168 resultaten
Filterresultaten (168)
Prijsopties
Productscore
Implementatie
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc.
It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Reduce the challenges of todays IT environment and improve working practices to protect critical information with Endpoint DLP.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable devices can connect to a company network. The second is to regulate what company data (or files) can be copied to removable media, and encrypt it (if necessary). The third is a data at rest scanning capability which locates where critical information is stored across a network.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Network security platform that helps businesses prevent malware, ransomware, and other network attacks from impacting firms.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required.
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
AI cybersecurity service and endpoint protection.
AI cybersecurity service and endpoint protection.
AI cybersecurity service and endpoint protection.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
REVE Endpoint Security software provides advanced protection for all endpoints of an organization.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Humming Heads Evolution DLP (data loss prevention) includes:
1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization.
2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing.
3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted.
4. Operation History: Records every detailed user and program action on all PCs.
Humming Heads Evolution DLP (data loss prevention) includes:
1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization.
2. Whitelist Protection: Advanced...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Ziften
(0)
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis.
The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection,...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
De veiligste cyberbeveiligingssoftware voor grote bedrijven.
De veiligste cyberbeveiligingssoftware voor grote bedrijven. Securden biedt met een verfrissend nieuwe aanpak volledige controle over geprivilegieerde toegang, zichtbaarheid zonder barrières en superieur toegangsbeheer in zowel cloudgebaseerde als fysieke en virtuele omgevingen.
De veiligste cyberbeveiligingssoftware voor grote bedrijven. Securden biedt met een verfrissend nieuwe aanpak volledige controle over geprivilegieerde toegang, zichtbaarheid zonder barrières en...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices.
Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components.
With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices.
Sternum's EIV (Embedded Integrity Verification) prevents...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company.
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company. We are a proactive, prevention-first solution designed to deterministically block evasive, in-memory malware that bypasses detection-based tools.
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company. We are a proactive, prevention-first solution designed to deterministically...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
enSilo
(0)
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Security and risk management software to find solutions.
Security and risk management software to find solutions.
Security and risk management software to find solutions.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Cloud-hosted managed service for monitoring and threat hunting
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with unparalleled digital security, forensic investigation capabilities and trained investigators who continuously scan for suspicious activity and provide a hands-on analysis of potential threats undetectable by automated tools.
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
The first software-only solution for high-trust operations from insecure IoT devices. Secure any key, anywhere.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and one on a remote server. This ensures that keys on endpoint devices always remain secure -- even in the presence of malware or a malicious actor fully controlling the device.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
SAM
(0)
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
zIPS
(0)
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure.
It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors.
It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices.
KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure.
It provides...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Silo
(0)
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
SEAP
(0)
Behavioral-based In-App Protection solution designed to protect web and mobile apps from the inside.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP provides a unique, integrated powerful solution to manage fraud and security risks of online digital services. The solution aims to collect information, identify security threats by analyzing the context, the user interaction with the device, and the environment within the application.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
aiden
(0)
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
CrowdSec is a security automation engine, using local IP behavior detection & leveraging our community-driven IP reputation database.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds of attacks. The solution also enables users to protect each other. Each time an IP is blocked, all community members are informed so they can also block it. The solution is being used in 100+ countries across all 6 continents.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
SIW
(0)
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Endpoint OS for simple, smart, secure access to cloud workspaces.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to use and for the IT team to manage and control. IGEL OS is designed for secure, high-fidelity user access to cloud workspaces from any compatible x86-64 device located anywhere -- on the corporate LAN, from home, or anyplace else via an Internet connection.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Archon
(0)
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising data security or regulatory compliance.
Our Workplace solution is the world’s most turnkey secure unified workspace, designed for regulated and security-minded organizations with networks of independent reps and agents.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising...
Functies
- Encryptie
- Witte lijst/zwarte lijst
- Activiteiten volgen
- Apparaatbeheer