en lost netwerkproblemen en zero-day-intrusies op in realtime, plant je toekomstige bandbreedtebehoefte op basis van het gebruikstrendpatroon en optimaliseert daarmee je bandbreedtegebruik. Meer informatie over NetFlow Analyzer Een op flows gebaseerde complete tool voor verkeersanalyse die een realistisch beeld geeft van je netwerkverkeeractiviteiten. Meer informatie over NetFlow Analyzer
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Meer informatie over Indeni Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology. Meer informatie over Indeni
Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Cloud Connectors for AWS, Google Cloud and Azure help you synchronise your systems, so no stone gets left unturned. Developer integrations with Slack and Jira make keeping up to date a breeze. Meer informatie over Intruder Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Meer informatie over Intruder
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. Meer informatie over DSRAZOR for Windows DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports. Meer informatie over DSRAZOR for Windows
Log360 is een geïntegreerde oplossing die ADAudit Plus en EventLog Analyzer combineert in een enkele console, en het vormt de alles-in-één oplossing voor al je logbeheer en alle uitdagingen op het gebied van netwerkbeveiliging. Het biedt realtime logverzameling, analyse, correlatie en archiveringsmogelijkheden die helpen om vertrouwelijke gegevens te beschermen, interne beveiligingsbedreigingen te blokkeren en externe aanvallen te bestrijden. Om te helpen voldoen aan de meest noodzakelijke beveiligings-, auditing- en naleving-eisen is het standaard voorzien van meer dan 1200 voorgedefinieerde rapporten en waarschuwingscriteria. Meer informatie over Log360 Log360, een uitgebreide SIEM-oplossing die beschermt tegen interne en externe beveiligingsaanvallen met mogelijkheden voor logbeheer. Meer informatie over Log360
Avast Business Antivirus Pro Plus 2019 is een alles-in-één pakket met krachtige bescherming van endpoint, e-mail, server en netwerk voor kleine en middelgrote bedrijven (met name geschikt voor bedrijven met 1 tot 500 werknemers). Werkt op pc's, Macs en Windows-servers. Het is verrijkt met 18 geavanceerde functies om je bedrijf volledig veilig te houden. Bevat krachtige antivirus-, server-, e-mail- en netwerkbeveiliging, CyberCapture, firewall, wachtwoordmanager, VPN en nog veel meer. Het kan zowel met als zonder cloudconsole worden gebruikt. Meer informatie over Avast Business Antivirus Pro Plus Bekroonde alles-in-één antivirusoplossing om elk onderdeel van je bedrijf te beschermen. Beschikbaar voor pc's, Macs en servers. Meer informatie over Avast Business Antivirus Pro Plus
EventLog Analyzer is een allesomvattende oplossing voor logbeheer met realtime detectie en analyse van dreigingen. Het correleert uiteenlopende gebeurtenissen die plaatsvinden binnen je netwerk en heeft ook een ingebouwd platform voor bedreigingsinformatie en incidentbeheer. Het biedt voorgedefinieerde auditrapporten om te helpen bij het volgen van activiteiten in databases, webservers, Windows-apparaten, netwerkperimeterapparaten en meer. Ook draagt het bij aan de naleving van voorschriften zoals de PCI DSS, SOX, HIPAA, FISMA en AVG. Meer informatie over EventLog Analyzer EventLog Analyzer is een allesomvattende oplossing voor logbeheer die meerdere beveiligingsmogelijkheden biedt in één verenigd platform. Meer informatie over EventLog Analyzer
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Meer informatie over Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Meer informatie over Horangi Web Security Services

door ManageEngine

(0 beoordelingen)
Firewall Analyzer is agentloze software voor loganalyse en configuratiebeheer, die logbestanden uit firewalls analyseert en realtime waarschuwingsmeldingen, beveiligings- en bandbreedterapporten genereert. De oplossing is leveranciersonafhankelijke software en ondersteunt meer dan 50 firewall-leveranciers. Het ondersteunt ook beheerders door uitgebreide rapporten over beveiligingsgebeurtenissen te creëren, zodat ze vervolgens stappen kunnen ondernemen om de beveiliging te verbeteren. Meer informatie over ManageEngine Firewall Analyzer Firewall Analyzer, software voor loganalyse en configuratiebeheer voor een volledig overzicht over de volledige netwerkbeveiliging. Meer informatie over ManageEngine Firewall Analyzer
SolarWinds Threat Monitor - Service Provider Edition is een snel, schaalbaar, cloudgebaseerd platform dat is gebouwd om beveiligingsgerichte Managed Service Providers (MSP's) een uniforme tool te bieden om beheerde netwerken te controleren op bedreigingen, en om logboeken te analyseren op basis van de nieuwste en meest actuele bedreigingsinformatie van over de hele wereld. Herstel snel de bedreigingen van je klant en bereid de informatie voor die nodig is om aan te tonen dat ze voldoen aan de normen die zijn vastgesteld door regelgevende instanties. Meer informatie over SolarWinds Threat Monitor SolarWinds® Threat Monitor is de tool die je nodig hebt om beveiligingsgebeurtenissen op te sporen, te verhelpen en te rapporteren voor al je beheerde netwerken. Meer informatie over SolarWinds Threat Monitor
Netsurion empowers organizations to successfully predict, prevent, detect, and respond to cybersecurity threats. Our SIEM platform, EventTracker, unifies machine learning, behavior analytics, and security orchestration, with recognition for 11 straight years on the Gartner MQ for SIEM. Our managed security service, EventTracker SIEMphonic, delivers a Co-Managed SIEM service driven by our 24/7 SOC. EventTracker EDR also protects critical endpoints from zero-day attacks and mutating malware. Meer informatie over EventTracker By providing SIEM, EDR and a 24/7 SOC, we quickly and efficiently deliver advanced threat protection and security orchestration. Meer informatie over EventTracker
PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren, de server kunt beschermen tegen ransomware-aanvallen en waarmee je kunt controleren wie er belangrijke bestanden leest, schrijft en verwijdert. Het kan ook zien wie er mappen verwijdert of verplaatst. Als de gebruiker het optionele File Sight-Endpoint heeft geïnstalleerd, kun je ook op de hoogte worden gesteld van het kopiëren van bestanden. Het gebruikersaccount en het bijbehorende IP-adres worden gerapporteerd. Meer informatie over PA File Sight PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren en de server kunt beschermen tegen ransomware-aanvallen. Meer informatie over PA File Sight

door Fox and Geese

(0 beoordelingen)
Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Meer informatie over Fluxguard Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Meer informatie over Fluxguard

door Fyde

(0 beoordelingen)
Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources for their employees, partners, contractors, and outsourcers. Meer informatie over Fyde Secure access to Internet and corporate resources with a single solution. Meer informatie over Fyde

door CloudSploit

(0 beoordelingen)
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Meer informatie over CloudSploit Geautomatiseerde AWS-beveiliging en configuratiebewaking om een veilige en compatibele cloudinfrastructuuromgeving te handhaven. Meer informatie over CloudSploit

door Skybox Security

(0 beoordelingen)
Skybox Network Assurance provides seamless visibility across physical IT, multi cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesnt exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Meer informatie over Network Assurance Visualize your attack surface across physical IT, multicloud and operational technology networks. Meer informatie over Network Assurance
Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform for assess certification, lifecycle and password management with workflow, & SSO. Each customer has their own private instance; maximizing security. With deep integrations to enterprise and cloud apps, our identity management solution automates IT administration tasks through self-service and workflow. Millions of customers trust Avatier to increase productivity, reduce cost and ensure security. Meer informatie over Avatier Identity Anywhere Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform. Meer informatie over Avatier Identity Anywhere
AVG Antivirus Business Edition 2018 beschermt de gegevens van je bedrijf en je klanten tegen actuele ransomware, virussen, malware en uitbraken in realtime. Het wordt aangedreven door nieuwe cloudgebaseerde functies zoals CyberCapture, verbeterde malwaredetectie en verbeterd webshield. Dit product bevat ook gratis beheer op afstand en geweldige rapportage. De gebruikersinterface van de client is ook bijgewerkt. Beschikbaar voor Windows-pc's, desktops en servers. AVG biedt klanten 24/7 gratis telefonische ondersteuning. Meer informatie over AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 beschermt de gegevens van je MKB-bedrijf en klanten in realtime tegen online bedreigingen. Meer informatie over AVG Antivirus Business Edition
Multi-vector bescherming tegen virussen en malware voor volledige bescherming tegen alle geavanceerde malwarebedreigingen van vandaag, waaronder Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day en geavanceerde aanhoudende bedreigingen. Ingebouwd Identity en Privacy Shield voorkomt dat gegevens worden gestolen of vastgelegd bij gebruik van internet, en de uitgaande firewall voorkomt dat gegevens worden gestolen door malware. Je hoeft je niet druk te maken om updates. Cloudgestuurde beveiliging betekent dat eindpunten altijd up-to-date zijn. Meer informatie over Webroot SecureAnywhere Endpoint Protection Multi-vector bescherming tegen virussen en malware, voor volledige bescherming tegen alle geavanceerde malware bedreigingen van vandaag. Meer informatie over Webroot SecureAnywhere Endpoint Protection
SecureLink is the leader in providing vendor privileged access and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLinks secure, purpose-built platform. SecureLink is headquartered in Austin, Texas. Meer informatie over SecureLink SecureLink is the leader in vendor privileged access management for highly regulated enterprise organizations and technology vendors. Meer informatie over SecureLink
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Meer informatie over Nessus Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Meer informatie over Nessus
OneLogin is ontworpen voor bedrijven met meer dan 100 gebruikers en levert een cloudgebaseerde oplossing voor identiteits- en toegangsbeheer (IAM) die eenvoudige single sign-on (SSO) biedt, waardoor bedrijven moeiteloos toegang tot webapplicaties kunnen beveiligen en beheren, zowel in de cloud als achter de firewall. Heeft je bedrijf drie of meer SaaS of interne web-apps? Zo ja, dan kun je profiteren van de beveiliging van OneLogins cloudgebaseerde single sign-on oplossing. Meer informatie over OneLogin Oplossing voor identiteitsbeheer (IAM) en Single Sign-On (SSO) voor bedrijven van elke omvang. Ga direct aan de slag met de gratis proefversie. Meer informatie over OneLogin
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Meer informatie over GlassWire GlassWire is a modern network monitor & security tool with a built in firewall. Meer informatie over GlassWire
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Meer informatie over Security Event Manager Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance. Meer informatie over Security Event Manager
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Meer informatie over CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Meer informatie over CyberGRX
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money. Centralized policy management with scalable, cross-platform virus protection on an enterprise-wide basis.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Multi-layered defense delivering smart endpoint protection through AI-powered technology. Multi-layered defense delivering smart endpoint protection through AI-powered technology.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now. Real-time monitoring, email alerts, monitor multiple devices in one dashboard, easy-to-use for Windows and Linux servers & switches.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.
CrashPlan for Small Business provides peace of mind through easy-to-use, unlimited automatic data backup and recovery. We help small businesses and organizations recover and bounce back faster from any worst-case scenario, whether it is a disaster, simple human error, a stolen laptop, ransomware and more. Our data security solution is a product of Code42, an industry leader protecting the critical data of more than 47,000 world-class organizations, including the largest global brands. Easy, affordable, unlimited cloud backup for businesses with up to 200 employees.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering. File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering.
Kaseya VSA is built to solve the problems that mean the most to you - delivering better service and improving your teams efficiency. Perform assessment, risk analysis, and network scanning. Configure and deploy AV/AM across your entire network. Drive scale and consistency through policy-based automation. Leverage unprecedented access to your documentation at the very moment you need it most. Manage patches, and proactively resolve issues across your complete environment with the push of a button Deliver better service and improve your team's efficiency - manage and automate all of IT to improve your network security with Kaseya.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products. Remote systems management for desktops, servers, and mobile laptops.
Software that lets you search and analyze all your IT infrastructure data from a single location in real time. Software that lets you search and analyze all your IT infrastructure data from a single location in real time.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications. OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities enterprise management
Monitoring is a powerful tool that can unlock new pathways to growth. At LogicMonitor, we expand whats possible for businesses by advancing the technology behind them. We seamlessly monitor infrastructures, empowering companies to focus less on problem solving and more on evolution. We turn on a complete view in minutes, turn the dial from maintenance to innovation and turn the corner from sight to vision. Join us in shaping the information revolution. LogicMonitors unified monitoring platform expands possibilities for businesses by advancing the technology behind them
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.
Purevpn leads the cyber security industry with a self-managed constellation of 300,000+ IPs, 2,000+ servers in 180+ locations and a 31-day money-back guarantee. PureVPN offers seamless accessibility to content while ensuring users' complete online anonymity. Hong Kong based GZ Systems experimented with a VPN in 2006 and that was the beginning of a revolutionary VPN - PureVPN
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware. Multi-dimensional scanning and process interrogation technology that detects and removes spyware.
Webroot SecureAnywhere DNS Protection offers a straightforward, effective way to prevent everyday web usage from becoming a major security risk. The intuitive web-based console enables admins to finely tune web access policies by IP and limit access to other potentially risky websites. Webroot offers over 82 URL categories for admins to tailor their usage policies to their organization's needs. DNS Protection prevents internet abuse, web-borne malware threats while enforcing employee content and web access policies.
RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end. RMail is an all-in-one service extension for powerful email, offering email encryption, e-delivery proof, e-signatures and more.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up. REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.
Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL. With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.
THE WORLD'S MOST ADVANCED AD BLOCKER! Get rid of intrusive ads and online tracking, and protect your devices from malware. *AdGuard will deal with annoying banners, pop-ups and video ads once and for all. *AdGuard hides your data from the multitude of trackers and activity analyzers that swarm the web. *Thanks to AdGuard, you will be able to avoid all fraudulent and phishing websites and malware attacks. Available for Windows, Mac, Android, iOS (on App Store). AdGuard is the best way to get rid of intrusive ads and online tracking, and to protect your computer from malware.
Protects your office computer against viruses, spyware, worms, and Trojans. Protects your office computer against viruses, spyware, worms, and Trojans.
Consolidate data. Identify risks. Automate security compliance reporting. Consolidate data. Identify risks. Automate security compliance reporting.
eTrust Antivirus is CA's award-winning antivirus solution, providing superior protection against today's most prevalent security threat - viruses. eTrust Antivirus reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices. Extensive features include multiple scanning engine support, realtime detection with system cure, unmatched manageability, and centralized event logging and alerting. Reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices.
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox. Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring.
An ITO solution that offers DNS traffic management with integrated network monitoring services. An ITO solution that offers DNS traffic management with integrated network monitoring services.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist. Block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries. My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits. Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently. Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology & delivered it as easy-to-deploy and easy-to-manage solutions. With advanced network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables small and midsize enterprises from around the globe to protect their business. As the cyber security landscape is constantly evolving, and new threats emerge each day, WatchGuard solutions keep you secure. WatchGuard offers advanced network security, secure Wi-Fi, and multi-factor authentication to protect small and midsize businesses.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe. Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.
Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most. RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.
Setup a self hosted Jump server (also called Bastion Host or Jump host) quickly to manage SSH access to your Linux servers, AWS instances or other cloud services. Our jumpbox software has features like 2 factor authentication, SAML Authentication, SSH session recording,Identity and Access management (IAM), RBAC, Privileged Access management (PAM),SSH key rotation, root password management, and much more. It would help you meet security compliances such as PCI,NIST,ISO 27001 and more. Setup your SSH Jump Server, Bastion Host in 30 minutes. Setup centralized access to your Linux hosts and meet security compliances.
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications. A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively. We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.
Forrester Research has ranked ShieldSquare as a Leader in their New Wave: Bot Management Report for Q3 2018. ShieldSquare offers a non-intrusive API-based solution to detect and eliminate bad bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages intent-based deep behavior analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. ShieldSquare protects online businesses from web scraping, account takeover, carding, content theft and other forms of bot abuse.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc. Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options. Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Developed in 2001, Securence was the 1st cloud based email filtering solution on the market featuring game changing signature based detection. Zero minute detection methods are deployed to counter malware campaigns faster and more accurately than any other solution. Securence is known for the best admin interface, overall effectiveness and lowest pricing on the market. 10 year email archiving, encrypted sending, continuity DR, all optimized to enhance on-prem hosted email, O365 and Gmail. A simple switch of your MX records will demonstrate why Securence is the secret weapon in email filtering, security and archiving.
Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees. Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.
Blocks phishing & malware attacks by giving you a fast new way to log in. Blocks phishing & malware attacks by giving you a fast new way to log in.
Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.
Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments. Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads.
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more. Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.
Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs. Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system based on machine learning and probabilistic mathematics.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.

door Check Point Software Technologies

(3 beoordelingen)
Firewall that provides access control, content security, authentication and centralized management. Firewall that provides access control, content security, authentication and centralized management.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
This software helps to prevent data leaks and protect your information wherever it is or what form its in. This software helps to prevent data leaks and protect your information wherever it is or what form its in.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies. Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure. Web based solution designed to protect your website and content from bad bots.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money. Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.
Cyber-security tool that protects businesses-critical data and applications through evaluation and elimination of emerging threats. Cyber-security tool that protects businesses-critical data and applications through evaluation and elimination of emerging threats.
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection. Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.
No Annoying Pop-up Ads! The best VPN to Enjoy Private, Secure surfing experience.Lightning fast connection.Easy to download and use across your devices.All you have to do is to tap the Connect button then you are protected. Unblock All Websites And Apps Change IP as you want Secure Your Internet Activity And WiFi Connection. Come to experience the real Trustworthy VPN service by the independent developer team!X-VPN Is Definitely Your Online Bodyguards! The best choice to unblock sites, protect online privacy and surf anonymously with no annoying pop-up ads!
Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware. Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware.
CertHat Tools for Microsoft PKI provides you with a web based tools for PKI management. It is easy to install and can manage all of your AD CS servers but can also import external certificates. With CertHat you will be able to track all your certificates and create alerts before they expire. CertHat help you to increase productivity and dramatically reduce the risk of system or business incidents due to expired certificate CertHat provides tools for managing and monitoring digital certificates from Microsoft AD CS but also mother/external PKI sources
OnDMARC is een product van Red Sift. Red Sift is een open cloudplatform dat cybersecurity toegankelijk maakt voor iedereen om cyberaanvallen te voorkomen. OnDMARC maakt het implementeren en onderhouden van een veilig DMARC-beleid eenvoudig. OnDMARC verwerkt niet alleen complexe XML-rapporten, maar gebruikt de nieuwste technologie om je te begeleiden naar volledige bescherming. OnDMARC is een e-mailbeveiligingsproduct dat organisaties van elke omvang helpt om DMARC met vertrouwen te gebruiken.
Sophos XG Firewall provides comprehensive next-generation firewall protection that is easy to manage and top rated at stopping the latest unknown threats. XG Firewall offers unmatched insights by exposing hidden user, application, and threat risks on your network and is unique in its ability to automatically responding to security incidents by isolating compromised systems with Synchronized Security. Sophos XG Firewall provides next-generation firewall protection that blocks threats, automatically responds, and exposes hidden risks.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier. Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate. An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.
It defines and manages organization wide security policy, provides embedded enterprise data security and more. It defines and manages organization wide security policy, provides embedded enterprise data security and more.
Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management. Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP. The result is a significant decrease in errors and the sheer amount of tasks required to keep networks available, flexible and secure. The real-time visibility and control you need for your network while reducing expenses and increasing availability.
The beSECURE (AVDS) family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. beSECURE (AVDS) is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Automated network Vulnerability Assessment and Management. Eliminate time consuming false positives and scan 50-500,000 IPs.
Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features. Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Blesk is a suite of applications for network monitoring and management. It is comprised of a mix of open source and proprietary tools that come pre-installed and configured on an optimized 64-bit version of CentOS Linux. Blesk integrates many popular tools including Nagios, Snort, Ntop, Cacti, Elasticsearch, Rancid, Netdisco, and GLPI. Each of these have been streamlined for optimal performance, and all run harmoniously on a single server. A suite of applications for network monitoring and management. Monitor availability, security, event logs, bandwidth consumption, etc.
Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites. VPN Plus Tor
Modular cloud security system designed to provide security framework for any devices. Modular cloud security system designed to provide security framework for any devices.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Protects mail servers and users from unwanted and malicious e-mail. Protects mail servers and users from unwanted and malicious e-mail.
Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance. Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.
Network security solution that validates the source of each session, detects malware, and generates incident reports. Network security solution that validates the source of each session, detects malware, and generates incident reports.
The HPE Intelligent Management Center Standard Software Platform and Enterprise platform are comprehensive wired and wireless network management tools supporting the FCAPS (Fault, Configuration, Accounting, Performance, Security) model, providing for end-to-end business management of IT, scalability of system architecture, and accommodation of new technology and infrastructure. Comprehensive wired and wireless network management tools supporting the FCAPS model.
A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content. A cloud service for internet security & content filtering for businesses of any size to secure corporate networks, manage web access
Anti-ransomware software that helps protect computers and networks against present and future ransomware of any type. Anti-ransomware software that helps protect computers and networks against present and future ransomware of any type.
Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring. Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring.
Provides companies with auditing, monitoring, compliance and prevention solutions for IBM i servers. Provides companies with auditing, monitoring, compliance and prevention solutions for IBM i servers.
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor de cloud (AWS); detecteren en waarschuwen over inbraken en verdachte activiteiten; controle van uitgaand verkeer en detectie van gegevenslekken; toegangscontrole en uitgebreide analyse van IP-adressen voor onderzoek van incidenten; bijhouden van aangepaste gebeurtenissen die met name belangrijk zijn voor je online bedrijf. Dhound is een tool voor beveiligingscontrole en inbraakdetectie voor op het internet gerichte servers, clouds en webtoepassingen.
{mono}sign is beyond an Identity & Access Management solution, it's positioned in the center of IT security. {mono}sign is the art of giving the right authority to right people at the right time.
Trend Micro goes beyond next-gen IPS to address the evolving requirements of the most demanding data centers and enterprise networks without sacrificing security or performance. With purpose-built hardware, centralized management, and industry-leading threat intelligence, we provide a smart, optimized, and connected network security solution that integrates across all types of environments. Go beyond next-gen IPS without compromising security or performance.

door Faydata Information Technologies

(1 review)
Cloud-based web application firewall that provides protection against SQL Injection, XSS, CSRF, RCE, RFI/LFI and other vulnerabilites. Cloud-based web application firewall that provides protection against SQL Injection, XSS, CSRF, RCE, RFI/LFI and other vulnerabilites.

door NetIQ

(0 beoordelingen)
Provides an advanced, central security console for real-time security event monitoring and automated response, host-based intrusion detection, event log consolidation, and security configuration management. Provides an advanced, central security console for real-time security event monitoring and automated response.

door Cyber Operations

(0 beoordelingen)
Centrally managing thousands of router ACLs from a single software application. Centrally managing thousands of router ACLs from a single software application.

door DESlock

(0 beoordelingen)
Protects your data transparently with fast file, folder and email encryption and used to encrypt any data. Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.

door Inner Media

(0 beoordelingen)
Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption. Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.

door FreeStone Software

(0 beoordelingen)
NETWORK SECURITY, FILTERING AND OPTIMIZATION.. Solutions for Visibility, Control and Performance.. Email virus protection, spam and Server-based website content filtering.

door Security Group Six

(0 beoordelingen)
Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents. Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.

door Definitive Data Security

(0 beoordelingen)
SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training. SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.

door DeviceLock

(0 beoordelingen)
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

door PCSecurityShield

(0 beoordelingen)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data. An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data.

door BAxBEx Software

(0 beoordelingen)
A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely. A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely.

door InfoExpress

(0 beoordelingen)
On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints. On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints.

door Logmatrix

(0 beoordelingen)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.

door CrypKey

(0 beoordelingen)
E-commerce solution that provides the ultimate in automated integrated software protection. E-commerce solution that provides the ultimate in automated integrated software protection.

door Cypherix

(0 beoordelingen)
Corporate network security solution that provides for a network wide encryption based security implementation. Corporate network security solution that provides for a network wide encryption based security implementation.

door Wavecrest Computing

(0 beoordelingen)
CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team. Web-use filtering and monitoring in a powerful proxy server. Covers 500 million Web pages with 80 blocking categories.

door Burstek

(0 beoordelingen)
Eliminate risk and regain control with enterprise solutions for Web and email filtering. Eliminate risk and regain control with enterprise solutions for Web and email filtering.

door ClearMyMail

(0 beoordelingen)
Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer. Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.

door Infiltration Systems

(0 beoordelingen)
Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations. Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations.

door Max Secure Software

(0 beoordelingen)
Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience. Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.

door PureSight Technologies

(0 beoordelingen)
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

door Netmon

(0 beoordelingen)
Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses. Comprehensive network monitoring appliance. Monitor network traffic, devices, and services. Integrated alert system.

door SafenSoft

(0 beoordelingen)
Intrusion prevention system that blocks spyware, new viruses and other malware. Intrusion prevention system that blocks spyware, new viruses and other malware.