50 resultados
Por que o Capterra é gratuito?
O SOC Prime TDM é uma comunidade SaaS que oferece conteúdo de detecção de ameaças que pode ser usado em vários formatos SIEM e soluções EDR. Saiba mais sobre o Threat Detection Marketplace
O SOC Prime Threat Detection Marketplace® (TDM) é uma plataforma de conteúdo SaaS que permite aos profissionais de segurança detectar e responder às ameaças cibernéticas, bem como aumentar o retorno do investimento (ROI na sigla em inglês) da maioria das ferramentas SIEM, EDR, NSM e SOAR em uso. O TDM agrega mais de 65 mil regras SIEM e EDR, analisadores e consultas de pesquisa e outros conteúdos mapeados diretamente para o MITER ATT&CK® e compatíveis com sua solução de resposta e detecção de endpoint (EDR na sigla em inglês) em uso, incluindo Microsoft Defender ATP, Carbon Black, CrowdStrike e Qualys. Saiba mais sobre o Threat Detection Marketplace
O SOC Prime Threat Detection Marketplace® (TDM) é uma plataforma de conteúdo SaaS que permite aos profissionais de segurança detectar e responder às ameaças cibernéticas, bem como aumentar o retorno do...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Saiba mais sobre o Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Saiba mais sobre o Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnologias de várias camadas que vão muito além dos recursos do antivírus básico. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnol...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk ajuda a investigar, supervisionar, analisar e atuar em todos os dados da organização.
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk é uma plataforma de análise de dados personalizável que permite investigar, supervisionar, analisar e agir. Da TI à segurança e às operações comerciais, o Splunk é uma plataforma de dados para tudo que permite tomar medidas em tempo real. Com o Splunk, é possível prever e prevenir problemas de TI, otimizar toda a pilha de segurança, minimizar o tempo de inatividade não planejado e explorar e visualizar processos de negócios para aumentar a transparência em uma única plataforma.
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk é uma plataforma de análise de dados personalizável que permite investigar, supervisionar, analisar e agir. Da TI à segurança e às op...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Plataforma baseada na nuvem e no local que permite que as empresas protejam dados críticos com autenticação multifatorial.
O acesso à empresa foi redefinido por serviços na nuvem, de mobilidade e do tipo traga seu próprio dispositivo (BYOD). Os trabalhadores exigem conectividade segura, não importa a localização: sua mesa pode estar em um carro, num quarto de hotel, em casa ou em um café. O Pulse Connect Secure é resultado de 15 anos de inovação e refinamento, que levaram a uma VPN segura e rica em recursos de última geração.
O acesso à empresa foi redefinido por serviços na nuvem, de mobilidade e do tipo traga seu próprio dispositivo (BYOD). Os trabalhadores exigem conectividade segura, não importa a localização: sua mesa...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
O Automox é uma plataforma de gestão de patches baseada na nuvem — higiene cibernética moderna para elevar a confiança na segurança do mundo.
Baseado na nuvem e disponível globalmente, o Automox aplica gestão de patches de SO e de terceiros, configurações de segurança e scripts personalizados no Windows, Mac e Linux a partir de um único console intuitivo. A TI e o SecOps podem obter controle e compartilhar rapidamente a visibilidade de endpoints locais, remotos e virtuais sem a necessidade de implantar uma infraestrutura dispendiosa.
Baseado na nuvem e disponível globalmente, o Automox aplica gestão de patches de SO e de terceiros, configurações de segurança e scripts personalizados no Windows, Mac e Linux a partir de um único cons...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Segurança de endpoint automática, criteriosa, tudo-em-um e confiável.
O Trend Micro Apex One usa uma combinação de técnicas avançadas de proteção contra ameaças para eliminar brechas de segurança em qualquer atividade do usuário e em qualquer endpoint. Ele aprende constantemente, se adapta e compartilha automaticamente a inteligência de ameaças em todo o ambiente. Essa combinação de proteção é fornecida por meio de uma arquitetura que utiliza os recursos de endpoint com mais eficiência e, em última análise, supera a concorrência na utilização da CPU e da rede.
O Trend Micro Apex One usa uma combinação de técnicas avançadas de proteção contra ameaças para eliminar brechas de segurança em qualquer atividade do usuário e em qualquer endpoint. Ele aprende consta...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Ao fornecer SIEM, EDR e SOC sem interrupção, ele oferece proteção avançada contra ameaças e orquestração de segurança de maneira rápida e eficiente.
O Netsurion capacita as organizações a prever, prevenir, detectar e responder com êxito as ameaças de segurança cibernética. A plataforma SIEM, EventTracker, unifica o aprendizado de máquina, a análise de comportamento e a orquestração de segurança com reconhecimento de 11 anos consecutivos no Gartner MQ for SIEM. O serviço de segurança gerenciada EventTracker SIEMphonic oferece um serviço de SIEM cogerenciado impulsionado pelo SOC sem interrupção. O EventTracker EDR também protege pontos de extremidade críticos contra ataques de dia zero e mutação de malware.
O Netsurion capacita as organizações a prever, prevenir, detectar e responder com êxito as ameaças de segurança cibernética. A plataforma SIEM, EventTracker, unifica o aprendizado de máquina, a análise...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of br...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collect...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that k...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitor...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the en...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
All-in-one unified threat management platform that aims to simplify cybersecurity and reduce its cost.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Management (SIEM), Vulnerability Management, Access Rights Auditor, Incident Response, HIPS/NIPS, Endpoint Protection, and Dark Web Monitoring. You can monitor almost any cloud environment or SaaS application with ready to use Integrations. UTMStack is currently integrated with Azure, AWS, etc.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Manage...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
DEFEND

DEFEND

(0 avaliações)
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long.
Identifies actual people as they work, not just their logins and passwords, all day long....
Hypori

Hypori

(0 avaliações)
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of pe...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Anakage

Anakage

(0 avaliações)
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Zenith

Zenith

(0 avaliações)
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
DigitalDefense

DigitalDefense

(0 avaliações)
Frontline.Cloud platform provides organizations with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS).
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
IntSights

IntSights

(0 avaliações)
IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwid...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Anomali

Anomali

(0 avaliações)
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats....
Cortex

Cortex

(0 avaliações)
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity...
Cyberbit EDR

Cyberbit EDR

(0 avaliações)
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signature...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Fidelis Endpoint

Fidelis Endpoint

(0 avaliações)
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Tachyon

Tachyon

(0 avaliações)
Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more.
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more....
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
On Demand By-the-Hour Forensic Analysis & Remote Remediation
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architect...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Hunters.AI

Hunters.AI

(0 avaliações)
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces.
Automatically detect threats across all attack surfaces....
SOC-as-a-Service

SOC-as-a-Service

(0 avaliações)
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact....
MVISION EDR

MVISION EDR

(0 avaliações)
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified.
Endpoint threat detection, investigation, and responsesimplified....
VIPRE SafeSend

VIPRE SafeSend

(0 avaliações)
Prevent misaddressed emails.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file...
FortiEDR

FortiEDR

(0 avaliações)
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response
Advanced, automated endpoint protection, detection, and response...
Capsule8

Capsule8

(0 avaliações)
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure....
Metallic delivers proven, enterprise-grade data protection for your organization's laptops and desktops - with the simplicity of SaaS.
Metallic Endpoint Backup & Recovery delivers proven data protection for your laptops and desktops - with the simplicity of SaaS. Built on Commvaults industry-leading technology, Metallic ensures your data is recoverable from deletion, corruption, ransomware and other malicious attacks. With unlimited Azure storage and one year of data retention included, Metallic SaaS offers hassle-free protection for your employees laptops and desktops wherever they may be.
Metallic Endpoint Backup & Recovery delivers proven data protection for your laptops and desktops - with the simplicity of SaaS. Built on Commvaults industry-leading technology, Metallic ensures your d...
  • Deteção de anomalias/malwares
  • Gestão de Remediação
  • Priorização
  • Lista negra/branca
  • Monitoração Contínua
Security.Desk

Security.Desk

(0 avaliações)
USB- und Endpoint-Security-Lösung
Mit Security.Desk kann genau definiert werden, welcher Benutzerkreis welche Dateien von und auf Wechseldatenträger(n) transferieren darf bzw. welche Dateitypen dafür nicht erlaubt sind. Sämtliche Dateibewegungen lassen sich protokollieren. > Freigabe und Blockade bestimmter Schnittstellen > Speichermedien und Dateitypen > Shadowing / Protokollierung von Daten- und Filetransfers > Active Directory-Integration > Rechtemanagement auf allen Ebenen > Zentraler Kontrollstand > Schutz vor Bad-USB uvm.
Mit Security.Desk kann genau definiert werden, welcher Benutzerkreis welche Dateien von und auf Wechseldatenträger(n) transferieren darf bzw. welche Dateitypen dafür nicht erlaubt sind. Sämtliche Datei...
CipherBox

CipherBox

(0 avaliações)
24/7 SOC-as-a-Service capabilities in a turnkey approach.
24/7 SOC-as-a-Service capabilities in a turnkey approach.
24/7 SOC-as-a-Service capabilities in a turnkey approach....
Blackpoint MDR

Blackpoint MDR

(0 avaliações)
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization...
eSentire

eSentire

(0 avaliações)
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments....
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach....
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection....