Computer Security Software

Utilizza Capterra in Italia per trovare il miglior Computer Security Software per la tua attività.

Perché Capterra è gratis
Gestisci le password con le migliori procedure. Imposta la scadenza della password in base al rischio (30-90 giorni), genera password complesse progettate per bloccare gli attacchi aggressivi da "dizionario", esegui la rotazione automatica delle password e rendi la modifica delle stesse rapida e semplice. Tieni traccia delle modifiche e dell'attività con il controllo delle ispezioni e i report. Onboarding rapido dei tecnici. Revoca l'accesso con un singolo flusso di lavoro e riduci i rischi nei casi in cui i tecnici lasciano la tua azienda. L'accesso può essere limitato. Ulteriori informazioni su SolarWinds Passportal Monitora l'utilizzo delle credenziali, tieni traccia delle modifiche per utente, data e applicazione ed esegui report di controllo delle ispezioni. Ulteriori informazioni su SolarWinds Passportal
Acunetix è uno strumento di sicurezza per computer che esegue la scansione e ispeziona tutte le applicazioni web tra cui HTML5, JavaScript e applicazioni a pagina singola. Scansione di 4.500 vulnerabilità tra cui SQLi e XSS. Viene utilizzato dai settori governativo, militare, istruzione, telecomunicazioni, bancario, finanziario e eCommerce, comprese molte aziende della classifica Fortune 500. Acunetix fornisce una soluzione conveniente, semplice, scalabile e a disponibilità elevata. Disponibile su Windows, Linux e online Ulteriori informazioni su Acunetix Strumento di sicurezza per computer che esegue una scansione del sito web, rileva vulnerabilità come XSS o SQL Injection e fornisce una soluzione. Ulteriori informazioni su Acunetix
Netsparker Security Scanner è una soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web. L'esclusiva tecnologia di scansione basata su prove di Netsparker, consente di allocare più tempo per correggere i difetti segnalati, sfruttando automaticamente le vulnerabilità identificate in modo sicuro e di sola lettura e produce anche una prova di sfruttamento. Pertanto è possibile vedere immediatamente l'impatto della vulnerabilità e non è necessario verificarlo manualmente. Ulteriori informazioni su Netsparker Security Scanner Soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web. Ulteriori informazioni su Netsparker Security Scanner
Probely helps security engineers and software developers achieve automated security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language. Ulteriori informazioni su Probely Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines and disturbing your current work Ulteriori informazioni su Probely
WipeDrive consente a società, enti governativi e privati di cancellare in modo permanente e sicuro i dati da dischi rigidi, supporti rimovibili e dispositivi mobili. Offre un modo conveniente, sicuro e socialmente responsabile di riciclare e disfarsi di computer e dei loro spazi di archiviazione. WipeDrive è il leader mondiale per la distruzione sicura dei dati. Ulteriori informazioni su WipeDrive Offre un modo conveniente, sicuro e socialmente responsabile di riciclare e disfarsi di risorse IT, di computer e dei loro spazi di archiviazione. Ulteriori informazioni su WipeDrive
Filtro dei contenuti web basato su DNS che blocca malware, ransomware e tentativi di phishing; fornisce anche un controllo avanzato dei contenuti web. Ogni giorno questo software filtra oltre mezzo miliardo di richieste DNS e identifica 60.000 iterazioni di malware per oltre 7.500 clienti. Disponibile come gateway o nel cloud. Migliora subito la sicurezza della tua rete e dei tuoi computer. Prova oggi stesso una versione gratuita di WebTitan, con supporto incluso. Ulteriori informazioni su WebTitan Filtro dei contenuti web basato su DNS per le imprese che blocca malware, ransomware e phishing; fornisce anche un controllo avanzato dei contenuti web. Ulteriori informazioni su WebTitan
EventLog Analyzer è una soluzione completa per la gestione dei registri, con rilevamento e analisi delle minacce in tempo reale. È in grado di correlare eventi disparati che si verificano nella rete e include anche una piattaforma per la gestione delle informazioni e degli incidenti associati alle minacce. Offre report di ispezione predefiniti per consentire di tenere traccia delle attività che si verificano in database, server web, dispositivi Windows, dispositivi perimetrali di rete e altre risorse. Aiuta anche a soddisfare le normative sulla conformità come PCI DSS, SOX, HIPAA, FISMA e GDPR. Ulteriori informazioni su EventLog Analyzer EventLog Analyzer è una soluzione completa per la gestione dei registri che offre molteplici funzionalità di sicurezza in un'unica piattaforma unificata. Ulteriori informazioni su EventLog Analyzer
AVG Antivirus Business Edition 2018 mantiene i dati della tua impresa e quelli dei tuoi clienti protetti contro ransomware, virus, malware e minacce improvvise, in tempo reale. È dotato di nuove funzionalità basate sul cloud come CyberCapture, rilevamento dei malware migliorato e uno scudo web potenziato. Questo prodotto include anche la gestione remota gratuita e un' ottimo strumento di creazione dei report. Anche l'interfaccia utente del client è aggiornata. Disponibile per PC, desktop e server Windows. AVG offre assistenza telefonica gratuita 24 ore su 24, 7 giorni su 7 ai propri clienti. Ulteriori informazioni su AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 mantiene la tua PMI e i dati dei tuoi clienti al sicuro dalle minacce online, in tempo reale. Ulteriori informazioni su AVG Antivirus Business Edition
Temi che le password vulnerabili e il loro riutilizzo possano mettere a rischio la sicurezza della tua azienda? Il tuo team IT passa la maggior parte del tempo ad occuparsi di richieste di reimpostazione della password? Risolvi questi problemi con 1Password! Si tratta di un software facile da implementare e gestire ed è considerato affidabile da oltre 30.000 aziende e 15 milioni di utenti in tutto il mondo. Ulteriori informazioni su 1Password Non preoccuparti. Dimentica le password. 1Password le ricorderà tutte per te. Salva le tue password e accedi ai siti con un solo clic. Ulteriori informazioni su 1Password
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Ulteriori informazioni su EventSentry Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring. Ulteriori informazioni su EventSentry
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Ulteriori informazioni su DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Ulteriori informazioni su DriveStrike
Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources for their employees, partners, contractors, and outsourcers. Ulteriori informazioni su Fyde Secure access to Internet and corporate resources with a single solution. Ulteriori informazioni su Fyde
ManageEngine ADAudit Plus è una soluzione dedicata alla sicurezza e alla conformità dei dati informatici. Con oltre 200 report e avvisi in tempo reale, ragguaglia l'utente sulle modifiche apportate al contenuto e alla configurazione di Active Directory, Azure AD e server Windows. Fornisce inoltre un'analisi approfondita degli accessi a workstation e file server (inclusi NetApp ed EMC). ADAudit Plus ti aiuta a monitorare gli utenti che si connettono e disconnettono, analizzare il blocco degli account, eseguire accertamenti su ADFS, ADLDS e stampanti, inoltrare i registri a strumenti SIEM e molto altro ancora. Ulteriori informazioni su ADAudit Plus ADAudit Plus è un software per il monitoraggio delle modifiche apportate ad Active Directory, Azure AD, file server (inclusi NetApp ed EMC) e workstation. Ulteriori informazioni su ADAudit Plus
Avast Business Antivirus Pro Plus 2019 è un potente pacchetto di protezione di endpoint, e-mail, server e rete all-in-one, per piccole e medie imprese (ideale per aziende da 1 a 500 dipendenti). È in grado di funzionare su PC, Mac e server Windows. Arricchito da 18 funzionalità all'avanguardia, garantisce la sicurezza della tua azienda. Include antivirus, server, e-mail e funzioni per la sicurezza di rete potenti, CyberCapture, firewall, gestione delle password, VPN e molto altro. Può essere utilizzato con console nel cloud o senza. Ulteriori informazioni su Avast Business Antivirus Pro Plus Soluzione antivirus pluripremiata, all-in-one pronta a proteggere ogni aspetto della tua impresa. Disponibile per PC, Mac e server. Ulteriori informazioni su Avast Business Antivirus Pro Plus
Protezione multi-vettoriale contro virus e malware, che offre una protezione completa contro tutte le sofisticate minacce malware odierne, inclusi trojan, keylogger, phishing, spyware, backdoor, rootkit, minacce persistenti zero-day e avanzate. Scudo integrato, per identità e privacy, blocca i dati che vengono rubati o acquisiti quando si utilizza Internet, mentre il firewall in uscita impedisce anche che i malware rubino dati. Non c'è bisogno di preoccuparsi o di eseguire aggiornamenti per la sicurezza basata sul cloud, perché gli endpoint sono sempre aggiornati. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection Protezione multi-vettoriale contro virus e malware che offre una protezione completa contro tutte minacce malware odierne più sofisticate. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection
Malware security tool that helps protect personal and private files through hacker attacks protection and payment security. Malware security tool that helps protect personal and private files through hacker attacks protection and payment security.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online. Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Certain software owns comprehensive disk partition management functions such as Merge Partition, Move/Resize Partition, Copy Partition, Create Partition, Split Partition, Delete Partition, Format Partition, and Convert File System. MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications. On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
Cloud Management Suite is a cloud-based IT Management and Security solution allowing IT departments to instantly respond to security events. Whether its a ransomware attack or supporting users on the fly, Cloud Management Suite Realtime Security allows you to manage, patch, and remediate your environment with ease. Stop breaches in real time and remediate vulnerabilities all from one console. Get live, data from 1000s of devices in under 10 seconds
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. GlassWire is a modern network monitor & security tool with a built in firewall.
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more. Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.
Access control solution for corporate apps that supports integration with third party authentication providers. Access control solution for corporate apps that supports integration with third party authentication providers.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
Hushmail is a secure email and web form service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and an iPhone app, there's no complicated installation process. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance and include the required BAA and an archive account. A secure email and web form service that lets you send and receive private, encrypted emails, attachments and web form submissions.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Public key infrastructure; enables, manages and simplifies the use of digital certificates. Public key infrastructure; enables, manages and simplifies the use of digital certificates.
Provides strong encryption, supports multiple protocols, security standards & authentication methods. Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules. Secure password management, end-user dashboards and SSO to thousands of cloud applications!
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM
Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Enables secure system administration, secure file transfer and secure application connectivity with centralized control.
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Ideal for businesses of all sizes, it is a security awareness tool that enables users to recognize threats using simulation technique. Ideal for businesses of all sizes, it is a security awareness tool that enables users to recognize threats using simulation technique.
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
Firewall that provides access control, content security, authentication and centralized management. Firewall that provides access control, content security, authentication and centralized management.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network. On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
Website security test to protect application and server against hackers. Website security test to protect application and server against hackers.
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring. Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.
Make decisive, appropriate responses to incidents by automating identification and resolution processes. Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
Manages all crucial security functions, including authentication, encryption and addressing. Manages all crucial security functions, including authentication, encryption and addressing.
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more. Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
App trust-listing technology. Protects your systems by only allowing trusted applications to execute. App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Bodi is a complete end-point security platform encompassing... Phishing prevention- prevents users from accidentally clicking on malicious links Insider threat detection stop data theft with real time alerts based on defined rules Usage analysis detailed analysis of app usage, web browsing, printing, activity Forensic evidence full recording and keyword search for detailed investigations Remediation full remote control capabilities to correct device related issues Integrate- API Support Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements.
Dhound IDS fornisce funzioni di raccolta e analisi di eventi di sicurezza, basate su agente, per il tuo server/dispositivo Internet. Offre: raccolta e analisi di eventi di sicurezza agentless per il cloud (AWS), rilevamento e avvisi su intrusioni e attività sospette, controllo del traffico in uscita e rilevamento delle perdite di dati, controllo degli accessi e analisi completa degli indirizzi IP per le indagini sugli incidenti, tracciamento degli eventi personalizzati che sono particolarmente importanti per la tua impresa online. Dhound è uno strumento di monitoraggio della sicurezza e di rilevamento delle intrusioni per server su Internet, nel cloud e per le applicazioni web.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.
Enables access to information through encryption, providing information security, privacy and confidentiality. Enables access to information through encryption, providing information security, privacy and confidentiality.
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

da Radient Software

(0 recensioni)
A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.
Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.
Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.

da NeoByte Solutions

(0 recensioni)
On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web. On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web.

da Odyssey Technologies

(0 recensioni)
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Create encrypted archives and self-extracting .exe files for secure storage and file sharing.

da PCSecurityShield

(0 recensioni)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Internet security software helping businesses track threats, run device scans and more.