Cyber security tools
Gebruik Capterra in Nederland om de beste Cyber security tools voor je bedrijf te vinden.
- Cloud, SaaS, Web (128)
- Geïnstalleerd - Mac (40)
- Geïnstalleerd - Windows (66)
- Mobiel - Android native (26)
- Mobiel - iOS native (26)
- AI / Machine learning (67)
- Audittrail (18)
- Beheer van webdreigingen (25)
- Compliancebeheer (19)
- Eindpuntbeheer (57)
- Gedragsanalyse (77)
- IOC-verificatie (24)
- Incidentenbeheer (56)
- Scannen op kwetsbaarheden (64)
- Witte lijst / zwarte lijst (64)
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Meer informatie over CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Meer informatie over CyberGRX
Stroomlijn de aggregatie en correlatie van gegevens over bedrijfsmiddelen, bedreigingen, kwetsbaarheden en tickets. Krijg beter inzicht in de risicostatus van je organisatie met geavanceerde risicoscore-algoritmen die een zakelijke context bieden die verder gaat dan de CVSS-scores, zoals de kriticiteit van bedrijfsmiddelen. Help je IT-team de juiste kwetsbaarheden te prioriteren en effectief de voortgang te communiceren aan al je belanghebbenden. Deze processen kunnen moeiteloos worden opgeschaald tot miljoenen bedrijfsmiddelen en tientallen miljoenen cyberkwetsbaarheden. Meer informatie over IT Risk & Compliance Verkrijg betere risico-informatie door je cyberkwetsbaarheden te rangschikken op basis van zakelijke ernst, voor een efficiëntere oplossing. Meer informatie over IT Risk & Compliance
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Meer informatie over ESET Endpoint Security
SolarWinds Threat Monitor - Service Provider Edition is een snel, schaalbaar, cloudgebaseerd platform dat is gebouwd om beveiligingsgerichte Managed Service Providers (MSP's) een uniforme tool te bieden om beheerde netwerken te controleren op bedreigingen, en om logboeken te analyseren op basis van de nieuwste en meest actuele bedreigingsinformatie van over de hele wereld. Herstel snel de bedreigingen van je klant en bereid de informatie voor die nodig is om aan te tonen dat ze voldoen aan de normen die zijn vastgesteld door regelgevende instanties. Meer informatie over SolarWinds Threat Monitor SolarWinds® Threat Monitor is de tool die je nodig hebt om beveiligingsgebeurtenissen op te sporen, te verhelpen en te rapporteren voor al je beheerde netwerken. Meer informatie over SolarWinds Threat Monitor
DNS-gebaseerde webcontentfilter en webbeveiligingslaag voor bedrijven die malware, ransomware en phishing blokkeren en controle van webcontent bieden. WebTitan filtert meer dan 2 miljard DNS-verzoeken per dag, identificeert elke dag 300.000 malware-iteraties en heeft meer 7500 klanten. Cloud- en gateway-versies beschikbaar. Verbeter direct je cybersecurity. Probeer vandaag nog een gratis proefversie van WebTitan, inclusief ondersteuning. Geweldige maandelijkse prijzen beschikbaar. Lokaal gehost. Meer informatie over WebTitan DNS-gebaseerde webcontentfilter voor bedrijven die malware, ransomware en phishing blokkeert en geavanceerde controle van webcontent biedt. Meer informatie over WebTitan
Multi-vector bescherming tegen virussen en malware voor volledige bescherming tegen alle geavanceerde malwarebedreigingen van vandaag, waaronder Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day en geavanceerde aanhoudende bedreigingen. Ingebouwd Identity en Privacy Shield voorkomt dat gegevens worden gestolen of vastgelegd bij gebruik van internet, en de uitgaande firewall voorkomt dat gegevens worden gestolen door malware. Je hoeft je niet druk te maken om updates. Cloudgestuurde beveiliging betekent dat eindpunten altijd up-to-date zijn. Meer informatie over Webroot SecureAnywhere Endpoint Protection Multi-vector bescherming tegen virussen en malware, voor volledige bescherming tegen alle geavanceerde malware bedreigingen van vandaag. Meer informatie over Webroot SecureAnywhere Endpoint Protection
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type including PCI, PII, PHI and even unstructured data formats and integrate with nearly any processor or endpoint. Meer informatie over Cloud-Based Tokenization Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types. Meer informatie over Cloud-Based Tokenization
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Meer informatie over Alert Logic Cybersecurity Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Meer informatie over Alert Logic Cybersecurity
Bescherm je team onmiddellijk tegen cyberbedreigingen en wifi-aanvallen. De bedrijfsservice van Perimeter 81 biedt krachtige 256-bits codering, automatische wifi-beveiliging en apps met één klik voor elk apparaat. De communicatie en online activiteiten van je team zijn volledig privé en veilig, waar de werknemers ook zijn. Met de complete cloudbeheerportal kunnen bedrijfseigenaren en IT-managers moeiteloos de netwerktoegang controleren en proactief mogelijke verdachte activiteiten identificeren. Meer informatie over Perimeter 81 Een kosteneffectieve softwareservice met één klik die online privacy en beveiliging garandeert voor bedrijven van elke omvang. Meer informatie over Perimeter 81
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. Meer informatie over Netwrix Auditor Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Meer informatie over Netwrix Auditor
Probely helps security engineers and software developers be more safe with a web app security scanner. Decrease time to put the new version of your software online by seamlessly and automatically integrate security testing into your development lifecycle. We make security engineers do less work by incorporating security testing into your development lifecycle. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability. Meer informatie over Probely Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease. Meer informatie over Probely
Log360 is een geïntegreerde oplossing die ADAudit Plus en EventLog Analyzer combineert in een enkele console, en het vormt de alles-in-één oplossing voor al je logbeheer en alle uitdagingen op het gebied van netwerkbeveiliging. Het biedt realtime logverzameling, analyse, correlatie en archiveringsmogelijkheden die helpen om vertrouwelijke gegevens te beschermen, interne beveiligingsbedreigingen te blokkeren en externe aanvallen te bestrijden. Om te helpen voldoen aan de meest noodzakelijke beveiligings-, auditing- en naleving-eisen is het standaard voorzien van meer dan 1200 voorgedefinieerde rapporten en waarschuwingscriteria. Meer informatie over Log360 Log360, een uitgebreide SIEM-oplossing die beschermt tegen interne en externe beveiligingsaanvallen met mogelijkheden voor logbeheer. Meer informatie over Log360
PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren, de server kunt beschermen tegen ransomware-aanvallen en waarmee je kunt controleren wie er belangrijke bestanden leest, schrijft en verwijdert. Het kan ook zien wie er mappen verwijdert of verplaatst. Als de gebruiker het optionele File Sight-Endpoint heeft geïnstalleerd, kun je ook op de hoogte worden gesteld van het kopiëren van bestanden. Het gebruikersaccount en het bijbehorende IP-adres worden gerapporteerd. Meer informatie over PA File Sight PA File Sight is software voor bestandsbewaking waarmee je het kopiëren van bestanden kunt detecteren en de server kunt beschermen tegen ransomware-aanvallen. Meer informatie over PA File Sight
Cryptosense Analyzer-software helpt klanten om zwakke plekken te vinden in de cryptografie die ze gebruiken in hun infrastructuur en applicaties, en ze vervolgens te repareren voordat er misbruik van wordt gemaakt. Deze software wordt momenteel gebruikt voor de volgende systemen: het grootste deel van de interbancaire berichten wereldwijd; meer dan de helft van alle wereldwijde Forex-transacties; 's werelds grootste financiële transactiedatabase; en de cryptografie die wordt gebruikt door 's werelds grootste cloudproviders. Meer informatie over Cryptosense Cryptosense biedt software voor het detecteren en elimineren van kwetsbaarheden die worden veroorzaakt door misbruik van cryptografie in apps en infrastructuren. Meer informatie over Cryptosense
Teramind biedt een gebruikersgerichte beveiligingsaanpak om het pc-gedrag van werknemers te controleren. Deze software stroomlijnt het verzamelen van werknemersgegevens om verdachte activiteiten te identificeren, mogelijke dreigingen te detecteren, de efficiëntie van medewerkers te controleren en naleving van de regelgeving te waarborgen. Dit product helpt beveiligingsincidenten te verminderen door realtime toegang te bieden tot gebruikersactiviteiten met alarmmeldingen, waarschuwingen, omleidingen en blokkeringen van gebruikers, zodat jij je bedrijf zo efficiënt en veilig mogelijk kan laten draaien. Meer informatie over Teramind Probeer de gratis proefversie om te zien waar iedereen zo enthousiast over is. Het volgen van gebruikersactiviteiten en preventie van gegevensdiefstal gemakkelijk gemaakt met Teramind. Meer informatie over Teramind
Netsparker Security Scanner is een accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Met de unieke scanning-technologie op basis van bewijs van Netsparker kun je meer tijd besteden aan het verhelpen van de gemelde fouten door de geïdentificeerde kwetsbaarheden automatisch op een "alleen-lezen" en veilige manier te bekijken. De software produceert ook een bewijs van exploitatie. Daarom kun je meteen de impact van kwetsbaarheid zien en hoef je het niet handmatig te verifiëren. Meer informatie over Netsparker Security Scanner Accurate oplossing die automatisch XSS-, SQL Injection- en andere kwetsbaarheden identificeert in webapplicaties. Meer informatie over Netsparker Security Scanner
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Meer informatie over Indeni Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology. Meer informatie over Indeni
Boxcryptor is a flexible and scalable encryption software for the cloud, that supports more than 30 providers as well as NAS encryption on all platforms. It offers collaboration, audit, and management features that allow secure collaboration on files while being compliant with privacy regulations. Define custom policies, manage users with Single Sign-on or Active Directory, and protect your accounts with 2FA. Choose security Made in Germany to work securely and efficiently in the cloud. Meer informatie over Boxcryptor Cross-platform encryption solution for the cloud and NAS systems that supports more than 30 cloud providers (e.g. Dropbox, OneDrive). Meer informatie over Boxcryptor
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Meer informatie over ComplyAssistant ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. Meer informatie over ComplyAssistant
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Meer informatie over Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Meer informatie over Horangi Web Security Services
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Meer informatie over DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Meer informatie over DriveStrike
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Meer informatie over Agari Secure Email Cloud Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO. Meer informatie over Agari Secure Email Cloud
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
ESM+Strategy helps organizations design, track, and adapt their strategic plan. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life. When starting out, you'll go through a tutorial to enter in key strategic objectives, measures, and initiatives. Once the strategic architecture is in place, organizations use ESM to centrally collect updates on progress, eliminating the need for exhausting spreadsheets and slide decks. Track the progress of your strategic plan with Balanced Scorecards, Strategy Maps, dashboards, and instantly generated exports.
Barkly vervangt verouderde antivirusprogramma's door de sterkste bescherming, de slimste technologie en het eenvoudigste beheer. Barkly blokkeert aanvallen over alle vectoren en intenties, waaronder exploits, scripts, uitvoerbare bestanden en ransomware. Barkly's gepatenteerde architectuur met 3 niveaus biedt ongeëvenaarde zichtbaarheid op alle niveaus van het systeem, inclusief de CPU, om aanvallen te blokkeren. Barkly is ongelooflijk eenvoudig te beheren en te implementeren: er zijn geen beleidslijnen, configuratie of beveiligingsexpertise vereist. De endpoint-bescherming van Barkly vervangt verouderde antivirusprogramma's door de sterkste bescherming, de slimste technologie en het eenvoudigste beheer.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Solutions to secure information for your organization, your employees, your vendors and yourself. Modern products for risk, compliance and security leaders to better protect critical information. Solutions to secure your information.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK. Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
The MetaPhish product has the ability to originate emails from a set of prepopulated simulated phishing domains. The software contains a library of smart learning experiences such as infographics, notices and training videos. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator. MetaPhish Our MetaPhish product helps keep your staff safe from phishing scams through automated training that increases their vigilance. MetaPhish has the ability to originate emails from a set of prepopulated simulated phishing domains.
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks. CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
LogRhythm is a leader in NextGen SIEM, empowering enterprises to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats. The LogRhythm NextGen SIEM Platform combines security analytics; UEBA; network detection and response (NDR); and SOAR in a single end-to-end solution. LogRhythm's technology serves as the foundation for modern security operations centers (SOCs), helping customers measurably secure their cloud, physical, and virtual infrastructures. LogRhythm empowers organizations to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Cloud-based risk management platform that helps firms manage compliance, IT, vendors, audits and documentation.
OnDMARC is een product van Red Sift. Red Sift is een open cloudplatform dat cybersecurity toegankelijk maakt voor iedereen om cyberaanvallen te voorkomen. OnDMARC maakt het implementeren en onderhouden van een veilig DMARC-beleid eenvoudig. OnDMARC verwerkt niet alleen complexe XML-rapporten, maar gebruikt de nieuwste technologie om je te begeleiden naar volledige bescherming. OnDMARC is een e-mailbeveiligingsproduct dat organisaties van elke omvang helpt om DMARC met vertrouwen te gebruiken.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks. Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
Based on robust technologies and on the Thales savoir-faire, the Citadel Team service can support millions of users and already offers a Chatbot technology to safely integrates business applications. The application guarantees a high level of security and is in the process of elementary qualification by the ANSSI (The French National Cubersecurity Agency). Today, the Citadel community represents tens of thousands members among more than 50 companies and organizations. Citadel Team is an instant and trustworthy communication service, developped, hosted and operated by the french Group, Thales.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data. Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With Smartcrypt, your organization can eliminate security gaps, maintain enterprisewide control over sensitive data, and meet your data security goals. PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and more.
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios. Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios.
DataDome is gespecialiseerd in het beschermen en versnellen van digitale bedrijven. Dankzij de AI-gestuurde botbeheeroplossing kunnen bedrijven de prestaties verbeteren van websites die worden belast door intensieve scraping, gebruikersgegevens beschermen tegen hackers en betere marketing- en zakelijke beslissingen nemen dankzij analytische gegevens die niet zijn aangetast door botverkeer. Ontwikkel je botbeheerstrategie en voer deze uit met behulp van het dashboard, rapporten en realtime waarschuwingen. AI-gestuurde botbeheeroplossing om al je kwetsbaarheidspunten (websites, apps) te beschermen en je digitale zaken te versnellen.
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
RIPS is the only code analysis solution dedicated to Java and PHP language. It detects the most complex security vulnerabilities deeply nested within Java and PHP code that no other tools are able to find. It supports all major Java and PHP frameworks, SDLC integration, relevant industry standards and can be deployed as a self-hosted software or used as a cloud service. With its high accuracy and no false positive noise, RIPS is the ideal choice for analyzing your code. Automatically detect real security issues in Java and PHP applications without false positive noise to optimize team efficiency.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics.
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security. Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats. Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.
De disruptieve technologie van Namogoo detecteert en blokkeert ongeautoriseerde product- en promotie-advertenties die worden geïnjecteerd in bezoekerssessies, zodat je klanten niet worden omgeleid naar je concurrenten. Door ongeautoriseerde advertenties te elimineren en te zorgen dat binnendringende content je klantentrajecten niet verstoort, verhoogt Namogoo consequent de conversie en omzet. Namogoo voorkomt het kapen van klanten. De technologie identificeert en blokkeert ongeautoriseerde advertenties die worden geïnjecteerd in websessies van consumenten.
Network security platform that assists users with data protection, dark web monitoring, anti-malware and mobile device security. Network security platform that assists users with data protection, dark web monitoring, anti-malware and mobile device security.
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.
CRYPTOSMART is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises The ultimate solution to secure mobile communications and devices
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.
Infocyte helps you proactively fight back against sophisticated cyber threats. Our award-winning threat detection and incident response platform, Infocyte HUNT, helps security teams detect, isolate, and respond to advanced cyber threats10x faster. What is proactive cyber security? Rather than waiting for alerts to appear and incidents to occur, Infocyte HUNT automatically and continuously scans your environment to proactively identify attackers capable of evading your defensive tooling. Defend your data and fight back against sophisticated cyber attacks. We help you identify, contain, and eradicate threats10x faster.
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.
CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanners, hackers and all other evolving threats. CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases. nstance Resolve is one of the most secure database solution with 6 solutions in 1 product. Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation; Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience. A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you.
An Information Security Management System (ISMS) is a set of policies and procedures implemented by organisations to manage information risks such as cyber attacks or data theft. ISO 27001 is the auditable international standard that requires a company to establish, implement and maintain best-practice information processes via its ISMS. An Information Security Management System (ISMS) is a set of policies and procedures implemented.
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.
R&STrusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&STrusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team. R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. MailGuard is a leading cloud-based email security provider. MailGuard detects and stop new threats 2-48 hours ahead of competitors.
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.