168 resultaten
Waarom Capterra gratis is
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Next-generation Apple device management for macOS, iOS, iPadOS, and tvOS.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of the box. The only MDM with a pre-built library of 150+ automations. Leverage app patching, compliance templates, and the industry's first macOS agent that auto-remediates - even when devices are offline. Provision devices in minutes with 1-click configurations for Mac, iPhone, iPad, and Apple TV.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Biedt een proactieve oplossing voor het beveiligen van bedrijfseindpunten (USB's, cd's/dvd's, BlueTooth, wifi, FireWire, iPods, mp3's).
AccessPatrol biedt een proactieve oplossing voor het beveiligen van bedrijfseindpunten (USB's, cd's/dvd's, BlueTooth, wifi, FireWire, iPods, mp3's).
AccessPatrol biedt een proactieve oplossing voor het beveiligen van bedrijfseindpunten (USB's, cd's/dvd's, BlueTooth, wifi, FireWire, iPods, mp3's).

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Prey is een platform voor het beveiligen, beheren en beschermen van gegevens van mobiele apparaten voor zowel bedrijven als persoonlijk gebruik, ontwikkeld door Prey Inc.
Prey is software en een online platform voor het volgen, beheren en beschermen van mobiele apparaten, beschikbaar voor laptops, tablets en mobiele telefoons. De software en service zijn ontwikkeld door het Chileense bedrijf Prey Inc.
Prey is software en een online platform voor het volgen, beheren en beschermen van mobiele apparaten, beschikbaar voor laptops, tablets en mobiele telefoons. De software en service zijn ontwikkeld...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Verminder de risico's, handhaaf de naleving en stroomlijn je cyberbeveiligingsactiviteiten met Infocyte, het platform voor proactieve cybersecurity.
Infocyte helpt beveiligingsteams hun eindpunten te beschermen met geavanceerde bedreigingsdetectie, geautomatiseerde incidentrespons en onmiddellijke dreigingsbeoordelingen. Integreer en stroomlijn je bestaande eindpuntbeveiligingsstack (SIEM, SOAR, EDR en meer) vanuit de gebruiksvriendelijke cloudconsole. MSSP's (Managed Security Service Providers, leveranciers van beheerde beveiligingsdiensten) maken gebruik van Infocyte om kosteneffectieve risicobeoordelingen voor cybersecurity, respons op beveiligingsincidenten, het opsporen van bedreigingen en MDR-beveiligingsservices (Managed Detection and Response, beheerde detectie en respons) te leveren.
Infocyte helpt beveiligingsteams hun eindpunten te beschermen met geavanceerde bedreigingsdetectie, geautomatiseerde incidentrespons en onmiddellijke dreigingsbeoordelingen. Integreer en stroomlijn...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint protection solution that helps businesses monitor operating system activities to detect & clean suspicious or unknown threats.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
CrowdStrike is een leider op het gebied van cloudgebaseerde eindpuntbescherming van de volgende generatie.
CrowdStrike is een leider op het gebied van cloudgebaseerde eindpuntbescherming van de volgende generatie. CrowdStrike heeft een revolutie teweeggebracht in eindpuntbescherming door antivirusbescherming, eindpuntdetectie en -respons te combineren met een 24/7 beheerde detectiedienst, en dit alles wordt geleverd via één lichtgewicht agent.
CrowdStrike is een leider op het gebied van cloudgebaseerde eindpuntbescherming van de volgende generatie. CrowdStrike heeft een revolutie teweeggebracht in eindpuntbescherming door...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Autonome eindpuntbeveiliging via een enkele weg die aanvallen op alle belangrijke vectoren voorkomt, detecteert en bestrijdt.
Autonome eindpuntbeveiliging via een enkele weg die aanvallen op alle belangrijke vectoren voorkomt, detecteert en bestrijdt. Het platform is ontworpen met het oog op gebruiksgemak en bespaart tijd door AI in te zetten om bedreigingen voor zowel lokale als cloudomgevingen automatisch en in realtime te elimineren; het is de enige oplossing die direct vanaf het endpoint zichtbaarheid biedt in het versleutelde verkeer verspreid over netwerken. SentinelOne is een geconvergeerde EPP + EDR-oplossing die naadloos kan worden geïntegreerd met diverse IT-omgevingen.
Autonome eindpuntbeveiliging via een enkele weg die aanvallen op alle belangrijke vectoren voorkomt, detecteert en bestrijdt. Het platform is ontworpen met het oog op gebruiksgemak en bespaart tijd...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Protect & manage your organizations devices wherever they are & wherever you are. With HiddenApp, peace of mind is fitted as standard.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Password Depot reliably protects your passwords and documents from unauthorized access! Whether at home or in a major corporation.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access rights a user receives, which folders or entries they can view or, for example, which activities should be logged. Thanks to the intuitive user guidance of Password Depot, all employees will be able to work with the program within a very short time, without expensive and time-consuming training.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Geavanceerde oplossing voor malwarebescherming waarmee bedrijven eindpunten, e-mails en webverkeer op meerdere platforms kunnen beveiligen met continue tracking, malwarepreventie, sandboxing en meer.
Geavanceerde oplossing voor malwarebescherming waarmee bedrijven eindpunten, e-mails en webverkeer op meerdere platforms kunnen beveiligen met continue tracking, malwarepreventie, sandboxing en meer.
Geavanceerde oplossing voor malwarebescherming waarmee bedrijven eindpunten, e-mails en webverkeer op meerdere platforms kunnen beveiligen met continue tracking, malwarepreventie, sandboxing en meer.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Toonaangevende eindpuntbeschermingssoftware. Ontdek, bewaak en bescherm je gevoelige gegevens.
Endpoint Protector maakt een einde aan gegevenslekken en gegevensdiefstal en biedt naadloze controle over draagbare opslagapparaten. De mogelijkheden voor het filteren van content voor gegevens in rust en in beweging variëren van bestandstype tot vooraf gedefinieerde content op basis van woordenboeken, reguliere expressies of voorschriften zoals AVG, PCI DSS, CCPA, HIPAA etc.
Endpoint Protector maakt een einde aan gegevenslekken en gegevensdiefstal en biedt naadloze controle over draagbare opslagapparaten. De mogelijkheden voor het filteren van content voor gegevens in...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Back-up- en rampherstelbeveiliging voor servers, desktops, notebooks en bedrijfskritische toepassingen.
Back-up- en rampherstelbeveiliging voor servers, desktops, notebooks en bedrijfskritische toepassingen. Ontworpen voor het MKB en met dienstverleners als uitgangspunt. Platformoverschrijdende hybride oplossing Archiveren, back-uppen of dupliceren van gegevens Centraal beheer en eindpuntbescherming Beschermt fysieke en virtuele omgevingen Betaalbaar en flexibel licentiemodel Ondersteuning voor disk, tape en cloud
Back-up- en rampherstelbeveiliging voor servers, desktops, notebooks en bedrijfskritische toepassingen. Ontworpen voor het MKB en met dienstverleners als uitgangspunt. Platformoverschrijdende hybride...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR)...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
DeepArmor is the first AI-based endpoint protection software built specifically for small businesses.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading efficacy. Stay protected wherever you work with security that works both online and off, and take advantage of DeepArmor's simple management and low impact to users. You can install and activate in less than 5 minutes without needing any IT or security skills.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Enterprise mobility management solution coupled with turn-key enterprise applications to increase productivity and efficiency.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both Apple iOS and Google Android operating systems are support under one unified console.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Imperva Sonar offers cloud-based solutions for application, data, and edge security.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect business traffic.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Cypherdog is an encryption tool for secure data transfer and communication between only two users.
Cypherdog is an encrypted file sharing, messaging and file storing. Cypherdog provides a desktop app compatible with Windows, MacOS and Linux that allows to send files, use chat, store files in cloud or local encrypted. Being the most advanced encryption software, Cypherdog ensures that the solutions proposed are unique and ensure the highest level of communication with confidentiality and anonymity.
Cypherdog is an encrypted file sharing, messaging and file storing. Cypherdog provides a desktop app compatible with Windows, MacOS and Linux that allows to send files, use chat, store files in cloud...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Cloud-based RMM software for patch management, endpoint management, remote desktop, IT asset management made for MSPs and IT admins
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support remote end-users. The cloud-based platform enables automatic patch management, remote desktop access, software deployment and distribution, IT asset inventory, network monitoring, reporting, and more. Action1 RMM is Free Forever for up to 50 endpoints, and it includes all the paid version features.
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
For on-premises, SaaS, and cloud-native data, Metallic gives you the best choice for your hybrid cloud data protection journey.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade solution to protect their data. Built on Microsoft Azure, Metallic offers coverage across apps, endpoints, on-premise, & cloud environments - proven to safeguard critical business data from deletion, corruption, & attack. Stay secure, stay compliant, stay recoverable with Metallic backup & recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Policy-driven endpoint security. Add enterprise grade technologies such as application whitelisting, ringfencing and storage control.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion.
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Dhound is een tool voor beveiligingscontrole en inbraakdetectie voor op het internet gerichte servers, clouds en webtoepassingen.
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor de cloud (AWS); detecteren en waarschuwen over inbraken en verdachte activiteiten; controle van uitgaand verkeer en detectie van gegevenslekken; toegangscontrole en uitgebreide analyse van IP-adressen voor onderzoek van incidenten; bijhouden van aangepaste gebeurtenissen die met name belangrijk zijn voor je online bedrijf.
Dhound IDS biedt medewerkersgebaseerde verzameling en analyse van beveiligingsgebeurtenissen op je internetserver/-apparaat; medewerkerloze verzameling en analyse van beveiligingsgebeurtenissen voor...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Veilige toegang tot internet en bedrijfsbronnen met één enkele oplossing.
Fyde helpt bedrijven met een steeds meer verspreid personeelsbestand om het risico op inbreuken te verminderen door het ondersteunen van veilige toegang tot kritieke bedrijfsmiddelen voor hun werknemers, partners, aannemers en outsourcers.
Fyde helpt bedrijven met een steeds meer verspreid personeelsbestand om het risico op inbreuken te verminderen door het ondersteunen van veilige toegang tot kritieke bedrijfsmiddelen voor hun...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Een eenvoudig te implementeren, betaalbare, gecentraliseerde consolegebaseerde tool waarmee je kwetsbaarheden en misconfiguraties kunt prioriteren en elimineren.
Met Vulnerability Manager Plus worden met behulp van een gecentraliseerde console alle aspecten van vulnerability management gemakkelijk gemaakt, vanaf detectie en beoordeling van kwetsbaarheden tot het elimineren ervan met een geautomatiseerde patching-workflow. Je kunt ook beveiligingsconfiguraties beheren, webservers verharden, zero-day kwetsbaarheden verminderen, end-of-life audits uitvoeren en riskante software verwijderen. Vereenvoudig vulnerability management met een op afstand inzetbare medewerker, webgebaseerde interface en eindeloze schaalbaarheid.
Met Vulnerability Manager Plus worden met behulp van een gecentraliseerde console alle aspecten van vulnerability management gemakkelijk gemaakt, vanaf detectie en beoordeling van kwetsbaarheden tot...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, and Threat Hunting.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Windows cybersecurity product for businesses.
Windows cybersecurity product for businesses.
Windows cybersecurity product for businesses.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer
Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI).
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds...

Functies

  • Encryptie
  • Witte lijst/zwarte lijst
  • Activiteiten volgen
  • Apparaatbeheer