46 resultaten
Waarom Capterra gratis is
SOC Prime TDM is een SaaS-community die inhoud voor bedreigingsdetectie levert die kan worden gebruikt in verschillende SIEM-indelingen en EDR-oplossingen. Meer informatie over Threat Detection Marketplace
SOC Prime TDM (Threat Detection Marketplace®) is een SaaS-contentplatform waarmee beveiligingsprofessionals cyberbedreigingen kunnen detecteren en erop kunnen reageren, en het rendement kunnen verhogen voor de meeste van hun SIEM-, EDR-, NSM- en SOAR-tools die in gebruik zijn. TDM verzamelt meer dan 65.000 SIEM- en EDR-regels, parsers en zoekopdrachten, en andere inhoud die rechtstreeks is toegewezen aan het MITRE AT&TCK®-framework en compatibel is met je EDR-oplossing die je gebruikt, inclusief Microsoft Defender ATP, Carbon Black, CrowdStrike en Qualys. Meer informatie over Threat Detection Marketplace
SOC Prime TDM (Threat Detection Marketplace®) is een SaaS-contentplatform waarmee beveiligingsprofessionals cyberbedreigingen kunnen detecteren en erop kunnen reageren, en het rendement kunnen verhogen...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Active threat response that keeps endpoints productive. Endpoint Detection and Response built to respond at the speed of an attack. Meer informatie over Malwarebytes Endpoint Detection and Response
Built to be effective, yet simple to deploy and manage by security professionals of all abilities. Complete and thorough remediation to return endpoints to a truly healthy state. Continuous cloud-based endpoint monitoring. Integrated threat detection that stops threats. Progressive threat detection enrichment intelligence that enables rapid investigation of a successful attack. Guided threat response to isolate, remediate and recover compromised endpoints. Meer informatie over Malwarebytes Endpoint Detection and Response
Built to be effective, yet simple to deploy and manage by security professionals of all abilities. Complete and thorough remediation to return endpoints to a truly healthy state. Continuous cloud-based...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebruik van meerlagige technologieën die de vaardigheden van standaard antivirusprogramma's ruimschoots overtreffen. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebru...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden.
Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden. Onderzoek, controleer en handel om operationele informatie te verkrijgen en de bedrijfsresultaten te verbeteren.
Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden. Onderzoek, controleer en handel om operationele informatie te verkrijgen en de bedrijfsresultaten te verbeteren....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Automatische, inzichtelijke, alles-in-één eindpuntbeveiliging van de vertrouwde leider.
Trend Micro Apex One gebruikt een combinatie van geavanceerde beschermingstechnieken om beveiligingslekken in alle gebruikersactiviteiten en elk eindpunt te elimineren. Het systeem leert voortdurend bij, past zich aan en deelt automatisch bedreigingsinformatie in je omgeving. Deze combinatie van bescherming wordt geleverd via een architectuur die eindpuntbronnen effectiever gebruikt en uiteindelijk beter presteert dan de concurrentie op het gebied van CPU en netwerkgebruik.
Trend Micro Apex One gebruikt een combinatie van geavanceerde beschermingstechnieken om beveiligingslekken in alle gebruikersactiviteiten en elk eindpunt te elimineren. Het systeem leert voortdurend bi...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Cloudgebaseerd en on-premise platform waarmee bedrijven kritieke gegevens kunnen beveiligen met multi-factor authenticatie.
Enterprise-toegang is opnieuw gedefinieerd door BYOD-, mobiliteits- en clouddiensten. De werknemers van nu eisen veilige connectiviteit, ongeacht de locatie – dit kan zijn in een auto, een hotelkamer, thuis of in een café. Pulse Connect Secure is het resultaat van 15 jaar innovatie en verfijning die heeft geleid tot de meest betrouwbare en veelzijdige VPN gebouwd voor de volgende generatie.
Enterprise-toegang is opnieuw gedefinieerd door BYOD-, mobiliteits- en clouddiensten. De werknemers van nu eisen veilige connectiviteit, ongeacht de locatie – dit kan zijn in een auto, een hotelkamer,...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Automox is een cloudgebaseerd platform voor patchbeheer: moderne cyberhygiëne die het veiligheidsvertrouwen van de wereld zal verhogen.
Automox is cloudgebaseerd en wereldwijd beschikbaar en handhaaft OS- en extern patchbeheer, beveiligingsconfiguraties en aangepaste scripting in Windows, Mac en Linux vanaf één intuïtieve console. IT en SecOps kunnen snel de controle krijgen en de zichtbaarheid van lokaal geïnstalleerde, externe en virtuele eindpunten delen zonder dat je dure infrastructuur hoeft te implementeren.
Automox is cloudgebaseerd en wereldwijd beschikbaar en handhaaft OS- en extern patchbeheer, beveiligingsconfiguraties en aangepaste scripting in Windows, Mac en Linux vanaf één intuïtieve console. IT e...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Door SIEM, EDR en een 24/7 SOC te combineren, levert dit platform snel en efficiënt zowel geavanceerde bescherming tegen bedreigingen als beveiligingsorganisatie.
Netsurion stelt organisaties in staat om met succes cyberbeveiligingsbedreigingen te voorspellen, te voorkomen, te detecteren en erop te reageren. Dit SIEM-platform, EventTracker, combineert machine learning, gedragsanalyses en beveiligingsorganisatie met erkenning gedurende 11 opeenvolgende jaren op de Gartner MQ voor SIEM. De beheerde beveiligingsservice, EventTracker SIEMphonic, levert een Co-Managed SIEM-service die wordt aangestuurd door de 24/7 SOC. EventTracker EDR beschermt daarnaast kritieke eindpunten tegen zero-day-aanvallen en muterende malware.
Netsurion stelt organisaties in staat om met succes cyberbeveiligingsbedreigingen te voorspellen, te voorkomen, te detecteren en erop te reageren. Dit SIEM-platform, EventTracker, combineert machine le...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Verminder de risico's, handhaaf de naleving en stroomlijn je cyberbeveiligingsactiviteiten met Infocyte, het platform voor proactieve cybersecurity.
Infocyte helpt beveiligingsteams om cyberdreigingen snel op te sporen, te beoordelen, en erop te reageren. Stroomlijn je eindpuntbeveiliging (SIEM, SOAR, EDR en meer) vanuit de gebruiksvriendelijke cloudconsole. Leveranciers van beheerde beveiligingsdiensten maken gebruik van dit platform om kosteneffectieve risicobeoordelingen voor cybersecurity, respons op cyberincidenten en beheerde detectie- en responsdiensten te leveren. Verminder de risico's, handhaaf de naleving en stroomlijn je beveiligingsactiviteiten met Infocyte, het platform voor proactieve cybersecurity.
Infocyte helpt beveiligingsteams om cyberdreigingen snel op te sporen, te beoordelen, en erop te reageren. Stroomlijn je eindpuntbeveiliging (SIEM, SOAR, EDR en meer) vanuit de gebruiksvriendelijke clo...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. InsightIDR verzamelt native gegevens van je eindpunten, beveiligingslogboeken en cloud-diensten. Pas gedragsanalyses van gebruikers en aanvallers toe op je gegevens om activiteiten van indringers te vinden bij elke stap van de aanvalsketen. Verenig je beveiligingsgegevens. Detecteer problemen voordat ze ernstig worden. Reageer 20x sneller met visuele onderzoeken en automatisering.
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. Insigh...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that k...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitor...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the en...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
All-in-one unified threat management platform that aims to simplify cybersecurity and reduce its cost.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Management (SIEM), Vulnerability Management, Access Rights Auditor, Incident Response, HIPS/NIPS, Endpoint Protection, and Dark Web Monitoring. You can monitor almost any cloud environment or SaaS application with ready to use Integrations. UTMStack is currently integrated with Azure, AWS, etc.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Manage...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
DEFEND

DEFEND

(0 reviews)
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long....
Hypori

Hypori

(0 reviews)
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of pe...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Zenith

Zenith

(0 reviews)
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Frontline.Cloud platform provides organizations with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS).
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwid...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats....
Cortex

Cortex

(0 reviews)
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity...
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signature...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more....
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architect...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces....
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact....
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified....
Prevent misaddressed emails.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file...
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response...
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure....
Metallic delivers proven, enterprise-grade data protection for your organization's laptops and desktops - with the simplicity of SaaS.
Metallic Endpoint Backup & Recovery delivers proven data protection for your laptops and desktops - with the simplicity of SaaS. Built on Commvaults industry-leading technology, Metallic ensures your data is recoverable from deletion, corruption, ransomware and other malicious attacks. With unlimited Azure storage and one year of data retention included, Metallic SaaS offers hassle-free protection for your employees laptops and desktops wherever they may be.
Metallic Endpoint Backup & Recovery delivers proven data protection for your laptops and desktops - with the simplicity of SaaS. Built on Commvaults industry-leading technology, Metallic ensures your d...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren
USB- und Endpoint-Security-Lösung
Mit Security.Desk kann genau definiert werden, welcher Benutzerkreis welche Dateien von und auf Wechseldatenträger(n) transferieren darf bzw. welche Dateitypen dafür nicht erlaubt sind. Sämtliche Dateibewegungen lassen sich protokollieren. > Freigabe und Blockade bestimmter Schnittstellen > Speichermedien und Dateitypen > Shadowing / Protokollierung von Daten- und Filetransfers > Active Directory-Integration > Rechtemanagement auf allen Ebenen > Zentraler Kontrollstand > Schutz vor Bad-USB uvm.
Mit Security.Desk kann genau definiert werden, welcher Benutzerkreis welche Dateien von und auf Wechseldatenträger(n) transferieren darf bzw. welche Dateitypen dafür nicht erlaubt sind. Sämtliche Datei...
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Anomalie- en malwaredetectie
  • Saneringsbeheer
  • Priorisering
  • Witte lijst/zwarte lijst
  • Doorlopend monitoren