Network Security Software

Network Security software prevents unauthorized access to a computer network. Organizations use these applications to prevent unauthorized, malicious or inadvertent intrusions into or usage of secure systems. Network Security solutions are designed to recognize legitimate traffic over today's complex enterprise networks and isolate abnormal events for further investigation as well as to perform key security audit and regulatory compliance functions. Features can include anti-spam, anti-virus, and intrusion detection. Network Security software is related to Computer Security software and Network Monitoring software.

Waarom Capterra gratis is

door Indeni

(12 beoordelingen)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Meer informatie over Indeni Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology. Meer informatie over Indeni

door Acunetix

(30 beoordelingen)
Acunetix is marktleider in automatische beveiligingssoftware voor webtoepassingen. Het scant je website op kwetsbaarheden zoals SQL-injectie en XSS. De Acunetix Online-oplossing omvat gratis scannen van netwerkbeveiliging gedurende maximaal een jaar. Meer informatie over Acunetix Acunetix Online omvat gratis scannen van netwerkbeveiliging gedurende maximaal een jaar. Meer informatie over Acunetix

door Safer Social

(5 beoordelingen)
Perimeter 81 is de ultieme veilige netwerktoegangsdienst voor je organisatie. Zeg vaarwel tegen dure hardware, moeizame installaties en urenlange helpdeskondersteuning. Geef werknemers onmiddellijk veilige toegang tot essentiële bedrijfsmiddelen op basis van on-premise, op het web of in de cloud. Implementeer private VPN-servers met statische IP's binnen enkele seconden en verkrijg ongeëvenaarde netwerkzichtbaarheid met een complete beheerportal. Inclusief apps met één klik voor elk apparaat. Meer informatie over Perimeter 81 Een kosteneffectieve cloud-VPN met één klik die zorgt voor vereenvoudigde veilige netwerktoegang en SaaS-resourcetoegang voor bedrijven van elke omvang. Meer informatie over Perimeter 81
Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Meer informatie over Alert Logic Network Security Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Meer informatie over Alert Logic Network Security
SolarWinds Threat Monitor - Service Provider Edition is een snel, schaalbaar, cloudgebaseerd platform dat is gebouwd om beveiligingsgerichte Managed Service Providers (MSP's) een uniforme tool te bieden om beheerde netwerken te controleren op bedreigingen, en om logboeken te analyseren op basis van de nieuwste en meest actuele bedreigingsinformatie van over de hele wereld. Herstel snel de bedreigingen van je klant en bereid de informatie voor die nodig is om aan te tonen dat ze voldoen aan de normen die zijn vastgesteld door regelgevende instanties. Meer informatie over SolarWinds Threat Monitor SolarWinds® Threat Monitor is de tool die je nodig hebt om beveiligingsgebeurtenissen op te sporen, te verhelpen en te rapporteren voor al je beheerde netwerken. Meer informatie over SolarWinds Threat Monitor

door ManageEngine

(5 beoordelingen)
NetFlow Analyzer maakt gebruik van flow-technologie om je netwerkbandbreedtegebruik te controleren en analyseren. Het helpt je om bandbreedtevertragingen en knelpunten te identificeren en te voorkomen met aangepaste rapporten, en om e-mail-/sms-waarschuwingen met grenswaarden in te stellen om de ernst van een probleem te begrijpen. Deze gebruiksvriendelijke analysetool detecteert, diagnosticeert en lost netwerkproblemen en zero-day-intrusies op in realtime, plant je toekomstige bandbreedtebehoefte op basis van het gebruikstrendpatroon en optimaliseert daarmee je bandbreedtegebruik. Meer informatie over NetFlow Analyzer Een op flows gebaseerde complete tool voor verkeersanalyse die een realistisch beeld geeft van je netwerkverkeeractiviteiten. Meer informatie over NetFlow Analyzer

door Intruder

(0 beoordelingen)
Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Cloud Connectors for AWS, Google Cloud and Azure help you synchronise your systems, so no stone gets left unturned. Developer integrations with Slack and Jira make keeping up to date a breeze. Meer informatie over Intruder Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Meer informatie over Intruder

door TitanHQ

(186 beoordelingen)
DNS-gebaseerde webcontentfilter die malware, ransomware en phishing blokkeert en controle van webcontent biedt. De oplossing filtert meer dan een half miljard DNS-verzoeken per dag, identificeert elke dag 60.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter nu je netwerkbeveiliging. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan

door LogicMonitor

(66 beoordelingen)
LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures. Meer informatie over LogicMonitor LogicMonitor is the SaaS-based performance monitoring platform for modern IT infrastructure. Meer informatie over LogicMonitor
Avast Business Antivirus Pro Plus 2019 is een alles-in-één pakket met krachtige bescherming van endpoint, e-mail, server en netwerk voor kleine en middelgrote bedrijven (met name geschikt voor bedrijven met 1 tot 500 werknemers). Werkt op pc's, Macs en Windows-servers. Het is verrijkt met 18 geavanceerde functies om je bedrijf volledig veilig te houden. Bevat krachtige antivirus-, server-, e-mail- en netwerkbeveiliging, CyberCapture, firewall, wachtwoordmanager, VPN en nog veel meer. Het kan zowel met als zonder cloudconsole worden gebruikt. Meer informatie over Avast Business Antivirus Pro Plus Bekroonde alles-in-één antivirusoplossing om elk onderdeel van je bedrijf te beschermen. Beschikbaar voor pc's, Macs en servers. Meer informatie over Avast Business Antivirus Pro Plus

door ManageEngine

(2 beoordelingen)
EventLog Analyzer is een allesomvattende oplossing voor logbeheer met realtime detectie en analyse van dreigingen. Het correleert uiteenlopende gebeurtenissen die plaatsvinden binnen je netwerk en heeft ook een ingebouwd platform voor bedreigingsinformatie en incidentbeheer. Het biedt voorgedefinieerde auditrapporten om te helpen bij het volgen van activiteiten in databases, webservers, Windows-apparaten, netwerkperimeterapparaten en meer. Ook draagt het bij aan de naleving van voorschriften zoals de PCI DSS, SOX, HIPAA, FISMA en AVG. Meer informatie over EventLog Analyzer EventLog Analyzer is een allesomvattende oplossing voor logbeheer die meerdere beveiligingsmogelijkheden biedt in één verenigd platform. Meer informatie over EventLog Analyzer

door ManageEngine

(4 beoordelingen)
Log360 is een geïntegreerde oplossing die ADAudit Plus en EventLog Analyzer combineert in een enkele console, en het vormt de alles-in-één oplossing voor al je logbeheer en alle uitdagingen op het gebied van netwerkbeveiliging. Het biedt realtime logverzameling, analyse, correlatie en archiveringsmogelijkheden die helpen om vertrouwelijke gegevens te beschermen, interne beveiligingsbedreigingen te blokkeren en externe aanvallen te bestrijden. Om te helpen voldoen aan de meest noodzakelijke beveiligings-, auditing- en naleving-eisen is het standaard voorzien van meer dan 1200 voorgedefinieerde rapporten en waarschuwingscriteria. Meer informatie over Log360 Log360, een uitgebreide SIEM-oplossing die beschermt tegen interne en externe beveiligingsaanvallen met mogelijkheden voor logbeheer. Meer informatie over Log360
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Meer informatie over Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Meer informatie over Horangi Web Security Services
Firewall Analyzer is agentloze software voor loganalyse en configuratiebeheer, die logbestanden uit firewalls analyseert en realtime waarschuwingsmeldingen, beveiligings- en bandbreedterapporten genereert. De oplossing is leveranciersonafhankelijke software en ondersteunt meer dan 50 firewall-leveranciers. Het ondersteunt ook beheerders door uitgebreide rapporten over beveiligingsgebeurtenissen te creëren, zodat ze vervolgens stappen kunnen ondernemen om de beveiliging te verbeteren. Meer informatie over ManageEngine Firewall Analyzer Firewall Analyzer, software voor loganalyse en configuratiebeheer voor een volledig overzicht over de volledige netwerkbeveiliging. Meer informatie over ManageEngine Firewall Analyzer

door Visual Click Software

(0 beoordelingen)
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. Meer informatie over DSRAZOR for Windows DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports. Meer informatie over DSRAZOR for Windows

door Netsurion

(20 beoordelingen)
Netsurion empowers organizations to successfully predict, prevent, detect, and respond to cybersecurity threats. Our SIEM platform, EventTracker, unifies machine learning, behavior analytics, and security orchestration, with recognition for 11 straight years on the Gartner MQ for SIEM. Our managed security service, EventTracker SIEMphonic, delivers a Co-Managed SIEM service driven by our 24/7 SOC. EventTracker EDR also protects critical endpoints from zero-day attacks and mutating malware. Meer informatie over EventTracker By providing SIEM, EDR and a 24/7 SOC, we quickly and efficiently deliver advanced threat protection and security orchestration. Meer informatie over EventTracker
Axonius is the only cybersecurity asset management platform that provides actionable visibility and automated policy enforcement for all assets, devices, and users. Seamlessly integrated with 100+ management and security solutions and covering more than one million endpoints for companies like AppsFlyer, Natera, and The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Meer informatie over Axonius Cybersecurity Asset Management Platform Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users. Meer informatie over Axonius Cybersecurity Asset Management Platform

door Fox and Geese

(0 beoordelingen)
Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Meer informatie over Fluxguard Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Meer informatie over Fluxguard

door Netikus.net

(17 beoordelingen)
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Meer informatie over EventSentry Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring. Meer informatie over EventSentry

door CloudSploit

(0 beoordelingen)
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Meer informatie over CloudSploit Geautomatiseerde AWS-beveiliging en configuratiebewaking om een veilige en compatibele cloudinfrastructuuromgeving te handhaven. Meer informatie over CloudSploit

door Skybox Security

(0 beoordelingen)
Skybox Network Assurance provides seamless visibility across physical IT, multi cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesnt exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Meer informatie over Network Assurance Visualize your attack surface across physical IT, multicloud and operational technology networks. Meer informatie over Network Assurance
Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform for assess certification, lifecycle and password management with workflow, & SSO. Each customer has their own private instance; maximizing security. With deep integrations to enterprise and cloud apps, our identity management solution automates IT administration tasks through self-service and workflow. Millions of customers trust Avatier to increase productivity, reduce cost and ensure security. Meer informatie over Avatier Identity Anywhere Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform. Meer informatie over Avatier Identity Anywhere
AVG Antivirus Business Edition 2018 beschermt de gegevens van je bedrijf en je klanten tegen actuele ransomware, virussen, malware en uitbraken in realtime. Het wordt aangedreven door nieuwe cloudgebaseerde functies zoals CyberCapture, verbeterde malwaredetectie en verbeterd webshield. Dit product bevat ook gratis beheer op afstand en geweldige rapportage. De gebruikersinterface van de client is ook bijgewerkt. Beschikbaar voor Windows-pc's, desktops en servers. AVG biedt klanten 24/7 gratis telefonische ondersteuning. Meer informatie over AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 beschermt de gegevens van je MKB-bedrijf en klanten in realtime tegen online bedreigingen. Meer informatie over AVG Antivirus Business Edition
Multi-vector bescherming tegen virussen en malware voor volledige bescherming tegen alle geavanceerde malwarebedreigingen van vandaag, waaronder Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day en geavanceerde aanhoudende bedreigingen. Ingebouwd Identity en Privacy Shield voorkomt dat gegevens worden gestolen of vastgelegd bij gebruik van internet, en de uitgaande firewall voorkomt dat gegevens worden gestolen door malware. Je hoeft je niet druk te maken om updates. Cloudgestuurde beveiliging betekent dat eindpunten altijd up-to-date zijn. Meer informatie over Webroot SecureAnywhere Endpoint Protection Multi-vector bescherming tegen virussen en malware, voor volledige bescherming tegen alle geavanceerde malware bedreigingen van vandaag. Meer informatie over Webroot SecureAnywhere Endpoint Protection
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. Meer informatie over ConnectWise Automate ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Meer informatie over ConnectWise Automate

door Tenable Network Security

(44 beoordelingen)
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Meer informatie over Nessus Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Meer informatie over Nessus

door OneLogin

(38 beoordelingen)
OneLogin is ontworpen voor bedrijven met meer dan 100 gebruikers en levert een cloudgebaseerde oplossing voor identiteits- en toegangsbeheer (IAM) die eenvoudige single sign-on (SSO) biedt, waardoor bedrijven moeiteloos toegang tot webapplicaties kunnen beveiligen en beheren, zowel in de cloud als achter de firewall. Heeft je bedrijf drie of meer SaaS of interne web-apps? Zo ja, dan kun je profiteren van de beveiliging van OneLogins cloudgebaseerde single sign-on oplossing. Meer informatie over OneLogin Oplossing voor identiteitsbeheer (IAM) en Single Sign-On (SSO) voor bedrijven van elke omvang. Ga direct aan de slag met de gratis proefversie. Meer informatie over OneLogin

door GlassWire

(17 beoordelingen)
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Meer informatie over GlassWire GlassWire is a modern network monitor & security tool with a built in firewall. Meer informatie over GlassWire
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Meer informatie over CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Meer informatie over CyberGRX

door Symantec

(1.326 beoordelingen)
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money. Centralized policy management with scalable, cross-platform virus protection on an enterprise-wide basis.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

door Malwarebytes

(1.134 beoordelingen)
Multi-layered defense delivering smart endpoint protection through AI-powered technology. Multi-layered defense delivering smart endpoint protection through AI-powered technology.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now. Real-time monitoring, email alerts, monitor multiple devices in one dashboard, easy-to-use for Windows and Linux servers & switches.

door NordVPN

(252 beoordelingen)
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.

door Code42

(197 beoordelingen)
CrashPlan for Small Business provides peace of mind through easy-to-use, unlimited automatic data backup and recovery. We help small businesses and organizations recover and bounce back faster from any worst-case scenario, whether it is a disaster, simple human error, a stolen laptop, ransomware and more. Our data security solution is a product of Code42, an industry leader protecting the critical data of more than 47,000 world-class organizations, including the largest global brands. Easy, affordable, unlimited cloud backup for businesses with up to 200 employees.

door TunnelBear

(175 beoordelingen)
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering. File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering.

door Kaseya

(141 beoordelingen)
Kaseya VSA is an integrated IT systems management platform that can be leveraged seamlessly across IT disciplines to streamline and automate your IT services. Kaseya VSA integrates all your key management capabilities into a single platform. VSA makes your IT staff more productive, services more reliable, your systems more secure, and your value easier to show. VSA capabilities include: Remote Monitoring, Remote Control, Help Desk, Patch Management, AV/AM, Process Automation, and more. Get the Power of Kaseya VSA¿s network security while providing real-time status updates and alerts to ensure maximum security.

door Cloudflare

(133 beoordelingen)
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.

door LogMeIn

(91 beoordelingen)
With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products. Remote systems management for desktops, servers, and mobile laptops.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.

door Splunk

(81 beoordelingen)
Software that lets you search and analyze all your IT infrastructure data from a single location in real time. Software that lets you search and analyze all your IT infrastructure data from a single location in real time.
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications. OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities enterprise management

door SecureLink

(60 beoordelingen)
SecureLink is the leader in providing a secure way for vendors to access your systems and applications. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink's secure, purpose-built platform. SecureLink is the leader in providing a secure way for vendors to access your systems and applications.

door DNSFilter

(59 beoordelingen)
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.

door PureVPN

(50 beoordelingen)
Purevpn leads the cyber security industry with a self-managed constellation of 300,000+ IPs, 2,000+ servers in 180+ locations and a 31-day money-back guarantee. PureVPN offers seamless accessibility to content while ensuring users' complete online anonymity. Hong Kong based GZ Systems experimented with a VPN in 2006 and that was the beginning of a revolutionary VPN - PureVPN

door Pulse Secure

(47 beoordelingen)
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Webroot SecureAnywhere DNS Protection offers a straightforward, effective way to prevent everyday web usage from becoming a major security risk. The intuitive web-based console enables admins to finely tune web access policies by IP and limit access to other potentially risky websites. Webroot offers over 82 URL categories for admins to tailor their usage policies to their organization's needs. DNS Protection prevents internet abuse, web-borne malware threats while enforcing employee content and web access policies.

door SUPERAntiSpyware

(33 beoordelingen)
Multi-dimensional scanning and process interrogation technology that detects and removes spyware. Multi-dimensional scanning and process interrogation technology that detects and removes spyware.

door RPost

(29 beoordelingen)
RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end. RMail is an all-in-one service extension for powerful email, offering email encryption, e-delivery proof, e-signatures and more.

door Black Duck

(28 beoordelingen)
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.

door REVE Antivirus

(26 beoordelingen)
REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up. REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.

door Cloudbric

(23 beoordelingen)
Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL. With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.

door Adguard

(20 beoordelingen)
THE WORLD'S MOST ADVANCED AD BLOCKER! Get rid of intrusive ads and online tracking, and protect your devices from malware. *AdGuard will deal with annoying banners, pop-ups and video ads once and for all. *AdGuard hides your data from the multitude of trackers and activity analyzers that swarm the web. *Thanks to AdGuard, you will be able to avoid all fraudulent and phishing websites and malware attacks. Available for Windows, Mac, Android, iOS (on App Store). AdGuard is the best way to get rid of intrusive ads and online tracking, and to protect your computer from malware.

door Sophos

(19 beoordelingen)
Sophos UTM helps you consolidate your security without compromising its effectiveness. By combining multiple security layers, its simple to protect your users everywhere while making security easier to deploy and manage. Sophos UTM provides essential next-gen firewall protection for your network, web, email, applications, and users. The Ultimate Security Package: Essential next-gen firewall protection for your network, web, email, applications, and users.

door Firetrust

(18 beoordelingen)
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox. Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.
Consolidate data. Identify risks. Automate security compliance reporting. Consolidate data. Identify risks. Automate security compliance reporting.

door DNS Made Easy

(17 beoordelingen)
An ITO solution that offers DNS traffic management with integrated network monitoring services. An ITO solution that offers DNS traffic management with integrated network monitoring services.
Protects your office computer against viruses, spyware, worms, and Trojans. Protects your office computer against viruses, spyware, worms, and Trojans.

door CA Technologies

(16 beoordelingen)
eTrust Antivirus is CA's award-winning antivirus solution, providing superior protection against today's most prevalent security threat - viruses. eTrust Antivirus reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices. Extensive features include multiple scanning engine support, realtime detection with system cure, unmatched manageability, and centralized event logging and alerting. Reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices.

door Synametrics Technologies

(16 beoordelingen)
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.

door SPAMfighter

(15 beoordelingen)
Block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist. Block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist.

door My Digital Shield

(15 beoordelingen)
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries. My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.

door IS Decisions

(15 beoordelingen)
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits. Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.

door Zone Labs

(13 beoordelingen)
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.

door Panda Security

(13 beoordelingen)
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

door SiteLock

(13 beoordelingen)
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.

door NANO Security

(11 beoordelingen)
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently. Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology & delivered it as easy-to-deploy and easy-to-manage solutions. With advanced network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables small and midsize enterprises from around the globe to protect their business. As the cyber security landscape is constantly evolving, and new threats emerge each day, WatchGuard solutions keep you secure. WatchGuard offers advanced network security, secure Wi-Fi, and multi-factor authentication to protect small and midsize businesses.

door AlienVault

(10 beoordelingen)
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.

door The Email Laundry

(10 beoordelingen)
The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe. Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.

door RG System

(10 beoordelingen)
Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most. RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.
Setup a self hosted Jump server (also called Bastion Host or Jump host) quickly to manage SSH access to your Linux servers, AWS instances or other cloud services. Our jumpbox software has features like 2 factor authentication, SAML Authentication, SSH session recording,Identity and Access management (IAM), RBAC, Privileged Access management (PAM),SSH key rotation, root password management, and much more. It would help you meet security compliances such as PCI,NIST,ISO 27001 and more. Setup your SSH Jump Server, Bastion Host in 30 minutes. Setup centralized access to your Linux hosts and meet security compliances.

door PracticeProtect

(9 beoordelingen)
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications. A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.

door GFI Software

(8 beoordelingen)
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively. We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.
Forrester Research has ranked ShieldSquare as a Leader in their New Wave: Bot Management Report for Q3 2018. ShieldSquare offers a non-intrusive API-based solution to detect and eliminate bad bot traffic from websites, mobile apps, and APIs in real-time. Our solution leverages intent-based deep behavior analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. ShieldSquare protects online businesses from web scraping, account takeover, carding, content theft and other forms of bot abuse.

door SolarWinds Security Management

(8 beoordelingen)
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance.

door Snyk

(7 beoordelingen)
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc. Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.

door PhishingBox

(6 beoordelingen)
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.

door Aruba Networks

(6 beoordelingen)
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options. Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.
JumpCloud Directory-as-a-Service biedt een vernieuwde vormgeving voor Active Directory en LDAP. JumpCloud beheert en verbindt je gebruikers veilig met hun systemen, applicaties, bestanden en netwerken. JumpCloud beheert gebruikers en hun systemen, of het nu gaat om Mac, Linux of Windows, en biedt toegang tot lokale en cloudresources zoals Office 365, G Suite, AWS, Salesforce en Jira. Dezelfde login verbindt gebruikers met netwerken en gedeelde bestanden via RADIUS en Samba, respectievelijk, en beveiligt de WiFi van organisaties. JumpCloud Directory-as-a-Service beheert en verbindt je gebruikers veilig met hun systemen, applicaties, bestanden en netwerken.

door ForeScout Technologies

(5 beoordelingen)
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.

door CryptoPhoto

(5 beoordelingen)
Blocks phishing & malware attacks by giving you a fast new way to log in. Blocks phishing & malware attacks by giving you a fast new way to log in.

door Palo Alto Networks

(5 beoordelingen)
Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.

door Kerio Technologies

(4 beoordelingen)
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more. Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.
Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees. Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.

door ScoutDNS

(4 beoordelingen)
Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments. Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads.

door Darktrace

(4 beoordelingen)
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

door Check Point Software Technologies

(3 beoordelingen)
Firewall that provides access control, content security, authentication and centralized management. Firewall that provides access control, content security, authentication and centralized management.

door Securence

(3 beoordelingen)
Developed in 2001, Securence was the 1st cloud based email filtering solution on the market featuring game changing signature based detection. Zero minute detection methods are deployed to counter malware campaigns faster and more accurately than any other solution. Securence is known for the best admin interface, overall effectiveness and lowest pricing on the market. 10 year email archiving, encrypted sending, continuity DR, all optimized to enhance on-prem hosted email, O365 and Gmail. A simple switch of your MX records will demonstrate why Securence is the secret weapon in email filtering, security and archiving.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies. Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

door FireMon

(3 beoordelingen)
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

door Untangle

(3 beoordelingen)
Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs. Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.

door Cybereason

(3 beoordelingen)
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.

door Treetop Innovation

(3 beoordelingen)
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.

door Enginsight

(3 beoordelingen)
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.

door Spirion

(2 beoordelingen)
This software helps to prevent data leaks and protect your information wherever it is or what form its in. This software helps to prevent data leaks and protect your information wherever it is or what form its in.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure. Web based solution designed to protect your website and content from bad bots.

door Vera

(2 beoordelingen)
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.

door Oxford BioChronometrics

(2 beoordelingen)
Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money. Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.

door Cisco Cloudlock

(2 beoordelingen)
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection. Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.
No Annoying Pop-up Ads! The best VPN to Enjoy Private, Secure surfing experience.Lightning fast connection.Easy to download and use across your devices.All you have to do is to tap the Connect button then you are protected. Unblock All Websites And Apps Change IP as you want Secure Your Internet Activity And WiFi Connection. Come to experience the real Trustworthy VPN service by the independent developer team!X-VPN Is Definitely Your Online Bodyguards! The best choice to unblock sites, protect online privacy and surf anonymously with no annoying pop-up ads!

door Enigma Software Group USA

(2 beoordelingen)
Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware. Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware.

door ProMDM

(2 beoordelingen)
CertHat Tools for Microsoft PKI provides you with a web based tools for PKI management. It is easy to install and can manage all of your AD CS servers but can also import external certificates. With CertHat you will be able to track all your certificates and create alerts before they expire. CertHat help you to increase productivity and dramatically reduce the risk of system or business incidents due to expired certificate CertHat provides tools for managing and monitoring digital certificates from Microsoft AD CS but also mother/external PKI sources

door Zscaler

(2 beoordelingen)
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.

door Redsift

(2 beoordelingen)
OnDMARC is een product van Red Sift. Red Sift is een open cloudplatform dat cybersecurity toegankelijk maakt voor iedereen om cyberaanvallen te voorkomen. OnDMARC maakt het implementeren en onderhouden van een veilig DMARC-beleid eenvoudig. OnDMARC verwerkt niet alleen complexe XML-rapporten, maar gebruikt de nieuwste technologie om je te begeleiden naar volledige bescherming. OnDMARC is een e-mailbeveiligingsproduct dat organisaties van elke omvang helpt om DMARC met vertrouwen te gebruiken.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier. Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.

door Security Stronghold

(1 review)
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate. An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.

door TraceSecurity

(1 review)
Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies. Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.
Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management. Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.
The beSECURE (AVDS) family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. beSECURE (AVDS) is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Automated network Vulnerability Assessment and Management. Eliminate time consuming false positives and scan 50-500,000 IPs.
Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features. Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Blesk is a suite of applications for network monitoring and management. It is comprised of a mix of open source and proprietary tools that come pre-installed and configured on an optimized 64-bit version of CentOS Linux. Blesk integrates many popular tools including Nagios, Snort, Ntop, Cacti, Elasticsearch, Rancid, Netdisco, and GLPI. Each of these have been streamlined for optimal performance, and all run harmoniously on a single server. A suite of applications for network monitoring and management. Monitor availability, security, event logs, bandwidth consumption, etc.
Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites. VPN Plus Tor
Modular cloud security system designed to provide security framework for any devices. Modular cloud security system designed to provide security framework for any devices.
PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren, de server kunt beschermen tegen ransomware-aanvallen en waarmee je kunt controleren wie er belangrijke bestanden leest, schrijft en verwijdert. Het kan ook zien wie er mappen verwijdert of verplaatst. Als de gebruiker het optionele File Sight-Endpoint heeft geïnstalleerd, kun je ook op de hoogte worden gesteld van het kopiëren van bestanden. Het gebruikersaccount en het bijbehorende IP-adres worden gerapporteerd. PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren en de server kunt beschermen tegen ransomware-aanvallen.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Protects mail servers and users from unwanted and malicious e-mail. Protects mail servers and users from unwanted and malicious e-mail.
Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance. Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.
Network security solution that validates the source of each session, detects malware, and generates incident reports. Network security solution that validates the source of each session, detects malware, and generates incident reports.
Cyber-security tool that protects businesses-critical data and applications through evaluation and elimination of emerging threats. Cyber-security tool that protects businesses-critical data and applications through evaluation and elimination of emerging threats.
The HPE Intelligent Management Center Standard Software Platform and Enterprise platform are comprehensive wired and wireless network management tools supporting the FCAPS (Fault, Configuration, Accounting, Performance, Security) model, providing for end-to-end business management of IT, scalability of system architecture, and accommodation of new technology and infrastructure. Comprehensive wired and wireless network management tools supporting the FCAPS model.
A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content. A cloud service for internet security & content filtering for businesses of any size to secure corporate networks, manage web access
Anti-ransomware software that helps protect computers and networks against present and future ransomware of any type. Anti-ransomware software that helps protect computers and networks against present and future ransomware of any type.
Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring. Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring.

door Raz-Lee Security

(1 review)
Provides companies with auditing, monitoring, compliance and prevention solutions for IBM i servers. Provides companies with auditing, monitoring, compliance and prevention solutions for IBM i servers.
With modusCloud, secure your business email with cloud based spam protection, targeted phishing protection, email archiving, secure email encryption, and more for Microsoft Exchange and Office 365. The modusCloud solution provides email continuity, advanced threat protection, URL and attachment defense, driven by machine learning to ensure industry leading catch rates and lower false positives. 24/7/365 Customer support will ensure your email security is always in good hands. Eliminate spam and viruses from your mail via email security tool with machine-learning, anti-virus, and archiving capabilities.
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor de cloud (AWS); detecteren en waarschuwen over inbraken en verdachte activiteiten; controle van uitgaand verkeer en detectie van gegevenslekken; toegangscontrole en uitgebreide analyse van IP-adressen voor onderzoek van incidenten; bijhouden van aangepaste gebeurtenissen die met name belangrijk zijn voor je online bedrijf. Dhound is een tool voor beveiligingscontrole en inbraakdetectie voor op het internet gerichte servers, clouds en webtoepassingen.
{mono}sign is beyond an Identity & Access Management solution, it's positioned in the center of IT security. {mono}sign is the art of giving the right authority to right people at the right time.
Trend Micro goes beyond next-gen IPS to address the evolving requirements of the most demanding data centers and enterprise networks without sacrificing security or performance. With purpose-built hardware, centralized management, and industry-leading threat intelligence, we provide a smart, optimized, and connected network security solution that integrates across all types of environments. Go beyond next-gen IPS without compromising security or performance.

door Faydata Information Technologies

(1 review)
Cloud-based web application firewall that provides protection against SQL Injection, XSS, CSRF, RCE, RFI/LFI and other vulnerabilites. Cloud-based web application firewall that provides protection against SQL Injection, XSS, CSRF, RCE, RFI/LFI and other vulnerabilites.
Provides an advanced, central security console for real-time security event monitoring and automated response, host-based intrusion detection, event log consolidation, and security configuration management. Provides an advanced, central security console for real-time security event monitoring and automated response.

door Cyber Operations

(0 beoordelingen)
Centrally managing thousands of router ACLs from a single software application. Centrally managing thousands of router ACLs from a single software application.

door DESlock

(0 beoordelingen)
Protects your data transparently with fast file, folder and email encryption and used to encrypt any data. Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.
Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption. Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.

door FreeStone Software

(0 beoordelingen)
NETWORK SECURITY, FILTERING AND OPTIMIZATION.. Solutions for Visibility, Control and Performance.. Email virus protection, spam and Server-based website content filtering.

door Security Group Six

(0 beoordelingen)
Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents. Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.

door Definitive Data Security

(0 beoordelingen)
SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training. SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.

door DeviceLock

(0 beoordelingen)
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

door PCSecurityShield

(0 beoordelingen)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data. An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data.

door BAxBEx Software

(0 beoordelingen)
A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely. A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely.

door InfoExpress

(0 beoordelingen)
On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints. On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints.

door Logmatrix

(0 beoordelingen)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.
E-commerce solution that provides the ultimate in automated integrated software protection. E-commerce solution that provides the ultimate in automated integrated software protection.
Corporate network security solution that provides for a network wide encryption based security implementation. Corporate network security solution that provides for a network wide encryption based security implementation.

door Wavecrest Computing

(0 beoordelingen)
CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team. Web-use filtering and monitoring in a powerful proxy server. Covers 500 million Web pages with 80 blocking categories.
Eliminate risk and regain control with enterprise solutions for Web and email filtering. Eliminate risk and regain control with enterprise solutions for Web and email filtering.
Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer. Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.

door Infiltration Systems

(0 beoordelingen)
Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations. Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations.

door Max Secure Software

(0 beoordelingen)
Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience. Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.

door PureSight Technologies

(0 beoordelingen)
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

door Netmon

(0 beoordelingen)
Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses. Comprehensive network monitoring appliance. Monitor network traffic, devices, and services. Integrated alert system.

door SafenSoft

(0 beoordelingen)
Intrusion prevention system that blocks spyware, new viruses and other malware. Intrusion prevention system that blocks spyware, new viruses and other malware.
Network security tool that provides digital protection through email protection, blocking targetted attacks and more. Network security tool that provides digital protection through email protection, blocking targetted attacks and more.