Waarom Capterra gratis is
Netsurion stelt organisaties in staat om met succes cyberbeveiligingsbedreigingen te voorspellen, te voorkomen, te detecteren en erop te reageren. Dit SIEM-platform, EventTracker, combineert machine learning, gedragsanalyses en beveiligingsorganisatie met erkenning gedurende 11 opeenvolgende jaren op de Gartner MQ voor SIEM. De beheerde beveiligingsservice, EventTracker SIEMphonic, levert een Co-Managed SIEM-service die wordt aangestuurd door de 24/7 SOC. EventTracker EDR beschermt daarnaast kritieke eindpunten tegen zero-day-aanvallen en muterende malware. Meer informatie over EventTracker Door SIEM, EDR en een 24/7 SOC te combineren, levert dit platform snel en efficiënt zowel geavanceerde bescherming tegen bedreigingen als beveiligingsorganisatie. Meer informatie over EventTracker
Elimineert alle soorten bedreigingen, waaronder virussen, malware, ransomware, rootkits, wormen en spyware met optionele cloudgestuurde scanning voor nog betere prestaties en detectie. ESET maakt gebruik van meerlagige technologieën die de vaardigheden van standaard antivirusprogramma's ruimschoots overtreffen. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand. Bevat anti-spyware, anti-phishing, webcontrole, anti-spam en botnetbescherming met mogelijkheden voor beheer op afstand.
Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden. Onderzoek, controleer en handel om operationele informatie te verkrijgen en de bedrijfsresultaten te verbeteren. Splunk is een aanpasbaar platform voor gegevensanalyse dat gegevens omzet in antwoorden.
Bekijk profiel
Trend Micro Apex One gebruikt een combinatie van geavanceerde beschermingstechnieken om beveiligingslekken in alle gebruikersactiviteiten en elk eindpunt te elimineren. Het systeem leert voortdurend bij, past zich aan en deelt automatisch bedreigingsinformatie in je omgeving. Deze combinatie van bescherming wordt geleverd via een architectuur die eindpuntbronnen effectiever gebruikt en uiteindelijk beter presteert dan de concurrentie op het gebied van CPU en netwerkgebruik. Automatische, inzichtelijke, alles-in-één eindpuntbeveiliging van de vertrouwde leider.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.

door CrowdStrike

(7 beoordelingen)
Bekijk profiel
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Bekijk profiel
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Bekijk profiel
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.

door Great Bay Software

(1 review)
Bekijk profiel
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Bekijk profiel
InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken: phishing, malware en het gebruik van gestolen wachtwoorden. InsightIDR verzamelt native gegevens van je eindpunten, beveiligingslogboeken en cloud-diensten. Pas gedragsanalyses van gebruikers en aanvallers toe op je gegevens om activiteiten van indringers te vinden bij elke stap van de aanvalsketen. Verenig je beveiligingsgegevens. Detecteer problemen voordat ze ernstig worden. Reageer 20x sneller met visuele onderzoeken en automatisering. InsightIDR is de uitkomst voor bedreigingsdetectie en -respons. Vind en reageer op alle belangrijkste aanvalvectoren achter inbreuken.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

door Plurilock Security Solutions

(0 beoordelingen)
Bekijk profiel
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.

door Hypori

(0 beoordelingen)
Bekijk profiel
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

door Anakage

(0 beoordelingen)
Bekijk profiel
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.

door Infocyte

(0 beoordelingen)
Bekijk profiel
Infocyte helpt beveiligingsteams om cyberdreigingen snel op te sporen, te beoordelen, en erop te reageren. Stroomlijn je eindpuntbeveiliging (SIEM, SOAR, EDR en meer) vanuit de gebruiksvriendelijke cloudconsole. Leveranciers van beheerde beveiligingsdiensten maken gebruik van dit platform om kosteneffectieve risicobeoordelingen voor cybersecurity, respons op cyberincidenten en beheerde detectie- en responsdiensten te leveren. Verminder de risico's, handhaaf de naleving en stroomlijn je beveiligingsactiviteiten met Infocyte, het platform voor proactieve cybersecurity. Verminder de risico's, handhaaf de naleving en stroomlijn je cyberbeveiligingsactiviteiten met Infocyte, het platform voor proactieve cybersecurity.

door Ziften Technologies

(0 beoordelingen)
Bekijk profiel
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

door DigitalDefense

(0 beoordelingen)
Bekijk profiel
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

door IntSights

(0 beoordelingen)
Bekijk profiel
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

door Anomali

(0 beoordelingen)
Bekijk profiel
Arm your security team with cyber threat intelligence to identify and prioritize threats. Arm your security team with cyber threat intelligence to identify and prioritize threats.

door Palo Alto Networks

(0 beoordelingen)
Bekijk profiel
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

door Cyberbit

(0 beoordelingen)
Bekijk profiel
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

door Cybereason

(0 beoordelingen)
Bekijk profiel
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today. The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.

door Tanium

(0 beoordelingen)
Bekijk profiel
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

door Symantec

(0 beoordelingen)
Bekijk profiel
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

door Fidelis Cybersecurity

(0 beoordelingen)
Bekijk profiel
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.

door 1E

(0 beoordelingen)
Bekijk profiel
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more. Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.

door CyFIR

(0 beoordelingen)
Bekijk profiel
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need On Demand By-the-Hour Forensic Analysis & Remote Remediation