306 resultaten
Waarom Capterra gratis is

door DataResolve Technologies

(1 review)
Bekijk profiel
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

door Argent Software

(1 review)
Bekijk profiel
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

door Ericom Software

(1 review)
Bekijk profiel
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security. Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.

door SecurityScorecard

(1 review)
Bekijk profiel
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.

door Twistlock

(1 review)
Bekijk profiel
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

door Cobweb Security

(1 review)
Bekijk profiel
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

door Pcysys

(1 review)
Bekijk profiel
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button

door Demisto

(1 review)
Bekijk profiel
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.

door Cequence Security

(1 review)
Bekijk profiel
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

door Zeguro

(1 review)
Bekijk profiel
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening

door Coronet

(1 review)
Bekijk profiel
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

door Thales SIX GTS

(1 review)
Bekijk profiel
De Citadel Team-service is gebaseerd op robuuste technologieën en de deskundigheid van Thales. Het kan miljoenen gebruikers ondersteunen en biedt nu al een chatbot-technologie om bedrijfstoepassingen veilig te integreren. Elke vorm van communicatie is versleuteld (chatten, bellen, bestanden delen...). De toepassing garandeert een hoog beveiligingsniveau en is in afwachting van elementaire kwalificatie door de ANSSI (het Franse nationale bureau voor cybersecurity). Citadel Team is een onmiddellijke en betrouwbare communicatiedienst, ontwikkeld, gehost en beheerd door de Franse groep Thales.

door Hivecode

(1 review)
Bekijk profiel
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code

door SecureWorks

(1 review)
Bekijk profiel
Secureworks combines machine learning with human intelligence to predict and prevent more threats. Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Netacea beschermt bedrijven tegen kwaadaardige bots. Intent Analytics, aangedreven door machine learning, onderscheidt bots snel en nauwkeurig van mensen om websites, mobiele apps en API's te beschermen tegen geavanceerde bedreigingen en prioriteit te geven aan echte gebruikers. Dankzij de bruikbare intelligence met gegevensrijke visualisaties kun je weloverwogen beslissingen nemen over je verkeer. Netacea biedt een revolutionaire oplossing voor botbeheer die websites, mobiele apps en API's beschermt tegen kwaadaardige bots.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores. Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

door Defendify

(1 review)
Bekijk profiel
An all-in-one platform to simplify cybersecurity for small businesses. An all-in-one platform to simplify cybersecurity for small businesses.

door Tripwire

(0 beoordelingen)
Bekijk profiel
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

door PKWARE

(0 beoordelingen)
Bekijk profiel
PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With Smartcrypt, your organization can eliminate security gaps, maintain enterprisewide control over sensitive data, and meet your data security goals. PKWAREs Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and more.

door ImageWare Systems

(0 beoordelingen)
Bekijk profiel
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.

door TransUnion

(0 beoordelingen)
Bekijk profiel
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.

door Prilink

(0 beoordelingen)
Bekijk profiel
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.

door Crypho

(0 beoordelingen)
Bekijk profiel
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.

door BluSapphire

(0 beoordelingen)
Bekijk profiel
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

door UpGuard

(0 beoordelingen)
Bekijk profiel
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world. Reduce cyber risk, prevent data breaches and protect customer data.

door Marty Soft Conception

(0 beoordelingen)
Bekijk profiel
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

door FICO

(0 beoordelingen)
Bekijk profiel
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

door PreEmptive Solutions

(0 beoordelingen)
Bekijk profiel
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data. PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.

door Zartech

(0 beoordelingen)
Bekijk profiel
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

door Twizo

(0 beoordelingen)
Bekijk profiel
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

door RIPS Technologies

(0 beoordelingen)
Bekijk profiel
RIPS is de enige codeanalyseoplossing die gewijd is aan de talen Java en PHP. Het detecteert de meest complexe kwetsbaarheden die diep genesteld zijn in Java- en PHP-code en onvindbaar zijn voor andere tools. Het ondersteunt alle belangrijke Java- en PHP-frameworks, SDLC-integratie en relevante industriestandaarden en kan worden ingezet als een zelfgehoste software of als een cloudservice. Dankzij de hoge nauwkeurigheid en geen foutpositieve ruis is RIPS de ideale keuze voor het analyseren van je code. Detecteer automatisch echte beveiligingsproblemen in Java- en PHP-applicaties zonder foutpositieve ruis om de efficiëntie van het team te optimaliseren.

door Akamai Technologies

(0 beoordelingen)
Bekijk profiel
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

door FourV Systems

(0 beoordelingen)
Bekijk profiel
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

door Fidelis Cybersecurity

(0 beoordelingen)
Bekijk profiel
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.

door Techefix

(0 beoordelingen)
Bekijk profiel
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

door Securonix

(0 beoordelingen)
Bekijk profiel
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

door NetLib Security

(0 beoordelingen)
Bekijk profiel
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

door Apility.io

(0 beoordelingen)
Bekijk profiel
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

door APMG International

(0 beoordelingen)
Bekijk profiel
CDCAT provides a comprehensive cyber security strategy and capability improvement service. CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

door inWebo

(0 beoordelingen)
Bekijk profiel
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

door TekMonks

(0 beoordelingen)
Bekijk profiel
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

door Syneidis

(0 beoordelingen)
Bekijk profiel
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.

door BioCatch

(0 beoordelingen)
Bekijk profiel
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats. Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

door Uplevel

(0 beoordelingen)
Bekijk profiel
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

door EclecticIQ

(0 beoordelingen)
Bekijk profiel
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

door Cryptomage

(0 beoordelingen)
Bekijk profiel
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

door Namogoo

(0 beoordelingen)
Bekijk profiel
De disruptieve technologie van Namogoo detecteert en blokkeert ongeautoriseerde product- en promotie-advertenties die worden geïnjecteerd in bezoekerssessies, zodat je klanten niet worden omgeleid naar je concurrenten. Door ongeautoriseerde advertenties te elimineren en te zorgen dat binnendringende content je klantentrajecten niet verstoort, verhoogt Namogoo consequent de conversie en omzet. Namogoo voorkomt het kapen van klanten. De technologie identificeert en blokkeert ongeautoriseerde advertenties die worden geïnjecteerd in websessies van consumenten.

door Kaymera Technologies

(0 beoordelingen)
Bekijk profiel
Cybersecurity solution providing protection on any device and maintain effective cyber defense. Cybersecurity solution providing protection on any device and maintain effective cyber defense.

door VigiTrust

(0 beoordelingen)
Bekijk profiel
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.

door Kobil Systems

(0 beoordelingen)
Bekijk profiel
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

door Nexus Guard

(0 beoordelingen)
Bekijk profiel
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

door Outpost24

(0 beoordelingen)
Bekijk profiel
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

door Giegerich & Partner

(0 beoordelingen)
Bekijk profiel
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

door Ercom

(0 beoordelingen)
Bekijk profiel
Cryptosmart is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises Cryptosmart, the ultimate solution to secure mobile communications and devices

door CybelAngel

(0 beoordelingen)
Bekijk profiel
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

door Cognicase Management Consulting

(0 beoordelingen)
Bekijk profiel
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

door MyIP.io

(0 beoordelingen)
Bekijk profiel
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

door XM Cyber

(0 beoordelingen)
Bekijk profiel
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

door ThreatX

(0 beoordelingen)
Bekijk profiel
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

door Interset Software

(0 beoordelingen)
Bekijk profiel
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

door AGARI Data

(0 beoordelingen)
Bekijk profiel
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO.

door SixGill

(0 beoordelingen)
Bekijk profiel
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

door Argus Cyber Security

(0 beoordelingen)
Bekijk profiel
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

door Infocyte

(0 beoordelingen)
Bekijk profiel
De software voor cybersecurity van Infocyte helpt beveiligingsteams om bestandsloze bedreigingen, APT's (Advanced Persistent Threats, geavanceerde aanhoudende bedreigingen), ransomware en malware sneller te detecteren en erop te reageren. Integreer en verhoog je bestaande eindpuntbeveiligingsstack (SIEM, SOAR, EDR en meer) vanuit de gebruiksvriendelijke cloudgehoste console. Leveranciers van beheerde beveiligingsdiensten maken gebruik van dit platform om kosteneffectieve risicobeoordelingen voor cybersecurity en compromisbeoordelingen, respons op cyberincidenten en beheerde detectie- en responsdiensten te leveren. Detecteer en reageer op geavanceerde bedreigingen, risico's en kwetsbaarheden met het gebruiksvriendelijke softwareplatform voor cybersecurity van Infocyte.

door Hdiv Security

(0 beoordelingen)
Bekijk profiel
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

door Precognitive

(0 beoordelingen)
Bekijk profiel
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts. Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.

door Barracuda Networks

(0 beoordelingen)
Bekijk profiel
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.

door Aqua Networks

(0 beoordelingen)
Bekijk profiel
CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanners, hackers and all other evolving threats. CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

door Introviz

(0 beoordelingen)
Bekijk profiel
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

door CyStack Security

(0 beoordelingen)
Bekijk profiel
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.

door Famteck

(0 beoordelingen)
Bekijk profiel
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases. nstance Resolve is one of the most secure database solution with 6 solutions in 1 product. Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation; Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.

door Group-IB

(0 beoordelingen)
Bekijk profiel
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices

door Gleam AI

(0 beoordelingen)
Bekijk profiel
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business

door Apptimi

(0 beoordelingen)
Bekijk profiel
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.

door A-LIGN

(0 beoordelingen)
Bekijk profiel
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience. A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.

door Systancia

(0 beoordelingen)
Bekijk profiel
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.

door CounterCraft

(0 beoordelingen)
Bekijk profiel
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.

door Ziwit

(0 beoordelingen)
Bekijk profiel
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you.

door Digital Shadows

(0 beoordelingen)
Bekijk profiel
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

door Hacker Combat

(0 beoordelingen)
Bekijk profiel
Monitor and control the development of responsive and secret information over your network. Monitor and control the development of responsive and secret information over your network.

door Data443 Risk Mitigation

(0 beoordelingen)
Bekijk profiel
ClassiDocs delivers comprehensive data classification, governance, discovery, and privacy regulation (GDPR, CCPA & more) compliance within one comprehensive, data security platform, making it truly powerful, yet cost-effective and easy to deploy. ClassiDocs enables the data creator to build, augment, and refine the classification process so they can govern the data they create and communicate its value across the organization. Inventory, Classify and Secure Every Data Point, Every Time

door TokenEx

(0 beoordelingen)
Bekijk profiel
TokenEx is een tokenisatieplatform voor grote ondernemingen dat vrijwel onbeperkte flexibiliteit biedt in hoe klanten toegang hebben tot gegevens, deze kunnen opslaan en beveiligen. Dit platform werkt met meerdere kanalen voor gegevensacceptatie met behulp van een processor-onafhankelijke aanpak, wat betekent dat deze software bijna elk gegevenstype kan tokeniseren en beveiligen, inclusief PCI, PII, PHI en zelfs ongestructureerde gegevensindelingen, en kan worden geïntegreerd met vrijwel elke processor of elk eindpunt. Cloudgebaseerd platform voor gegevensbeveiliging dat tokenisatie en veilige bewaking van cloudgegevens biedt voor alle soorten gevoelige gegevens.

door Rohde & Schwarz Cybersecurity

(0 beoordelingen)
Bekijk profiel
R&STrusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&STrusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team. R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.

door EdGuards

(0 beoordelingen)
Bekijk profiel
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks. Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.

door Silverbolt

(0 beoordelingen)
Bekijk profiel
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

door Alyne

(0 beoordelingen)
Bekijk profiel
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.

door SecureStack

(0 beoordelingen)
Bekijk profiel
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

door Lucy Security

(0 beoordelingen)
Bekijk profiel
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.

door Wandera

(0 beoordelingen)
Bekijk profiel
Wanderas Mobile Security Suite provides a single cloud solution that protects against the broadest range of cyber threats and access-based risks. The Mobile Security Suite consists of Mobile Threat Defense, Data Policy and Broker. Wanderas Security Suite provides a single cloud solution that protects against the broadest range of cyber threats & access risks.

door ITrust.fr

(0 beoordelingen)
Bekijk profiel
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems

door RiskSense

(0 beoordelingen)
Bekijk profiel
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

door RocketCyber

(0 beoordelingen)
Bekijk profiel
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

door MailGuard

(0 beoordelingen)
Bekijk profiel
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more

door Brinqa

(0 beoordelingen)
Bekijk profiel
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.

door Securden

(0 beoordelingen)
Bekijk profiel
The most secure cybersecurity software for enterprise companies. The most secure cybersecurity software for enterprise companies.

door ShieldApps Software Development

(0 beoordelingen)
Bekijk profiel
Identity Theft Preventer pays attention to hundreds of micro-parameters on a computer, looking for exposed data that can potentially endanger ones identity. Information logged & stored by browsers, such as login credentials, web-mail services, banking portals, health providers web-accounts & social networks, as well as billing information, such as credit cards numbers, social security information, home address & more, are all reported back and resolved in a couple of clicks! Identity Theft Preventer protects your digital privacy & locally stored personal information from external/foreign abuse.

door Arkose Labs

(0 beoordelingen)
Bekijk profiel
Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates. Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates.