71 Ergebnisse
Warum Capterra kostenlos ist
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Sicherer Zugriff auf Internet- und Unternehmensressourcen mit einer einzigen Lösung.
Fyde hilft Unternehmen mit zunehmend verteiltem Personal, das Risiko von Verstößen zu minimieren, indem es den Mitarbeiter*innen, Partner*innen, Auftragnehmer*innen und Outsourcer*innen einen sicheren Zugriff auf kritische Unternehmensressourcen ermöglicht.
Fyde hilft Unternehmen mit zunehmend verteiltem Personal, das Risiko von Verstößen zu minimieren, indem es den Mitarbeiter*innen, Partner*innen, Auftragnehmer*innen und Outsourcer*innen einen...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs).
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
ThreatSTOP DNS Defense turns your existing DNS into true Protective DNS (PDNS) with continuous updates from 900+ feeds.
DNS Defense Outbound Threat Protection ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done. DNS Defense turns your existing DNS into true Protective DNS (PDNS). DNS Defense provides granular, proactive DNS threat protection, and includes everything you need in a simple service
DNS Defense Outbound Threat Protection ThreatSTOP DNS Defense enables true Protective DNS (PDNS) with continuous updates from 900+ Threat Intelligence sources. DNS Defense turns your existing...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.
Cloud based solution designed to monitor the endpoint to develop advanced user behavior analytics and anomaly detection.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Secure Cloud Storage Gateway
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt also protects data at rest within the secure storage container it creates within the cloud storage target.
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
IntSights ist eine externe Bedrohungsanalyse- und Schutzplattform, die entwickelt wurde, um Bedrohungen außerhalb des Drahts zu neutralisieren.
IntSights ist eine externe Bedrohungsanalyse- und Schutzplattform, die speziell dafür entwickelt wurde, Bedrohungen außerhalb des Drahts zu neutralisieren. Die IntSights-Lösungssuite stattet Cybersicherheitsteams weltweit aus, um Bedrohungen in ihrer Quelle effektiver zu erkennen, zu verhindern und zu beseitigen.
IntSights ist eine externe Bedrohungsanalyse- und Schutzplattform, die speziell dafür entwickelt wurde, Bedrohungen außerhalb des Drahts zu neutralisieren. Die IntSights-Lösungssuite stattet...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Kunden verlassen sich auf Check Points NGFWs (Next Generation Firewalls), um höchste Sicherheitseffizienz zu genießen.
Check Point hält seine Fähigkeit aufrecht, Organisationen vor raffinierten Cyber-Angriffen der fünften Generation zu schützen. Check Points NGFW wird über die Check Point Infinity-Architektur angeboten und umfasst 23 Firewall-Modelle, die für die gleichzeitige Ausführung aller Bedrohungsabwehr-Technologien optimiert sind. Hierzu zählt eine vollständige SSL-Traffic-Inspektion, ohne dass Kompromisse bei der Sicherheit oder Leistung eingegangen werden müssen.
Check Point hält seine Fähigkeit aufrecht, Organisationen vor raffinierten Cyber-Angriffen der fünften Generation zu schützen. Check Points NGFW wird über die Check Point Infinity-Architektur...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Next-generation managed detection and response (MDR) powered by patented AI technology, for proactive threat detection and response.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform, AI.saac, powers their services to enhance detection and response against complex, targeted, and unknown attacks. Paladion helps organizations ensure robust security by staying proactive in their efforts with advanced software and expert consulting services.
Paladion provides next-gen managed detection and response (MDR) services to technology, manufacturing, and cloud-first companies across the US. Their patented artificial intelligence platform,...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Strobes is a risk-based Vulnerability Management Platform for Enterprises with 25+ open-source vulnerability assessment scanners!
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and simplifying the prioritization of findings using threat intelligence. Get actionable insights into the overall security health index of your organization.
Strobes is a risk-based Vulnerability Management Platform for Enterprises. Streamline vulnerability management by correlating vulnerabilities from multiple sources, automatically de-duplicating and...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.
Process secure transactions, meet PCI compliance and protect your application from malicious attacks.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe!
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.
Network security tool that helps businesses prevent ransomware attacks to provide protection across web browsers and downloaded files.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung
Appgate SDP ist eine Zero-Trust-Netzwerkzugriffslösung, die die Zugriffskontrollen für hybride Unternehmen vereinfacht und verstärkt.
Appgate SDP ist eine Zero-Trust-Netzwerkzugriffslösung, die die Zugriffskontrollen für alle Nutzer, Geräte und Workloads vereinfacht und stärkt. Die Lösung bietet sicheren Zugriff für komplexe und hybride Unternehmen, indem sie komplexe Bedrohungen verhindert, Kosten senkt und die betriebliche Effizienz steigert. Die vollständige Suite von Appgate-Lösungen und -Dienstleistungen schützt mehr als 650 Organisationen – von Regierung über Fortune 50 bis hin zu globalen Unternehmen.
Appgate SDP ist eine Zero-Trust-Netzwerkzugriffslösung, die die Zugriffskontrollen für alle Nutzer, Geräte und Workloads vereinfacht und stärkt. Die Lösung bietet sicheren Zugriff für komplexe und...

  • Threat Response
  • Priorisierung
  • Schwachstellen-Scannen
  • Aktivitäts-Dashboard
  • Datenvisualisierung
  • Überwachung