73 resultaten
Waarom Capterra gratis is
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors. It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices. KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Prevent misaddressed emails.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
USB and endpoint security solution!
With Security.Desk you can define exactly which users are allowed to transfer which files from and to removable media and which file types are not allowed. All file movements can be logged. > Enabling and blocking of specific interfaces > Storage media and file types > Shadowing / logging of data and file transfers > Active Directory integration > Rights management at all levels > Central control station > Bad-USB protection and much more.
With Security.Desk you can define exactly which users are allowed to transfer which files from and to removable media and which file types are not allowed. All file movements can be logged. >...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
It is a cybersecurity solution that helps businesses conduct behavioral analysis, manage bots, scan for malware, and more.
Myra Web Application Security is a cybersecurity solution that helps protect content and applications across websites of businesses in finance, insurance, and healthcare, and eCommerce sectors. The platform enables administrators to optimize the security for companies responsible for social systems or essential food delivery. To complete such tasks, the company uses certain technology to prevent malicious code from being injected into systems, among other things.
Myra Web Application Security is a cybersecurity solution that helps protect content and applications across websites of businesses in finance, insurance, and healthcare, and eCommerce sectors. The...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
The future of Cyber Defense warfare. Easy to use localized console with toolkit for new and expert users.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential. Payment schedules are flexible.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Triage

Triage

(0) Lokaal product Lokaal product
Triage is een ultramoderne online sandbox om malware te detecteren, en kan opgeschaald worden tot maximaal 500.000 analyses per dag.
Triage is een online, platform-onafhankelijke sandbox om malware te detecteren en te analyseren. Het kan gebruikt worden op macOS-, Windows-, Linux- en Android-systemen. De applicatie heeft een minimalistisch grafisch ontwerp en presenteert in de overzichten enkel de voor de gebruiker relevante gegevens. Voor inzicht in alle bij de analyse gegenereerde gegevens, of om Triage in een workflow te integreren, is er een uitgebreide REST API beschikbaar.
Triage is een online, platform-onafhankelijke sandbox om malware te detecteren en te analyseren. Het kan gebruikt worden op macOS-, Windows-, Linux- en Android-systemen. De applicatie heeft een...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Microsoft 365 Defender enables businesses to stop attacks with automated, cross-domain security and built-in AI.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsofts XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed....

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats across endpoints.
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats, incidents, and other online threats across endpoints and systems.
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats, incidents, and other online threats across endpoints and systems.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
The ultimate next-generation antivirus powered by market-leading threat intelligence, forensics, and firewall integration.
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis, process and behavior-based examination, and real-time cloud inspection. It is the detection-oriented counterpart to our threat prevention offering, Heimdal Threat Prevention. Besides its EDR features, Heimdal NGAV comes with complete firewall integration, which will further secure your workstations.
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis,...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks.
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This includes both fileless and file-based strains for complete, round-the-clock safety. It can detect any encryption attempt, even those that have no signatures or behavioral patterns. Our solution was built to be universally compatible with any antivirus, be it Heimdal’s own NGAV or something else.
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
DIARIO is a malware detection software that scans attachments without compromising privacy or sharing content
DIARIO is a document malware detection tool that analyzes and scans documents for malware. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. For users that do not want to upload entire documents, they are given the choice to use the special client feature which would allow them to only upload certain parts.
DIARIO is a document malware detection tool that analyzes and scans documents for malware. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. For users that...

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Enterprise-class threat detection, isolation, and remediation.
Enterprise-class threat detection, isolation, and remediation.
Enterprise-class threat detection, isolation, and remediation.

Functies

  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren