Filtrar resultados (267)
Classificação do produto
- Celular - Android nativo (35)
- Celular - iOS nativo (33)
- Instalado - Mac (49)
- Instalado - Windows (82)
- Nuvem, SaaS, web (177)
- Análises de dados comportamentais (97)
- Gestão de conformidade (29)
- Gestão de incidentes (74)
- Gestão de terminais (73)
- Inteligência artificial e aprendizado de máquina (84)
- Monitoramento em tempo real (26)
- Scanner de vulnerabilidades (95)
- Segurança de aplicativos (29)
- Verificação de IOC (29)
- Whitelisting/Blacklisting (78)
O Netacea protege as empresas do tráfego malicioso de bot. O Intent Analytics, desenvolvido com aprendizado de máquina, distingue com rapidez e precisão os robôs dos seres humanos para proteger sites, aplicativos móveis e APIs contra ameaças sofisticadas, priorizando usuários genuínos. A inteligência acionável com visualizações ricas em dados permite tomar decisões informadas sobre o tráfego. Saiba mais sobre o Netacea Bot Management O Netacea fornece uma solução revolucionária de gerenciamento de bot que protege sites, aplicativos móveis e APIs de bots maliciosos. Saiba mais sobre o Netacea Bot Management
O AVG Antivirus Business Edition 2018 mantém os dados de negócios e clientes protegidos contra ransomware, vírus, malware e surtos mais recentes em tempo real. É equipado com novos recursos baseados em nuvem, como CyberCapture, detecção aprimorada de malware e proteção aprimorada da Internet. Este produto inclui também gerenciamento remoto gratuito e excelente geração de relatórios. A interface de usuário do cliente também é atualizada. Disponível para PCs, computadores e servidores do Windows. O AVG oferece suporte telefônico para os clientes gratuito, sem interrupção. Saiba mais sobre o AVG Antivirus Business Edition O AVG Antivirus Business Edition 2018 mantém pequenas e médias empresas e dados de clientes protegidos contra ameaças online em tempo real. Saiba mais sobre o AVG Antivirus Business Edition
Milhões de pessoas e milhares de empresas dependem do gerenciador de senhas e do cofre digital do Keeper para reduzir substancialmente o risco de violação de dados. A Keeper é a líder mundial na proteção de senhas, documentos e ativos digitais sensíveis. Com o Keeper, a empresa pode gerar automaticamente senhas de alta resistência, proteger arquivos confidenciais em um cofre digital criptografado, compartilhar registros com equipes com segurança e integrar-se perfeitamente com SSO, LDAP e 2FA. Solicite uma demonstração gratuita agora mesmo. Saiba mais sobre o Keeper for Business O Keeper está transformando a forma como as empresas e os indivíduos protegem senhas e ativos digitais para reduzir significativamente o roubo cibernético. Saiba mais sobre o Keeper for Business
Limpeza, bloqueio e localização remotos de computador e dispositivo móvel para todos os sistemas operacionais e hardware. Saiba mais sobre o DriveStrike Limpeza, bloqueio e localização remotos de computador e dispositivo móvel para todos os sistemas operacionais e hardware. Saiba mais sobre o DriveStrike
O SolarWinds Threat Monitor - Service Provider Edition é uma plataforma rápida, escalável e baseada na nuvem criada para habilitar fornecedores de serviços gerenciados (MSPs) preocupados com a segurança, com uma ferramenta unificada para a supervisão de redes gerenciadas para análise de ameaças, contra as mais recentes e atualizadas ameaças a informações de inteligência de todo o mundo. Corrija rapidamente as ameaças dos clientes e prepare as informações necessárias para demonstrar a conformidade com os padrões estabelecidos pelos órgãos reguladores. Saiba mais sobre o SolarWinds Threat Monitor O SolarWinds® Threat Monitor é a ferramenta que você precisa para detectar, corrigir e gerar relatórios de eventos de segurança para todas as redes gerenciadas. Saiba mais sobre o SolarWinds Threat Monitor
O Firewall Analyzer é um software de gestão de analítica e configuração de registros sem agente, que analisa registros de firewalls e gera notificações de alerta em tempo real, segurança e relatórios de largura de banda. A solução é um software independente para fornecedor e suporta mais de 50 fornecedores de firewall. Ele também permite que os administradores forneçam relatórios abrangentes sobre os eventos de segurança e, por sua vez, possam tomar medidas para atenuar a segurança. Saiba mais sobre o ManageEngine Firewall Analyzer Firewall Analyzer, um software de análise de registro e gestão de configuração para uma visibilidade completa de toda a segurança da rede. Saiba mais sobre o ManageEngine Firewall Analyzer
O Boxcryptor é um software de criptografia flexível e expansível para a nuvem, compatível com mais de 30 provedores, bem como criptografia NAS em todas as plataformas. Ele oferece recursos de colaboração, auditoria e gerenciamento que possibilitam a colaboração segura em arquivos, estando em conformidade com os regulamentos de privacidade. Defina políticas personalizadas, gerencie usuários com Single Sign-on ou Active Directory e proteja contas com 2FA. Escolha a segurança Produzida na Alemanha para trabalhar de forma segura e eficiente na nuvem. Saiba mais sobre o Boxcryptor Solução de criptografia entre plataformas para sistemas NAS e nuvem, que oferece suporte a mais de 30 provedores de nuvem (ex: Dropbox, OneDrive). Saiba mais sobre o Boxcryptor
O Log360, uma solução integrada que combina o ADAudit Plus e o EventLog Analyzer em um único console, é a solução única para todos os desafios de gerenciamento de registros e segurança de rede. Ele oferece recursos de coleta, análise, correlação e arquivamento de registros em tempo real que ajudam a proteger dados confidenciais, impedir ameaças à segurança interna e combater ataques externos. Para ajudar a atender às demandas de segurança, auditoria e conformidade mais necessárias, ele vem pré-embalado em mais de 1.200 relatórios predefinidos e critérios de alerta. Saiba mais sobre o Log360 O Log360, uma solução abrangente de SIEM que ajuda a defender ataques contra segurança interna e externa com capacidade de gestão de registros. Saiba mais sobre o Log360
Sempre que surgem novos problemas de segurança ou operacionais, o Flowmon devolve o controle aos profissionais de TI. Aproveitando a análise de comportamento da rede, os profissionais de TI podem tomar ações decisivas, lidar com ameaças cibernéticas e gerenciar redes com confiança. Saiba mais sobre o Flowmon O Flowmon devolve o controle aos profissionais de TI. Lide com ameaças cibernéticas com a análise de comportamento da rede. Saiba mais sobre o Flowmon
O software Cryptosense Analyzer ajuda clientes a encontrar falhas de segurança na criptografia usada em infraestruturas e aplicações e, em seguida, corrigir antes que eles sejam explorados. O software é atualmente usado para analisar os sistemas que protegem: a maioria das mensagens interbancárias em todo o mundo; mais da metade de todas as negociações globais do Forex; o maior banco de dados de transações financeiras do mundo e a criptografia usada pelos maiores provedores de nuvem do mundo. Saiba mais sobre o Cryptosense A Cryptosense fornece software para detectar e eliminar vulnerabilidades causadas pelo mau uso da criptografia em aplicativos e infraestruturas. Saiba mais sobre o Cryptosense
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnologias de várias camadas que vão muito além dos recursos do antivírus básico. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Filtro de conteúdo da Internet baseado em DNS e camada de segurança da Internet para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. WebTitan filtra mais de 2 bilhões de solicitações de DNS todos os dias, identifica 300.000 iterações de malware por dia e tem mais de 7.500 clientes. Versões disponíveis para nuvem e gateway. Melhore a segurança cibernética agora. Faça uma avaliação gratuita do WebTitan hoje, suporte incluído. Ótimo preço mensal. Hospedado localmente. Filtro de conteúdo da Internet baseado em DNS para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Proteção multivetorial contra vírus e malwares que oferece proteção total contra todas as ameaças de malware sofisticadas de hoje, incluindo cavalos de Tróia, keyloggers, phishing, spyware, backdoors, rootkits, ameaças persistentes avançadas e de dia zero. O Identity and Privacy Shield integrado impede que os dados sejam roubados ou capturados durante o uso da Internet e o firewall de saída também impede o malware de roubar dados. Não é preciso se preocupar ou executar atualizações. A segurança orientada pela nuvem significa que os terminais estejam sempre atualizados. Proteção multivetorial contra vírus e malware, oferecendo proteção total contra todas as ameaças sofisticadas de malware atuais.
Netwrix empowers organizations to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. Our products enables them to minimize the risk of data breaches and ensure regulatory compliance by proactively reducing the exposure of sensitive data and promptly detecting policy violations and suspicious user behavior. Netwrix products identify sensitive data regardless of where it resides and enables you to reduce risks and prevent breaches.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.
ESM+Strategy ajuda as organizações a criar, rastrear e adaptar o plano estratégico. Com Balanced Scorecards, mapas estratégicos, painéis e relatórios instantâneos automatizados, o ESM dá vida à estratégia. Ao iniciar, você passará por um tutorial para se informar sobre os principais objetivos estratégicos, medidas e iniciativas. Uma vez que a arquitetura estratégica estiver em vigor, as organizações usam ESM para coletar atualizações do progresso de forma centralizada, eliminando a necessidade de planilhas e slides de uso exaustivos. Acompanhe o progresso do plano estratégico com balanced scorecards, mapas de estratégias, painéis e exportações geradas instantaneamente.
O Barkly substitui o antivírus legado com uma proteção mais forte, tecnologia mais inteligente e gerenciamento mais simples. O Barkly bloqueia ataques em todos os vetores e intenções, incluindo explorações, scripts, executáveis e ransomware. A arquitetura patenteada de 3 níveis do Barkly proporciona uma visibilidade inigualável de todos os níveis do sistema, incluindo da CPU, para bloquear ataques. O Barkly é incrivelmente simples de gerenciar e implantar: nenhuma política, configuração ou especialização em segurança é necessária. O Barkly Endpoint Protection substitui o antivírus legado com uma proteção mais forte, tecnologia mais inteligente e gerenciamento mais simples.
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
CyberGRX has the #1 third-party risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manually assessing risk. Third party risk management platform that automates self-assessments and their validation for third-party vendors.
Netsparker Web Application Security Solution automatically and accurately identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Automate and scale your web security with Netsparker - a single platform for all your web security needs.
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time. Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business. Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
O Probely ajuda os engenheiros de segurança e DevOps a fornecer aplicativos da Internet seguros sem comprometer os prazos. Ele permite integrar, de forma tranquila e automática, os testes de segurança ao ciclo de vida de desenvolvimento ágil, sem atrapalhar o fluxo de trabalho atual. Manter a segurança contínua nos estágios iniciais do ciclo de vida de desenvolvimento ágil e corrigir rapidamente as vulnerabilidades. Obter instruções fáceis passo a passo no rastreador de problemas sobre onde e como corrigir cada vulnerabilidade. É possível fazer uma avaliação gratuita. Sem cartão de crédito O Probely ajuda especialistas em segurança e desenvolvedores de software a encontrar vulnerabilidades, corrigi-las e automatizar os testes de segurança com facilidade.
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK. Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more. Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data. Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes.
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. Find & fix security and compliance issues in open source libraries in real-time
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
DataDome é especializada em proteger e acelerar negócios digitais. Graças à solução de gestão de bots com tecnologia IA, as empresas podem melhorar o desempenho de sites sobrecarregados com raspagem intensiva; proteger os dados do usuário contra hackers; tomar melhores decisões de marketing e de negócio, graças aos dados de análise que não estão contaminados pelo tráfego de bots. Desenvolva e execute a estratégia de gestão de bots graças ao painel, relatórios e alertas em tempo real. Solução de gestão de bots com tecnologia IA para proteger todos os pontos de vulnerabilidade (sites, aplicativos…) e acelerar os negócios digitais.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
O produto MetaPhish tem a capacidade de originar e-mails de um conjunto de domínios de phishing simulados preenchidos. O software contém uma biblioteca de experiências inteligentes de aprendizado, como infográficos, avisos e vídeos de treinamento. Ao contrário de outras soluções de phishing, o software permite que o usuário ateste ou comunique-se com o administrador. MetaPhish O MetaPhish ajuda a manter a equipe protegida contra golpes de phishing por meio de um treinamento automatizado que aumenta a vigilância. O MetaPhish tem a capacidade de originar e-mails de um conjunto de domínios de phishing simulados preenchidos.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and media. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Data management system with branching validation capability that controls, sorts and seeks for sensitive data such as PII, PCI or ePHI. Data management system with branching validation capability that controls, sorts and seeks for sensitive data such as PII, PCI or ePHI.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Integrated risk management platform that helps firms manage regulatory compliance, IT, security, vendors, audits and documentation.
OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but uses the latest technology to guide you to full protection. OnDMARC is an email security product that helps organisations of all sizes deploy DMARC with confidence.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code. Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Panorays automates third-party security lifecycle management. With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR and NYDFS. Automates third-party security lifecycle management.
A SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. D3 Security is a SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
Cloud security software to continuously verify hybrid, multi-cloud networks' security within and between physical, cloud, and software defined environments. with a visual interface to ensure control policies, analyze access, and more. Cloud software to continuously verify network set up and access to ensure compliance with policies and regulations..
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Investigation platform that helps enterprises perform threat investigations through tracking employee misconduct, frauds, chats & more while performing root cause analysis. Investigation platform that helps enterprises perform threat investigations through tracking employee misconduct, frauds, chats & more.
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.