Netzwerksicherheit Software

Netzwerksicherheit Software verhindert den unbefugten Zugriff auf ein Computernetzwerk. Organisationen verwenden diese Anwendungen, um unbefugte, böswillige oder unbeabsichtigte Eingriffe in oder Verwendung von sicheren Systemen zu verhindern. Netzwerksicherheitslösungen wurden entwickelt, um legitimen Datenverkehr über die heutigen komplexen Unternehmensnetzwerke zu erkennen und ungewöhnliche Ereignisse für weitere Untersuchungen zu isolieren sowie wichtige Sicherheitsüberwachungs- und Compliance-Funktionen durchzuführen. Zu den Funktionen gehören Anti-Spam, Anti-Virus und Angriffserkennung. Netzwerksicherheit Software ist mit PC Sicherheitsprogrammen und Netzwerk-Monitoring Software verbunden.

Warum Capterra kostenlos ist
Aobo Internet Filter for Mac is a stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications. Support multi-computer setup with easy steps. A stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications.

von Vallum Software

(0 Bewertungen)
The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data and alerts. Installation of a free universal agent, included as part of the installation, will provide more extensive metrics on CPU, Memory, Disk, Network, processes and services. Vallum Halo is web based is a web based enterprise network monitoring solution.
east-tec InvisibleSecrets 4 hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution & real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer. The complete security suite for all your data/communication needs

von Data Encryption Systems

(0 Bewertungen)
Security solution that allows software authors to protect their applications against unpaid use. Security solution that allows software authors to protect their applications against unpaid use.

von Visual Click Software

(0 Bewertungen)
Email alerts when users are locked out of Active Directory? Email alerts when folders are 'drag-n-dropped'? Failed logon alerting that can be isolated to the kerberos error? CPTRAX for Windows provides real-time enterprise-wide alerting and auditing for your Windows and Active Directory environments. Areas covered include Windows File Systems (NTFS) including permission changes, Active Directory, Server Authentication and Group Policy. Does not use or rely on Windows Event Logs. Provides real-time enterprise-wide alerting and auditing for your Windows Servers, Workstations and Active Directory environments.

von Mission2Mars

(0 Bewertungen)
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.

von LogPoint

(0 Bewertungen)
Die SIEM-Lösung von LogPoint extrahiert auf intelligente Weise Ereignisse und Vorfälle aus Milliarden Protokollen, die in jeder IT-Infrastruktur beliebiger Größe vorhanden sind. Gefilterte und sorgfältig korrelierte Echtzeitergebnisse werden in einfach zu verwaltenden Dashboards angezeigt, die basierend auf den spezifischen Rollen und Zuständigkeiten der einzelnen Benutzer konfiguriert werden können. LogPoint ist eine effektive und wertvolle SIEM-Lösung für Unternehmen aller Größen wegen ihres einzigartigen Designs und der reichhaltigen Funktionen.

von BAE Systems

(0 Bewertungen)
Our CyberReveal platform analyses the behaviour of devices on your network and their connections with the internet to pick out attacks from within legitimate network traffic. Skilled security analysts investigate suspicious activity and raise security incidents when you need to take action. Our Threat Intelligence function monitors key attack groups, ensuring that the latest techniques can be detected. Advanced Threat Detection helps you to stop sophisticated attacks with the potential for serious impact to your business.

von IWASSA

(0 Bewertungen)
Single-sign-in for each user and secured service for file sharing. Single-sign-in for each user and secured service for file sharing.

von Ntrepid

(0 Bewertungen)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

von Solana Networks

(0 Bewertungen)
SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks. SmartFlow distills network traffic & flow data into more than 20 different stat measures. SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks.

von USEReady

(0 Bewertungen)
Be self reliant on data with our agile analytics, governance and security solutions. Be self reliant on data with our agile analytics, governance and security solutions.

von Qrator Labs

(0 Bewertungen)
Die proprietäre, ständig aktualisierte Technologielösung reduziert die mit DDoS-Angriffen aller Art verbundenen Risiken erheblich. Die proprietäre, ständig aktualisierte Technologielösung reduziert die mit DDoS-Angriffen aller Art verbundenen Risiken erheblich.

von Lancera

(0 Bewertungen)
Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness. Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness.

von Vormetric

(0 Bewertungen)
Vormetric hilft Unternehmen, sich sicher und schnell zu bewegen und Vertrauen zu schaffen, indem es Data-at-Rest über alle Kanäle und Umgebungen hinweg sichert. Da die Kunden wissen, dass ihre Daten sicher sind, können sie schneller reagieren und Vertrauen zwischen den Benutzern und über alle Kanäle, Anwendungen und Umgebungen hinweg schaffen. Vormetric hilft, die sichere Übernahme neuer Datenumgebungen zu realisieren. Vertrauen, Geschwindigkeit und Sicherheit durch Verschlüsselung der Daten, die das Geschäft aufbauen, mit Vormetrics Data Security.

von Illumio

(0 Bewertungen)
Adaptive security tool that enables processes on physical and virtual hosts through prevention of the spread of breaches. Adaptive security tool that enables processes on physical and virtual hosts through prevention of the spread of breaches.

von VIPole

(0 Bewertungen)
VIPole ist eine verschlüsselte Kommunikationsplattform für Einzelpersonen, Teams und Unternehmen. Es bietet sichere Messaging-, File-Sharing-, Telefon- und Videokonferenzen sowie eine ganze Reihe von Zusammenarbeit-Tools für Unternehmen, wie einen Organizer, Notizen, Tagesplaner und einen Passwort-Tresor. Alles im System ist während der Übertragung und im Ruhezustand vollständig E2E-verschlüsselt. Eine Reihe von erweiterten Admin-Tools ermöglicht eine zentralisierte Kontrolle und umfassende Benutzerverwaltung für vollständige Sicherheit. Sichere Geschäftskommunikation mit verschlüsselten Nachrichten-, Anruf-, Video-, Freigabe- und Kollaborations-Tools in einer einzigen Plattform.

von vArmour

(0 Bewertungen)
Das softwarebasierte verteilte Sicherheitssystem von vArmour bietet die einzige integrierte Lösung für die Mikrosegmentierung mit erweiterten Sicherheitsanalysen für Netzwerke, Anwendungen und Nutzer auf dem Markt. Die erweiterbare Architektur von vArmour bietet Sicherheit in privaten und öffentlichen Clouds mit einem einzigen Ort zur Richtlinienverwaltung. Darüber hinaus bietet vArmour kontextabhängigen Sichtbarkeitsverkehr von Schicht 2 zu Schicht 7 kombiniert mit Inline-Sicherheitsrichtliniensteuerungen, die seitliche Angriffe verhindern und isolieren. Softwarebasierte verteilte Sicherheitssysteme bieten die branchenweit einzige integrierte Lösung für die Mikrosegmentierung mit Sicherheitsanalyse.

von NopSec

(0 Bewertungen)
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

von FireLayers

(0 Bewertungen)
Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application. Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.

von Kenna Security

(0 Bewertungen)
Kenna Security integriert Schwachstellen-Scan-Daten mit großen Datenanalysen und mehreren Exploit-Feeds, um das Risiko einer Ausnutzung einer Schwachstelle vorherzusagen. Sie berechnet Risikobewertungen für dein Unternehmen, deine Organisationen und deine kritischen Asset-Gruppen. Die Sanierungsanleitung priorisiert Patches mit der größten Risikominderung. Umsetzbare Ergebnisse werden innerhalb weniger Stunden nach der Installation der Scan-Daten erreicht. Kenna Security verwendet Exploit Intelligence-Feeds, um Schwachstellen zu identifizieren, die stark ausgenutzt werden und dein Unternehmen in Gefahr bringen.

von Onion ID

(0 Bewertungen)
Solution for IT Infrastructure Security to prevent insider threats. Solution for IT Infrastructure Security to prevent insider threats.
DataDome ist spezialisiert im Schutz und der Beschleunigung digitaler Unternehmen. Dank der KI-basierten Bot-Management-Lösung können Unternehmen die Leistung von Websites verbessern, die durch intensives Scraping belastet werden; Nutzerdaten vor Hackern schützen und bessere Marketing- und Geschäftsentscheidungen dank Analysedaten treffen, die nicht durch den Bot-Verkehr kontaminiert sind. Entwickle und implementiere deine Bot-Management-Strategie dank des Dashboards, Berichten und Echtzeit-Benachrichtigungen. KI-basierte Bot-Management-Lösung zum Schutz all deiner Schwachstellen (Websites, Apps etc.) und zur Beschleunigung deines digitalen Geschäfts

von Cossack Labs

(0 Bewertungen)
Cossack Labs ist mit Themis bestrebt, Risiken bei der Datensicherheit durch die Entwicklung von nutzerfreundlichen, plattformübergreifenden Lösungen zu mindern, mit denen Daten auf einfache Weise in Unternehmensinfrastrukturen oder eigenständigen Anwendungen sowie über verteilte Anwendungseinstellungen und über das Internet bereitgestellte Daten geschützt werden können. Lösung, die Datensicherheit bietet und Open-Source- und kommerzielle Instrumente für den Datenschutz und die Sicherheit in deinem Unternehmen bietet.

von InfiSecure Technologies

(0 Bewertungen)
InfiSecure Technologies Inc is a cutting-edge Web Application Security company that specializes in protecting WebsitesI from OWASP Top Automated Threats such as web scraping / price scraping, account hijacking, carding fraud, form spam and application-level DDoS attacks. It is designed to give online businesses finely tuned control over bot traffic on their websites. InfiSecure is a robust bot protection platform to detect and block automated attacks on websites in real-time.

von LogRhythm

(0 Bewertungen)
Gain real-time visibility into your network to detect threats, perform forensic investigations, support audits, and identify operational issues. LogRhythm NetMon is a highly-functional, intuitive, and cost-effective network monitoring and forensics solution that delivers enterprise-wide network visibility. From automatic application identification to full packet capture and customizable Deep Packet Analytics, NetMon provides the data you need to protect your organization. Get started for free. LogRhythm NetMon provides full and intuitive network visibility critical for threat detection and rapid incident response.

von PerimeterX

(0 Bewertungen)
A new approach for Accurate, Easy to Integrate Protection from Automated Attacks A new approach for Accurate, Easy to Integrate Protection from Automated Attacks

von Terabit Security

(0 Bewertungen)
Network security tool that provides elimination of DoS/DDoS attacks through 64-bit multivendor compatibility. Network security tool that provides elimination of DoS/DDoS attacks through 64-bit multivendor compatibility.

von L7 Defense

(0 Bewertungen)
Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks. Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks.

von Corax

(0 Bewertungen)
Eine Cloud-basierte Software, die hilft, Entscheidungen zu treffen und Maßnahmen zu ergreifen, um Cyberkriminalität und Datenverlust zu verhindern. Eine Cloud-basierte Software, die hilft, Entscheidungen zu treffen und Maßnahmen zu ergreifen, um Cyberkriminalität und Datenverlust zu verhindern.

von Hypori

(0 Bewertungen)
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

von IronCore Labs

(0 Bewertungen)
An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption. An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption.

von GENIANS

(0 Bewertungen)
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution. Re-imagined Network Access Control for the World of IoT

von RBLTracker

(0 Bewertungen)
Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media. Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.

von E8 Security

(0 Bewertungen)
Machine-learning analytics solution to identify unknown threats already inside the network Machine-learning analytics solution to identify unknown threats already inside the network

von Parablu

(0 Bewertungen)
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt also protects data at rest within the secure storage container it creates within the cloud storage target. Secure Cloud Storage Gateway

von Sqreen

(0 Bewertungen)
Runtime Application Self Protection (RASP) für Entwickler. Sie schützt Webanwendungen während ihrer Laufzeit vor Angriffen. Die Schutzlogik wird ohne Änderung des Quellcodes oder Umleitung des Verkehrs in die Anwendung eingeführt. Nach der Bereitstellung bietet Sqreen Echtzeitüberwachung und Schutz vor zahlreichen Schwachstellen, z. B. SQL-Injektionen, XSS, Kontoübernahme, Bad Bots, Sicherheitsscanner usw. Sqreen wird innerhalb von 30 Sekunden installiert und erfordert keine Konfiguration oder Wartung. Eine automatisierte Echtzeitsicherheitslösung für Entwickler. Sie schützt Webanwendungen während ihrer Laufzeit vor Angriffen.

von Appknox

(0 Bewertungen)
Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck. Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck.

von CloudSploit

(0 Bewertungen)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment.
Corero Network Security is a leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and digital enterprises rely on Corero's award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, with comprehensive visibility, analytics and reporting. This industry leading technology delivers flexible protection that scales to tens of terabits, with a lower cost of ownership than formerly possible. Leader in real-time, high-performance, automatic DDoS detection and mitigation, with comprehensive visibility, analytics and reporting.

von shareOptic

(0 Bewertungen)
Security solution that allows you to remain compliant while uncovering data security threats. Security solution that allows you to remain compliant while uncovering data security threats.

von Pwnie Express

(0 Bewertungen)
Pulse erkennt, inventarisiert und klassifiziert alle IT- und IoT-Geräte und bildet eine umfassende Identität für jedes Gerät. Die Geräteerkennung und -klassifizierung wird kontinuierlich durchgeführt, ohne dass Agenten oder Netzwerkänderungen erforderlich sind. Pulse überwacht kontinuierlich das Verhalten von Geräten und zugehörigen Systemen auf Indikatoren für Beeinträchtigung oder Sabotage und erstellt dann verwertbare Informationen über Bedrohungen und Risiken. Reagiere direkt von Pulse aus, um IoT-Gerätbedrohungen für deine Systeme zu neutralisieren. Pulse identifiziert und bewertet kontinuierlich alle Geräte und IoT-Systeme und bietet die Möglichkeit, auf Netzwerkbedrohungen zu reagieren.

von BluSapphire

(0 Bewertungen)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

von Leakwatch

(0 Bewertungen)
Solution that monitors your data to detect leaks in real time and enable you to take action quickly. Solution that monitors your data to detect leaks in real time and enable you to take action quickly.

von HaltDos

(0 Bewertungen)
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It ensures high-availability of your website along with in-depth network monitoring and predefined ruleset custom dashboards. HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.

von Unistal Systems

(0 Bewertungen)
Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology. Unistal provides best Data Recovery Software that Recovers Lost or Deleted Files From Windows,Mac,Linux,Hard Disk,Pen Drive,etc

von UpGuard

(0 Bewertungen)
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. Get complete visibility into the configuration of every server, network device, and cloud app you're running.

von Abusix

(0 Bewertungen)
Überwache und schütze dein Netzwerk vor Missbrauch mit dieser All-in-one-Lösung. Überwache und schütze dein Netzwerk vor Missbrauch mit dieser All-in-one-Lösung.

von NTP Software

(0 Bewertungen)
With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your companys sensitive file data and intellectual property. With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment

von CacheGuard Technologies

(0 Bewertungen)
An Appliance oriented Operating System dedicated to Web traffic Security and Optimization. CacheGuard embeds a gateway antivirus, a URL filtering facility, a firewall, a traffic shaping facility, an SSL inspection facility, a Web proxy, a reverse proxy, a Web application load balancer, a Web application firewall, a traffic logger and much more. An Appliance oriented Operating System dedicated to Web traffic Security and Optimization.

von ManageEngine

(0 Bewertungen)
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Web-based SSH Key and SSL Certificate Management Solution for Enterprises

von ZEVENET

(0 Bewertungen)
POWERFUL AND EASY TO USE. The virtual appliance is aimed to provide massive scalability, high availability and increased security for your services, applications and networks. FAST DEPLOYMENT, READY TO GO. No need of installation solution, what allows a quick production consolidation. The ZVA lightweight and portable format allows to be deployed in the most popular hypervisors with a broad integration capabilities to be integrated easily in your infrastructure ensuring a cost-effective solution. Multi layered Application Delivery Controller for application, services, networks and datacenters.

von Marty Soft Conception

(0 Bewertungen)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

von IMMUNIO

(0 Bewertungen)
A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time. A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.

von CloudFish

(0 Bewertungen)
Eine Netzwerksicherheitslösung, die die nächste Generation von Sicherheitsinfrastrukturprodukten für die Cloud erstellt. Eine Netzwerksicherheitslösung, die die nächste Generation von Sicherheitsinfrastrukturprodukten für die Cloud erstellt.

von Cyberint

(0 Bewertungen)
In an age of digital transformation, businesses are exposed to far greater cyber risks and threats. CyberInt's Managed Detection and Response services track your digital channels, responding to advanced cyber threats missed by standard security controls, protecting your brand, digital assets and customers. CyberInt is trusted by the world's top finance, retail and telecommunication organizations. CyberInt provides Managed Detection and Response for the Digital Business.

von Artica Tech

(0 Bewertungen)
Eine leistungsstarke Lösung für große und multinationale Unternehmen, die Internetleistung protokolliert, Anforderungen filtert und Berichte verwaltet. Eine leistungsstarke Lösung für große und multinationale Unternehmen, die Internetleistung protokolliert, Anforderungen filtert und Berichte verwaltet.
Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach. Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach.

von Moonshot Technologies

(0 Bewertungen)
A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting. A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting.

von SecureNok

(0 Bewertungen)
Secure-NOK offers SNOK, an easy-to-use, state-of-the-art tool for monitoring, detection, and early warning of cybersecurity events in industrial control and automation systems. Through our products and services, Secure-NOK enables well-informed security decisions. We provide knowledge and awareness of security risks and their consequences and support our customers with holistic defense strategies and solutions. SNOK from SecureNok is a cybersecurity monitoring system for industrial networks to detect espionage, sabotage, and malware intrusion

von MePin

(0 Bewertungen)
MePIN is a mobile app authenticator and a universal authentication service, providing compliance and strong security with exceptional user experience. Use MePIN as a service or on-premise as a white label strong authentication platform. MePIN supports two-factor authentication, passwordless login, digital signatures, biometrics, FIDO & legacy OTPs; choose your authentication methods and policies, or offer them all for the end-users to choose. Integration is easy with unified MePIN Services API. One API delivering compliance, digital signatures, biometrics, payment authorization, multi-factor authentication and more.

von Sepior

(0 Bewertungen)
Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys

von SentryBay

(0 Bewertungen)
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. On-premise solution that provides real-time protection of user data from malware and phishing attacks

von Difenso

(0 Bewertungen)
Difenso is a data security software that helps companies protect sensitive data in cloud and intranet Difenso is a data security software that helps companies protect sensitive data in cloud and intranet

von PrimeSoft Solutions

(0 Bewertungen)
Eine Netzwerksicherheitslösung mit Zugriffsagenten, Service-Controller und sicheren Service-Gateway-Funktionen. Eine Netzwerksicherheitslösung mit Zugriffsagenten, Service-Controller und sicheren Service-Gateway-Funktionen.
CIGLOO is the next generation browser isolation management platform, It provides organizations with the ability to enforce web isolation and assures that all malicious browsers code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data. CIGLOO is A browser isolation management platform, you can browse on a remote browser so all browsers malicious code will be out.

von Haystax

(0 Bewertungen)
The Haystax Analytics Platform enables organizations to move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities and people. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we've developed a system for transforming human expertise into probabilistic models that can evaluate complex security problems and prioritize an organization's risks. A platform that applies multiple artificial intelligence techniques to monitor threats and prioritize security risks.

von Mithi Software Technologies

(0 Bewertungen)
ClrStream is the email security, continuity and durability solution for your MS Exchange, Office 365, MDaemon, Postfix, PostMaster, Zimbra & other mail solutions. ClrStream protects your email servers from Spam, Virus, Ransomware and DDOS attacks. It also provides email continuity when the primary mail server is unavailable or down. When bundled with Vaultastic, email data durability is guaranteed at 99.99999999999%. All without any lengthy and costly email service migrations. Protect business system and critical data against malicious intent with ClrStream

von BlueTalon

(0 Bewertungen)
Delivers data-centric security across big data environments and eliminates security blind spots. Delivers data-centric security across big data environments and eliminates security blind spots.

von Tavve

(0 Bewertungen)
Security and network management software that securely manages applications and devices across firewall partitioned networks. Security and network management software that securely manages applications and devices across firewall partitioned networks.

von Ozon

(0 Bewertungen)
OZON protect eCommerce site, data and transactions against all web cyber-attacks, hackers, fraudsters and malicious bots. OZON protect eCommerce site, data and transactions against all web cyber-attacks, hackers, fraudsters and malicious bots.

von GSLB.me

(0 Bewertungen)
Autoritäre, dynamische und Geo-DNS, Traffic-Balancing, CDN-Offload, Domain Services und DNS-Firewall. Mit voller DNSSEC-Unterstützung. Autoritäre, dynamische und Geo-DNS, Traffic-Balancing, CDN-Offload, Domain Services und DNS-Firewall. Mit voller DNSSEC-Unterstützung.

von AIONCLOUD

(0 Bewertungen)
AIONCLOUD is a simple way to secure your website. AIONCLOUD is total web security service to safeguard websites from various attacks and improve your business performance. AIONCLOUD detects and blocks malicious activities and protects critical data from the latest threats such as SQL injection, DDos, homepage defacement, information leaks, identity theft and malware. A cloud-based web security service to protect your website that provides Cloud WAF and SITECHECKER.
[email protected] cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers [email protected] cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers

von DATCOM

(0 Bewertungen)
Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture. Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture.

von Zartech

(0 Bewertungen)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

von Privacyware

(0 Bewertungen)
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

von Ridgeback Network Defense

(0 Bewertungen)
Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea of Interactive Deception. The Ridgeback Interactive Deception Platform influences adversary behavior, leading the adversary to engage in behaviors that reveal malicious intent. Ridgeback creates the appearance of billions of unavoidable phantom resources in the network, each a landmine that stops lateral exploits in real time. Up and running in ten minutes. An enterprise security software platform that defeats malicious network invasion in real time.

von Access Watch Technologies

(0 Bewertungen)
Access Watch verbessert deine Sicherheitsebene gegen kostspieligen und bösartigen Robotertraffic. Reduziere Angriffe auf deine und Missbrauch deiner Website durch Bad Bots und reduziere die Hostingkosten um bis zu 30 %. Fortschrittliche Robotererkennung mit präziser Sicherheit, niedrigeren Hosting-Kosten und höherer Anwendungsleistung.

von IAInnocationLab

(0 Bewertungen)
Netzwerksicherheitslösung für VPN mit Mac OS, die PPTP und L2TP von 10.7 bis zur neuesten Version von Mac unterstützt. Netzwerksicherheitslösung für VPN mit Mac OS, die PPTP und L2TP von 10.7 bis zur neuesten Version von Mac unterstützt.

von Invinsec

(0 Bewertungen)
It doesnt matter what you buy.. Our technology sits on top of your existing systems. We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network This real time view constantly monitors for potential threats, and compliance issues 24/7/365. If we find something nasty we tell you. Our response speed is the fastest in the industry. Its all designed to put you back in control (fast) Helps aggregate all business technology systems into one security dashboard giving a real-time and on-demand view of required network.

von Gridinsoft

(0 Bewertungen)
Eine Netzwerksicherheitslösung zur Säuberung von Viren, zur Wiederherstellung der Computerleistung und mehr. Eine Netzwerksicherheitslösung zur Säuberung von Viren, zur Wiederherstellung der Computerleistung und mehr.

von Threatcare

(0 Bewertungen)
Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations. Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations.

von Black Bird Cleaner Software

(0 Bewertungen)
A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more. A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more.

von Cloudnosys

(0 Bewertungen)
Cloudnosys platform delivers security, compliance, cost and DevOps automation. Continually scan entire your AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc. Provides DevOps automation such as on/off/snooze, snapshot management and identifies costs savings by improving asset utilization for Azure and AWS. Meet PCI, HIPAA, FISMA, AWS CIS Benchmark compliance quickly. Provides easy guided remediation and audit functions. CloudEye Continuously Secure your cloud services and automate compliance. Continuous Security Scanning and Alert on Vulnerabilities.

von Flowmon Networks

(0 Bewertungen)
Netzwerkleistungsüberwachungsplattform, mit der IT-Experten den Netzwerkverkehr überwachen und Netzwerkprobleme beheben können. Netzwerkleistungsüberwachungsplattform, mit der IT-Experten den Netzwerkverkehr überwachen und Netzwerkprobleme beheben können.

von South River Technologies

(0 Bewertungen)
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cloud & on-premise tool that helps manage file transfer across servers with multi-layer security, collaboration & automation.

von G-TAC Software

(0 Bewertungen)
NTFS permission tool to get effective security of data on system through permissions for files and folders. NTFS permission tool to get effective security of data on system through permissions for files and folders.

von Sentinel IPS

(0 Bewertungen)
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

von EdgeWave

(0 Bewertungen)
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure. Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points

von Comodo Group

(0 Bewertungen)
Web security tool that enables endpoint malware detection through scanning and cleaning. Web security tool that enables endpoint malware detection through scanning and cleaning.

von Cato Networks

(0 Bewertungen)
Verwalte ein WAN, bewerte die Echtzeit-Transportqualität und verwende das Policy-basierte Routing, um anwendungsspezifischen Datenverkehr zu routen. Verwalte ein WAN, bewerte die Echtzeit-Transportqualität und verwende das Policy-basierte Routing, um anwendungsspezifischen Datenverkehr zu routen.

von Fox and Geese

(0 Bewertungen)
Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Website change monitoring to catch outages, bugs, and monitor overall web app integrity.

von NCP engineering

(0 Bewertungen)
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.

von Outpost24

(0 Bewertungen)
HIAB is an automated vulnerability management tool that scans & secures internal networks (in relation with employee, consultants,suppliersforexample).The solution edits reports with concrete remediation solutions. It also integrates a web application scanner. HIAB can be deployed as physical or virtual servers. And even if it is a stand-alone scanning tool, it can be implemented with other Outpost24 tools or managed services. The Oupost24's support team is available 24/7. HIAB is an automated vulnerability management solution that scans and secures internal networks (used by employee, suppliers...).
ditno Network Firewall hat den traditionellen Server-Schutz vereinfacht. Das Unternehmen ermöglicht es jeder Organisation, unabhängig von Größe und Komplexität, den Schutz auf Unternehmensebene auf jedem Server in jeder Umgebung mit minimalem Aufwand und ohne vorherige Verpflichtung zu nutzen. ditno Network Firewall bietet eine zentrale Ansicht, mit der alle Server einheitlich visualisiert und verwaltet werden können. Dadurch werden die Anforderungen an spezialisierte FTEs und die hohen Betriebskosten erheblich reduziert. Network Firewall hat den traditionellen Serverschutz vereinfacht.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

von Cybonet

(0 Bewertungen)
Single, affordable network security solution providing network visibility, vulnerability management and breach detection. Single, affordable network security solution providing network visibility, vulnerability management and breach detection.

von MyIP.io

(0 Bewertungen)
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

von Buffer Zone

(0 Bewertungen)
Network security solution that provides endpoint security solutions protecting organizations from ransomware and phishing scams. Network security solution that provides endpoint security solutions protecting organizations from ransomware and phishing scams.