248 resultaten
Waarom Capterra gratis is
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. InsightIDR verzamelt native gegevens van je eindpunten, beveiligingslogboeken en cloud-diensten. Pas gedragsanalyses van gebruikers en aanvallers toe op je gegevens om activiteiten van indringers te vinden bij elke stap van de aanvalsketen. Verenig je beveiligingsgegevens. Detecteer problemen voordat ze ernstig worden. Reageer 20x sneller met visuele onderzoeken en automatisering.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
The iboss cloud provides fast and secure Internet access on any device, from any location, in the cloud.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.
Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Quixxi is an end-to-end mobile app security solution for developers to protect and monitor any mobile app in minutes.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection. Quixxi is also a monitoring tool with Licensing, Analytics & Diagnostics SDK. Allowing developers to identify illegal use & help recover associated lost revenue, detailed insights into customer engagement & advanced debugging files.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Webtoepassing zonder configuratie, API-bescherming en botbeheersing voor Kubernetes.
Prophaze Cloud WAF beschermt organisaties tegen kwaadwillende hackers die gegevens van webtoepassingen of gateways voor mobiele apps of API's proberen aan te vallen en te stelen. In tegenstelling tot traditionele firewalls beschermt Prophaze WAF uitsluitend web- en mobiele API's tegen inbreuk op de beveiliging met behulp van adaptieve profilering en op gedrag gebaseerde machine learning-algoritmen. Het product is native gebouwd op het Kubernetes-platform en beschermt Kubernetes-clusters en cloudinfrastructuur van klanten tegen verschillende aanvalsvectoren.
Prophaze Cloud WAF beschermt organisaties tegen kwaadwillende hackers die gegevens van webtoepassingen of gateways voor mobiele apps of API's proberen aan te vallen en te stelen. In tegenstelling tot...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Helps monitor and analyze networks. Advanced Dropless Collection capabilities.
A complete Network Monitoring solution. Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.
A complete Network Monitoring solution. Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.
Identity management platform that allows businesses to encrypt and securely share data across applications for maintaining privacy.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Contextual cloud security platform that protects native, Kubernetes, and microservices from known and unknown risks.
Why Lightspin Cloud Security Lightspin offers a contextual cloud security platform that protects cloud native, Kubernetes, and microservices from known and unknown risks by empowering security teams with the ability to continuously and effortlessly visualize, detect, and block any attack path in their cloud and Kubernetes environment.
Why Lightspin Cloud Security Lightspin offers a contextual cloud security platform that protects cloud native, Kubernetes, and microservices from known and unknown risks by empowering security teams...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloudaware is een SPOT CMDB voor grootschalige AWS-, Azure- en Google-cloudgebruikers met add-on-modules voor kosten- en veiligheidsbeheer.
Cloudaware is een SaaS multi-cloud beheerplatform met modules als: CMDB (Configuration Management Database), kostenbeheer, scannen op kwetsbaarheden, inbraakdetectie, compliance-systeem, logboekbeheer, en back-ups en replicatie. Cloudaware is ontworpen voor ondernemingen die workloads implementeren bij meerdere AWS-, Azure-, Google-cloudproviders en op locatie. Cloudaware kan out-of-the-box worden geïntegreerd met NewRelic, JIRA, Chef, Puppet, Ansible en meer dan 50 andere producten.
Cloudaware is een SaaS multi-cloud beheerplatform met modules als: CMDB (Configuration Management Database), kostenbeheer, scannen op kwetsbaarheden, inbraakdetectie, compliance-systeem,...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Identiteitsgovernance en -administratie in cloud- en ondernemingsinfrastructuren. Intelligente identiteit. Slimmere beveiliging.
Saviynt biedt intelligente identiteitstoegang en governance voor cloud-, hybride en on-premises IT-infrastructuren om de digitale transformatie van ondernemingen te versnellen. Het platform kan worden geïntegreerd met toonaangevende IaaS-, PaaS- en SaaS-toepassingen, waaronder AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, Salesforce, Workday en vele andere. Het innovatieve geavanceerde IGA 2.0 platform voor risicoanalyse won de Trust Award en werd door Gartner uitgeroepen tot marktleider.
Saviynt biedt intelligente identiteitstoegang en governance voor cloud-, hybride en on-premises IT-infrastructuren om de digitale transformatie van ondernemingen te versnellen. Het platform kan...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation.
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.
Prevents attacks on your APIs and web applications with a data driven approach to AppSec.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
DisruptOps is enabling security and development teams to work together and fix cloud security issues faster.
DisruptOps helps you fix cloud security issues faster and more consistently. Our Cloud Security Detection and Response Platform connects to AWS and Azure clouds and intelligently routes security alerts to the responsible team within the tools they already use. DisruptOps integrates tightly with cloud native logs and assessment tools to quickly and consistently take the appropriate actions and remediate security issues, reducing the risk of compromises due to misconfigurations.
DisruptOps helps you fix cloud security issues faster and more consistently. Our Cloud Security Detection and Response Platform connects to AWS and Azure clouds and intelligently routes security...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organizations public cloud. Digs Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Stop the most common cause of cloud data breaches with Warden, the integrated cloud security and compliance solution for AWS users.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous Vulnerability Monitoring: Prevent exploitable vulnerabilities like open AWS S3 Buckets and disabled MFA with automated detection on Storyfier. Built-in Compliance Reporting: Assess your compliance posture against the CIS Benchmark and AWS Well-Architected Framework.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks....

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.
PAM security solution and real-time threat prevention for cloud, container and datacenter Linux workloads.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs).
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Holistic Security For Your CI/CD Pipeline. Prevent software supply chain attacks and vulnerabilities, from commit to release.
Argon provides security for software development environments' CI/CD pipelines, eliminating the risk from misconfigurations, vulnerabilities and preventing supply chain attacks. This new bread of attacks is an issue all enterprises are dealing with and Argon's solution materially solves the problem in a meaningful way. Argon provides end-to-end AppSec visibility and security platform for the development process and boost your overall security posture.
Argon provides security for software development environments' CI/CD pipelines, eliminating the risk from misconfigurations, vulnerabilities and preventing supply chain attacks. This new bread of...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
End to end encrypted file transfer and dataroom solution with no size restrictions.
End to end encrypted file transfer and dataroom solution with no size restrictions.
End to end encrypted file transfer and dataroom solution with no size restrictions.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.
Web-based platform that includes forgotten password reset, helpdesk assisted password reset, and Windows Login Screen client.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
AWS cloud logs analysis & management tool - get insights into your end user content consumption.
AWS cloud logs analysis & management tool - get insights into your end user content consumption.
AWS cloud logs analysis & management tool - get insights into your end user content consumption.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.
Cloud Raxak automates the delivery of cloud security compliance across the enterprise.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Network security solution that helps businesses predict and identify vulnerabilities while calculating organizational risk scores.
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data.
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Threat Stack provides cloud security & compliance for infrastructure and applications.
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads.
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Scale Out VPC Peering solution designed to manage cloud gateways.
Scale Out VPC Peering solution designed to manage cloud gateways.
Scale Out VPC Peering solution designed to manage cloud gateways.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
A suite that provides accurate, easy to integrate protection from automated cyber-attacks.
PerimeterX is a suite that provides accurate, easy to integrate protection from automated cyber-attacks. It offers cloud-based products for behavior-based bot protection and client-side breach prevention. PerimeterX is designed to safeguard the consumer digital experience on business websites and mobile apps.
PerimeterX is a suite that provides accurate, easy to integrate protection from automated cyber-attacks. It offers cloud-based products for behavior-based bot protection and client-side breach...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Geautomatiseerde AWS-beveiliging en configuratiebewaking om een veilige en compatibele cloudinfrastructuuromgeving te handhaven. Open source.
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Op de Secure DevOps Toolchain van SANS. Amazon Partner.
CloudSploit scant configuraties van AWS-accounts op zoek naar beveiligingsproblemen. Open source, met een volledig gratis optie. Op de Secure DevOps Toolchain van SANS. Amazon Partner.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It ensures high-availability of your website along with in-depth network monitoring and predefined ruleset custom dashboards.
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data.
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud management solution that helps businesses with data management, media migration and information security.
Cloud management solution that helps businesses with data management, media migration and information security.
Cloud management solution that helps businesses with data management, media migration and information security.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Encryption key management solution built to protect your critical data within virtualized environment.
Encryption key management solution built to protect your critical data within virtualized environment.
Encryption key management solution built to protect your critical data within virtualized environment.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Stel de risico's voor je netwerk vast en prioriteer ze met uitgebreide scan- en analyseoplossingen voor kwetsbaarheden.
Skybox Vulnerability Control ondersteunt een systematische aanpak voor vulnerability management zoals geen enkele andere leverancier. Deze oplossing is gebaseerd op uitgebreide zichtbaarheid van je aanvalsoppervlak, en maakt gebruik van zijn context voor het snel analyseren, prioriteren en herstellen van je meest risicovolle kwetsbaarheden.
Skybox Vulnerability Control ondersteunt een systematische aanpak voor vulnerability management zoals geen enkele andere leverancier. Deze oplossing is gebaseerd op uitgebreide zichtbaarheid van je...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills.
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios.
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud-first, hybrid-ready solution delivering behavior-centric, risk-adaptive security across environments via a converged platform.
Forcepoint Edge Protection helps modernize enterprise networks for cloud adoption. Gain visibility and control over SaaS apps and web use while protecting your users wherever they are. Converged solutions like SD-WAN and NGFW combined with behavior-centric, risk-adaptive capabilities provide outside-in security for on-premise and in the cloud. Reduce the cost and complexity of connecting remote locations with cloud-delivered, zero-footprint security services.
Forcepoint Edge Protection helps modernize enterprise networks for cloud adoption. Gain visibility and control over SaaS apps and web use while protecting your users wherever they are. Converged...

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Cloud storage management solution that enables organizations to manage, sync, and share business files with co-workers.
Secure storage solution for managing, syncing, and sharing business files.
Secure storage solution for managing, syncing, and sharing business files.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen
Mobile collaboration platform that helps businesses automate versioning of overwritten documents and restore deleted files.
Mobile collaboration platform that helps businesses automate versioning of overwritten documents and restore deleted files.
Mobile collaboration platform that helps businesses automate versioning of overwritten documents and restore deleted files.

Functies

  • Dreigingsanalyse
  • Gedragsanalyse
  • Toepassingsbeveiliging
  • Inbraakdetectiesysteem
  • Eindpuntbeheer
  • Authenticatie in twee stappen