Software de Segurança Informática

Software de segurança informática: os produtos dessa categoria automatizam a segurança e o monitoramento de sistemas de computador. Esses aplicativos examinam e monitoram a rede de computadores da organização para avaliar possíveis vulnerabilidades. Além disso, o software de segurança informática fornece soluções de segurança de rede personalizáveis, bem como pré-configuradas para uma variedade de padrões regulatórios. O software de segurança informática fornece relatórios em tempo real sobre segurança de rede, bem como relatórios de incidentes para possíveis violações de segurança. O software de segurança informática relaciona-se ao sistema de segurança de rede.

Por que o Capterra é gratuito
Está preocupado com senhas fracas e reutilização de senhas que possam prejudicar a segurança da sua empresa? Sua equipe de TI passa a maior parte do tempo solicitando redefinição de senha? Esses problemas podem ser solucionados com o 1Password! Ele é fácil implantar e gerenciar e tem a confiança de mais de 30.000 empresas e mais de 15 milhões de usuários em todo o mundo. Saiba mais sobre o 1Password Vá em frente. Esqueça suas senhas. O 1Password lembra de todas elas para você. Salve suas senhas e faça login nos sites com um único clique. Saiba mais sobre o 1Password
Milhões de pessoas e milhares de empresas dependem do gerenciador de senhas e do cofre digital do Keeper para reduzir substancialmente o risco de violação de dados. A Keeper é a líder mundial na proteção de senhas, documentos e ativos digitais sensíveis. Com o Keeper, a empresa pode gerar automaticamente senhas de alta resistência, proteger arquivos confidenciais em um cofre digital criptografado, compartilhar registros com equipes com segurança e integrar-se perfeitamente com SSO, LDAP e 2FA. Solicite uma demonstração gratuita agora mesmo. Saiba mais sobre o Keeper for Business O Keeper está transformando a forma como as empresas e os indivíduos protegem senhas e ativos digitais para reduzir significativamente o roubo cibernético. Saiba mais sobre o Keeper for Business

da South River Technologies

(0 avaliações)
Acesse o site
O Cornerstone MFT oferece transferência segura de arquivos e colaboração com segurança multicamada, alta disponibilidade e automação. Compatível com PCI e HIPAA, a solução Cornerstone oferece criptografia ponto a ponto, segurança de perímetro e autenticação de 2 fatores. Melhorando a produtividade e aprimorando a segurança, o Cornerstone permite que os usuários incorporem facilmente essa solução altamente segura aos processos de trabalho existentes. Saiba mais sobre o Cornerstone MFT Server Ferramenta no local e na nuvem que ajuda a gerenciar a transferência de arquivos entre servidores com segurança multicamada, colaboração e automação. Saiba mais sobre o Cornerstone MFT Server
O AVG Antivirus Business Edition 2018 mantém os dados de negócios e clientes protegidos contra ransomware, vírus, malware e surtos mais recentes em tempo real. É equipado com novos recursos baseados em nuvem, como CyberCapture, detecção aprimorada de malware e proteção aprimorada da Internet. Este produto inclui também gerenciamento remoto gratuito e excelente geração de relatórios. A interface de usuário do cliente também é atualizada. Disponível para PCs, computadores e servidores do Windows. O AVG oferece suporte telefônico para os clientes gratuito, sem interrupção. Saiba mais sobre o AVG Antivirus Business Edition O AVG Antivirus Business Edition 2018 mantém pequenas e médias empresas e dados de clientes protegidos contra ameaças online em tempo real. Saiba mais sobre o AVG Antivirus Business Edition
Limpeza, bloqueio e localização remotos de computador e dispositivo móvel para todos os sistemas operacionais e hardware. Saiba mais sobre o DriveStrike Limpeza, bloqueio e localização remotos de computador e dispositivo móvel para todos os sistemas operacionais e hardware. Saiba mais sobre o DriveStrike
Acunetix é uma ferramenta de segurança de computação que verifica e audita todos os aplicativos na Internet, incluindo HTML5, JavaScript e aplicativos de página única. Varreduras para 4.500 vulnerabilidades, incluindo SQLi e XSS, entre outros. Usado por governos, exércitos e empresas de educação, telecomunicações, bancos, finanças e comércio eletrônico, incluindo muitas empresas da Fortune 500. Acunetix oferece uma solução econômica, simples, expansível e de alta disponibilidade. Disponível em Windows, Linux e Online Saiba mais sobre o Acunetix Solução de segurança de computadores que realiza uma varredura do site, detecta vulnerabilidades como XSS ou SQL Injection e oferece correção. Saiba mais sobre o Acunetix
O EventLog Analyzer é uma solução abrangente de gestão de registros com detecção e análise de ameaças em tempo real. Ele pode correlacionar eventos díspares que ocorrem em toda a rede e também possui uma inteligência de ameaças integrada e uma plataforma de gestão de incidentes. Ele oferece relatórios de auditoria predefinidos para ajudar a rastrear a atividade em bancos de dados, servidores da Internet, dispositivos Windows, dispositivos de perímetro de rede e muito mais. Ele também ajuda a cumprir os regulamentos de conformidade, como PCI DSS, SOX, HIPAA, FISMA e GDPR. Saiba mais sobre o EventLog Analyzer O EventLog Analyzer é uma solução abrangente de gestão de registros que fornece vários recursos de segurança em uma plataforma unificada. Saiba mais sobre o EventLog Analyzer
O ManageEngine ADAudit Plus é uma solução de segurança e conformidade de TI. Com mais de 200 relatórios e alertas em tempo real, ele fornece conhecimento sobre as alterações feitas no conteúdo e na configuração de servidores Active Directory, Azure AD e Windows. Além disso, fornece informações sobre o acesso a estações de trabalho e servidores de arquivos (incluindo NetApp e EMC). O ADAudit Plus ajuda você a rastrear o logon e o logoff do usuário; analisar bloqueios de conta; auditar ADFS, ADLDS e impressoras; encaminhar registros para ferramentas SIEM e muito mais. Saiba mais sobre o ADAudit Plus O ADAudit Plus é um servidor Active Directory, Azure AD e de arquivos (incluindo NetApp e EMC) e um software de supervisão de alterações de estações de trabalho. Saiba mais sobre o ADAudit Plus
Gerencie senhas com as melhores práticas. Defina a expiração da senha de acordo com o risco (30 a 90 dias), gere senhas robustas para bloquear ataques de dicionário e de força bruta, promova automaticamente o rodízio de senhas e faça alterações de senha com rapidez e facilidade. Acompanhe as alterações e atividades com trilhas e relatórios de auditoria. Integre técnicos rapidamente, revogue acesso com um único fluxo de trabalho e reduza o risco em caso de desligamento do técnico. É possível limitar o acesso. Saiba mais sobre o SolarWinds Passportal Gere relatórios e demonstre conformidade na criação, uso e armazenamento de credenciais e controle as alterações por ator, data e aplicativo. Saiba mais sobre o SolarWinds Passportal
O Avast Business Antivirus Pro Plus 2019 é um poderoso pacote completo de terminais, e-mail, servidor e proteção de rede para pequenas e médias empresas (melhor para empresas de 1 a 500 funcionários). Funciona em PCs, Macs e Windows servers. Ele é aprimorado com 18 recursos de ponta para manter a empresa totalmente segura. Inclui poderoso antivírus, servidor, e-mail e segurança de rede, CyberCapture, firewall, gerenciador de senhas, VPN e muito mais. Pode ser usado com ou sem console na nuvem. Saiba mais sobre o Avast Business Antivirus Pro Plus Solução antivírus completa e premiada pronta para proteger todas as partes do negócio. Disponível para PCs, Macs e servidores. Saiba mais sobre o Avast Business Antivirus Pro Plus
Ferramenta de segurança contra malware que ajuda a proteger arquivos pessoais e privados por meio de proteção contra ataques de hackers e segurança de pagamento. Ferramenta de segurança contra malware que ajuda a proteger arquivos pessoais e privados por meio de proteção contra ataques de hackers e segurança de pagamento.
Proteja os usuários contra programas maliciosos, como vírus, worms, cavalos de Troia, hackers, spam e outras formas de invasão. Proteja os usuários contra programas maliciosos, como vírus, worms, cavalos de Troia, hackers, spam e outras formas de invasão.

da NewSoftwares.net

(526 avaliações)
Ver perfil
O Folder Lock permite proteger arquivos, pastas e unidades com senha, criptografar arquivos importantes durante o processo, fazer backup em tempo real, proteger unidades portáteis, triturar arquivos e unidades e limpar o histórico. O Folder Lock é o aplicativo de segurança de arquivos mais baixado, com mais de 55 milhões de usuários. Funciona nas versões de 32 e 64 bits do Windows 8, 7, Vista e XP. O Folder Lock permite proteger arquivos, pastas e unidades com senha, criptografar arquivos importantes durante o processo e fazer backup em tempo real.
Ele auxilia as empresas a manter suas redes e conexões com a Internet seguras. O serviço de VPN adiciona uma camada extra de proteção para proteger suas comunicações. Isso é feito com o uso de criptografia sólida em todo o tráfego de entrada e saída, para que terceiros não possam acessar suas informações confidenciais. Proteja sua organização contra violações de segurança. Acesso remoto seguro para toda a equipe. Simplifique a segurança da rede comercial. Acesse conteúdo online específico da região a partir de qualquer lugar do mundo. O NordVPN utiliza criptografia sólida em todo o tráfego da Internet para que terceiros não possam violar suas comunicações comerciais.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
Filtro de conteúdo da Internet baseado em DNS que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. Filtra mais de meio bilhão de solicitações de DNS todos os dias, identifica 60.000 iterações de malware por dia e tem mais de 7.500 clientes. Versões disponíveis para nuvem e gateway. Melhore a segurança da rede e de computadores agora. Faça uma avaliação gratuita do WebTitan hoje, suporte incluído. Filtro de conteúdo da Internet baseado em DNS para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet.
Proteção multivetorial contra vírus e malwares que oferece proteção total contra todas as ameaças de malware sofisticadas de hoje, incluindo cavalos de Tróia, keyloggers, phishing, spyware, backdoors, rootkits, ameaças persistentes avançadas e de dia zero. O Identity and Privacy Shield integrado impede que os dados sejam roubados ou capturados durante o uso da Internet e o firewall de saída também impede o malware de roubar dados. Não é preciso se preocupar ou executar atualizações. A segurança orientada pela nuvem significa que os terminais estejam sempre atualizados. Proteção multivetorial contra vírus e malware, oferecendo proteção total contra todas as ameaças sofisticadas de malware atuais.
O GravityZone foi desenvolvido integralmente para virtualização e nuvem, para fornecer serviços de segurança comercial. a endpoints físicos, dispositivos móveis, máquinas virtuais em servidores privados, nuvem pública e correio do Exchange. O GravityZone Enterprise Security oferece opções flexíveis de licenciamento para atender às necessidades de proteção de escritórios, datacenters e nuvem pública. Todos os serviços de segurança são fornecidos a partir de um dispositivo virtual para instalação no local, cobrindo todos os endpoints em todo o ambiente. A solução oferece opções flexíveis de licenciamento para atender às necessidades de proteção de escritórios, datacenters e nuvem pública.
O Windscribe é um aplicativo de desktop VPN e uma extensão de navegador VPN/proxy que trabalham juntos para bloquear anúncios e rastreadores, restaurar o acesso ao conteúdo bloqueado, proteger as comunicações online e ajudar a proteger sua privacidade online. Proteja seus dados e acesse informações sem restrições, independentemente da sua localização geográfica, por meio de uma VPN segura e um bloqueador de anúncios.

da Synametrics Technologies

(72 avaliações)
Ver perfil
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Certain software owns comprehensive disk partition management functions such as Merge Partition, Move/Resize Partition, Copy Partition, Create Partition, Split Partition, Delete Partition, Format Partition, and Convert File System. MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Ver perfil
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications. On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities

da WhiteCanyon Software

(29 avaliações)
Ver perfil
O WipeDrive permite que corporações, entidades governamentais e indivíduos apaguem permanentemente e com segurança os dados de discos rígidos, mídias removíveis e dispositivos móveis. Ele oferece uma maneira econômica, segura e socialmente responsável de reciclar e aposentar computadores e armazenamento de computadores. O WipeDrive é o líder mundial em destruição segura de dados. Ele oferece uma maneira econômica, segura e socialmente responsável de reciclar e aposentar ativos de TI, computadores e armazenamento de computadores.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. GlassWire is a modern network monitor & security tool with a built in firewall.
Hushmail is a secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and iPhone app, there's no complicated installation. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance, and our legally binding e-signatures comply with ESIGN and UETA. Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Ver perfil
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more. Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.
Solução SIEM híbrida que combina supervisão de registros (eventos) em tempo real com estoque de FIM, SW/HW e mais para uma abordagem integrada visando a aumentar a segurança da rede. O mecanismo exclusivo de correlação e normalização de registros de eventos de segurança com alertas descritivos de e-mail fornece contexto adicional e apresenta eventos de segurança ocultos do Windows em relatórios fáceis de entender que oferecem uma visão que vai além do que está disponível em eventos brutos. Um ciclo de lançamento dinâmico adiciona constantemente recursos para desafios oportunos como Ransomware. Solução SIEM híbrida de supervisão de registros de eventos em tempo real com monitoramento de rede e estoque, Active Directory e integridade do sistema.
Access control solution for corporate apps that supports integration with third party authentication providers. Access control solution for corporate apps that supports integration with third party authentication providers.
Netsparker Web Application Security Solution automatically and accurately identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Automate and scale your web security with Netsparker - a single platform for all your web security needs.
Ver perfil
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time. Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.

da Panda Security

(13 avaliações)
Ver perfil
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business. Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Provides strong encryption, supports multiple protocols, security standards & authentication methods. Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Ver perfil
Public key infrastructure; enables, manages and simplifies the use of digital certificates. Public key infrastructure; enables, manages and simplifies the use of digital certificates.
O Probely ajuda os engenheiros de segurança e os desenvolvedores de software a realizar testes de segurança automatizados com um scanner de segurança de aplicativos da Internet. O produto aumenta a velocidade da entrega do software, integrando perfeitamente os testes de segurança ao ciclo de desenvolvimento. Ele permite que os engenheiros de segurança realizem menos trabalho tedioso e se concentrem em ameaças críticas. Ele torna os desenvolvedores de software mais independentes, com instruções passo a passo sobre onde e como corrigir cada vulnerabilidade de acordo com a linguagem de programação. O Probely ajuda os engenheiros de segurança e DevOps a fornecer aplicativos da Internet seguros sem comprometer os prazos e prejudicar o trabalho atual.
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules. Secure password management, end-user dashboards and SSO to thousands of cloud applications!

da Treetop Innovation

(8 avaliações)
Ver perfil
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.) Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.

da CrowdStrike

(7 avaliações)
Ver perfil
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring. Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
Ver perfil
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers lack. We believe that real phish are the real problem. Through experiential learning - simulations of current phishing threats - you'll condition smarter email behavior, transforming vulnerable targets into an essential layer of defense. Improve effectiveness of Security Awareness Programs & condition users to defend organizations against an evolving threat landscape

da WhiteSource Software

(5 avaliações)
Ver perfil
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. Find & fix security and compliance issues in open source libraries in real-time
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

da ShieldApps Software Development

(4 avaliações)
Ver perfil
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network. On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.

da Atom Security

(4 avaliações)
Ver perfil
StaffCop Enterprise is on-permise software system that makes your business safe and secure. StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity. StaffCop Enterprise is an application based on client-server architecture which allows to monitor all the user activity on workstations, system events and information channels. Employee monitoring solution that helps with feature such as user behavior analysis, productivity tracking and investigation tools.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
Website security test to protect application and server against hackers. Website security test to protect application and server against hackers.
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Ver perfil
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging
Ver perfil
Web-based solution that provides computer security through fixing, ransomware, malware, adware, spyware and more. Web-based solution that provides computer security through fixing, ransomware, malware, adware, spyware and more.
Ver perfil
Make decisive, appropriate responses to incidents by automating identification and resolution processes. Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Ver perfil
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.

da MicroWorld Technologies

(1 avaliação)
Ver perfil
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
Manages all crucial security functions, including authentication, encryption and addressing. Manages all crucial security functions, including authentication, encryption and addressing.
Ver perfil
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more. Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
Ver perfil
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.

da White Cloud Security

(1 avaliação)
Ver perfil
App trust-listing technology. Protects your systems by only allowing trusted applications to execute. App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.

da Great Bay Software

(1 avaliação)
Ver perfil
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.

da Open-Xchange

(1 avaliação)
Ver perfil
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Ver perfil
Bodi is a complete end-point security platform encompassing... Phishing prevention- prevents users from accidentally clicking on malicious links Insider threat detection stop data theft with real time alerts based on defined rules Usage analysis detailed analysis of app usage, web browsing, printing, activity Forensic evidence full recording and keyword search for detailed investigations Remediation full remote control capabilities to correct device related issues Integrate- API Support Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Ver perfil
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
A Fyde ajuda empresas com uma força de trabalho cada vez mais distribuída a reduzir o risco de violação ao habilitar o acesso seguro a recursos essenciais da empresa para funcionários, parceiros, contratados e terceirizados. Acesso seguro à Internet e a recursos corporativos com uma única solução.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.

da RapidFire Tools

(1 avaliação)
Ver perfil
Cyber Hawk is the #1 cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. 30-day money-back guarantee. Cyber Hawk is the #1 cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service.

da Tripwire

(0 avaliações)
Ver perfil
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

da TecSec

(0 avaliações)
Ver perfil
Enables access to information through encryption, providing information security, privacy and confidentiality. Enables access to information through encryption, providing information security, privacy and confidentiality.

da Evidian

(0 avaliações)
Ver perfil
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.

da WiKID Systems

(0 avaliações)
Ver perfil
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

da Radient Software

(0 avaliações)
Ver perfil
A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.