Filtrar resultados (125)
O Netacea protege as empresas do tráfego malicioso de bot. O Intent Analytics, desenvolvido com aprendizado de máquina, distingue com rapidez e precisão os robôs dos seres humanos para proteger sites, aplicativos móveis e APIs contra ameaças sofisticadas, priorizando usuários genuínos. A inteligência acionável com visualizações ricas em dados permite tomar decisões informadas sobre o tráfego. Saiba mais sobre o Netacea Bot Management O Netacea fornece uma solução revolucionária de gerenciamento de bot que protege sites, aplicativos móveis e APIs de bots maliciosos. Saiba mais sobre o Netacea Bot Management
O 365 Total Protection da Hornetsecurity oferece proteção abrangente para serviços em nuvem da Microsoft, especialmente desenvolvidos para o Office 365 e integrados de maneira integrada. Beneficie-se do fato de que é fácil de configurar e extremamente intuitivo de usar, simplificando a gestão de segurança de TI desde o início. Saiba mais sobre o 365 Total Protection O 365 Total Protection Business oferece uma solução abrangente de segurança de e-mail com diversos recursos. Saiba mais sobre o 365 Total Protection
O Avast Business Antivirus Pro Plus 2019 é um poderoso pacote completo de terminais, e-mail, servidor e proteção de rede para pequenas e médias empresas (melhor para empresas de 1 a 500 funcionários). Funciona em PCs, Macs e Windows servers. Ele é aprimorado com 18 recursos de ponta para manter a empresa totalmente segura. Inclui poderoso antivírus, servidor, e-mail e segurança de rede, CyberCapture, firewall, gerenciador de senhas, VPN e muito mais. Pode ser usado com ou sem console na nuvem. Saiba mais sobre o Avast Business Antivirus Pro Plus Solução antivírus completa e premiada pronta para proteger todas as partes do negócio. Disponível para PCs, Macs e servidores. Saiba mais sobre o Avast Business Antivirus Pro Plus
Filtro de conteúdo da Internet baseado em DNS e camada de segurança da Internet para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. WebTitan filtra mais de 2 bilhões de solicitações de DNS todos os dias, identifica 300.000 iterações de malware por dia e tem mais de 7.500 clientes. Versões disponíveis para nuvem e gateway. Melhore a segurança cibernética agora. Faça uma avaliação gratuita do WebTitan hoje, suporte incluído. Ótimo preço mensal. Hospedado localmente. Saiba mais sobre o WebTitan Filtro de conteúdo da Internet baseado em DNS para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. Saiba mais sobre o WebTitan
O TOPIA é um sistema inovador de segurança na nuvem que coleta dados em sua infraestrutura digital para reconhecer e atenuar vulnerabilidades antes que se tornem ameaças. Vários idiomas e sistemas operacionais? Sem problema. Com o TOPIA, ambientes de nuvem dinâmicos e diversos são seguros. Uma solução de segurança na nuvem dinâmica e leve para a moderna infraestrutura nativa na nuvem. Capaz de analisar e priorizar riscos em uma rede complexa de aplicativos e ativos. Saiba mais sobre o TOPIA Plataforma unificada de gestão de vulnerabilidades de segurança nativa na nuvem Saiba mais sobre o TOPIA
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnologias de várias camadas que vão muito além dos recursos do antivírus básico. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
A missão da empresa é proteger a sua missão. A Duo Security simplifica a segurança, para que você possa se concentrar no que é importante. A solução de acesso confiável e escalonável baseada em nuvem protege o acesso a todos os aplicativos para qualquer usuário e dispositivo, a partir de qualquer lugar. A solução de autenticação multifatorial (MFA) da Duo é fácil de usar, administrar e implantar, proporcionando total visibilidade e controle do endpoint. Essa combinação de confiança do usuário e dispositivo é a base para um modelo de segurança zero-trust. A autenticação multifatorial do Duo Security oferece acesso fácil e rápido aos aplicativos, protegendo os usuários contra roubo de credencial.
Protect your email against ransomware, spearphishing and all other threats. ZEROSPAM is a highly effective and easy to use Cloud Email Security solution with a proven catch rate of 99.9% against all forms of email-borne threats. Fully compatible with Office 365, it provides superior ransomware and phishing protection, the best spearphishing protection in the industry and a very low false positive rate. We are an service-oriented team with a complete and highly accurate antispam. A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing.
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk é uma plataforma de análise de dados personalizável que permite investigar, supervisionar, analisar e agir. Da TI à segurança e às operações comerciais, o Splunk é uma plataforma de dados para tudo que permite tomar medidas em tempo real. Com o Splunk, é possível prever e prevenir problemas de TI, otimizar toda a pilha de segurança, minimizar o tempo de inatividade não planejado e explorar e visualizar processos de negócios para aumentar a transparência em uma única plataforma. Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk ajuda a investigar, supervisionar, analisar e atuar em todos os dados da organização.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities. Protect your business across physical, virtual cloud and container environments with central visibility and control.
O Rubrik fornece disponibilidade instantânea de aplicativos para empresas na nuvem híbrida para recuperação, pesquisa, nuvem e desenvolvimento. Ao usar a excelente plataforma de gestão de dados na nuvem, os clientes mobilizam aplicativos, automatizam políticas de proteção, recuperam-se do Ransomware, pesquisam e analisam dados de aplicativos em escala em uma só plataforma. De dias para segundos. Solução de gestão e backup de dados que ajuda as empresas a gerenciar dados em ambientes na nuvem usando políticas de proteção automatizadas.
A cloud security analytics platform that provides security intelligence for your hybrid environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence.
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. Cloud-based solution that enables businesses to detect & prevent cyber threats with website scanning, malware removal and more.
O Boxcryptor é um software de criptografia flexível e expansível para a nuvem, compatível com mais de 30 provedores, bem como criptografia NAS em todas as plataformas. Ele oferece recursos de colaboração, auditoria e gerenciamento que possibilitam a colaboração segura em arquivos, estando em conformidade com os regulamentos de privacidade. Defina políticas personalizadas, gerencie usuários com Single Sign-on ou Active Directory e proteja contas com 2FA. Escolha a segurança Produzida na Alemanha para trabalhar de forma segura e eficiente na nuvem. Solução de criptografia entre plataformas para sistemas NAS e nuvem, que oferece suporte a mais de 30 provedores de nuvem (ex: Dropbox, OneDrive).
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
O Dark Web ID ajuda fornecedores de serviços gerenciados (MSPs na sigla em inglês) e equipes de TI internas a proteger sua organização e clientes de uma violação de segurança cibernética, supervisionando a dark web sem interrupção e alertando se dados ou senhas confidenciais de empresas ou funcionários forem encontrados à venda na dark web. O Dark Web ID supervisiona dados e credenciais comerciais e o alerta se for encontrado para venda nos mercados da dark web, para que você possa evitar violações.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps. Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing.
DataDome é especializada em proteger e acelerar negócios digitais. Graças à solução de gestão de bots com tecnologia IA, as empresas podem melhorar o desempenho de sites sobrecarregados com raspagem intensiva; proteger os dados do usuário contra hackers; tomar melhores decisões de marketing e de negócio, graças aos dados de análise que não estão contaminados pelo tráfego de bots. Desenvolva e execute a estratégia de gestão de bots graças ao painel, relatórios e alertas em tempo real. Solução de gestão de bots com tecnologia IA para proteger todos os pontos de vulnerabilidade (sites, aplicativos…) e acelerar os negócios digitais.
Manage all of your core security and compliance operations from one place. With JupiterOne, you can perform access reviews, code repo vulnerabilities, general vulnerability management, endpoint compliance, run executive security reports and gather compliance evidence. All of the data is collected and classified automatically into a database you can search, visualize, alert and analyze. Spend 10X less time on the tedious. Manage all of your security and compliance operations from one real-time location.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises adopting cloud services, ensuring confidential and sensitive data is protected at all locations - in the cloud and on users devices. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection. Cloud security solution that helps secure user access and identity via adaptive authentication, single sign-on, and portal protection.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Infoblox solutions reduce network expense and increase network availability and flexibility by automating key components of network infrastructure, including IP address management (IPAM), DNS and DHCP. The result is a significant decrease in errors and the sheer amount of tasks required to keep networks available, flexible and secure. IP address management solution that assists users with data organization, network allocation, configuration tasks, and more
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control. VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Cloud Control is a 100% API based cloud infrastructure and workload protection platform that offers enterprises complete cloud control through actionable security intelligence across AWS, GCP, and Azure. Using Cloud Control an organization can gain complete visibility into its cloud infrastructure, prevent misconfiguration, enforce security best practices, implement IAM governance, ensure compliance with ever-evolving compliance frameworks and auto- remediate any violations in near real-time. Cloud Control automates cloud security and compliance monitoring and management.
Cloud Security software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner. Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud infrastructure, workloads, containers, and kubernetes environments. Lacework unified cloud security platform provides deep visibility, advanced anomaly detection, delivers one-click investigation with rich context, and simplifies cloud compliance through automation. Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks.
Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it. Cloud-based tool that helps users perform data acquisition, break backup passwords, view and analyze information stored in it.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 100 patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide. Secure Internet access on any device, from any location, in the cloud.
DisruptOps provides a SaaS-based cloud management platform to implement automated control and security of cloud infrastructure. We are helping organizations enforce cloud security best practices with automated guardrails, for multi-cloud environments. Rather than erecting barriers to cloud adoption, DisruptOps enforces guardrails that empowers DevOps and Security teams to remain agile and innovative while helping avoid security and operational pitfalls. DisruptOps is a multi-cloud management platform that is helping organizations assess and automate cloud security best practices.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores. Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.
Stop the most common cause of cloud data breaches with Warden. Warden provides continuous vulnerability and compliance monitoring, giving you visibility and control of your top cloud risks. Continuous Vulnerability Monitoring: Prevent exploitable vulnerabilities like open AWS S3 Buckets and disabled MFA with automated detection on Storyfier. Built-in Compliance Reporting: Assess your compliance posture against the CIS Benchmark and AWS Well-Architected Framework. Stop the most common cause of cloud data breaches with Warden, the integrated cloud security and compliance solution for AWS users.
O VaultCore é uma solução de gerenciamento de chaves de criptografia para automatizar o processo do ciclo de vida das chaves, oferecer capacidade para dar suporte a centenas de milhões de chaves e oferecer integração de rede para proteger os ativos contra ataques a dispositivos e infraestrutura. Atendendo aos setores bancário/financeiro, de saúde, armazenamento de dados, telecomunicações, energia, TI e transporte, o VaultCore é reconhecido pela escalabilidade, interoperabilidade, automação e facilidade de uso. Ferramenta de criptografia de gerenciamento de chaves que fornece controle e segurança a todo o ciclo de vida das chaves para todas as tecnologias aplicáveis.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection. Quixxi is also a monitoring tool with Licensing, Analytics & Diagnostics SDK. Allowing developers to identify illegal use & help recover associated lost revenue, detailed insights into customer engagement & advanced debugging files. Quixxi is an end-to-end mobile app security solution for developers to protect and monitor any mobile app in minutes.
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source.
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Cloudaware is a SaaS multi-cloud management platform with such modules as: CMDB, Cost Management, Vulnerability Scanning, Intrusion Detection, Compliance Engine, Log Management and Backups & Replication. Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products. Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management.
O Skybox Vulnerability Control tem uma abordagem sistemática da gestão de vulnerabilidades, diferente de qualquer outro fornecedor. A solução está enraizada na visibilidade abrangente de sua superfície de ataque, usando seu contexto para analisar, priorizar e corrigir suas vulnerabilidades mais arriscadas rapidamente. Identifique e priorize riscos para sua rede com soluções abrangentes de varredura e análise de vulnerabilidades.
R&SCloud Protector is specifically designed for cloud-specific security challenges at the application level. The Anti-DDoS option prevents distributed denial-of-service (DDoS) attacks that paralyze websites. R&SCloud Protector is hosted in European data centers and guarantees the best hosting quality at the highest security level. It enables businesses and users to protect web applications without having to manage the required backend infrastructure or acquire new skills. R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support
The Cato Cloud securely connects all business locations, people, and applications. Cato reduces MPLS costs, eliminates distributed appliances, provides secure internet access, and globally extends the WAN to mobile users and cloud datacenters. Cato provides a global SD-WAN with built-in network security, delivered as a cloud service.
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.
Forcepoint Edge Protection helps modernize enterprise networks for cloud adoption. Gain visibility and control over SaaS apps and web use while protecting your users wherever they are. Converged solutions like SD-WAN and NGFW combined with behavior-centric, risk-adaptive capabilities provide outside-in security for on-premise and in the cloud. Reduce the cost and complexity of connecting remote locations with cloud-delivered, zero-footprint security services. Cloud-first, hybrid-ready solution delivering behavior-centric, risk-adaptive security across environments via a converged platform.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.
Provides HIPAA Cloud automation for AWS applications and workloads. Plan, enforce, and demonstrate HIPAA compliance internally and externally. Create and enforce organizational and administrative policies with the Policy Navigator then automate DevOps and Security Operations with continuous compliance monitoring. Continuous Compliance Monitoring for AWS. Automate HIPAA compliance and DevOps tasks for AWS. Generate organizational policies.
ThreatX protects web applications and APIs from cyber threats across cloud and on-prem environments. By combining behavior profiling and collective threat intelligence with deep analytics, ThreatX delivers precise protection and complete threat visibility. ThreatXs AppSec-as-a-Service combines threat hunting with 24/7 access to security experts along with operational management, virtually eliminating costs associated with legacy WAFs. ThreatX protects modern web applications and APIs from complex cyber threats combining intelligent defense with 24/7 AppSec expertise.
Elastic Workload Protector is a Cloud analytics solution which integrates a vulnerability scanner. This way, customers infrastructure are protected all the time because they know every new vulnerability or other potential risk and have detailed reports with adapted remediation solutions. EWP protects every infrastructure (traditional, Cloud, virtualized, hybrid) and containers. Its patented Clone & Scan feature allows customers to make precise analysis without impacting the production. Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously.
CloudGuard Dome9 is a comprehensive software platform for public cloud security and compliance orchestration. Using Dome9, organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud. Dome9 delivers security capabilities across Amazon Web Services, Microsoft Azure, and Google Cloud Platform (GCP). CloudGuard Dome9 provides cloud security solutions to keep enterprise data, assets and apps free from sophisticated attacks.
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.
TokenEx é uma plataforma de tokenização de classe empresarial, baseada na nuvem, que oferece flexibilidade praticamente ilimitada na forma como os clientes podem acessar, armazenar e proteger dados. Trabalha com múltiplos canais de aceitação de dados e mantém uma abordagem agnóstica ao processador, o que significa que pode transformar em token e proteger quase qualquer tipo de dados, incluindo PCI, PII, PHI e até mesmo formatos de dados não estruturados, integrando-se praticamente a qualquer processador ou endpoint. Plataforma de segurança de dados baseada na nuvem, que oferece tokenização e proteção segura de dados na nuvem para todos os tipos de dados sensíveis.
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks.
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.
Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Acra provides selective encryption, multi-layered access control, database leakage prevention and intrusion detection capabilities in a convenient, developer-friendly package. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.
Recognizing the inadequacy of traditional application security paradigms, Protego Labs designed the first comprehensive solution built with the unique constraints and opportunities of serverless in mind. Through continuous serverless security posture, dynamic serverless intelligence, and elastic defense, Protego helps organizations achieve control over the security of their applications with unmatched automation and security that is at the speed of serverless- in under 20 minutes. Protegos unique technology and automation delivers unmatched security that is at the speed of serverless- in less than 20 minutes.
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more
Defendry's AI-powered security solution automatically detects, deters, and reports threats including guns, masks, and intruders in just seconds -- helping people to respond intelligently, immediately. Learn more at defendry.com. Defendry's AI-powered security solution automatically detects, deters, and reports threats in just seconds.
O Turbot fornece automação de governança em nuvem para a nuvem empresarial, com proteções automatizadas que garantem que a infraestrutura de nuvem esteja segura, compatível, escalável e com otimização de custos. O Turbot permite que a equipe de nuvem se concentre em fornecer valor de nível superior, enquanto as equipes de aplicativos permanecem ágeis com o uso de ferramentas nativas da AWS, Azure e GCP. O Turbot fornece automação de governança em nuvem para a nuvem empresarial com proteções automatizadas.
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
AtomicWP Workload Security helps to secure workloads in a variety of environments while enhancing security. AtomicWP meets virtually all cloud workload protection and compliance requirements in a single lightweight agent. AtomicWP secures workloads running in Amazon AWS, Google Cloud Platform (GCP), Microsoft Azure, IBM Cloud, or in any hybrid environment. AtomicWP secures both VM-based and container-based workloads. For more info: https://www.atomicorp.com/atomic-wp/ AtomicWP Workload Protection helps to secure workloads in a variety of environments while enhancing the security.