Logiciels de sécurité informatique

Un logiciel de sécurité informatique automatise la sécurité et la surveillance des systèmes informatiques. Cette application analyse et surveille le réseau informatique d'une entreprise pour évaluer les vulnérabilités potentielles. De plus, elle offre des solutions de sécurité réseau personnalisables, ainsi que des solutions préconfigurées pour diverses normes réglementaires. Ce type de logiciel fournit des reporting en temps réel sur la sécurité du réseau, ainsi que des rapports d'incidents relatifs à des violations potentielles de la sécurité. Voir aussi : logiciel de sécurité réseau.

Pourquoi Capterra est gratuit
MetaPhish

MetaPhish

par MetaCompliance

(1 avis)
Le produit MetaPhish peut générer des e-mails à partir d'un ensemble de domaines d'hameçonnage simulés prédéfinis. Le logiciel contient une bibliothèque d'expériences d'apprentissage intelligentes, telles que des infographies, des avis et des vidéos de formation. Contrairement aux autres solutions anti-hameçonnage, le logiciel permet à l'utilisateur d'attester ou de communiquer avec l'administrateur. En savoir plus sur MetaPhish MetaPhish peut générer des e-mails à partir d'un ensemble de domaines d'hameçonnage simulés prédéfinis. En savoir plus sur MetaPhish
Realtime Security

Realtime Security

par Cloud Management Suite

(24 avis)
Cloud Management Suite is a cloud-based IT Management and Security solution allowing IT departments to instantly respond to security events. Whether its a ransomware attack or supporting users on the fly, Cloud Management Suite Realtime Security allows you to manage, patch, and remediate your environment with ease. En savoir plus sur Realtime Security Stop breaches in real time and remediate vulnerabilities all from one console. Get live, data from 1000s of devices in under 10 seconds En savoir plus sur Realtime Security
JumpCloud DaaS

JumpCloud DaaS

par JumpCloud

(4 avis)
JumpCloud Directory-as-a-Service, c'est Active Directory et LDAP réinventés. JumpCloud gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux. JumpCloud gère les utilisateurs et leurs systèmes sous Mac, Linux ou Windows et fournit un accès aux ressources dans le cloud et sur site tel qu'Office 365, Suite G, AWS, Salesforce et Jira. Le même login connecte les utilisateurs aux réseaux et aux partages de fichiers via RADIUS et Samba, respectivement, en sécurisant le WiFi de votre entreprise. En savoir plus sur JumpCloud DaaS JumpCloud Directory-as-a-Service gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux. En savoir plus sur JumpCloud DaaS
Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus est un puissant module de protection des terminaux et des serveurs tout-en-un pour les petites et moyennes entreprises (idéal pour 1 à 200 employés). Fonctionne sur PC, Mac et serveurs. Le produit est amélioré avec 18 fonctions de pointe pour assurer la sécurité de l'entreprise. Comprend un puissant antivirus, serveur, sécurité de messagerie et de réseau, cybercapture, pare-feu, gestionnaire de mots de passe, VPN et bien plus encore. Il peut être utilisé avec ou sans console cloud. Au choix. En savoir plus sur Avast Business Antivirus Pro Plus Solution antivirus primée tout-en-un prête à protéger toutes les parties de l'entreprise. Disponible pour PC, Mac et serveurs. En savoir plus sur Avast Business Antivirus Pro Plus
Webroot SecureAnywhere Endpoint Protection
Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles comme les trojans, les keyloggers, le phishing, les logiciels espions, les backdoors, les rootkits (malwares furtifs), les zero-days et les menaces persistantes avancées. La protection de l'identité et des données personnelles incluse dans le logiciel empêche le vol ou l'enregistrement des données pendant l'activité en ligne, et le pare-feu outbound défend les données contre les vols par malware. Pas besoin de vous charger ni de vous préoccuper des mises à jour : grâce à la sécurité basée sur le cloud, les points terminaux sont toujours à jour. En savoir plus sur Webroot SecureAnywhere Endpoint Protection Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles. En savoir plus sur Webroot SecureAnywhere Endpoint Protection
SolarWinds Threat Monitor

SolarWinds Threat Monitor

par SolarWinds MSP

(1 avis)
SolarWinds Threat Monitor (édition pour les prestataires de services) est une plateforme rapide, évolutive et basée sur le cloud, conçue pour permettre aux prestataires d'infogérance soucieux de la sécurité de disposer d'un outil unifié pour surveiller les journaux d'analyse des menaces des réseaux gérés et les comparer aux informations d'analyse des dernières menaces du monde entier. Neutralisez rapidement les menaces de votre client et préparez les informations nécessaires pour démontrer sa conformité aux normes définies par les organismes de réglementation. En savoir plus sur SolarWinds Threat Monitor SolarWinds® Threat Monitor est l'outil nécessaire pour détecter, neutraliser et signaler les événements de sécurité sur tous vos réseaux gérés. En savoir plus sur SolarWinds Threat Monitor
ADAudit Plus

ADAudit Plus

par ManageEngine

(16 avis)
ManageEngine ADAudit Plus est une solution de sécurité et de conformité informatique. Avec plus de 200 rapports et alertes en temps réel, il fournit des informations à propos des modifications apportées au contenu et à la configuration des serveurs Active Directory, Azure AD et Windows. De plus, il fournit des informations sur l'accès au poste de travail et au serveur de fichiers (y compris NetApp et EMC). ADAudit Plus vous aide à suivre la connexion et la fermeture de session de l'utilisateur ; analyser les verrouillages de compte ; auditer ADFS, ADLDS et les imprimantes ; transmettre les journaux aux outils SIEM ; et fait beaucoup plus. En savoir plus sur ADAudit Plus ADAudit Plus est un serveur de fichiers Active Directory, Azure AD (y compris NetApp et EMC) et un logiciel de surveillance des modifications des postes de travail. En savoir plus sur ADAudit Plus
EventLog Analyzer

EventLog Analyzer

par ManageEngine

(3 avis)
EventLog Analyzer est la solution SIEM (Security Information and Event Management) la plus rentable disponible sur le marché. EventLog Analyzer répond à toutes les fonctionnalités SIEM critiques telles que l'agrégation de journaux, l'analyse de journaux, le reporting de conformité, la surveillance de l'intégrité des fichiers, la surveillance de l'activité utilisateur, la corrélation d'événements, les alertes en temps réel, l'investigation des journaux et la rétention des journaux. Désormais, vous pouvez limiter les cyberattaques sophistiquées, identifier la cause première des incidents de sécurité et contrecarrer les violations de données. En savoir plus sur EventLog Analyzer Fournit le logiciel SIEM (Security Information and Event Management) le plus rentable sur le marché. En savoir plus sur EventLog Analyzer
WebTitan

WebTitan

par TitanHQ

(165 avis)
Filtre de contenu web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web. Ils filtrent plus d'un demi-milliard de requêtes DNS chaque jour, identifient 60 000 itérations de programmes malveillants par jour et comptent plus de 7 500 clients. Versions cloud et passerelle disponibles. Améliorez votre réseau et sécurité informatique maintenant. Faites un essai gratuit de WebTitan dès aujourd'hui, support compris. En savoir plus sur WebTitan Filtre web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web En savoir plus sur WebTitan
Dhound

Dhound

par IDS Global

(1 avis)
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. En savoir plus sur Dhound Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications. En savoir plus sur Dhound
Teramind

Teramind

par Teramind

(50 avis)
Teramind propose une approche de la sécurité centrée sur l'utilisateur pour surveiller le comportement de votre employé sur son PC. Ce logiciel rationalise la collecte des données des employés afin d'identifier les activités suspectes, de détecter les menaces éventuelles, de surveiller l'efficacité des employés et d'assurer la conformité du secteur. Il contribue à réduire les incidents de sécurité en fournissant un accès en temps réel aux activités des utilisateurs et en proposant des alertes, des avertissements, des redirections et des verrouillages d'utilisateurs pour que votre entreprise soit aussi efficace et sécurisée que possible. En savoir plus sur Teramind Testez la version d'essai gratuite. Teramind simplifie la surveillance de l'activité de l'utilisateur et la prévention du vol de données. En savoir plus sur Teramind
Passworks

Passworks

par Certero

(1 avis)
Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. En savoir plus sur Passworks Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. En savoir plus sur Passworks
PA File Sight

PA File Sight

par Power Admin

(0 avis)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. En savoir plus sur PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. En savoir plus sur PA File Sight
OneLogin

OneLogin

par OneLogin

(26 avis)
Destiné aux entreprises comptant plus de 100 utilisateurs, OneLogin propose une solution de gestion des identités et des accès (IAM) basée sur le cloud qui offre des authentifications uniques (SSO) simples. Il permet aux entreprises de sécuriser et de gérer plus facilement l'accès aux applications web aussi bien en cloud que derrière un pare-feu. Votre entreprise travaille avec au moins trois logiciels en tant que service (SaaS) ou applications web internes ? Alors la sécurité offerte par la solution OneLogin à authentification unique basée sur le cloud est faite pour vous. En savoir plus sur OneLogin Solutions de gestion des identités (GIA) et des signatures uniques (SSO) pour les entreprises de toutes tailles. Démarrez immédiatement avec la version d'essai gratuite. En savoir plus sur OneLogin
GlassWire

GlassWire

par GlassWire

(14 avis)
Helps protect your computer network and privacy via network monitoring and a built in firewall management tool. En savoir plus sur GlassWire Helps protect your computer network and privacy via network monitoring and a built in firewall management tool. En savoir plus sur GlassWire
Veriato RansomSafe

Veriato RansomSafe

par Veriato 360

(4 avis)
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. En savoir plus sur Veriato RansomSafe Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. En savoir plus sur Veriato RansomSafe
AVG Antivirus Business Edition
AVG Antivirus Business Edition 2018 protège les données de votre entreprise et de vos clients contre les rançongiciels, les virus, les logiciels malveillants et les épidémies en temps réel. Il est alimenté par de nouvelles fonctionnalités basées sur le cloud telles que CyberCapture, une détection améliorée des logiciels malveillants et un bouclier web amélioré. Ce produit inclut également une gestion à distance gratuite et un excellent reporting. L'interface utilisateur du client est également mise à jour. Disponible pour les PC Windows, les ordinateurs de bureau et les serveurs. AVG offre une assistance téléphonique gratuite 24h/24, 7j/7 à ses clients. En savoir plus sur AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 protège vos PME et vos données clients contre les menaces en ligne et en temps réel. En savoir plus sur AVG Antivirus Business Edition
EventSentry

EventSentry

par Netikus.net

(17 avis)
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. En savoir plus sur EventSentry Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities. En savoir plus sur EventSentry
mSpy

mSpy

par mSpy

(9 avis)
Avec des millions d'utilisateurs satisfaits dans le monde entier, mSpy est l'application de surveillance et de sécurité la plus populaire disponible sur le marché. Ce logiciel fonctionne en suivant toutes les activités en arrière-plan du téléphone surveillé, y compris l'emplacement GPS, l'historique web, les images, les vidéos, les e-mails, les SMS, les conversations Skype et WhatsApp ou encore les frappes clavier et bien plus encore. Le panneau de commande facile à utiliser, le support client en direct 24h/24, 7j/7 et le cryptage 256 bits font de mSpy la meilleure solution pour assurer la sécurité de vos enfants et la productivité de vos employés. Une application de surveillance et de sécurité pour examiner l'activité des utilisateurs et mesurer leur productivité.
TunnelBear

TunnelBear

par TunnelBear

(78 avis)
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
VyprVPN

VyprVPN

par Golden Frog

(18 avis)
Gère son propre réseau et possède le matériel requis pour offrir le plus rapide débit de VPN au monde. Gère son propre réseau et possède le matériel requis pour offrir le plus rapide débit de VPN au monde.
AVG Internet Security

AVG Internet Security

par AVG Technologies

(538 avis)
AVG vous aide à développer votre entreprise en sachant que vos données et communications en ligne sont protégées.
MiniTool Partition Wizard
MiniTool Partition Wizard Free Edition est un gestionnaire de partitions gratuit, destiné aux particuliers et indépendants. Certains logiciels possèdent des fonctions de gestion de partitions de disques complètes telles que la fusion des partitions, le déplacement/redimensionnement des partitions, la copie des partitions, la création des partitions, la séparation des partitions, la suppression des partitions, le formatage des partitions et la conversion d'un système de fichiers. MiniTool Partition Wizard Free Edition est un gestionnaire de partitions gratuit, destiné aux particuliers et indépendants.
LogPoint

LogPoint

par LogPoint

(0 avis)
La solution LogPoint SIEM extrait intelligemment les événements et les incidents des milliards de journaux existant dans n'importe quelle infrastructure informatique, quelle que soit sa taille. Les résultats en temps réel filtrés et soigneusement corrélés sont affichés dans des tableaux de bord faciles à gérer qui peuvent être configurés en fonction des rôles et des responsabilités spécifiques de chaque utilisateur. LogPoint est une solution SIEM efficace et utile pour les entreprises de toutes tailles en raison de sa conception unique et de ses nombreuses fonctionnalités.
Kaspersky Endpoint Security

Kaspersky Endpoint Security

par Kaspersky Lab

(267 avis)
Protégez les utilisateurs contre les programmes malveillants tels que les virus, les vers, les chevaux de Troie, les pirates informatiques, les spams et autres formes d'intrusion.
Phishme

Phishme

par Phishme

(3 avis)
Offre des fonctionnalités de gestion des menaces d'hameçonnage, notamment la simulation de scénarios d'hameçonnage ainsi que la détection et l'analytique des menaces.
Fusion

Fusion

par Panda Security

(11 avis)
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
Genesis

Genesis

par Internet Biometric Security Systems

(0 avis)
On demand biometric security solution for any type of internet application requiring security of confidential information. On demand biometric security solution for any type of internet application requiring security of confidential information.
PowerBroker

PowerBroker

par BeyondTrust

(0 avis)
BeyondTrust est une entreprise mondiale de cybersécurité qui considère que la prévention des violations de données nécessite une visibilité suffisante pour permettre le contrôle des risques internes et externes. Celle-ci donne la visibilité nécessaire pour réduire les risques avec confiance et le contrôle pour prendre des mesures proactives et éclairées contre les menaces. Cette plateforme unifie les technologies les plus efficaces pour gérer les risques internes et externes : gestion de compte privilégié et gestion des vulnérabilités. Une plateforme qui unifie des technologies efficaces pour faire face aux risques internes et externes : compte privilégié et gestion de la vulnérabilité.
FileAudit

FileAudit

par IS Decisions

(0 avis)
Suivi, audit, reporting et alertes proactives sur tous les accès aux fichiers et dossiers sur les serveurs Windows. FileAudit est installé en moins de 3 minutes sur toute machine et offre une surveillance en temps réel pour accéder aux tentatives. Offre des alertes e-mail automatiques, rapports selon plusieurs critères (chemin, type de fichier, type d'accès, adresse source IP, temps, etc.) pour l'audit et la conformité réglementaire. Offre des alertes sur l'accès en masse, la copie, la suppression ou le mouvement de fichiers en bloc qui indiquent une violation potentielle et plus encore. Suivi, audit, reporting et alertes proactives sur tous les accès aux fichiers et dossiers sur les serveurs Windows.
Bitium

Bitium

par Bitium

(12 avis)
Access control solution for corporate apps that supports integration with third party authentication providers. Access control solution for corporate apps that supports integration with third party authentication providers.
ZoneAlarm Pro

ZoneAlarm Pro

par Zone Labs

(10 avis)
Un pare-feu pour ordinateur qui protège vos données personnelles et votre vie privée des pirates informatiques et des voleurs de données. Un pare-feu pour ordinateur qui protège vos données personnelles et votre vie privée des pirates informatiques et des voleurs de données.
Invisible Secrets

Invisible Secrets

par NeoByte Solutions

(0 avis)
Logiciel de sécurité qui crypte vos données et vos fichiers pour les garder en sécurité ou les transférer en toute sécurité sur le net. Logiciel de sécurité qui crypte vos données et vos fichiers pour les garder en sécurité ou les transférer en toute sécurité sur le net.
DeviceLock

DeviceLock

par DeviceLock

(0 avis)
Fournit à la fois un contrôle contextuel et basé sur le contenu pour une prévention maximale des fuites à un coût initial et de propriété minimum. Fournit à la fois un contrôle contextuel et basé sur le contenu pour une prévention maximale des fuites à un coût initial et de propriété minimum.
Jscrambler

Jscrambler

par Jscrambler

(0 avis)
Jscrambler est la solution leader de sécurité pour les applications JavaScript. Elle travaille sur des produits de sécurité hautement innovants pour protéger les applications web et mobiles. Ces produits comptent 30 000 utilisateurs dans 145 pays, y compris certaines des entreprises les plus innovantes au monde et les entreprises du Fortune 500, dans un certain nombre de secteurs tels que la finance, la publicité, les médias et les jeux. Récemment, un nouveau module d'intégrité de page web a été introduit : il étend l'expertise de protection de code à la page web. Laissez votre application JavaScript se protéger elle-même.
Gemnasium

Gemnasium

par Gemnasium

(0 avis)
Gemnasium surveille les dépendances open source de vos applications et vous alerte en cas de mises à jour disponibles et de failles de sécurité. Vos projets utilisent peut-être une dépendance dangereuse. Vous en serez informé dès la publication des avis et dès que vos projets en seront affectés. Les applications JavaScript, Ruby, Python et PHP sont prises en charge et d'autres seront bientôt disponibles. La version d'entreprise prend en charge GitHub Enterprise, GitLab et Bitbucket Server. Toutes les versions sont des versions d'essai gratuites. Cette solution de sécurité surveille les dépendances de votre projet et vous alerte en cas de mises à jour disponibles et de failles de sécurité.
Rohos Logon Key

Rohos Logon Key

par Tesline-Service

(0 avis)
Solutions d'authentification à deux facteurs pour Windows. Connexion sécurisée par clé USB. Solutions d'authentification à deux facteurs pour Windows. Connexion sécurisée par clé USB.
SecuBox

SecuBox

par Aiko Solutions

(0 avis)
Cryptage de disque AES 256 bits pour les terminaux portables Windows Embedded Compact et Windows CE et leurs cartes multimédias. Stockage sûr, sécurisé et pratique pour toutes les informations d'entreprise importantes et critiques. Cryptage de disque AES 256 bits pour les terminaux portables Windows Embedded Compact et Windows CE et leurs cartes multimédias. Stockage sûr, sécurisé et pratique
CylancePROTECT

CylancePROTECT

par Cylance

(26 avis)
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
BlackFog

BlackFog

par BlackFog

(1 avis)
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.
TF2000

TF2000

par ComputerProx

(0 avis)
Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Solution that automatically locks the system without requiring any keystrokes from the user.
DriveCrypt

DriveCrypt

par Securstar

(0 avis)
Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.
Black Duck Hub

Black Duck Hub

par Black Duck

(28 avis)
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Secret Server Password Manager

Secret Server Password Manager

par Thycotic Software

(12 avis)
Secure, multi-user password management software for IT professionals. One central vault for securing passwords and more. Easy deployment - 30 to 60 minutes. Installed on-premise (runs on a VM if you want). Free 30 Day Trial. Integrated with Active Directory. Changes passwords on AD, Windows, SQL Server, Sybase, Oracle, MySQL, UNIX/Linux, Cisco, Juniper and even more. Also take control of your Service Account passwords (find where service accounts are used and automatically change passwords). Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets.
Indeni

Indeni

par Indeni

(12 avis)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Clearlogin

Clearlogin

par Evolve IP

(9 avis)
Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features. Give users streamlined access to the applications they use every day, from anywhere.
RSA Keon

RSA Keon

par RSA Security

(4 avis)
Public key infrastructure; enables, manages and simplifies the use of digital certificates. Public key infrastructure; enables, manages and simplifies the use of digital certificates.
SSH Tectia

SSH Tectia

par SSH Communications Security

(3 avis)
Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Enables secure system administration, secure file transfer and secure application connectivity with centralized control.
CipherCloud for Salesforce
CipherCloud for Salesforce addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.The CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with Salesforce. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.
Falcon Host

Falcon Host

par CrowdStrike

(3 avis)
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
GamaScan

GamaScan

par GamaSec

(2 avis)
Website security test to protect application and server against hackers. Website security test to protect application and server against hackers.
QualysGuard Enterprise
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
G Data Internet Security 2013

G Data Internet Security 2013

par G Data Software

(2 avis)
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
Saint Security Suite
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
BorderWare Firewall Server

BorderWare Firewall Server

par BorderWare Technologies

(1 avis)
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
eScan ISS

eScan ISS

par MicroWorld Technologies

(1 avis)
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
Active Shield

Active Shield

par Security Stronghold

(1 avis)
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
Fortres 101

Fortres 101

par Fortres Grand

(1 avis)
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
NetIQ Sentinel 7
Make decisive, appropriate responses to incidents by automating identification and resolution processes. Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Viewfinity Application Control
Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.
Beacon

Beacon

par Great Bay Software

(1 avis)
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Tripwire for Servers
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.
StillSecure

StillSecure

par StillSecure

(0 avis)
Security testing, monitoring and management software that defends networks from security breaches. Security testing, monitoring and management software that defends networks from security breaches.
SecurityEXPERT

SecurityEXPERT

par St. Bernard Software

(0 avis)
Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.
Security Shield

Security Shield

par PCSecurityShield

(0 avis)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
Network Security Auditor
Network security audit system designed to audit network and detect available security vulnerabilities in the network. Network security audit system designed to audit network and detect available security vulnerabilities in the network.
CyberGatekeeper

CyberGatekeeper

par InfoExpress

(0 avis)
Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.
Retina Network Security Scanner

Retina Network Security Scanner

par eEye Digital Security

(0 avis)
Combines advanced scanning technology with most comprehensive vulnerability database. Combines advanced scanning technology with most comprehensive vulnerability database.
NerveCenter

NerveCenter

par Logmatrix

(0 avis)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.
ControlCase

ControlCase

par ControlCase

(0 avis)
ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI. Comprehensive computer security incident management system.
AccuHash

AccuHash

par Viwal Interactive

(0 avis)
Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.
Internet Lock

Internet Lock

par TopLang Software

(0 avis)
Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.
LiveEnsure

LiveEnsure

par LiveEnsure

(0 avis)
Authenticates users through their mobile device, location, knowledge and behavior. Authenticates users through their mobile device, location, knowledge and behavior.
AnVir Task Manager Pro

AnVir Task Manager Pro

par AnVir Software

(0 avis)
Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.
Egosecure Endpoint

Egosecure Endpoint

par Egosecure

(0 avis)
Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.
Nfusion

Nfusion

par Ntrepid

(0 avis)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.
NetSupport Protect

NetSupport Protect

par NetSupport

(0 avis)
Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.
ForeScout CounterACT Edge

ForeScout CounterACT Edge

par ForeScout Technologies

(3 avis)
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Vera

Vera

par Vera

(2 avis)
Vera secures any kind of data, wherever it goes Vera secures any kind of data, wherever it goes
iLock Security Services
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
Spoon

Spoon

par Spoon

(1 avis)
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
Trust Lockdown

Trust Lockdown

par White Cloud Security

(1 avis)
App trust-listing technology. Protects your systems by only allowing trusted applications to execute. App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
Promisec Endpoint Manager 4.12
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.
OpaqueVEIL

OpaqueVEIL

par TecSec

(0 avis)
Enables access to information through encryption, providing information security, privacy and confidentiality. Enables access to information through encryption, providing information security, privacy and confidentiality.
Identity & Access Manager
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.
WiKID Authentication System

WiKID Authentication System

par WiKID Systems

(0 avis)
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.
Secure CommNet

Secure CommNet

par Radient Software

(0 avis)
A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.
MemberProtect

MemberProtect

par InetSolution

(0 avis)
Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.
IntelliTrack Network

IntelliTrack Network

par Soni-Soft

(0 avis)
Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.
Secure Hive

Secure Hive

par Secure Hive

(0 avis)
Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Create encrypted archives and self-extracting .exe files for secure storage and file sharing.
Validian Protect

Validian Protect

par Validian

(0 avis)
Manages all crucial security functions, including authentication, encryption and addressing. Manages all crucial security functions, including authentication, encryption and addressing.
Calyx Suite

Calyx Suite

par Open Seas

(0 avis)
Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.
TweakEasy Professional
A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.
Security Services Platform
Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.
IMCrypto Pro

IMCrypto Pro

par Global Information Technology

(0 avis)
IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.
PlatinumCache
Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software. Secures the Windows Operating System from unwanted or malicious writes.
CimTrak Integrity Suite
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. A comprehensive security software application that is easy to deploy and scales to the largest of global networks.
SyncBoss

SyncBoss

par SecurePro Software

(0 avis)
File Synchronization Application and Cloud Storage. File Synchronization Application and Cloud Storage.
XyLoc Security Server

XyLoc Security Server

par Ensure Technologies

(0 avis)
A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.
Trustifier KSE

Trustifier KSE

par Trustifier

(0 avis)
Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network. Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.
Data Rover EP

Data Rover EP

par Mission2Mars

(0 avis)
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.
Secure Hunter Business

Secure Hunter Business

par Secure Hunter

(0 avis)
Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.
Appvigil

Appvigil

par Wegilant

(0 avis)
Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest.
Cofactor Kite

Cofactor Kite

par Cofactor Computing

(0 avis)
Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.
Specops Password Sync

Specops Password Sync

par Specops Software

(0 avis)
Specops Password Sync simplifies password management for users by allowing them to use one password across multiple systems- including on-premises and SaaS targets. Specops Password Sync instantly synchronizes Active Directory passwords to other systems, which ensures complexity is applied to all business systems. Fights password fatigue by reducing number of passwords to remember
Advanced Security Manager
Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica. Now NexVue makes 2FA available for Acumatica.
Votiro Secure Email Gateway
A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.
Siwenoid

Siwenoid

par Siwena

(0 avis)
We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.
iSafeSend

iSafeSend

par DMS Companies

(0 avis)
Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables you to securely share sensitive information through a one-time use link.
EntryProtect

EntryProtect

par SentryBay

(0 avis)
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. Provides real-time protection of user data from malware and phishing attacks
NordVPN

NordVPN

par NordVPN

(102 avis)
Les entreprises peuvent sécuriser leurs réseaux et connexions Internet. Le service VPN ajoute une couche de protection supplémentaire pour sécuriser vos communications. Cela se fait en appliquant un cryptage fort à tout le trafic entrant et sortant afin qu'aucun tiers ne puisse accéder à vos informations confidentielles. Protégez votre organisation contre les failles de sécurité. Accès sécurisé de l'équipe à distance. Simplifiez la sécurité du réseau d'entreprise. Accédez à du contenu en ligne spécifique à une région depuis n'importe où dans le monde NordVPN applique un cryptage fort à tout votre trafic Internet afin qu'aucun tiers ne puisse violer vos communications professionnelles.
bitdefender GravityZone

bitdefender GravityZone

par bitdefender

(57 avis)
GravityZone est conçu à partir de zéro pour la virtualisation et le cloud afin de fournir des services de sécurité d'entreprise aux points de terminaison physiques, aux appareils mobiles, aux machines virtuelles dans les serveurs de messagerie privés, publics et Exchange. GravityZone Enterprise Security fournit des options de licence flexibles pour répondre aux besoins de protection de vos bureaux, des datacenters et du cloud public. Tous les services de sécurité sont fournis à partir d'une machine virtuelle à installer sur site pour couvrir tous les points d'extrémité de votre environnement.
McAfee E-Business Server
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
Windscribe

Windscribe

par Windscribe

(19 avis)
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online. Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.
F-Secure VPN+

F-Secure VPN+

par F-Secure

(6 avis)
Provides strong encryption, supports multiple protocols, security standards & authentication methods. Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Avast Business CloudCare
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Prey

Prey

par Prey

(4 avis)
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM
Hushmail

Hushmail

par Hushmail

(3 avis)
Hushmail est un service e-mail sécurisé qui vous permet d'envoyer et de recevoir des e-mails et des pièces jointes cryptés et privés à n'importe qui, même ceux qui n'utilisent pas Hushmail. Avec un webmail et une application iPhone faciles à utiliser, il n'y a pas de processus d'installation compliqué. Inscrivez-vous et commencez à envoyer en toute sécurité. Les plans de soins de santé sont configurés pour la conformité HIPAA et comprennent le BAA requis, un compte d'archive et des formulaires sécurisés. Un service de messagerie sécurisé qui vous permet d'envoyer et de recevoir des e-mails et des pièces jointes cryptés et privés à destination et en provenance de n'importe qui.
Firewall-1

Firewall-1

par Check Point Software Technologies

(2 avis)
Pare-feu qui assure le contrôle d'accès, la sécurité du contenu, l'authentification et la gestion centralisée. Pare-feu qui assure le contrôle d'accès, la sécurité du contenu, l'authentification et la gestion centralisée.
Cisco Cloudlock

Cisco Cloudlock

par Cisco Cloudlock

(2 avis)
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
HackerOne

HackerOne

par HackerOne

(2 avis)
Solution de sécurité informatique dotée d'une connexion avec détecteur de problème, boîte de réception sécurisée, contrôles d'équipe, analyse et métriques, notamment.
CWIS Security Antivirus Scanner
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
Ransomware Defender

Ransomware Defender

par ShieldApps Software Development

(2 avis)
Scans, detects and protects from ransomware malicious attempts. Scans, detects and protects from ransomware malicious attempts.
Web Security Appliance
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
modusGate

modusGate

par Vircom

(1 avis)
modusGate is an on-premise multi-layer anti-spam email filtering gateway harnessing 2 decades of security and network experience. It incorporates state of the art AI through a real-time machine learning engine to effectively identify threats by reputation and advanced statistical models. We integrate layered scanning with Bitdefender and Avira Anti-Virus, providing leading defense against phishing and malware threats. Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate.
End-user IT Analytics
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
SpyShelter Anti-Keylogger
Protège des logiciels espions et de surveillance, y compris les enregistreurs de frappe, les enregistreurs de caméra et les logiciels financiers malveillants. Protège des logiciels espions et de surveillance, y compris les enregistreurs de frappe, les enregistreurs de caméra et les logiciels financiers malveillants.
Powertech Security Software
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Bodi

Bodi

par Pilixo

(1 avis)
Bodi est une plateforme de sécurité complète qui englobe : prévention du phishing (empêche les utilisateurs de cliquer accidentellement sur des liens malveillants), détection des menaces d'intrus (empêche le vol de données avec des alarmes en temps réel basées sur des règles définies), analyse de l'utilisation (analyse détaillée de l'utilisation de l'application, du navigateur web, de l'impression, des activités), investigation (enregistrement complet des preuves et recherche de mot-clés pour des investigations détaillées), résolution (capacités de contrôle à distance complète pour corriger les problèmes liés aux appareils), prise en charge API intégrée. Augmentez la productivité des employés, découragez les menaces internes et améliorez la sécurité des données pour répondre aux exigences de conformité strictes.
Barracuda Web Security Gateway

Barracuda Web Security Gateway

par Barracuda Networks

(1 avis)
Making Web Browsing Safe Making Web Browsing Safe
Network Security Manager

Network Security Manager

par Intellitactics

(0 avis)
Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats.
Snorkel-Server

Snorkel-Server

par Odyssey Technologies

(0 avis)
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.
PureSight CSDK/OEM

PureSight CSDK/OEM

par PureSight Technologies

(0 avis)
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.
Net Monitor for Employees
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity. Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.
east-tec Eraser

east-tec Eraser

par East-Tec

(0 avis)
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Clearswift SECURE Email Gateway
The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, the Clearswift SEG incorporates the latest in inbound threat protection (Sophos and/or Kaspersky AV), a multi-layer spam defence mechanism, multiple encryption options, deep content inspection control on size and types of attachments and Adaptive Redaction features The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss
RDS-Shield

RDS-Shield

par Marty Soft Conception

(0 avis)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Anti-Executable

Anti-Executable

par Faronics

(0 avis)
Faronics Anti-Executable garantit la productivité totale des terminaux en autorisant uniquement l'exécution d'applications approuvées sur un ordinateur ou un serveur. Tous les autres programmes, qu'ils soient non désirés, non autorisés ou simplement inutiles, ne peuvent jamais être exécutés. Faronics Anti-Executable garantit la productivité totale des terminaux en autorisant uniquement l'exécution d'applications approuvées sur un ordinateur ou un serveur.
OX Guard

OX Guard

par Open-Xchange

(0 avis)
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Cyberator

Cyberator

par Zartech

(0 avis)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
ThreatSentry

ThreatSentry

par Privacyware

(0 avis)
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.
CISS Forza

CISS Forza

par SAI Technology

(0 avis)
A computer security solution that limits incorrect employee access privileges and responds to malicious activity. A computer security solution that limits incorrect employee access privileges and responds to malicious activity.
SERVERWAT.CH Security Scanner

SERVERWAT.CH Security Scanner

par SERVERWAT.CH Security Scanner

(0 avis)
Are you running an online business and haven't thought about security? Find your vulnerabilities before others do. Schedule vulnerability scans for your servers and get notified when it's time to call your admin. Schedule vulnerability scans for your servers and get notified when it's time to call your admin.
GridinSoft Anti-Malware
Une solution de sécurité réseau pour nettoyer le système des virus, aider à restaurer les performances de l'ordinateur et plus encore. Une solution de sécurité réseau pour nettoyer le système des virus, aider à restaurer les performances de l'ordinateur et plus encore.
BlueFiles

BlueFiles

par Forecomm

(0 avis)
Envoyez vos données sensibles en toute confidentialité de manière simple et rapide. Avec l'imprimante virtuelle BlueFiles, envoyez une copie cryptée de vos fichiers natifs avec un contrôle permanent sur l'impression, le téléchargement, la période d'accès, les destinataires, et ce, même après expédition, ou cliquez avec le bouton droit sur vos fichiers ou dossiers originaux pour les transférer. BlueFiles garantit une confidentialité optimale jusqu'à la réception de vos données à travers une interface simple et conviviale. Envoyez vos données sensibles en toute confidentialité de manière simple et rapide.
BitRaser

BitRaser

par Stellar Data Recovery

(0 avis)
It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm. BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.
Encryptionizer

Encryptionizer

par NetLib Security

(0 avis)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.
Cornerstone MFT Server

Cornerstone MFT Server

par South River Technologies

(0 avis)
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.
SecureCircle

SecureCircle

par SecureCircle

(0 avis)
The first security product designed to meet the challenges of securing & managing unstructured data in a zero-trust word. Unlike existing technologies, SecureCircle provides a transparent solution which is always encrypted, trackable, and retractable. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.
SecuredTouch

SecuredTouch

par SecuredTouch

(0 avis)
SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.
Driver Genius 18 Professional

Driver Genius 18 Professional

par Avanquest Software

(0 avis)
Automatic driver detection: - Schedule the analysis of your drivers - Have Notifications for the new drivers Download: - Download and automatically install from a database of more than 600.000 drivers Backup: - Have a complete history of your drivers - Save your PC drivers - Choose a download location for your drivers - Clone your drivers in an auto-installation file Cleaning and optimisation: - Uninstall the unwanted drivers: - Identify the devices which are not working Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance
NCR Network & Security Services
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.
RollBack Rx Pro

RollBack Rx Pro

par Horizon Datasys

(0 avis)
RollBack Rx is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses or even botched software installations can be easily and absolutely reversed in a fast and efficient way. A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.
VMRay

VMRay

par VMRay

(0 avis)
VMRay Analyzer is an automated malware analysis and detection product with a revolutionary agentless, hypervisor-centric dynamic analysis engine at its core. Combined with rapid static analysis and reputation engines, it enables malware analysts and incident response professionals to monitor, analyze and identify threats and extract indicators of compromise (IOCs). VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.
IPdiva Cleanroom

IPdiva Cleanroom

par Systancia

(0 avis)
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Intrusta

Intrusta

par iSubscribed

(0 avis)
Intrusta's goal is to make online security simple. Whether it's using our software, paying your bill, or chatting with a customer service agent, we've taken great efforts to make every interaction enjoyable and easy. Intrusta's software is very lightweight, unlike other products that consume RAM and eat into your battery leaving your system struggling to cope. Intrusta focuses on the bare essentials and fulfills the main purpose efficiently. Completely securing your computer from harm's way. Intelligent scanning software that works quietly in the background finding and fixing issues so you never have to think about it.