Software per rilevamento e risposta alle minacce endpoint

Software per rilevamento e risposta alle minacce endpoint: utilizza Capterra in Italia per trovare il software gestionale più adatto per la tua attività.

Perché Capterra è gratis
Netsurion consente alle organizzazioni di prevedere, prevenire, rilevare e rispondere con successo alle minacce di sicurezza informatica. La piattaforma SIEM, EventTracker, unisce machine learning, analisi del comportamento e coordinamento della sicurezza, ed è stata riconosciuta come SIEM, per 11 anni consecutivi, sul Magic Quadrant di Gartner. Il servizio di sicurezza gestito, EventTracker SIEMphonic, offre un servizio SIEM co-gestito, guidato da un centro operativo per la sicurezza, 24 ore su 24, 7 giorni su 7. EventTracker EDR (registrazione dati eventi) protegge anche gli endpoint critici da attacchi zero-day e malware mutanti. Ulteriori informazioni su EventTracker Fornendo SIEM, registrazione dati eventi e un centro operativo per la sicurezza 24 ore su 24, 7 giorni su 7, questa soluzione offre, in modo rapido ed efficiente, una protezione avanzata dalle minacce e il coordinamento della sicurezza. Ulteriori informazioni su EventTracker
Elimina tutti i tipi di minacce, inclusi virus, malware, ransomware, rootkit, worm e spyware, con scansione cloud opzionale per prestazioni e un rilevamento ancora migliori. ESET utilizza tecnologie multilivello che vanno ben oltre le capacità degli antivirus di base. Include protezione anti-spyware, anti-phishing, controllo web, anti-spam e botnet con funzionalità di gestione a distanza. Include protezione anti-spyware, anti-phishing, controllo web, anti-spam e botnet con funzionalità di gestione a distanza.
Visualizza profilo
Apex One di Trend Micro utilizza una combinazione di avanzate tecniche di protezione dalle minacce per eliminare le lacune di sicurezza in qualsiasi attività ed endpoint dell'utente. Questa soluzione apprende costantemente, si adatta e condivide automaticamente le informazioni sulle minacce nell'intero ambiente. Questa combinazione di protezione viene fornita tramite un'architettura che utilizza le risorse degli endpoint in modo più efficace e, in definitiva, supera la concorrenza nell'utilizzo di CPU e rete. Sicurezza per gli endpoint automatica, approfondita e multifunzione dal leader di fiducia.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.

da CrowdStrike

(5 recensioni)
Visualizza profilo
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.

da Great Bay Software

(1 recensione)
Visualizza profilo
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

da Plurilock Security Solutions

(0 recensioni)
Visualizza profilo
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.

da Hypori

(0 recensioni)
Visualizza profilo
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

da Anakage

(0 recensioni)
Visualizza profilo
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.

da Infocyte

(0 recensioni)
Visualizza profilo
Infocytes platform helps security teams assess, detect, and respond to cyber threats (risks, vulnerabilities, attacks, breaches and more) and streamline cybersecurity operations. Managed security service providers leverage our platform to deliver cost-effective cybersecurity risk assessments, cyber incident response, and managed detection and response services. Reduce risk, maintain compliance, and streamline cybersecurity operations with Infocytethe platform for proactive cybersecurity. Reduce risk, maintain compliance, and streamline cybersecurity operations with Infocytethe platform for proactive cybersecurity.

da Ziften Technologies

(0 recensioni)
Visualizza profilo
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

da DigitalDefense

(0 recensioni)
Visualizza profilo
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

da IntSights

(0 recensioni)
Visualizza profilo
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

da Palo Alto Networks

(0 recensioni)
Visualizza profilo
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

da Cyberbit

(0 recensioni)
Visualizza profilo
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

da Cybereason

(0 recensioni)
Visualizza profilo
Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities. Cybersecurity solution for identifying and preventing advanced cyber attacks with integrated antivirus and EDR capabilities.

da Tanium

(0 recensioni)
Visualizza profilo
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

da Symantec

(0 recensioni)
Visualizza profilo
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

da Fidelis Cybersecurity

(0 recensioni)
Visualizza profilo
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.