Endpoint protection software

Gebruik Capterra in Nederland om de beste Endpoint protection software voor je bedrijf te vinden.

Waarom Capterra gratis is
Het SolarWinds® N-central® platform voor bewaking en beheer op afstand is ontworpen om managed service providers te helpen moeiteloos om te gaan met complexe netwerken. N-central bevat uitgebreide automatisering, diepgaande configuratiemogelijkheden en beveiligingsfuncties zoals antivirus- en patchbeheer en geïntegreerde back-up. Het is ontworpen om MSP-bedrijven te helpen bij het efficiënt beheren van ingewikkelde netwerken vanaf één eenvoudig te gebruiken platform. Meer informatie over SolarWinds N-central SolarWinds® N-central® is een krachtige tool met geavanceerde bescherming die verder gaat dan antivirus om een volledig gelaagde beveiligingsoplossing te bieden. Meer informatie over SolarWinds N-central
Autonome eindpuntbeveiliging via een enkele weg die aanvallen op alle belangrijke vectoren voorkomt, detecteert en bestrijdt. Het platform is ontworpen met het oog op gebruiksgemak en bespaart tijd door AI in te zetten om bedreigingen voor zowel lokale als cloudomgevingen automatisch en in realtime te elimineren; het is de enige oplossing die direct vanaf het endpoint zichtbaarheid biedt in het versleutelde verkeer verspreid over netwerken. SentinelOne is een geconvergeerde EPP + EDR-oplossing die naadloos kan worden geïntegreerd met diverse IT-omgevingen. Meer informatie over Endpoint Protection Platform Autonome eindpuntbeveiliging via een enkele weg die aanvallen op alle belangrijke vectoren voorkomt, detecteert en bestrijdt. Meer informatie over Endpoint Protection Platform
Webgebaseerde software voor Windows desktopmanagement die helpt bij het beheren van duizenden desktops vanaf één centrale locatie. Het kan desktops zowel in LAN als via WAN beheren. Het automatiseert normale desktopbeheeractiviteiten zoals het installeren van software, patches en servicepacks, en standaardiseert de desktops door het toepassen van uniforme configuraties zoals achtergronden, snelkoppelingen, printers, enz. Simpel gezegd, het helpt beheerders bij het automatiseren, standaardiseren, beveiligen en controleren van hun Windows-netwerk. Meer informatie over ManageEngine Desktop Central Het helpt beheerders bij het automatiseren, standaardiseren, beveiligen en controleren van hun Windows-netwerk. Desktop Central ondersteunt nu ook MDM. Meer informatie over ManageEngine Desktop Central

door Fyde

(0 beoordelingen)
Fyde helpt bedrijven met een steeds meer verspreid personeelsbestand om het risico op inbreuken te verminderen door het ondersteunen van veilige toegang tot kritieke bedrijfsmiddelen voor hun werknemers, partners, aannemers en outsourcers. Meer informatie over Fyde Veilige toegang tot internet en bedrijfsbronnen met één enkele oplossing. Meer informatie over Fyde
EventLog Analyzer is een allesomvattende oplossing voor logbeheer met realtime detectie en analyse van dreigingen. Het correleert uiteenlopende gebeurtenissen die plaatsvinden binnen je netwerk en heeft ook een ingebouwd platform voor bedreigingsinformatie en incidentbeheer. Het biedt voorgedefinieerde auditrapporten om te helpen bij het volgen van activiteiten in databases, webservers, Windows-apparaten, netwerkperimeterapparaten en meer. Ook draagt het bij aan de naleving van voorschriften zoals de PCI DSS, SOX, HIPAA, FISMA en AVG. Meer informatie over EventLog Analyzer EventLog Analyzer is een allesomvattende oplossing voor logbeheer die meerdere beveiligingsmogelijkheden biedt in één verenigd platform. Meer informatie over EventLog Analyzer
DNS-gebaseerde webcontentfilter die malware, ransomware en phishing blokkeert en controle van webcontent biedt. De oplossing filtert meer dan een half miljard DNS-verzoeken per dag, identificeert elke dag 60.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan
AVG Antivirus Business Edition 2018 beschermt de gegevens van je bedrijf en je klanten tegen actuele ransomware, virussen, malware en uitbraken in realtime. Het wordt aangedreven door nieuwe cloudgebaseerde functies zoals CyberCapture, verbeterde malwaredetectie en verbeterd webshield. Dit product bevat ook gratis beheer op afstand en geweldige rapportage. De gebruikersinterface van de client is ook bijgewerkt. Beschikbaar voor Windows-pc's, desktops en servers. AVG biedt klanten 24/7 gratis telefonische ondersteuning. Meer informatie over AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 beschermt de gegevens van je MKB-bedrijf en klanten in realtime tegen online bedreigingen. Meer informatie over AVG Antivirus Business Edition
Maak je je zorgen over zwakke wachtwoorden en hergebruik van wachtwoorden die de veiligheid van je bedrijf kunnen ondermijnen? Brengt je IT-team het grootste deel van hun tijd door met verzoeken voor het opnieuw instellen van wachtwoorden? Los deze problemen op met 1Password! Het is moeiteloos in te zetten en te beheren en wordt vertrouwd door meer dan 30.000 bedrijven en meer dan 15 miljoen gebruikers over de hele wereld. Meer informatie over 1Password Ga je gang. Vergeet je wachtwoorden maar. 1Password onthoudt ze allemaal voor je. Sla je wachtwoorden op en log in op sites met één enkele klik. Meer informatie over 1Password
Endpoint Protector is een oplossing voor het voorkomen van gegevensverlies voor ondernemingen en het midden- en kleinbedrijf, beschikbaar als hardware en virtueel apparaat of als cloudinfrastructuur. Endpoint Protector maakt een einde aan gegevenslekken en gegevensdiefstal en biedt naadloze controle over draagbare opslagapparaten. De mogelijkheden voor het filteren van content voor gegevens in rust en in beweging variëren van bestandstype tot vooraf gedefinieerde content op basis van woordenboeken, reguliere expressies of voorschriften zoals AVG, PCI DSS, CCPA, HIPAA etc. Meer informatie over Endpoint Protector Voorkoming van gegevensverlies. Mogelijkheden voor apparaatbeheer en eDiscovery op Windows, macOS en Linux. Meer informatie over Endpoint Protector
Met Vulnerability Manager Plus worden met behulp van een gecentraliseerde console alle aspecten van vulnerability management gemakkelijk gemaakt, vanaf detectie en beoordeling van kwetsbaarheden tot het elimineren ervan met een geautomatiseerde patching-workflow. Je kunt ook beveiligingsconfiguraties beheren, webservers verharden, zero-day kwetsbaarheden verminderen, end-of-life audits uitvoeren en riskante software verwijderen. Vereenvoudig vulnerability management met een op afstand inzetbare medewerker, webgebaseerde interface en eindeloze schaalbaarheid. Meer informatie over ManageEngine Vulnerability Manager Plus Een eenvoudig te implementeren, betaalbare, gecentraliseerde consolegebaseerde tool waarmee je kwetsbaarheden en misconfiguraties kunt prioriteren en elimineren. Meer informatie over ManageEngine Vulnerability Manager Plus
Patch Manager Plus is geautomatiseerde patchbeheersoftware die ondernemingen één enkele interface biedt voor alle patchbeheertaken. Werkt op verschillende platforms en helpt je bij patches voor Windows, Mac, Linux en meer dan 300 externe toepassingen. Je kunt de scan voor ontbrekende patches automatiseren, testen en goedkeuren voor probleemloos patchen, het implementatiebeleid aanpassen om aan zakelijke behoeften te voldoen, patches weigeren en kwetsbaarheidsrapporten genereren. Patch Manager Plus is nu zowel in de cloud als lokaal beschikbaar. Meer informatie over Patch Manager Plus Patch Manager Plus is geautomatiseerde patchbeheersoftware voor het patchen van Windows-, Mac-, of Linux-updates en meer dan 300 toepassingen van derden. Meer informatie over Patch Manager Plus
Multi-vector bescherming tegen virussen en malware voor volledige bescherming tegen alle geavanceerde malwarebedreigingen van vandaag, waaronder Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day en geavanceerde aanhoudende bedreigingen. Ingebouwd Identity en Privacy Shield voorkomt dat gegevens worden gestolen of vastgelegd bij gebruik van internet, en de uitgaande firewall voorkomt dat gegevens worden gestolen door malware. Je hoeft je niet druk te maken om updates. Cloudgestuurde beveiliging betekent dat eindpunten altijd up-to-date zijn. Meer informatie over Webroot SecureAnywhere Endpoint Protection Multi-vector bescherming tegen virussen en malware, voor volledige bescherming tegen alle geavanceerde malware bedreigingen van vandaag. Meer informatie over Webroot SecureAnywhere Endpoint Protection
ManageEngine ADAudit Plus is een oplossing voor IT-beveiliging en naleving. Met meer dan 200 rapporten en realtime waarschuwingen biedt het kennis over wijzigingen die zijn aangebracht in de content en configuratie van Active Directory, Azure AD en Windows-servers. Daarnaast geeft het inzicht in de toegang tot werkstations en bestandsservers (inclusief NetApp en EMC). ADAudit Plus helpt je bij het bijhouden van aan- en -afmeldingen van gebruikers; het analyseren van accountvergrendelingen; het controleren van ADFS, ADLDS en printers; het doorsturen van logs naar SIEM-tools en nog veel meer. Meer informatie over ADAudit Plus ADAudit Plus is een Active Directory, Azure AD, bestandsserver (inclusief NetApp en EMC) en software voor het bewaken van werkstationwijzigingen. Meer informatie over ADAudit Plus
Avast Business Antivirus Pro Plus 2019 is een alles-in-één pakket met krachtige bescherming van endpoint, e-mail, server en netwerk voor kleine en middelgrote bedrijven (met name geschikt voor bedrijven met 1 tot 500 werknemers). Werkt op pc's, Macs en Windows-servers. Het is verrijkt met 18 geavanceerde functies om je bedrijf volledig veilig te houden. Bevat krachtige antivirus-, server-, e-mail- en netwerkbeveiliging, CyberCapture, firewall, wachtwoordmanager, VPN en nog veel meer. Het kan zowel met als zonder cloudconsole worden gebruikt. Meer informatie over Avast Business Antivirus Pro Plus Bekroonde alles-in-één antivirusoplossing om elk onderdeel van je bedrijf te beschermen. Beschikbaar voor pc's, Macs en servers. Meer informatie over Avast Business Antivirus Pro Plus
Netsurion stelt organisaties in staat om met succes cyberbeveiligingsbedreigingen te voorspellen, te voorkomen, te detecteren en erop te reageren. Dit SIEM-platform, EventTracker, combineert machine learning, gedragsanalyses en beveiligingsorganisatie met erkenning gedurende 11 opeenvolgende jaren op de Gartner MQ voor SIEM. De beheerde beveiligingsservice, EventTracker SIEMphonic, levert een Co-Managed SIEM-service die wordt aangestuurd door de 24/7 SOC. EventTracker EDR beschermt daarnaast kritieke eindpunten tegen zero-day-aanvallen en muterende malware. Meer informatie over EventTracker Door SIEM, EDR en een 24/7 SOC te combineren, levert dit platform snel en efficiënt zowel geavanceerde bescherming tegen bedreigingen als beveiligingsorganisatie. Meer informatie over EventTracker
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
LogMeIn Central is a powerful, easy-to-use endpoint protection and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk. Simplified endpoint management for desktops, servers, and mobile laptops.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control. Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more. On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the system of record, presenting detailed, accurate, and actionable data for use in incident response, high-risk insider monitoring, and productivity reporting. Cerebral can be deployed On-prem, in the Cloud or through an MSP provider. Monitor and analyze your employees company-wide whether they are in the office or working remotely.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization. Automatic, insightful, all-in-one endpoint security from the trusted leader.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks. NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Deep Freeze Reboot to Restore Software provides ultimate endpoint protection by freezing a snapshot of your desired computer configuration and settings. With an instant reboot, any unwanted or unauthorized changes are completely erased from the system, restoring it back to its pristine Frozen state. Deep Freeze provides unrestricted system access to end-users while preventing permanent configuration changes and ensures 100% workstation recovery with every restart.. Reboot to Restore is System Restore technology helps to restore Windows and Mac to a pristine, pre-configured state with just a reboot.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce. Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Barkly vervangt verouderde antivirusprogramma's door de sterkste bescherming, de slimste technologie en het eenvoudigste beheer. Barkly blokkeert aanvallen over alle vectoren en intenties, waaronder exploits, scripts, uitvoerbare bestanden en ransomware. Barkly's gepatenteerde architectuur met 3 niveaus biedt ongeëvenaarde zichtbaarheid op alle niveaus van het systeem, inclusief de CPU, om aanvallen te blokkeren. Barkly is ongelooflijk eenvoudig te beheren en te implementeren: er zijn geen beleidslijnen, configuratie of beveiligingsexpertise vereist. De endpoint-bescherming van Barkly vervangt verouderde antivirusprogramma's door de sterkste bescherming, de slimste technologie en het eenvoudigste beheer.
Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs. Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over software that is not built for your systems. It boasts one of the most comprehensive sets of virus signatures available and keeps itself up to date by automatically downloading the latest virus definitions. You'll have peace of mind knowing that your scan engine is backed by battle-tested technology. Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Idaptive delivers Next-Gen Access, protecting organizations from data breaches through a Zero Trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). Idaptive Next-Gen Access is an integrated platform delivering identity and access management solutions as a service.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS. Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data. Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money. Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both Apple iOS and Google Android operating systems are support under one unified console. Enterprise mobility management solution coupled with turn-key enterprise applications to increase productivity and efficiency.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
GFI EndPointSecurity reduces risk of data leaks and other malicious activity GFI EndPointSecurity reduces risk of data leaks and other malicious activity
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration. Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.

door Check Point Software Technologies

(1 review)
Provides a single management console, security compliance verification, media encryption, anti-malware and program control. Provides a single management console, security compliance verification, media encryption, anti-malware and program control.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors. Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor de cloud (AWS); detecteren en waarschuwen over inbraken en verdachte activiteiten; controle van uitgaand verkeer en detectie van gegevenslekken; toegangscontrole en uitgebreide analyse van IP-adressen voor onderzoek van incidenten; bijhouden van aangepaste gebeurtenissen die met name belangrijk zijn voor je online bedrijf. Dhound is een tool voor beveiligingscontrole en inbraakdetectie voor op het internet gerichte servers, clouds en webtoepassingen.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.

door TrustWave

(0 beoordelingen)
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more. Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.

door SecPod Technologies

(0 beoordelingen)
SecPod Saner provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy to manage solution. SecPod creates computer security software for proactively managing endpoint computer risks.

door CounterTack

(0 beoordelingen)
Enables endpoint security control providing behavior-based detection and analysis of malware. Enables endpoint security control providing behavior-based detection and analysis of malware.

door Hypori

(0 beoordelingen)
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

door Adept Technologies

(0 beoordelingen)
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.

door UpGuard

(0 beoordelingen)
UpGuard is a cybersecurity company that helps businesses manage security risks across their information technology supply chains. UpGuard's integrated risk platform combines third party security ratings, security assessment questionnaires, and threat intelligence capabilities to give businesses a full and comprehensive view of their risk surface. Reduce cyber risk, prevent data breaches and protect customer data.

door OS-Easy Cloud

(0 beoordelingen)
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc. It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time. Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint. It also supports additional security features including device control, deep content inspection, remediation actions, encryption and comprehensive auditing. Running in the background, utilizing advanced throttling techniques, the agent silently discovers critical information without interrupting end user activity. Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint.

door Proofpoint

(0 beoordelingen)
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console. Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.

door Sentinel IPS

(0 beoordelingen)
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

door Safely Open

(0 beoordelingen)
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer. Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.

door MyDiamo

(0 beoordelingen)
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required. The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution

door Absolute Software

(0 beoordelingen)
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users. Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.

door Stellar Data Recovery

(0 beoordelingen)
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion. Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline

door Micro Focus

(0 beoordelingen)
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing. Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.

door Deep Instinct

(0 beoordelingen)
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device. End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.

door Secure Channels

(0 beoordelingen)
All-in-one data encryption solution that supports all your data protection needs. All-in-one data encryption solution that supports all your data protection needs.
Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain English queries, with a Google-like experience, right in your web browser. Cloud-based endpoint management and protection platform to assess security and enforce compliance of endpoints.

door Kandji

(0 beoordelingen)
Kandji is the MDM worthy of your Apple devices. You've chosen Apple and we've designed a device management experience to match. Drawing on decades of experience in Apple IT, we saw a dire need for an Apple device management platform that could accommodate growing businesses and increasing regulatory demands. Existing solutions were either overly simplistic or mind-numbingly complex, and didnt meet the needs of today's organizations. We knew there had to be a better way - so we built Kandji. Kandji is the MDM worthy of your Apple devices. You've chosen Apple and we've designed a device management experience to match.

door Silverbolt

(0 beoordelingen)
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

door REVE Antivirus

(0 beoordelingen)
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks. REVE Endpoint Security software provides advanced protection for all endpoints of an organization.

door RocketCyber

(0 beoordelingen)
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

door Humming Heads

(0 beoordelingen)
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.

door Ziften Technologies

(0 beoordelingen)
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

door WP Hacked Help

(0 beoordelingen)
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites

door EndGame

(0 beoordelingen)
Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Endpoint protection platform that reduces the cost and complexity of your endpoint environment.

door Instart

(0 beoordelingen)
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure. Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.

door IntSights

(0 beoordelingen)
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

door Sternum

(0 beoordelingen)
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices. Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components. With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end. Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.

door Morphisec

(0 beoordelingen)
Ideal for small to large enterprises, the endpoint security solution helps protect data against malware, ransomware & more. Ideal for small to large enterprises, the endpoint security solution helps protect data against malware, ransomware & more.

door enSilo

(0 beoordelingen)
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response. Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.

door Cisco

(0 beoordelingen)
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more. Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont

door SparkCognition

(0 beoordelingen)
Minimize your risk and stay focused on driving your business forward with the first AI protection built specifically for small businesses. DeepArmor Small Business uses AI to prevent attacks from ransomware, viruses, and other advanced malware with industry-leading efficacy. Easily install, activate, and get started with advanced protection that works both online and off, and take advantage of DeepArmor's simple management and low impact to users. Secure your small business against today's most advanced ransomware, viruses, and malware with DeepArmor's leading AI-based protection.

door Ivanti

(0 beoordelingen)
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform. Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.