109 risultati
Perché Capterra è gratis
Soluzione di monitoraggio dell'attività degli utenti, che consente di acquisire registrazioni video, identificare gli utenti e generare registri di controllo testuali.
Permette di creare report 24 ore su 24 e 7 giorni su 7 e di riprodurre di tutte le sessioni, siano esse con accesso in remoto o da console. Con supporto per Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC e NetOP, ObserveIT è indipendente dal protocollo e dall'applicazione client. ObserveIT acquisisce metadati testuali durante la registrazione. Queste informazioni dettagliate sullo stato del sistema operativo e dell'applicazione in uso permettono di trovare sessioni utente pertinenti senza la necessità di riprodurre l'intera registrazione.
Permette di creare report 24 ore su 24 e 7 giorni su 7 e di riprodurre di tutte le sessioni, siano esse con accesso in remoto o da console. Con supporto per Terminal Services, Citrix, Remote Desktop,...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
All-in-One Solution for Sophisticated Content Analysis and Migration
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple sources into Enterprise Content Management systems (ECMs).
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data recovery solution that helps businesses retrieve media as well as documents from hard drives, USB flash disks, SD cards, and more.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Tracking for your data to avoid data leaks and prevent others from using your source code
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Automatic, SaaS backup, and on-demand restore
Quit playing lost and found with your data. Achieve data protection greatness with AvePoints full-fidelity backup and recovery, automatic and on-demand backups, and top-notch Microsoft Azure Encryption.
Quit playing lost and found with your data. Achieve data protection greatness with AvePoints full-fidelity backup and recovery, automatic and on-demand backups, and top-notch Microsoft Azure...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Somansa provides total data loss prevention to monitor, prevent, and discover sensitive data in emails, cloud, social media, and USBs.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance requirements. Somansa provides its worldwide customers in Financial, Healthcare, Manufacturing, Telecom/Media, and Government with a total DLP solution to Monitor, Prevent, and Discover sensitive data in motion, Emails, Cloud and at rest, USBs, Printing, etc.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Antimalware solution that come with multilayered threat detection using behavior analytics and dynamic detection to identify threats.
Antimalware solution that come with multilayered threat detection using behavior analytics and dynamic detection to identify threats.
Antimalware solution that come with multilayered threat detection using behavior analytics and dynamic detection to identify threats.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Take critical information protection to the next level. Clearswift's Adaptive-DLP is data loss prevention redefined.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The solution offers an automated, disruption-free and content-aware approach to protecting the unauthorized loss of sensitive data through email, the internet, including cloud collaboration applications, and removable devices. A-DLP includes real-time redaction, encryption, blocking or deleting.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA.
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA.
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
The Dathena Citizen Suite helps companies address data privacy challenges and comply to complex data privacy regulations.
Organisations that need to comply with complex data privacy regulations, such as GDPR, CCPA etc. must understand what data they have, where it is and which files contain personal data. For organisations that need to get a better grip on what they have, the Dathena Citizen suite helps discover all their data and builds detailed personal data libraries, so data protection officers and decision makers can better protect their data and comply with privacy regulations
Organisations that need to comply with complex data privacy regulations, such as GDPR, CCPA etc. must understand what data they have, where it is and which files contain personal data. For organisatio...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors.
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors to reduce risk of data loss. Accelerate forensic investigations, and reduce false positives, ensuring that resources are spent on alerts most likely to be fraudulent.
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors to reduce risk of data loss. Accelerate forensic investigations, and reduce...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Monitors and protects websites against the latest threats affecting online businesses/eCommerce.
Monitors and protects websites against the latest threats affecting online businesses/eCommerce.
Monitors and protects websites against the latest threats affecting online businesses/eCommerce.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data loss prevention solution designed to fill the gap between excessively feature-rich DLP software.
Data loss prevention solution designed to fill the gap between excessively feature-rich DLP software.
Data loss prevention solution designed to fill the gap between excessively feature-rich DLP software.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown.
Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown.
Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Continuous data protection to ensure vital systems and applications remain operational.
Arcserve Continuous Availability ensures business continuity with proven technologies that have one common purpose: to keep your business up and running during unplanned disruptions. Confidently deliver on the most stringent service level agreements (SLAs) by continuously replicating data at the file system level of files/folders and applications, and full physical/virtual systems, with heartbeat-powered automatic failover to ensure they remain operational.
Arcserve Continuous Availability ensures business continuity with proven technologies that have one common purpose: to keep your business up and running during unplanned disruptions. Confidently...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Cloud security software to protect your companies data.
Cloud security software to protect your companies data.
Cloud security software to protect your companies data.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Protects sensitive client data in a database if the database is breached
Protects sensitive client data in a database if the database is breached
Protects sensitive client data in a database if the database is breached

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data Recovery Tool is for anyone who wants back their lost, corrupted, unmounted and deleted data from any storage derive.
CubexSoft Data Recovery is like a data backup tool, can easily backup and recover deleted data, documents, photo, audio, files video, folders and many more from partition losses, deletions, formatted, corrupted and other data loss scenarios. The Tool supports to recover storage disk of all models having NTFS, FAT (FAT16/FAT32), and exFAT file system. CubexSoft Data Recovery also comes with a free version to provide a preview of the selected drive. See license pricing details for Data Recovery.
CubexSoft Data Recovery is like a data backup tool, can easily backup and recover deleted data, documents, photo, audio, files video, folders and many more from partition losses, deletions, formatted,...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Verimatrix Code Protection is an enterprise-grade, on-premise security toolkit for mobile and embedded systems.
Verimatrix Code Protection injects powerful, automated, self-defending security directly into your app and frees up your development resources. This solution offers obfuscation, environmental checks (including jailbreak and root detection), and anti-tamper technology that meet strict security requirements of the most regulated industries. Protect Java, Kotlin, C, C++, Objective-C, Swift and JavaScript. Supported platforms include Android, iOS, Mac, Linux and Windows.
Verimatrix Code Protection injects powerful, automated, self-defending security directly into your app and frees up your development resources. This solution offers obfuscation, environmental checks...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Leverages advanced deep learning for accurate data classification to instantly detect and remediate data loss threats across SaaS.
Leverages advanced deep learning for accurate data classification to instantly detect and remediate data loss threats across SaaS.
Leverages advanced deep learning for accurate data classification to instantly detect and remediate data loss threats across SaaS.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Ripristino rapido e semplice dei dati critici per l'azienda in caso di emergenza, aiutandoti a riportare online le applicazioni critiche.
Ripristino rapido e semplice dei dati critici per l'azienda in caso di emergenza, aiutandoti a riportare online le applicazioni critiche. Mantieni la continuità aziendale e riduci al minimo la perdita di dati risparmiando tempo e budget preziosi, con la fatturazione della piattaforma PAYG e il failover automatico della soluzione. In caso di emergenza potrai attivare immediatamente le tue risorse di DRaaS e approfittare del supporto 24 ore su 24, 7 giorni su 7. Tecnici esperti sono sempre a tua disposizione per aiutarti a tornare operativo il prima possibile.
Ripristino rapido e semplice dei dati critici per l'azienda in caso di emergenza, aiutandoti a riportare online le applicazioni critiche. Mantieni la continuità aziendale e riduci al minimo la...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Control and prevent data leaks.
Control and prevent data leaks.
Control and prevent data leaks.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Netkiller ISMS is a Real-Time Data Loss Prevention platform for Google Drive. Now, Google Workspace Business users can implement DLP!
Netkiller ISMS is a cloud security platform specifically created to meet the needs of Google Workspace Business customers. With advanced threat detection and adaptive controls for any regulation, Netkiller ISMS helps you manage all your Google Cloud Data. Using Google's security metrics as a framework, we create personalized reports based on your domains file revisionhistory and ensure you are up to date with all.
Netkiller ISMS is a cloud security platform specifically created to meet the needs of Google Workspace Business customers. With advanced threat detection and adaptive controls for any regulation,...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Helps prevent data theft, identity theft, and cyber crime by protecting and controlling access to user data on web platforms.
AxcessD protects your data by allowing you to control exactly who has access to it on Social Media, Email and other Web Applications. Your data is protected and authenticated end to end - from when it leaves your device to when it reaches your intended recipient. Works with any web application where you enter data. Seamless integration with Facebook and Gmail. Works with Chrome and Firefox browsers. Basic version is FREE. Premium version has enhanced features for a small subscription fee.
AxcessD protects your data by allowing you to control exactly who has access to it on Social Media, Email and other Web Applications. Your data is protected and authenticated end to end - from when...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Cloud-native, enterprise-ready platform brings Microsoft Office 365 DLP, Azure Information Protection, and Cloud App Security in focus.
Aperture is a single-pane-of-glass service platform for Microsoft 365 that integrates security tools such as Office 365 DLP, Azure Information Protection, and Cloud App Security. The cloud-native interface enables access for InteliSecure's comprehensive managed data protection services. Centralizing and simplifying alerting and management saves time, money, and effort. Through Aperture, businesses gain visibility and control to make the most of their comprehensive data protection services.
Aperture is a single-pane-of-glass service platform for Microsoft 365 that integrates security tools such as Office 365 DLP, Azure Information Protection, and Cloud App Security. The cloud-native...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Tools that help businesses prevent data loss.
Tools that help businesses prevent data loss.
Tools that help businesses prevent data loss.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Enterprise multi-cloud solution for cloud migration, data protection, disaster recovery, and more.
Enterprise multi-cloud solution for cloud migration, data protection, disaster recovery, and more.
Enterprise multi-cloud solution for cloud migration, data protection, disaster recovery, and more.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Smarter data masking tools that radically reduce your compliance risk when sharing data.
We specialize in helping organizations eliminate their risks when sharing information internally and/or with third-party providers. Our intelligent data masking technology allows you to maintain accurate information for reporting and business needs while eliminating the risk of disclosing vulnerable information.
We specialize in helping organizations eliminate their risks when sharing information internally and/or with third-party providers. Our intelligent data masking technology allows you to maintain...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Monitor the use of your customer databases by your third parties, subcontractors and employees.
Monitor the use of your customer databases by your third parties, subcontractors and employees.
Monitor the use of your customer databases by your third parties, subcontractors and employees.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
SOS Click for Microsoft Office is an add-on which allows you to save your files to multiple locations in one click.
SOS Click for Microsoft Office is an add-on that allows you to save your work to multiple places (up to eight) in one click saving the hassle of saving to multiple places using the tedious built-in saving process Microsoft Office offers. The add-on is available separately for Word, Excel, and PowerPoint or all three together as one package. Once configured, a single click saves and sends your file to the desired locations both local and remote ensuring your work is with you no matter what.
SOS Click for Microsoft Office is an add-on that allows you to save your work to multiple places (up to eight) in one click saving the hassle of saving to multiple places using the tedious built-in...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Qohash unifies the best data discovery and insider threats capabilities under one platform
Qohash finds, tracks, and safeguards the world’s most sensitive data. The Qostodian platform deploys in minutes to discover risks, pinpoint insider threats, and track how data propagates between people in real-time. Security teams can understand their sensitive data clearly and quickly, and prioritize threats at the pace of business.
Qohash finds, tracks, and safeguards the world’s most sensitive data. The Qostodian platform deploys in minutes to discover risks, pinpoint insider threats, and track how data propagates between...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Veeam® Backup for Microsoft Office 365 è una soluzione completa che consente di eseguire il backup e il ripristino dei dati di Office 365.
Veeam® Backup for Microsoft Office 365 è una soluzione completa che consente di eseguire il backup e il ripristino dei dati di Office 365, tra cui Exchange Online, SharePoint Online, OneDrive for Business e Microsoft Teams in modo che i dati siano sempre protetti e accessibili. Veeam ti offre la possibilità di eseguire in modo sicuro il backup di Office 365 in qualsiasi luogo, anche on-premise, su cloud hyperscale o su un fornitore di servizi.
Veeam® Backup for Microsoft Office 365 è una soluzione completa che consente di eseguire il backup e il ripristino dei dati di Office 365, tra cui Exchange Online, SharePoint Online, OneDrive for...

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
iPhone data recovery solution that helps recover lost or deleted data.
iPhone data recovery solution that helps recover lost or deleted data.
iPhone data recovery solution that helps recover lost or deleted data.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Aranda Data Safe is a backup & recovery software that prevents the loss of business data, in a simple, safe, and efficient way.
Aranda Data Safe is a backup & recovery software that prevents the loss of business data, in a simple, safe, and efficient way.
Aranda Data Safe is a backup & recovery software that prevents the loss of business data, in a simple, safe, and efficient way.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità
Data recovery solution that allows enterprises to streamline business continuity and disaster recovery.
Data recovery solution that allows enterprises to streamline business continuity and disaster recovery.
Data recovery solution that allows enterprises to streamline business continuity and disaster recovery.

Caratteristiche

  • Elenco elementi consentiti/non consentiti
  • Gestione polizze
  • Gestione delle minacce del web
  • Gestione di incidenti
  • Individuazione dei dati sensibili
  • Monitoraggio della conformità