Utilizza Capterra in Italia per trovare il miglior Cybersecurity Software per la tua attività.
Filtra i risultati (221)
Valutazione del prodotto
- Cloud, SaaS, Web (142)
- Dispositivi mobili - Android nativo (30)
- Dispositivi mobili - iOS nativo (29)
- Installazione eseguita - Mac (41)
- Installazione eseguita - Windows (69)
- Analisi dei dati comportamentali (81)
- Elenco elementi consentiti / elenco elementi non consentiti (70)
- Gestione degli endpoint (58)
- Gestione della conformità (22)
- Gestione delle minacce del web (29)
- Gestione di incidenti (59)
- Identificazione di indicatori di compromissione (IOC) (27)
- Intelligenza artificiale e apprendimento automatico (73)
- Scansione delle vulnerabilità (75)
- Sicurezza delle applicazioni (22)
SolarWinds Threat Monitor - Service Provider Edition è una piattaforma veloce, scalabile, basata sul cloud, creata per consentire ai Managed Service Provider (MSP) orientati alla sicurezza, di utilizzare uno strumento unificato per monitorare le reti gestite per le minacce e analizzare i registri rispetto alle minacce più recenti e aggiornate, in base a informazioni di intelligence provenienti da tutto il mondo. Elimina rapidamente le minacce dei tuoi clienti e prepara le informazioni necessarie a dimostrare la loro conformità con gli standard stabiliti dagli enti normativi. Ulteriori informazioni su SolarWinds Threat Monitor SolarWinds® Threat Monitor è lo strumento necessario per rilevare, correggere e segnalare eventi di sicurezza per tutte le reti gestite. Ulteriori informazioni su SolarWinds Threat Monitor
TokenEx è una piattaforma di tokenizzazione di classe enterprise che offre una flessibilità praticamente illimitata nel modo in cui i clienti possono accedere ai dati, archiviarli e proteggerli. Essendo in grado di interagire con più canali di accettazione dei dati e mantenendo un approccio indipendente dal processore, TokenEx può tokenizzare e proteggere quasi tutti i tipi di dati inclusi PCI, PII, PHI, compresi i dati in formati non strutturati, e integrarli con qualsiasi processore o endpoint. Ulteriori informazioni su Cloud-Based Tokenization È una piattaforma di protezione dei dati basata sul cloud che offre la tokenizzazione e il vaulting sicuro dei dati nel cloud per tutti i tipi di dati sensibili. Ulteriori informazioni su Cloud-Based Tokenization
Filtro dei contenuti web basato su DNS e livello di sicurezza web per le imprese che bloccano malware, ransomware e phishing, assicurando anche il controllo dei contenuti web. Ogni giorno WebTitan filtra oltre 2 miliardi di richieste DNS, identifica 300.000 iterazioni di malware e vanta oltre 7.500 clienti. Disponibile come gateway o nel cloud. Migliora subito la tua sicurezza informatica. Prova oggi stesso una versione gratuita di WebTitan, con supporto incluso. Sono disponibili ottimi prezzi mensili. Gestito su host locale. Ulteriori informazioni su WebTitan Filtro dei contenuti web basato su DNS per le imprese che blocca malware, ransomware e phishing; fornisce anche un controllo avanzato dei contenuti web. Ulteriori informazioni su WebTitan
MetaPhish ha la capacità di creare e-mail da un insieme di domini di phishing prepopolati simulati. Il software contiene una libreria di esperienze di apprendimento intelligenti come infografica, avvisi e video di formazione. A differenza di altre soluzioni di phishing, il software consente all'utente di attestare o comunicare a ritroso con l'amministratore. MetaPhish MetaPhish consente di mantenere il personale al riparo dalle frodi di phishing tramite un corso di formazione automatizzato che ne aumenta la vigilanza. Ulteriori informazioni su MetaPhish MetaPhish ha la capacità di creare e-mail da un insieme di domini di phishing prepopolati simulati. Ulteriori informazioni su MetaPhish
Netsparker Security Scanner è una soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web. L'esclusiva tecnologia di scansione basata su prove di Netsparker, consente di allocare più tempo per correggere i difetti segnalati, sfruttando automaticamente le vulnerabilità identificate in modo sicuro e di sola lettura e produce anche una prova di sfruttamento. Pertanto è possibile vedere immediatamente l'impatto della vulnerabilità e non è necessario verificarlo manualmente. Ulteriori informazioni su Netsparker Security Scanner Soluzione accurata che identifica automaticamente XSS, SQL Injection e altre vulnerabilità nelle applicazioni web. Ulteriori informazioni su Netsparker Security Scanner
Boxcryptor è un versatile e scalabile software di crittografia per il cloud che supporta oltre 30 provider e la crittografia NAS su tutte le piattaforme. Offre funzionalità di collaborazione, controllo e gestione che consentono di collaborare ai file in modo sicuro, mantenendo al contempo la conformità con le normative sulla privacy. Permette di definire criteri personalizzati, gestire gli utenti con Single Sign-On o Active Directory e proteggere gli account con l'autenticazione a due fattori. La sicurezza Made in Germany assicura la possibilità di lavorare nel cloud in modo sicuro ed efficiente. Ulteriori informazioni su Boxcryptor Soluzione di crittografia multi-piattaforma per sistemi cloud e NAS che supporta oltre 30 provider di servizi cloud (ad esempio Dropbox e OneDrive). Ulteriori informazioni su Boxcryptor
Probely consente ai tecnici della sicurezza e DevOps di fornire app web sicure senza compromettere le scadenze. Integra in modo semplice e automatico i test di sicurezza nel tuo ciclo di vita dello sviluppo Agile, senza disturbare il flusso di lavoro attuale. Esegui continuamente funzioni di sicurezza nelle prime fasi del tuo ciclo di vita dello sviluppo Agile e correggi rapidamente le vulnerabilità. Ottieni istruzioni semplici e dettagliate dal sistema di monitoraggio dei problemi per vedere dove e come risolvere ogni vulnerabilità. Inizia una prova gratuita al 100%. Non è richiesta alcuna carta di credito. Ulteriori informazioni su Probely Probely consente agli esperti della sicurezza e agli sviluppatori software di individuare le vulnerabilità, risolverle e automatizzare facilmente i test di sicurezza. Ulteriori informazioni su Probely
Log360 è una soluzione integrata che combina ADAudit Plus ed EventLog Analyzer in un'unica console. Piattaforma completa, consente di gestire tutte le sfide della gestione dei registri e della sicurezza di rete. Offre raccolta di registri in tempo reale, analisi, correlazione e capacità di archiviazione che consentono di proteggere i dati riservati, contrastare le minacce interne alla sicurezza e combattere gli attacchi esterni. Per soddisfare tutte le esigenze di sicurezza e di ispezione, nonché le richieste di conformità più impellenti, viene fornito con oltre 1.200 report e criteri di avviso predefiniti. Ulteriori informazioni su Log360 Log360 è una soluzione SIEM completa che consente di difendersi dagli attacchi di sicurezza interni ed esterni, offendo anche capacità di gestione dei registri. Ulteriori informazioni su Log360
Protezione multi-vettoriale contro virus e malware, che offre una protezione completa contro tutte le sofisticate minacce malware odierne, inclusi trojan, keylogger, phishing, spyware, backdoor, rootkit, minacce persistenti zero-day e avanzate. Scudo integrato, per identità e privacy, blocca i dati che vengono rubati o acquisiti quando si utilizza Internet, mentre il firewall in uscita impedisce anche che i malware rubino dati. Non c'è bisogno di preoccuparsi o di eseguire aggiornamenti per la sicurezza basata sul cloud, perché gli endpoint sono sempre aggiornati. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection Protezione multi-vettoriale contro virus e malware che offre una protezione completa contro tutte minacce malware odierne più sofisticate. Ulteriori informazioni su Webroot SecureAnywhere Endpoint Protection
Il software Cryptosense Analyzer consente ai clienti di individuare le vulnerabilità della sicurezza nella crittografia utilizzata nelle infrastrutture e applicazioni, per correggerle prima che vengano sfruttate. Questo software è attualmente utilizzato per analizzare i sistemi che proteggono: la maggior parte dei messaggi interbancari di tutto il mondo, oltre la metà di tutto il trading in Forex globale, il database di transazioni finanziarie più grande del mondo e la crittografia utilizzata dai più grandi provider di cloud a livello globale. Ulteriori informazioni su Cryptosense Cryptosense fornisce software per rilevare ed eliminare le vulnerabilità causate dalle violazioni della crittografia in applicazioni e infrastrutture. Ulteriori informazioni su Cryptosense
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location.
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Cybersecurity platform for IT professionals that helps with content filtering, threat detection, reporting, API integration and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.
ESM+Strategy helps organizations design, track, and adapt their strategic plan. With automated Balanced Scorecards, strategy maps, dashboards, and instant reports, ESM brings strategy to life. When starting out, you'll go through a tutorial to enter in key strategic objectives, measures, and initiatives. Once the strategic architecture is in place, organizations use ESM to centrally collect updates on progress, eliminating the need for exhausting spreadsheets and slide decks. Track the progress of your strategic plan with Balanced Scorecards, Strategy Maps, dashboards, and instantly generated exports.
Barkly sostituisce gli antivirus di vecchia generazione con la protezione più potente, la tecnologia più intelligente e la gestione più semplice attualmente disponibili. Barkly blocca gli attacchi su tutti i vettori e gli intenti, compresi exploit, script, eseguibili e ransomware. L'architettura brevettata a 3 livelli di Barkly consente una visibilità impareggiabile in tutti i livelli del sistema, inclusa la CPU, per bloccare gli attacchi. Barkly è incredibilmente semplice da gestire e implementare: non è richiesta alcuna competenza in termini di policy, configurazione o sicurezza. Barkly Endpoint Protection sostituisce gli antivirus di vecchia generazione con la protezione più potente, la tecnologia più intelligente e la gestione più semplice attualmente disponibili.
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Cyber risk management platform that automates self-assessments and their validation for third-party suppliers.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Solutions to secure information for your organization, your employees, your vendors and yourself. Modern products for risk, compliance and security leaders to better protect critical information. Solutions to secure your information.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK. Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
LogRhythm is a leader in NextGen SIEM, empowering enterprises to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats. The LogRhythm NextGen SIEM Platform combines security analytics; UEBA; network detection and response (NDR); and SOAR in a single end-to-end solution. LogRhythm's technology serves as the foundation for modern security operations centers (SOCs), helping customers measurably secure their cloud, physical, and virtual infrastructures. LogRhythm empowers organizations to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats.
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes.
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks. CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and media. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Funzioni di cancellazione remota, blocco e individuazione per tutti i sistemi operativi. DriveStrike è una soluzione di protezione di dati e dispositivi per i dispositivi smarriti, rubati, mancanti o ritirati. Ti consente di proteggere i dispositivi che sono sfuggiti al tuo controllo, per prevenire la compromissione dei dati. Dagli account personali alle organizzazioni Fortune 500 che operano in ambito sanitario, legale, dei servizi finanziari, governativo, e-commerce e intrattenimento, DriveStrike previene le violazioni dei dati per garantire riservatezza, conformità e vantaggio competitivo. Cancellazione remota dei dati di computer e dispositivi mobili per tutti i sistemi operativi e tipi di hardware.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Cloud-based risk management platform that helps firms manage compliance, IT, vendors, audits and documentation.
OnDMARC è un prodotto Red Sift. Red Sift è una piattaforma cloud aperta, che rende la sicurezza informatica accessibile a tutti, per prevenire gli attacchi. OnDMARC facilita l'implementazione e il mantenimento di procedure sicure basate sul protocollo DMARC. OnDMARC non solo elabora report XML complessi, ma utilizza la tecnologia più recente per guidare l'utente verso una protezione completa. OnDMARC è un prodotto per la protezione delle e-mail che aiuta organizzazioni di tutte le dimensioni a implementare con sicurezza il protocollo DMARC.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data. Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Investigation platform that helps enterprises perform threat investigations through tracking employee misconduct, frauds, chats & more while performing root cause analysis. Investigation platform that helps enterprises perform threat investigations through tracking employee misconduct, frauds, chats & more.
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk.
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
SecurityScorecard is a cyber security risk rating platform that helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company's approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard's proprietary SaaS platform offers an unmatched breadth and depth of critical data points. Cyber security risk rating platform that provides instant visibility into the security posture of any organization.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Zeguro offers an end-to-end cyber safety platform for small to mid-sized businesses (SMBs), offering a comprehensive suite of tools for risk mitigation and compliance, as well as insurance premiums tailored to the size, sector and risk profile of a company. Use our intuitive tools to prevent cyber attacks, and your insurance costs go down. Its a win-win for your business, and for your peace of mind. Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With Smartcrypt, your organization can eliminate security gaps, maintain enterprisewide control over sensitive data, and meet your data security goals. PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and more.
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.
DataDome è specializzato nella protezione e nell'accelerazione delle attività digitali. Grazie alla sua soluzione di gestione dei bot basata sull'intelligenza artificiale, le imprese possono migliorare le prestazioni dei siti web appesantiti da un intenso scraping, proteggere i dati utente dagli hacker, prendere decisioni di marketing e di business migliori con dati di analisi non contaminati dal traffico di bot. Sviluppa ed esegui la tua strategia di gestione dei bot grazie a dashboard, report e avvisi in tempo reale Una soluzione di gestione dei bot con tecnologia basata sull'intelligenza artificiale, per proteggere tutte le vulnerabilità (siti web, applicazioni...) e far crescere la tua impresa digitale
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.