Network Security Software

Utilizza Capterra in Italia per trovare il miglior Network Security Software per la tua attività.

Perché Capterra è gratis
Visita il sito web
Acunetix è leader nel mercato dei software di sicurezza automatico per le applicazioni web. Il software analizza il sito web per verificare l'assenza di vulnerabilità come SQL Injection e XSS. La soluzione Acunetix Online comprende la scansione della sicurezza della rete disponibile gratuitamente per un periodo massimo di un anno. Ulteriori informazioni su Acunetix Acunetix Online comprende la scansione di sicurezza della rete disponibile gratuitamente per un periodo massimo di un anno. Ulteriori informazioni su Acunetix
Visita il sito web
Il modulo Network Detective Security Assessment è un ottimo strumento utilizzato dagli MSP per identificare le minacce alla sicurezza interne ed esterne per clienti esistenti e potenziali. La funzione di scansione della rete non è invadente: non è necessario installare funzioni di analisi, agenti o software. Genera report sui rischi per la sicurezza completamente personalizzati, piani di gestione della sicurezza, report sugli accessi anomali, report di scansione delle vulnerabilità esterne, report sulla sicurezza in uscita, report sulla responsabilità per violazione dei dati e molto altro ancora. Ottieni una demo oggi stesso. Garanzia soddisfatti o rimborsati. Ulteriori informazioni su Network Detective Network Detective Security Assessment Module è un ottimo strumento utilizzato dagli MSP per eseguire valutazioni continue della sicurezza IT. Ulteriori informazioni su Network Detective
Visita il sito web
NetFlow Analyzer utilizza la tecnologia di flusso per monitorare e analizzare l'utilizzo della larghezza di banda della rete. Consente di identificare ed evitare ritardi e ostacoli della larghezza di banda con report personalizzati e impostare avvisi via email/SMS basati sulla soglia, per comprendere la gravità di un problema. Questo strumento analitico di facile utilizzo rileva, esegue diagnosi e risolve le anomalie della rete e le intrusioni di tipo zero-day in tempo reale e pianifica la tua futura larghezza di banda in base al modello di tendenza dell'utilizzo, ottimizzandone così l'utilizzo. Ulteriori informazioni su NetFlow Analyzer Uno strumento completo di analisi del traffico, basato sul flusso, che offre una visione olistica dell'attività del traffico di rete in tempo reale. Ulteriori informazioni su NetFlow Analyzer
Visita il sito web
Intruder trova i punti deboli delle proprietà digitali online, spiega i rischi e consente di eliminare i problemi prima che possa verificarsi una violazione. I connettori cloud per AWS, Google Cloud e Azure consentono di sincronizzare i sistemi, pertanto non viene trascurato alcun aspetto. Le integrazioni degli sviluppatori con Slack e Jira consentono di mantenere facilmente sempre aggiornato il sistema. Ulteriori informazioni su Intruder Intruder trova i punti deboli delle proprietà digitali online, spiega i rischi e consente di eliminare i problemi prima che possa verificarsi una violazione. Ulteriori informazioni su Intruder
Visita il sito web
Filtro dei contenuti web basato su DNS che blocca malware, ransomware e tentativi di phishing; fornisce anche un controllo avanzato dei contenuti web. Ogni giorno questo software filtra oltre mezzo miliardo di richieste DNS e identifica 60.000 iterazioni di malware per oltre 7.500 clienti. Disponibile come gateway o nel cloud. Migliora subito la sicurezza della tua rete. Prova oggi stesso una versione gratuita di WebTitan, con supporto incluso. Ulteriori informazioni su WebTitan Filtro dei contenuti web basato su DNS per le imprese che blocca malware, ransomware e phishing; fornisce anche un controllo avanzato dei contenuti web. Ulteriori informazioni su WebTitan
Visita il sito web
SolarWinds Threat Monitor - Service Provider Edition è una piattaforma veloce, scalabile, basata sul cloud, creata per consentire ai Managed Service Provider (MSP) orientati alla sicurezza, di utilizzare uno strumento unificato per monitorare le reti gestite per le minacce e analizzare i registri rispetto alle minacce più recenti e aggiornate, in base a informazioni di intelligence provenienti da tutto il mondo. Elimina rapidamente le minacce dei tuoi clienti e prepara le informazioni necessarie a dimostrare la loro conformità con gli standard stabiliti dagli enti normativi. Ulteriori informazioni su SolarWinds Threat Monitor SolarWinds® Threat Monitor è lo strumento necessario per rilevare, correggere e segnalare eventi di sicurezza per tutte le reti gestite. Ulteriori informazioni su SolarWinds Threat Monitor

da Fyde

(0 recensioni)
Visita il sito web
Fyde aiuta le aziende con una forza lavoro sempre più distribuita a mitigare il rischio di violazioni, consentendo l'accesso sicuro alle risorse aziendali critiche a dipendenti, partner, appaltatori e addetti all'outsourcing. Ulteriori informazioni su Fyde Accesso sicuro a Internet e alle risorse aziendali con un'unica soluzione. Ulteriori informazioni su Fyde

da Netikus.net

(0 recensioni)
Visita il sito web
Soluzione SIEM ibrida che combina il monitoraggio dei registri in tempo reale (eventi) con lo stock FIM, SW/HW e altro per un approccio integrato per aumentare la sicurezza della rete. La normalizzazione univoca del registro eventi di sicurezza e il motore di correlazione con avvisi e-mail descrittivi forniscono un contesto aggiuntivo, presentando gli eventi di sicurezza criptici di Windows in report di facile comprensione, che offrono informazioni oltre a ciò che è disponibile dagli eventi non elaborati. Un ciclo di rilascio dinamico aggiunge costantemente funzionalità per sfide tempestive come Ransomware. Ulteriori informazioni su EventSentry Soluzione di monitoraggio SIEM ibrida del registro eventi e del registro in tempo reale con monitoraggio di Active Directory, dell'integrità del sistema, dello stock e della rete. Ulteriori informazioni su EventSentry

da ManageEngine

(0 recensioni)
Visita il sito web
EventLog Analyzer è una soluzione completa per la gestione dei registri, con rilevamento e analisi delle minacce in tempo reale. È in grado di correlare eventi disparati che si verificano nella rete e include anche una piattaforma per la gestione delle informazioni e degli incidenti associati alle minacce. Offre report di ispezione predefiniti per consentire di tenere traccia delle attività che si verificano in database, server web, dispositivi Windows, dispositivi perimetrali di rete e altre risorse. Aiuta anche a soddisfare le normative sulla conformità come PCI DSS, SOX, HIPAA, FISMA e GDPR. Ulteriori informazioni su EventLog Analyzer EventLog Analyzer è una soluzione completa per la gestione dei registri che offre molteplici funzionalità di sicurezza in un'unica piattaforma unificata. Ulteriori informazioni su EventLog Analyzer

da ManageEngine

(0 recensioni)
Visita il sito web
Firewall Analyzer è un software di gestione dell'analisi dei registri e della configurazione senza agente, che analizza i registri dei firewall e genera notifiche di avviso in tempo reale, report sulla sicurezza e la larghezza di banda. Questa soluzione è un software indipendente dal fornitore e supporta oltre 50 fornitori di firewall. Consente inoltre agli amministratori di ottenere report completi sugli eventi di sicurezza permettendo loro di adottare misure per mitigare i rischi per la sicurezza. Ulteriori informazioni su ManageEngine Firewall Analyzer Firewall Analyzer è un software di gestione dell'analisi dei registri e della configurazione che consente visibilità completa sull'intera sicurezza della rete. Ulteriori informazioni su ManageEngine Firewall Analyzer
Visita il sito web
Keyhub è una piattaforma completa per la gestione del ciclo di vita dei certificati. È progettata per gestire gli ID digitali delle macchine attraverso il rilevamento, l'organizzazione e il monitoraggio dei certificati digitali in automatico. Fornisce sottodomini approfonditi e scansioni delle reti interne, panoramica dell'integrità del sistema nella dashboard, inventario di facile navigazione, creazione di report sulle scadenze e molto altro ancora. Ulteriori informazioni su Keyhub Piattaforma unica per la gestione degli ID digitali delle macchine attraverso il rilevamento, l'organizzazione e il monitoraggio dei certificati digitali in automatico. Ulteriori informazioni su Keyhub

da Skybox Security

(0 recensioni)
Visita il sito web
Skybox Network Assurance assicura la completa visibilità tra ambienti fisici IT, multi-cloud e tecnologie operative (OT), mettendo a disposizione il contesto necessario per comprendere come i dispositivi di rete e i controlli di sicurezza interagiscono o lasciano esposti. Garantisce continuamente che l'accesso esistente a un'infrastruttura non superi il livello di accesso desiderato previsto nelle proprie politiche e scopre i potenziali vettori di attacco, compresi quelli che potrebbero essere utilizzati nei movimenti laterali. Ulteriori informazioni su Network Assurance Visualizza la superficie di attacco su reti IT fisiche, multi-cloud e di tecnologie operative. Ulteriori informazioni su Network Assurance
AVG Antivirus Business Edition 2018 mantiene i dati della tua impresa e quelli dei tuoi clienti protetti contro ransomware, virus, malware e minacce improvvise, in tempo reale. È dotato di nuove funzionalità basate sul cloud come CyberCapture, rilevamento dei malware migliorato e uno scudo web potenziato. Questo prodotto include anche la gestione remota gratuita e un' ottimo strumento di creazione dei report. Anche l'interfaccia utente del client è aggiornata. Disponibile per PC, desktop e server Windows. AVG offre assistenza telefonica gratuita 24 ore su 24, 7 giorni su 7 ai propri clienti. Ulteriori informazioni su AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 mantiene la tua PMI e i dati dei tuoi clienti al sicuro dalle minacce online, in tempo reale. Ulteriori informazioni su AVG Antivirus Business Edition

da South River Technologies

(0 recensioni)
Visita il sito web
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Ulteriori informazioni su Cornerstone MFT Server Cloud & on-premise tool that helps manage file transfer across servers with multi-layer security, collaboration & automation. Ulteriori informazioni su Cornerstone MFT Server

da ManageEngine

(4 recensioni)
Visita il sito web
Log360 è una soluzione integrata che combina ADAudit Plus ed EventLog Analyzer in un'unica console. Piattaforma completa, consente di gestire tutte le sfide della gestione dei registri e della sicurezza di rete. Offre raccolta di registri in tempo reale, analisi, correlazione e capacità di archiviazione che consentono di proteggere i dati riservati, contrastare le minacce interne alla sicurezza e combattere gli attacchi esterni. Per soddisfare tutte le esigenze di sicurezza e di ispezione, nonché le richieste di conformità più impellenti, viene fornito con oltre 1.200 report e criteri di avviso predefiniti. Ulteriori informazioni su Log360 Log360 è una soluzione SIEM completa che consente di difendersi dagli attacchi di sicurezza interni ed esterni, offendo anche capacità di gestione dei registri. Ulteriori informazioni su Log360
Avast Business Antivirus Pro Plus 2019 è un potente pacchetto di protezione di endpoint, e-mail, server e rete all-in-one, per piccole e medie imprese (ideale per aziende da 1 a 500 dipendenti). È in grado di funzionare su PC, Mac e server Windows. Arricchito da 18 funzionalità all'avanguardia, garantisce la sicurezza della tua azienda. Include antivirus, server, e-mail e funzioni per la sicurezza di rete potenti, CyberCapture, firewall, gestione delle password, VPN e molto altro. Può essere utilizzato con console nel cloud o senza. Ulteriori informazioni su Avast Business Antivirus Pro Plus Soluzione antivirus pluripremiata, all-in-one pronta a proteggere ogni aspetto della tua impresa. Disponibile per PC, Mac e server. Ulteriori informazioni su Avast Business Antivirus Pro Plus
Protezione multi-vettoriale contro virus e malware, che offre una protezione completa contro tutte le sofisticate minacce malware odierne, inclusi trojan, keylogger, phishing, spyware, backdoor, rootkit, minacce persistenti zero-day e avanzate. Scudo integrato, per identità e privacy, blocca i dati che vengono rubati o acquisiti quando si utilizza Internet, mentre il firewall in uscita impedisce anche che i malware rubino dati. Non c'è bisogno di preoccuparsi o di eseguire aggiornamenti per la sicurezza basata sul cloud, perché gli endpoint sono sempre aggiornati. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection Protezione multi-vettoriale contro virus e malware che offre una protezione completa contro tutte minacce malware odierne più sofisticate. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection

da Netsurion

(0 recensioni)
Visita il sito web
Netsurion consente alle organizzazioni di prevedere, prevenire, rilevare e rispondere con successo alle minacce di sicurezza informatica. La piattaforma SIEM, EventTracker, unisce machine learning, analisi del comportamento e coordinamento della sicurezza, ed è stata riconosciuta come SIEM, per 11 anni consecutivi, sul Magic Quadrant di Gartner. Il servizio di sicurezza gestito, EventTracker SIEMphonic, offre un servizio SIEM co-gestito, guidato da un centro operativo per la sicurezza, 24 ore su 24, 7 giorni su 7. EventTracker EDR (registrazione dati eventi) protegge anche gli endpoint critici da attacchi zero-day e malware mutanti. Ulteriori informazioni su EventTracker Fornendo SIEM, registrazione dati eventi e un centro operativo per la sicurezza 24 ore su 24, 7 giorni su 7, questa soluzione offre, in modo rapido ed efficiente, una protezione avanzata dalle minacce e il coordinamento della sicurezza. Ulteriori informazioni su EventTracker

da Flowmon Networks

(0 recensioni)
Visita il sito web
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Ulteriori informazioni su Flowmon Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics. Ulteriori informazioni su Flowmon
Cloud Platform è un insieme di servizi modulari basati sul cloud che ti consentono di creare qualsiasi componente, da semplici siti web ad applicazioni complesse. Cloud Platform è un insieme di servizi modulari basati sul cloud che ti consentono di creare qualsiasi componente, da semplici siti web ad applicazioni complesse.
Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now. Real-time monitoring, email alerts, monitor multiple devices in one dashboard, easy-to-use for Windows and Linux servers & switches.
Visualizza profilo
Lo scopo di questa soluzione è aiutare le aziende a proteggere le proprie reti e connessioni Internet. Questo servizio VPN aggiunge un ulteriore livello di protezione per le comunicazioni. Ciò è possibile mediante una crittografia avanzata che viene applicata al traffico in entrata e in uscita per fare in modo che nessuna terza parte possa accedere a informazioni riservate. Proteggi la tua organizzazione dalle violazioni di sicurezza. Accesso sicuro al team da remoto. Semplifica la sicurezza della rete aziendale. Permette di accedere a contenuti online specifici di una regione da qualsiasi parte del mondo. NordVPN applica una crittografia avanzata al traffico Internet per fare in modo che nessuna terza parte possa violare le comunicazioni aziendali.
Visualizza profilo
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
Visualizza profilo
File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering. File server security solution that helps businesses through network protection, scan scheduling, and traffic filtering.
Visualizza profilo
Proteggere i tuoi dati e le tue informazioni è la sua unica preoccupazione. Ecco perché Norton ti fa questa audace promessa: dal momento in cui diventi idoneo per la Protezione virus 100% Norton, un esperto Norton ti aiuterà a mantenere i tuoi dispositivi liberi da virus, altrimenti verrai rimborsato. Gestione centralizzata della normativa con protezione antivirus scalabile e multipiattaforma in tutta l'impresa.
Visualizza profilo
Con il lancio di LogMeIn Central e LogMeIn Pro, le soluzioni di prossima generazione di LogMeIn per l'accesso remoto e la gestione dei sistemi, LogMeIn IT Reach non è più disponibile per nuovi clienti. I clienti IT Reach esistenti continueranno a ricevere supporto e verranno assistiti nella transizione ai nuovi prodotti. Soluzione basata sul cloud che fornisce la gestione di sistemi remoti per desktop, server e computer portatili.
Visualizza profilo
Difesa multilivello che offre protezione endpoint intelligenti attraverso una tecnologia basata sull'intelligenza artificiale. Difesa multilivello che offre protezione endpoint intelligenti attraverso una tecnologia basata sull'intelligenza artificiale.
Visualizza profilo
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications. OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities enterprise management
Visualizza profilo
Splunk is a customizable data analytics platform that turns data into answers. Investigate, monitor and act to gain operational intelligence and improve business outcomes. Splunk is a customizable data analytics platform that turns data into answers.
Visualizza profilo
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
Visualizza profilo
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Cybersecurity platform for IT professionals that helps with content filtering, threat detection, reporting, API integration and more.
Visualizza profilo
SecureLink is the leader in providing vendor privileged access and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLinks secure, purpose-built platform. SecureLink is headquartered in Austin, Texas. SecureLink is the leader in vendor privileged access management for highly regulated enterprise organizations and technology vendors.
Visualizza profilo
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates. Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Network security tool that helps businesses of all sizes protect DNS networks against internet abuse, web-borne malware threats & more. Network security tool that helps businesses of all sizes protect DNS networks against internet abuse, web-borne malware threats & more.
Visualizza profilo
Proteggi gli utenti da programmi dannosi come virus, worm, Trojan, hacker, spam e altre forme di intrusione. Proteggi gli utenti da programmi dannosi come virus, worm, Trojan, hacker, spam e altre forme di intrusione.
Visualizza profilo
RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end. RMail is an all-in-one service extension for powerful email, offering email encryption, e-delivery proof, e-signatures and more.
Visualizza profilo
REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up. REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.
Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform for assess certification, lifecycle and password management with workflow, & SSO. Each customer has their own private instance; maximizing security. With deep integrations to enterprise and cloud apps, our identity management solution automates IT administration tasks through self-service and workflow. Millions of customers trust Avatier to increase productivity, reduce cost and ensure security. Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform.
Visualizza profilo
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Visualizza profilo
THE WORLD'S MOST ADVANCED AD BLOCKER! Get rid of intrusive ads and online tracking, and protect your devices from malware. *AdGuard will deal with annoying banners, pop-ups and video ads once and for all. *AdGuard hides your data from the multitude of trackers and activity analyzers that swarm the web. *Thanks to AdGuard, you will be able to avoid all fraudulent and phishing websites and malware attacks. Available for Windows, Mac, Android, iOS (on App Store). AdGuard is the best way to get rid of intrusive ads and online tracking, and to protect your computer from malware.
Elimina tutti i tipi di minacce, inclusi virus, malware, ransomware, rootkit, worm e spyware, con scansione cloud opzionale per prestazioni e un rilevamento ancora migliori. ESET utilizza tecnologie multilivello che vanno ben oltre le capacità degli antivirus di base. Include protezione anti-spyware, anti-phishing, controllo web, anti-spam e botnet con funzionalità di gestione a distanza. Include protezione anti-spyware, anti-phishing, controllo web, anti-spam e botnet con funzionalità di gestione a distanza.

da Synametrics Technologies

(20 recensioni)
Visualizza profilo
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Visualizza profilo
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Cyber risk management platform that automates self-assessments and their validation for third-party suppliers.

da DNS Made Easy

(17 recensioni)
Visualizza profilo
An ITO solution that offers DNS traffic management with integrated network monitoring services. An ITO solution that offers DNS traffic management with integrated network monitoring services.
Visualizza profilo
Anti-spam solution that enables small to medium businesses to detect and block spyware, malware, phishing frauds and more. Anti-spam solution that enables small to medium businesses to detect and block spyware, malware, phishing frauds and more.
Visualizza profilo
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits. Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.

da IS Decisions

(15 recensioni)
Visualizza profilo
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
Visualizza profilo
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Visualizza profilo
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.
Visualizza profilo
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Visualizza profilo
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology & delivered it as easy-to-deploy and easy-to-manage solutions. With advanced network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables small and midsize enterprises from around the globe to protect their business. As the cyber security landscape is constantly evolving, and new threats emerge each day, WatchGuard solutions keep you secure. WatchGuard offers advanced network security, secure Wi-Fi, and multi-factor authentication to protect small and midsize businesses.
Visualizza profilo
The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe. Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.
Visualizza profilo
La missione è proteggere la tua missione. Duo Security rende pratica la sicurezza, quindi puoi concentrarti su ciò che è importante. Questa soluzione di accesso affidabile, scalabile e basata sul cloud, protegge l'accesso a tutte le applicazioni per qualsiasi utente e dispositivo, da qualsiasi luogo. La soluzione di autenticazione a più fattori (MFA) di Duo è facile da usare, distribuire e implementare, oltre a offrire visibilità e controllo completi dell'endpoint. Questa combinazione di affidabilità utente e dispositivo costituisce la base per un modello di sicurezza zero trust. L'autenticazione a più fattori di Duo Security offre ai tuoi utenti un accesso semplice e immediato alle applicazioni, proteggendoti dal furto di credenziali.
Visualizza profilo
Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most. RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.
Visualizza profilo
Setup a self hosted Jump server (also called Bastion Host or Jump host) quickly to manage SSH access to your Linux servers, AWS instances or other cloud services. Our jumpbox software has features like 2 factor authentication, SAML Authentication, SSH session recording,Identity and Access management (IAM), RBAC, Privileged Access management (PAM),SSH key rotation, root password management, and much more. It would help you meet security compliances such as PCI,NIST,ISO 27001 and more. Setup your SSH Jump Server, Bastion Host in 30 minutes. Setup centralized access to your Linux hosts and meet security compliances.
Visualizza profilo
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications. A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.
Visualizza profilo
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Visualizza profilo
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Visualizza profilo
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.

da 4Securitas

(7 recensioni)
Visualizza profilo
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Visualizza profilo
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.
Visualizza profilo
Ideal for windows users, it is an AntiVirus platform that helps preventing attack of malicious websites, viruses, malware, and others. Ideal for windows users, it is an AntiVirus platform that helps preventing attack of malicious websites, viruses, malware, and others.
Visualizza profilo
Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees. Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.
Visualizza profilo
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.
Visualizza profilo
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options. Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.

da Treetop Innovation

(6 recensioni)
Visualizza profilo
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Visualizza profilo
Protects your office computer against viruses, spyware, worms, and Trojans. Protects your office computer against viruses, spyware, worms, and Trojans.
Visualizza profilo
Developed in 2001, Securence was the 1st cloud based email filtering solution on the market featuring game changing signature based detection. Zero minute detection methods are deployed to counter malware campaigns faster and more accurately than any other solution. Securence is known for the best admin interface, overall effectiveness and lowest pricing on the market. 10 year email archiving, encrypted sending, continuity DR, all optimized to enhance on-prem hosted email, O365 and Gmail. Network security platform which provides email filtering through spam detection, restricted access, keyword scanning and more.

da Palo Alto Networks

(5 recensioni)
Visualizza profilo
Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.
Visualizza profilo
Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments. Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads.
Visualizza profilo
Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device. A single-click, cost-effective cloud VPN that ensures simplified secure network and SaaS resource access for businesses of all sizes.
Visualizza profilo
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
Visualizza profilo
Sophos XG Firewall provides comprehensive next-generation firewall protection powered by deep learning and Synchronized Security. Offering unmatched insights, XG Firewall exposes hidden user, application, and threat risks on the network and is unique in its ability to respond automatically to security incidents by isolating compromised systems with Security Heartbeat. Sophos XG Firewall provides next-generation firewall protection that blocks threats, automatically responds, and exposes hidden risks.
Visualizza profilo
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies. Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Visualizza profilo
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Visualizza profilo
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Visualizza profilo
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Visualizza profilo
This software helps to prevent data leaks and protect your information wherever it is or what form its in. This software helps to prevent data leaks and protect your information wherever it is or what form its in.
Visualizza profilo
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Visualizza profilo
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services.
Visualizza profilo
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Visualizza profilo
See for yourself why thousands of MSPs seeking greater profitability and small IT Departments needing to do more with less use Kaseya VSA to manage and automate network security. With Kaseya's solutions, organizations can manage their entire infrastructure and IT operations, including cloud, on-premise, hybrid, virtualized and distributed environments all from one place. Start your free trial to proactively manage security of network IT assets and applications remotely, easily, and efficiently. Thousands of MSPs and small IT Departments use Kaseya VSA to manage and automate network security. Start your free trial!
Visualizza profilo
Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection. Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Visualizza profilo
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Visualizza profilo
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
Visualizza profilo
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Visualizza profilo
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
Visualizza profilo
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. GlassWire is a modern network monitor & security tool with a built in firewall.
Visualizza profilo
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Visualizza profilo
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

da Oxford BioChronometrics

(2 recensioni)
Visualizza profilo
Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money. Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.
Visualizza profilo
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Visualizza profilo
On-premise and web-based network security platform that allows businesses of all sizes to access restricted WiFi network, social networking sites and more by changing their virtual location. On-premise & web-based network security platform that allows businesses of all sizes to access restricted WiFi network by changing VPN.

da Enigma Software Group USA

(2 recensioni)
Visualizza profilo
Tool that provides malware remediation against online security threats, custom-made fixes, remove, detect and eliminate malware. Malware remediation against online security threats, custom-made fixes, remove, detect and eliminate malware.
Visualizza profilo
CertHat Tools for Microsoft PKI provides you with a web based tools for PKI management. It is easy to install and can manage all of your AD CS servers but can also import external certificates. With CertHat you will be able to track all your certificates and create alerts before they expire. CertHat help you to increase productivity and dramatically reduce the risk of system or business incidents due to expired certificate CertHat provides tools for managing and monitoring digital certificates from Microsoft AD CS but also mother/external PKI sources
Visualizza profilo
OnDMARC è un prodotto Red Sift. Red Sift è una piattaforma cloud aperta, che rende la sicurezza informatica accessibile a tutti, per prevenire gli attacchi. OnDMARC facilita l'implementazione e il mantenimento di procedure sicure basate sul protocollo DMARC. OnDMARC non solo elabora report XML complessi, ma utilizza la tecnologia più recente per guidare l'utente verso una protezione completa. OnDMARC è un prodotto per la protezione delle e-mail che aiuta organizzazioni di tutte le dimensioni a implementare con sicurezza il protocollo DMARC.

da Security Stronghold

(1 recensione)
Visualizza profilo
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more. Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
Visualizza profilo
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox. Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.