34 resultados
Por que o Capterra é gratuito?
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnologias de várias camadas que vão muito além dos recursos do antivírus básico. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk é uma plataforma de análise de dados personalizável que permite investigar, supervisionar, analisar e agir. Da TI à segurança e às operações comerciais, o Splunk é uma plataforma de dados para tudo que permite tomar medidas em tempo real. Com o Splunk, é possível prever e prevenir problemas de TI, otimizar toda a pilha de segurança, minimizar o tempo de inatividade não planejado e explorar e visualizar processos de negócios para aumentar a transparência em uma única plataforma. Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk ajuda a investigar, supervisionar, analisar e atuar em todos os dados da organização.
Ver perfil
O Trend Micro Apex One usa uma combinação de técnicas avançadas de proteção contra ameaças para eliminar brechas de segurança em qualquer atividade do usuário e em qualquer endpoint. Ele aprende constantemente, se adapta e compartilha automaticamente a inteligência de ameaças em todo o ambiente. Essa combinação de proteção é fornecida por meio de uma arquitetura que utiliza os recursos de endpoint com mais eficiência e, em última análise, supera a concorrência na utilização da CPU e da rede. Segurança de endpoint automática, criteriosa, tudo-em-um e confiável.
Baseado na nuvem e disponível globalmente, o Automox aplica gestão de patches de SO e de terceiros, configurações de segurança e scripts personalizados no Windows, Mac e Linux a partir de um único console intuitivo. A TI e o SecOps podem obter controle e compartilhar rapidamente a visibilidade de endpoints locais, remotos e virtuais sem a necessidade de implantar uma infraestrutura dispendiosa. O Automox é uma plataforma de gestão de patches baseada na nuvem — higiene cibernética moderna para elevar a confiança na segurança do mundo.
O Netsurion capacita as organizações a prever, prevenir, detectar e responder com êxito as ameaças de segurança cibernética. A plataforma SIEM, EventTracker, unifica o aprendizado de máquina, a análise de comportamento e a orquestração de segurança com reconhecimento de 11 anos consecutivos no Gartner MQ for SIEM. O serviço de segurança gerenciada EventTracker SIEMphonic oferece um serviço de SIEM cogerenciado impulsionado pelo SOC sem interrupção. O EventTracker EDR também protege pontos de extremidade críticos contra ataques de dia zero e mutação de malware. Ao fornecer SIEM, EDR e SOC sem interrupção, ele oferece proteção avançada contra ameaças e orquestração de segurança de maneira rápida e eficiente.

da CrowdStrike

(7 avaliações)
Ver perfil
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Ver perfil
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Ver perfil
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.

da Great Bay Software

(1 avaliação)
Ver perfil
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.

da Plurilock Security Solutions

(0 avaliações)
Ver perfil
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.

da Hypori

(0 avaliações)
Ver perfil
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

da Anakage

(0 avaliações)
Ver perfil
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.

da Infocyte

(0 avaliações)
Ver perfil
Infocyte helps security teams assess, detect, and respond to cyber threats--fast. Streamline your endpoint security (SIEM, SOAR, EDR, and more) from our easy-to-use cloud console. Managed security service providers leverage our platform to deliver cost-effective cybersecurity risk assessments, cyber incident response, and managed detection and response services. Reduce risk, maintain compliance, and streamline security operations with Infocyte --the platform for proactive cybersecurity. Reduce risk, maintain compliance, and streamline cybersecurity operations with Infocyte -- the platform for proactive cybersecurity.

da Ziften Technologies

(0 avaliações)
Ver perfil
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

da DigitalDefense

(0 avaliações)
Ver perfil
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.

da IntSights

(0 avaliações)
Ver perfil
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

da Anomali

(0 avaliações)
Ver perfil
Arm your security team with cyber threat intelligence to identify and prioritize threats. Arm your security team with cyber threat intelligence to identify and prioritize threats.

da Palo Alto Networks

(0 avaliações)
Ver perfil
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity

da Cyberbit

(0 avaliações)
Ver perfil
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.

da Cybereason

(0 avaliações)
Ver perfil
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today. The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.

da Tanium

(0 avaliações)
Ver perfil
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.

da Symantec

(0 avaliações)
Ver perfil
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.

da Fidelis Cybersecurity

(0 avaliações)
Ver perfil
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.

da 1E

(0 avaliações)
Ver perfil
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more. Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.

da CyFIR

(0 avaliações)
Ver perfil
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need On Demand By-the-Hour Forensic Analysis & Remote Remediation

da Cyber Hunters

(0 avaliações)
Ver perfil
Automatically detect threats across all attack surfaces. Automatically detect threats across all attack surfaces.

da Artic Wolf Networks

(0 avaliações)
Ver perfil
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact. A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.

da McAfee

(0 avaliações)
Ver perfil
Endpoint threat detection, investigation, and responsesimplified. Endpoint threat detection, investigation, and responsesimplified.