Logiciels de sécurité réseau

Logiciels de sécurité réseau, France : utilisez Capterra.fr pour trouver les meilleurs outils pour votre entreprise.

Pourquoi Capterra est gratuit

À propos des options de classement

Logiciels filtrés :

304 produits trouvés

Note du produit

Déploiement

Fonctionnalités

Kaseya VSA

Kaseya VSA

par Kaseya

(75 avis)

Le système de sauvegarde et reprise après incident Kaseya fournit des solutions automatisées en temps réel de sauvegardes de disque, de création d'images disques, de sauvegardes au niveau des fichiers et de restaurations complètes pour les serveurs et postes de travail Windows. Contrairement aux produits classiques basés sur des fichiers, Kaseya BUDR crée une image de l'état complet du système, y compris le système d'exploitation, les applications métier, les paramètres utilisateur, les pilotes et les données, afin de donner aux administrateurs le cadre nécessaire pour reconstruire complètement un système en moins d'une heure. En savoir plus sur Kaseya VSA

NetFlow Analyzer

NetFlow Analyzer

par ManageEngine

(1 avis)

NetFlow Analyzer se sert de technologies basées sur les flux de trafic pour contrôler et analyser l'utilisation de la bande passante de votre réseau. Il vous permet d'identifier les problèmes de délais et de congestion de bande passante, à l'aide de rapports personnalisés et d'alertes par e-mail ou SMS configurées sur la base d'une valeur seuil, afin de mieux comprendre la gravité des problèmes auxquels vous faites face. Facile à utiliser, l'outil d'analytique détecte, diagnostique et dépanne les anomalies réseau et les intrusions "zéro day" en temps réel, puis planifie vos besoins futurs en bande passante en se basant sur les tendances observées, afin d'optimiser votre utilisation de bande passante. En savoir plus sur NetFlow Analyzer

WebTitan

WebTitan

par TitanHQ

(129 avis)

Filtre web basé sur les DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de hameçonnage, tout en fournissant un contrôle du contenu web. Il filtre plus d'un demi-milliard de requêtes DNS chaque jour, identifie 60 000 itérations de logiciels malveillants par jour et compte plus de 7 500 clients. Il existe des versions via cloud et via plateforme. Améliorez votre cybersécurité dès maintenant. Essayez la version d'essai gratuite de WebTitan dès aujourd'hui, support inclus. En savoir plus sur WebTitan

Horangi Web Security Services

Horangi Web Security Services

par Horangi Cyber Security

(1 avis)

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. En savoir plus sur Horangi Web Security Services

DSRAZOR for Windows

DSRAZOR for Windows

par Visual Click Software

(0 avis)

Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. En savoir plus sur DSRAZOR for Windows

SolarWinds RMM

SolarWinds RMM

par SolarWinds MSP

(9 avis)

Remote Monitoring & Management est la première plateforme de surveillance et de gestion à distance (RMM ou Remote Monitoring & Management) sur le marché mondial, et ce, pour une très bonne raison : elle vous offre l'ensemble d'outils le plus complet sur le marché, en vue de sécuriser, de maintenir et d'améliorer les activités informatiques de votre entreprise. La console en ligne comprend des fonctions de gestion intégrée des patchs, de protection antivirus, de filtrage du contenu web, de sauvegarde et de restauration, d'accès à distance ainsi que des fonctions automatisées de surveillance et de maintenance et bien plus. Ses capacités d'automatisation permettent d'automatiser les tâches de routine en toute simplicité et les rapports complets offrent un excellent aperçu des activités. En savoir plus sur SolarWinds RMM

Avast Business Antivirus Pro Plus

Avast Business Antivirus Pro Plus

par Avast

(216 avis)

Avast Business Antivirus Pro Plus is all-in-one powerful endpoint and server protection package for small and medium size businesses (best for 1-200 employees). Works on PCs, Macs and servers. The product is enhanced with 18 cutting - edge features to keep your corporate life fully secure. Includes powerful antivirus, server, email and network security, cybercapture, firewall, password manger, VPN and much more. It can be used either with cloud console or without. It's up to you. En savoir plus sur Avast Business Antivirus Pro Plus

Acunetix

Acunetix

par Acunetix

(2 avis)

Acunetix leads the market in automatic web application security software. It scans your website for vulnerabilities such as SQL Injection and XSS. The Acunetix Online solution includes network security scanning available for free for up to one year En savoir plus sur Acunetix

ESET Endpoint Security

ESET Endpoint Security

par ESET

(340 avis)

Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. En savoir plus sur ESET Endpoint Security

CloudSploit

CloudSploit

par CloudSploit

(0 avis)

CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. En savoir plus sur CloudSploit

Log360

Log360

par ManageEngine

(3 avis)

Log360, une solution intégrée qui combine ADAudit Plus et EventLog Analyzer dans une seule console, est la solution complète pour tous les problèmes en matière de gestion des journaux et sécurité réseau. Elle propose la collecte, l'analyse, la corrélation de journaux en temps réel et des capacités d'archivage qui aident à protéger les données confidentielles, contrecarrer les menaces de sécurité internes et combattre les attaques externes. Pour aider à répondre aux exigences en matière de sécurité, d'audit et de conformité, elle est disponible sur plus de 1 200 rapports prédéfinis et critères d'alerte. En savoir plus sur Log360

LogicMonitor

LogicMonitor

par LogicMonitor

(32 avis)

LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures. En savoir plus sur LogicMonitor

ConnectWise Automate

ConnectWise Automate

par ConnectWise

(41 avis)

ConnectWise Automate, formerly LabTech is the only RMM platform designed to work the way you work, because it was built by a managed service provider (MSP) specifically for MSPs. Designed with cutting-edge agent technology, Automate delivers unprecedented centralized visibility into your clients IT systems. Its powerful built-in monitors alert you when IT issues are found, so you can resolve problems proactively, before they result in downtime for your clients. Start your free trial today! En savoir plus sur ConnectWise Automate

AdRem NetCrunch

AdRem NetCrunch

par AdRem Software

(22 avis)

An all-in-one and agentless network monitoring and management system, capable of monitoring every device in your network. Monitor bandwidth, availability, performance, services and traffic flow. Automatically generate maps and dependencies.Support for all leading OS types: Windows, Linux, Mac OS X, VMWare ESX/ESXi, BSD, and more. Advanced layer-2 mapping and automatic alert correlation. Baseline thresholds and range triggers. 7000+ MIBs and a built-in MIB compiler for complete SNMP support En savoir plus sur AdRem NetCrunch

OneLogin

OneLogin

par OneLogin

(17 avis)

Destiné aux entreprises comptant plus de 100 utilisateurs, OneLogin propose une solution de gestion des identités et des accès (IAM) basée sur le cloud qui offre des authentifications uniques (SSO) simples. Il permet aux entreprises de sécuriser et de gérer plus facilement l'accès aux applications web aussi bien en cloud que derrière un pare-feu. Votre entreprise travaille avec au moins trois logiciels en tant que service (SaaS) ou applications web internes ? Alors la sécurité offerte par la solution OneLogin à authentification unique basée sur le cloud est faite pour vous. En savoir plus sur OneLogin

Marshal

Marshal

par Onehub

(0 avis)

Marshal is a free, online privacy tool that connects to your cloud services (Box, Dropbox, Google Drive, Microsoft OneDrive, Onehub) to uncover any exposed sensitive data you are sharing. Within minutes, Marshal delivers a secure, sanitized report outlining any exposed Social Security Numbers, credit card numbers, email addresses or phone numbers you are sharing. En savoir plus sur Marshal

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

par Webroot Software

(66 avis)

Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles comme les trojans, les keyloggers, le phishing, les logiciels espions, les backdoors, les rootkits (malwares furtifs), les zero-days et les menaces persistantes avancées. La protection de l'identité et des données personnelles incluse dans le logiciel empêche le vol ou l'enregistrement des données pendant l'activité en ligne, et le pare-feu outbound défend les données contre les vols par malware. Pas besoin de vous charger ni de vous préoccuper des mises à jour : grâce à la sécurité basée sur le cloud, les points terminaux sont toujours à jour. En savoir plus sur Webroot SecureAnywhere Endpoint Protection

ManageEngine Firewall Analyzer

ManageEngine Firewall Analyzer

par ManageEngine

(0 avis)

Firewall Analyzer est un logiciel d'analytique des journaux et de gestion de la configuration sans intervention humaine qui analyse les journaux issus des pare-feu et émet des notifications d'alerte ainsi que des rapports concernant la sécurité et la bande passante, en temps réel. La solution consiste en un logiciel indépendant des fournisseurs, compatible avec plus de 50 fournisseurs de pare-feu. Elle aide également les administrateurs, en leur fournissant des rapports complets concernant les événements de sécurité, ce qui leur permet de prendre des mesures d'atténuation des risques y étant liés. En savoir plus sur ManageEngine Firewall Analyzer

Malwarebytes

Malwarebytes

par Malwarebytes

(238 avis)

Powerful multi-layered defense delivers smart endpoint protection

TunnelBear

TunnelBear

par TunnelBear

(34 avis)

When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager.

CryptoMite

CryptoMite

par BAxBEx Software

(0 avis)

A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely.

SUPERAntiSpyware

SUPERAntiSpyware

par SUPERAntiSpyware

(13 avis)

Multi-dimensional scanning and process interrogation technology that detects and removes spyware.

PureVPN

PureVPN

par PureVPN

(24 avis)

VPN solution for Windows that protects against 3rd party spying, accessing restricted websites, and ISP speed throttling.

Norton Security

Norton Security

par Symantec

(260 avis)

Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money.

Praetorian

Praetorian

par Praetorian

(0 avis)

As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios.

RMail

RMail

par RPost

(22 avis)

RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end.

RG System

RG System

par RG System

(10 avis)

Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most.

Sqreen

Sqreen

par Sqreen

(0 avis)

Runtime Application Self-Protection (RASP) for developers. It protects web applications against attacks at runtime. The protection logic is brought into applications with no source code modification or traffic redirection. Once deployed, Sqreen provides real-time monitoring and protection against a large set of vulnerabilities incl. SQL injections, XSS, account takeovers, bad bots,Security scanners etc. Sqreen gets installed in 30 seconds and doesn't require any configuration or maintenance.

LogPoint

LogPoint

par LogPoint

(0 avis)

The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user.

Sophos UTM

Sophos UTM

par Sophos

(8 avis)

Sophos UTM helps you consolidate your security without compromising its effectiveness. By combining multiple security layers, its simple to protect your users everywhere while making security easier to deploy and manage. Sophos UTM provides essential next-gen firewall protection for your network, web, email, applications, and users.

Kenna

Kenna

par Kenna Security

(0 avis)

Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data.

MailWasher

MailWasher

par Firetrust

(14 avis)

Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.

RansomFree

RansomFree

par Cybereason

(1 avis)

RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2.

Vormetric

Vormetric

par Vormetric

(0 avis)

Vormetric helps enterprises move confidently and quickly and create trust by securing data-at-rest across all channels and environments. Knowing their data is secure, customers can respond faster and generate trust between users and across channels, applications and environments. Vormetric helps make secure adoption of new data environments a reality.

Kaspersky Endpoint Security

Kaspersky Endpoint Security

par Kaspersky Lab

(130 avis)

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.

LogMeIn Pro

LogMeIn Pro

par LogMeIn

(38 avis)

With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products.

Corax

Corax

par Corax

(0 avis)

Cloud-based software that will help you to make decisions and take actions to prevent cyber crime and data loss.

OpenVPN Access Server

OpenVPN Access Server

par OpenVPN

(25 avis)

Full featured secure network tunneling VPN solution for Windows, Mac, and Linus environments.

MailCleaner

MailCleaner

par MailCleaner

(7 avis)

Professional anti spam server protection for ISP SME SMI & large companies

Netmon

Netmon

par Netmon

(0 avis)

Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses.

Artica Proxy

Artica Proxy

par Artica Tech

(0 avis)

A powerful solution for large and multinational companies to log internet performance, filter requests, and manage reporting.

Difenso

Difenso

par Difenso

(0 avis)

Difenso is a data security software that helps companies protect sensitive data in cloud and intranet

SiteLock

SiteLock

par SiteLock

(6 avis)

SiteLock is the Global Leader in website security, currently protecting more than five million websites. The company provides advanced, cloud-based security solutions for organizations of all sizes. SiteLock products include daily scanning with automatic malware removal, a managed web application firewall with a global CDN for a blazing fast website, advanced DDoS protection and an unrivaled 24/7 U.S. based phone support staff.

Security Testing

Security Testing

par tieBridge

(0 avis)

After assessing your current security measures, tieBridge will work with you to create your customized security solution.

SmartFlow

SmartFlow

par Solana Networks

(0 avis)

SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks. SmartFlow distills network traffic & flow data into more than 20 different stat measures.

GFI LanGuard

GFI LanGuard

par GFI Software

(6 avis)

GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively.

Fusion

Fusion

par Panda Security

(3 avis)

Easy-to-use protection against viruses, spyware, hackers, spam and other Internet threats.

Privatoria

Privatoria

par Privatoria

(1 avis)

Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites.

Application Security

Application Security

par F5 Networks

(0 avis)

Provides proactive and comprehensive safeguards against unauthorized access and malicious application attacks.

KerioControl

KerioControl

par Kerio Technologies

(1 avis)

Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.

ECS2

ECS2

par SecuCloud

(1 avis)

Modular cloud security system designed to provide security framework for any devices.

VIPole

VIPole

par VIPole

(0 avis)

VIPole is an encrypted communication platform for individuals, teams and companies. It delivers secure messaging, file sharing, calls and video conferencing as well as a whole host of collaboration tools for business, such an organizer, notes, daily planner and a password vault. Everything within the system is fully e2e encrypted in transit and at rest. A set of advanced admin tools enables centralized control and comprehensive user management for complete security.

ZoneAlarm Pro

ZoneAlarm Pro

par Zone Labs

(8 avis)

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.

DESlock

DESlock

par DESlock

(0 avis)

Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.

DeviceLock

DeviceLock

par DeviceLock

(0 avis)

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

Qrator

Qrator

par Qrator Labs

(0 avis)

Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds.

Pulse

Pulse

par Pwnie Express

(0 avis)

Pulse discovers, inventories and classifies all IT and IoT devices and builds a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes. Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks. Respond directly from from Pulse to neutralize IoT device threats to your systems.

NANO Antivirus

NANO Antivirus

par NANO Security

(5 avis)

Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.

UserLock

UserLock

par IS Decisions

(0 avis)

Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.

Leakwatch

Leakwatch

par Leakwatch

(0 avis)

Solution that monitors your data to detect leaks in real time and enable you to take action quickly.

CylancePROTECT

CylancePROTECT

par Cylance

(14 avis)

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Red Hat Enterprise Virtualization

Red Hat Enterprise Virtualization

par Red Hat

(1 avis)

Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.

SecureZIP

SecureZIP

par PKWARE

(0 avis)

Provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use.

SecureTrack

SecureTrack

par Tufin

(0 avis)

Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.

PDF Restrictions Remover

PDF Restrictions Remover

par Axommsoft

(0 avis)

PDF decryption software is fast desktop utility which helps to remove security from pdf documents.

vArmour

vArmour

par vArmour

(0 avis)

vArmour's software-based distributed security system delivers the industry's only integrated micro-segmentation solution with advanced security analytics across networks, applications, and users. vArmour's extensible architecture provides security across private and public clouds, with a single point of policy management. In addition, vArmour provides contextual visibility traffic from Layer 2 to Layer 7, combined with inline security policy controls prevent and quarantine lateral attacks.

eTrust Antivirus

eTrust Antivirus

par CA Technologies

(5 avis)

eTrust Antivirus is CA's award-winning antivirus solution, providing superior protection against today's most prevalent security threat - viruses. eTrust Antivirus reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices. Extensive features include multiple scanning engine support, realtime detection with system cure, unmatched manageability, and centralized event logging and alerting.

Dome9

Dome9

par Dome9 Security

(1 avis)

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments.

ACL Manager

ACL Manager

par Cyber Operations

(0 avis)

Centrally managing thousands of router ACLs from a single software application.

FireLayers

FireLayers

par FireLayers

(0 avis)

Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.

NG Firewall

NG Firewall

par Untangle

(0 avis)

Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.

DNSFilter

DNSFilter

par DNSFilter

(0 avis)

DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.

CloudFish

CloudFish

par CloudFish

(0 avis)

A network security solution creating the next generation of security infrastructure products for the cloud.

MePin

MePin

par MePin

(0 avis)

MePIN is a mobile app authenticator and a universal authentication service, providing compliance and strong security with exceptional user experience. Use MePIN as a service or on-premise as a white label strong authentication platform. MePIN supports two-factor authentication, passwordless login, digital signatures, biometrics, FIDO & legacy OTPs; choose your authentication methods and policies, or offer them all for the end-users to choose. Integration is easy with unified MePIN Services API.

Barracuda Spam Firewall

Barracuda Spam Firewall

par Barracuda Networks

(58 avis)

The Barracuda Spam & Virus Firewall provides a powerful, easy-to-use and affordable solution for complete protection of an organization's email infrastructure. It eliminates spam and virus intrusions while safeguarding an organization's reputation through content inspection based on policy for both inbound and outbound email. Outbound filtering also prevents confidential or sensitive information from being purposely or inadvertently leaked outside the organization.

Avira Antivirus Server

Avira Antivirus Server

par Avira Operations

(43 avis)

File server security solution that offers network protection, scan scheduling, and traffic filtering.

ConnectWise Automate

ConnectWise Automate

par ConnectWise

(41 avis)

Server & network infrastructure provide the backbone for your clients' businesses & they depend on you to ensure its always available. As an IT service provider, if you are tasked with the mission critical functions of network & server management, you are responsible for detecting, troubleshooting and repairing faults; configuring services; controlling resource access; ensuring up-time & measuring performance. Automate collaborates with industry leaders to deliver the integrated tools you need.

VMware VirtualCenter

VMware VirtualCenter

par VMware

(30 avis)

Virtual infrastructure management software, provides a central point of control for virtual computing resources.

Black Duck Hub

Black Duck Hub

par Black Duck

(28 avis)

Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.

EventTracker

EventTracker

par EventTracker

(19 avis)

EventTracker SIEM is a comprehensive security platform that delivers advanced security tools with audit-ready compliance capabilities. It offers a wide range of security essentials from endpoint threat detection to behavioral correlation. SIEMphonic, our flagship managed detection and response (MDR) service combines our 24/7 iSOC and our leading SIEM platform. While typical SIEM implementations fail, EventTracker SIEMphonic succeeds.

Connect Secure

Connect Secure

par Pulse Secure

(18 avis)

Delivers end-user access to corporate networks and resources. Ensures connectivity for both trusted & untrusted devices.

REVE Antivirus

REVE Antivirus

par REVE Antivirus

(15 avis)

REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up.

My Digital Shield

My Digital Shield

par My Digital Shield

(14 avis)

My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.

Axence nVision

Axence nVision

par Axence

(13 avis)

Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits.

The Email Laundry

The Email Laundry

par The Email Laundry

(9 avis)

The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe.

Indeni

Indeni

par Indeni

(9 avis)

Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues.

AlienVault USM

AlienVault USM

par AlienVault

(8 avis)

AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.

STOPzilla AntiVirus

STOPzilla AntiVirus

par STOPzilla

(2 avis)

Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.

BorderWare Firewall Server

BorderWare Firewall Server

par BorderWare Technologies

(1 avis)

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

Cloudmark Authority

Cloudmark Authority

par Cloudmark

(1 avis)

Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.

Active Shield

Active Shield

par Security Stronghold

(1 avis)

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

PerfectMail

PerfectMail

par XPMsoftware

(1 avis)

An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.

DLP Suite

DLP Suite

par Spirion

(1 avis)

This software helps to prevent data leaks and protect your information wherever it is or what form its in.

Privileged Account Security Solution

Privileged Account Security Solution

par CyberArk Software

(1 avis)

Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

TRITON Enterprise

TRITON Enterprise

par Forcepoint

(1 avis)

Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.

Bot Detection and Mitigation

Bot Detection and Mitigation

par Distil Networks

(1 avis)

Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure.

Flextivity

Flextivity

par Intego

(1 avis)

Anti-virus Mac solution designed to monitor online employee activity and protect your network.

Abusix

Abusix

par Abusix

(1 avis)

Monitor and protect your network from abuse using this all in one solution.

PhishingBox

PhishingBox

par PhishingBox

(1 avis)

PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cyber security objectives.

RanStop

RanStop

par Temasoft

(1 avis)

Protects computers and networks against present and future ransomware of any type.

SSProtect

SSProtect

par Definitive Data Security

(0 avis)

SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.

Security Shield

Security Shield

par PCSecurityShield

(0 avis)

A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without.

CyberGatekeeper

CyberGatekeeper

par InfoExpress

(0 avis)

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

NerveCenter

NerveCenter

par Logmatrix

(0 avis)

Delivers integrated, real-time security management in a single, seamless suite.

Cryptainer PE

Cryptainer PE

par Cypherix

(0 avis)

Corporate network security solution that provides for a network wide encryption based security implementation.

CyBlock

CyBlock

par Wavecrest Computing

(0 avis)

CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team.

Spam and Virus Blocker

Spam and Virus Blocker

par ClearMyMail

(0 avis)

Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.

Max Secure Spyware Detector

Max Secure Spyware Detector

par Max Secure Software

(0 avis)

Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.

SafenSec

SafenSec

par SafenSoft

(0 avis)

Intrusion prevention system that blocks spyware, new viruses and other malware.

602LAN SUITE

602LAN SUITE

par Software602

(0 avis)

Secure mail server with anti-virus & anti-spam,built-in firewall with NAT and web content filter proxy.

CIAgent

CIAgent

par SNMP Research

(0 avis)

It is a new Web-based, SNMP agent for system and application management.

Armor2net Personal Firewall

Armor2net Personal Firewall

par Armor2net Software

(0 avis)

Stops hackers and data thieves and protects your PC from Internet-borne threats.

PrivacyKeyboard

PrivacyKeyboard

par Global Information Technology

(0 avis)

PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible.

Active Wall

Active Wall

par Active Network CO

(0 avis)

Provides continuous enterprise-wide protection against the full range of Internet threats.

SpamJadoo

SpamJadoo

par Data Infocom

(0 avis)

Anti Spam service which eliminates spam at protocol level.

Netsweeper

Netsweeper

par Netsweeper

(0 avis)

Netsweeper Inc. provides web content filtering and web threat management that protects more than 50 million users worldwide. Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience. Netsweeper supports customers worldwide with offices in North America, the UK, the UAE, India and Australia as well as a network of partners and distributors.

QualysGuard Enterprise

QualysGuard Enterprise

par Qualys

(0 avis)

Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.

Business Email Security

Business Email Security

par Grove Group

(0 avis)

Secure boundary services that protect email communications by providing complete email intrusion prevention.

Safend Protector

Safend Protector

par Safend

(0 avis)

Safend is a leading provider of endpoint data protection solutions that protect against corporate data loss or theft by offering comprehensive products for data encryption and data transfer devices. The Safend Data Protection Suite encrypts internal and external hard drives, removable storage and CD/DVDs and provides granular control over all physical ports, wireless ports and removable media devices, ensuring compliance with regulatory data security and privacy standards.

Specops Password Policy

Specops Password Policy

par Specops Software

(0 avis)

You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users. Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level

CounterStorm

CounterStorm

par Raytheon

(0 avis)

An advanced network security solution specifically designed to stop zero-day, and targeted attacks in seconds.

AuthenWare

AuthenWare

par AuthenWare

(0 avis)

AuthenWare is a leading cybersecurity software provider focused on fighting identity theft. The Company's innovative tokenless 2-factor authentication system delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and other system vulnerabilities. The AuthenWare solution measures how a user types to ensure only authorized users access a system or web page, while stopping hackers and password sharing.

XD Air

XD Air

par Tresys

(0 avis)

Security software for mobile networks allowing only designated content to be sent or received over a given network.

FlowTraq

FlowTraq

par FlowTraq

(0 avis)

FlowTraq is network security software that uses full-fidelity network flow records to provide unified security, monitoring, and forensics. Its behavioral analytics and alerting helps IT administrators identify and investigate data leaks, compromises, spammers, botnets, worms, and DDoS attacks in high-volume networks. FlowTraq monitors network performance and bandwidth consumption, catalogs applications in use, and detects problematic changes in network activity.

Saint Security Suite

Saint Security Suite

par SAINT

(0 avis)

The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA.

Aobo Internet Filter for Mac

Aobo Internet Filter for Mac

par Awosoft

(0 avis)

Aobo Internet Filter for Mac is a stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications. Support multi-computer setup with easy steps.

Marble Security

Marble Security

par Marble Security

(0 avis)

Security solution for corporate mobile devices that facilitates remote authentication for access to corporate networks.

CPTRAX for Windows

CPTRAX for Windows

par Visual Click Software

(0 avis)

Email alerts when users are locked out of Active Directory? Email alerts when folders are 'drag-n-dropped'? Failed logon alerting that can be isolated to the kerberos error? CPTRAX for Windows provides real-time enterprise-wide alerting and auditing for your Windows and Active Directory environments. Areas covered include Windows File Systems (NTFS) including permission changes, Active Directory, Server Authentication and Group Policy. Does not use or rely on Windows Event Logs.

IWASSA

IWASSA

par IWASSA

(0 avis)

Single-sign-in for each user and secured service for file sharing.

Nfusion

Nfusion

par Ntrepid

(0 avis)

Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop.

Illumio ASP

Illumio ASP

par Illumio

(0 avis)

Go beyond network-level visibility. Gain information on systems and processes on physical and virtual hosts and their communications.

Tanium Endpoint Platform

Tanium Endpoint Platform

par Tanium

(0 avis)

15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

Onion ID

Onion ID

par Onion ID

(0 avis)

Solution for IT Infrastructure Security to prevent insider threats.

Themis

Themis

par Cossack Labs

(0 avis)

We aim to mitigate risks in data security through the development of easy-to-use, cross-platform solutions that are designed to provide a simple means to protect data within corporate infrastructures or stand-alone applications and over both a distributed application setting and in the open Internet.

SQL Safe Backup

SQL Safe Backup

par IDERA

(0 avis)

DBAs need a powerful backup and recovery solution that greatly reduces backup and recovery time, minimizes storage requirements, and provides enterprise management capabilities to conduct backups across a large numbers of servers simultaneously. SQL Safe has been specifically designed to meet these requirements, resulting in increased application and business availability for your critical SQL Server infrastructure.

InfiSecure

InfiSecure

par InfiSecure Technologies

(0 avis)

InfiSecure is a robust bot protection platform to detect and block automated threats. The service bundles all aspects of website security, including Bot Protection, Click Fraud Protection and Fake Traffic Prevention. InfiSecure serves multiple geographies through direct and partner channels. Built on a highly scalable open-source stack, InfiSecure functions as an easy-to-deploy SaaS offering.

Fortscale

Fortscale

par Fortscale

(0 avis)

Detect and Eliminate Threats with User Behavior Analytics

Biocoded

Biocoded

par Biocoded

(0 avis)

Safest end-to-end encrypted voice call and messaging app by opinion of independent security research groups.

LogRhythm Network Monitor

LogRhythm Network Monitor

par LogRhythm

(0 avis)

Organizations need visibility into their networks to detect threats, perform forensic investigations, support audits, and identify operational issues. LogRhythm Network Monitor is a highly-functional, intuitive and cost-effective network monitoring and forensics solution that provides enterprise-wide network visibility in more detail than traditional network and security solutions like flow analysis tools and next-generation firewalls.

Lynis Enterprise

Lynis Enterprise

par CISOfy

(0 avis)

Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.

PerimeterX

PerimeterX

par PerimeterX

(0 avis)

A new approach for Accurate, Easy to Integrate Protection from Automated Attacks

Terabit Security

Terabit Security

par Terabit Security

(0 avis)

Our system offers significant technical and financial advantages. DPS functions at the network edge and conducts automatic traffic

Cloudbric

Cloudbric

par Cloudbric

(0 avis)

Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL.

Metapacket

Metapacket

par Metapacket

(0 avis)

Defend your network against any malware.

Virtual Mobile Infrastructure

Virtual Mobile Infrastructure

par Hypori

(0 avis)

Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

RBLTracker

RBLTracker

par RBLTracker

(0 avis)

Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.

E8 Security

E8 Security

par E8 Security

(0 avis)

Machine-learning analytics solution to identify unknown threats already inside the network

Key Manager Plus

Key Manager Plus

par ManageEngine

(0 avis)

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues.

IMMUNIO

IMMUNIO

par IMMUNIO

(0 avis)

A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.

Cyberint

Cyberint

par Cyberint

(0 avis)

In an age of digital transformation, businesses are exposed to far greater cyber risks and threats. CyberInt's Managed Detection and Response services track your digital channels, responding to advanced cyber threats missed by standard security controls, protecting your brand, digital assets and customers. CyberInt is trusted by the world's top finance, retail and telecommunication organizations.

Sepior

Sepior

par Sepior

(0 avis)

Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys

Security Framework

Security Framework

par PrimeSoft Solutions

(0 avis)

A network security solution with access agent, service controller, and secure service gateway functions.

BlueTalon

BlueTalon

par BlueTalon

(0 avis)

Delivers data-centric security across big data environments and eliminates security blind spots.

Okta

Okta

par Okta

(124 avis)

Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure.

Splunk

Splunk

par Splunk

(49 avis)

Software that lets you search and analyze all your IT infrastructure data from a single location in real time.

Cloudflare

Cloudflare

par Cloudflare

(43 avis)

Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.

GlassWire

GlassWire

par GlassWire

(11 avis)

Helps protect your computer network and privacy via network monitoring and a built in firewall management tool.

Adguard

Adguard

par Adguard

(9 avis)

Gets rid of annoying ads, rejects online tracking, and protects your computer from malware.

McAfee Preventsys Risk Analyzer

McAfee Preventsys Risk Analyzer

par McAfee

(7 avis)

Consolidate data. Identify risks. Automate security compliance reporting.

CryptoPhoto

CryptoPhoto

par CryptoPhoto

(4 avis)

Blocks phishing & malware attacks by giving you a fast new way to log in.

ForeScout CounterACT Edge

ForeScout CounterACT Edge

par ForeScout Technologies

(3 avis)

Security hardware that monitors the perimeter and preempts targeted attacks.

SecureAd

SecureAd

par Oxford BioChronometrics

(2 avis)

Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.

SecurenceMail

SecurenceMail

par Securence

(1 avis)

Securence is a leading provider of email filtering software equipped with anti-spam filters to avoid spammy emails. Our email security and management solutions include inbound and outbound filtering, cyphermail, email archiving, continuing and shadowing, hosted exchange, PDP email hosting and security services for Office 365. We guarantee a 99.99% availability on our software and have lowest false positive ratings in the industry.

NetSpective Content Filter

NetSpective Content Filter

par TeleMate.Net Software

(1 avis)

Passive and Proxy packet inspection identifies URL, VoIP, and P2P signatures regardless of port with unprecedented scalability

AVDS

AVDS

par Beyond Security

(1 avis)

The AVDS family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. AVDS is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Finds new active IPs, applications, Wireless Access Points. Sends no data out of network.

Threat Manager

Threat Manager

par Alert Logic

(1 avis)

Security-as-a Service provider that offers network vulnerability identification tools for on premise and cloud environments.

Blesk

Blesk

par Prival

(1 avis)

Blesk is a suite of applications for network monitoring and management. It is comprised of a mix of open source and proprietary tools that come pre-installed and configured on an optimized 64-bit version of CentOS Linux. Blesk integrates many popular tools including Nagios, Snort, Ntop, Cacti, Elasticsearch, Rancid, Netdisco, and GLPI. Each of these have been streamlined for optimal performance, and all run harmoniously on a single server.

Vera

Vera

par Vera

(1 avis)

Vera secures any kind of data, wherever it goes

PowerTech

PowerTech

par HelpSystems

(1 avis)

Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.

PerfectMail Antispam

PerfectMail Antispam

par PerfectMail

(1 avis)

Protects mail servers and users from unwanted and malicious e-mail.

WildFire

WildFire

par Palo Alto Networks

(1 avis)

Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.

DynaZip Max Secure

DynaZip Max Secure

par Inner Media

(0 avis)

Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.

SafeInternetEmail

SafeInternetEmail

par FreeStone Software

(0 avis)

NETWORK SECURITY, FILTERING AND OPTIMIZATION.. Solutions for Visibility, Control and Performance..

StealthDisk Mobile

StealthDisk Mobile

par Security Group Six

(0 avis)

Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.

Outpost Firewall Personal Pro

Outpost Firewall Personal Pro

par Agnitum

(0 avis)

Hides your computer identity from hackers, stops hacker attacks automatically, and blocks transmission of private data.

Encrypted Data Gateway Engine

Encrypted Data Gateway Engine

par Authora

(0 avis)

An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data.

Safenet ProtectApp

Safenet ProtectApp

par Gemalto

(0 avis)

SafeNet ProtectApp offers the highest level of application security available in a commercial encryption solution for business applications like CRM, ERP and human capital management (HCM). Data is secured transparently, without affecting application performance or the user experience. Centralized key and policy management provided with the integrated SafeNet DataSecure appliance enables administrators to support a large number of applications.

Casper BlackBox

Casper BlackBox

par CrypKey

(0 avis)

E-commerce solution that provides the ultimate in automated integrated software protection.

Calyx Suite

Calyx Suite

par Open Seas

(0 avis)

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Infiltrator

Infiltrator

par Infiltration Systems

(0 avis)

Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations.

Vaccine46

Vaccine46

par 46Soft.com

(0 avis)

Virus & spyware removal utility that detects, removes and protects your PC from malware threats like adware, trojans, worms, etc.

VFind Security ToolKit

VFind Security ToolKit

par CyberSoft

(0 avis)

It is a suite of State-Of-The-Art Computer Security Virus and Intrusion Tools.

MailSite Fusion

MailSite Fusion

par Rockliffe Systems

(0 avis)

MailSite Fusion is a windows email, calendar and contact server with over-the-air push to all types of smartphones, Full native Outlook sync, a sophisticated AJAX web client and a calendar and contact sharing server, which can synchronize and publish to many other clients. MailSite has been voted in the top 3 mail server products by readers of Windows IT Pro Magazine 3 years running.

Declude Security Suite

Declude Security Suite

par Declude

(0 avis)

Integrated suite of security software applications designed to detect and halt all email vulnerabilities from infiltrating the network.

Lockspam Pro 3.0

Lockspam Pro 3.0

par Polesoft

(0 avis)

Safe anti-spam program for all POP3 mail clients like Microsoft Outlook, Outlook Express, Eudora, Incredimail, the Bat!

DragonSoft DVM

DragonSoft DVM

par DragonSoft Security Associates

(0 avis)

Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.

Enterprise Security

Enterprise Security

par Protegrity

(0 avis)

It defines and manages organization wide security policy, provides embedded enterprise data security and more.

AccessPatrol

AccessPatrol

par CurrentWare

(0 avis)

AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).

Catbird

Catbird

par Catbird

(0 avis)

Catbird is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbirds software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.

Zada Suite

Zada Suite

par Zada Partners

(0 avis)

Wide array of solutions for various industries, ranging from Waste & Recycling to Government and Defense to Health Care & Life Sciences

Cybersecurity

Cybersecurity

par Intelligent Technologies Labs

(0 avis)

Security system that offers data loss prevention, backup and disaster recovery, web, email, and mobile security features.

CimTrak Integrity Suite

CimTrak Integrity Suite

par Cimcor

(0 avis)

Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments.

Secure My Files

Secure My Files

par SecuSimple

(0 avis)

Prevent other people from seeing your files with the new program Secure My Files.

Attack Mitigation System

Attack Mitigation System

par Radware

(0 avis)

Network attack mitigation solution with several security modules, including network behavioral analysis & intrusion prevention.

AtomOS Kwick Key

AtomOS Kwick Key

par Atom AMPD

(0 avis)

A software platform that allows customers to streamline their network by running multiple applications from a single source.

Vallum GMI Agent

Vallum GMI Agent

par Vallum Software

(0 avis)

The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data and alerts. Installation of a free universal agent, included as part of the installation, will provide more extensive metrics on CPU, Memory, Disk, Network, processes and services.

DESwrap

DESwrap

par Data Encryption Systems

(0 avis)

Security solution that allows software authors to protect their applications against unpaid use.

Data Rover EP

Data Rover EP

par Mission2Mars

(0 avis)

DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization.

CyberReveal

CyberReveal

par BAE Systems

(0 avis)

Our CyberReveal platform analyses the behaviour of devices on your network and their connections with the internet to pick out attacks from within legitimate network traffic. Skilled security analysts investigate suspicious activity and raise security incidents when you need to take action. Our Threat Intelligence function monitors key attack groups, ensuring that the latest techniques can be detected.

FireScope Dash

FireScope Dash

par FireScope

(0 avis)

Provides end-to-end monitoring of your critical IT infrastructure and applications, providing early warning when the first signs of failure appear and enabling you to react faster, more effectively.

MB

MB

par MalleableByte

(0 avis)

Web based solution to eliminate web traffic spam. Sixty percent of all web traffic on our Internet today is spam.

Lancera

Lancera

par Lancera

(0 avis)

Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness.

FireEye Enterprise

FireEye Enterprise

par FireEye

(0 avis)

Fully integrated security for every communication channel in your organization

Unified VRM

Unified VRM

par NopSec

(0 avis)

NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks.

DataDome bot mitigation

DataDome bot mitigation

par DataDome

(0 avis)

DETECTION Our solution analyses thousands of hits in real time, automatically detecting bad bots from human and good bot traffic. ALERTING Real time email alerts help you understand which bots access your website, and for what purpose. PROTECTION Our experts devise tailor-made strategies and activate DataDome technology to protect your website against bad bots activity. BENEFITS Regain control over your content, improve your website performance and protect your users.

L7 Defense

L7 Defense

par L7 Defense

(0 avis)

Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks.

IronSFTP

IronSFTP

par IronCore Labs

(0 avis)

An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption.

Genian NAC

Genian NAC

par GENIANS

(0 avis)

Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution.

BluKrypt

BluKrypt

par Parablu

(0 avis)

BluKrypt is an on-premise CASB that completely secures your critical data on the cloud. Whether the data is in your collaboration tools, archive & backup platforms or SaaS applications, BluKrypt gives you total control over data security. BluKrypt acts as a secure cloud gateway to enable enterprises to fully manage security policy enforcement irrespective of where the digital assets are stored public cloud, private cloud or local data stores. As opposed to other CASBs, which mainly rely on

Devknox

Devknox

par Appknox

(0 avis)

Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck.

ChurchDNS

ChurchDNS

par ChurchDNS

(0 avis)

Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments.

SmartWall TDS

SmartWall TDS

par Corero

(0 avis)

The Corero SmartWall Threat Defense System (TDS) is a family of DDoS protection appliances that eliminate cyber threats in real-time. These appliances deliver comprehensive DDoS protection in rapidly scalable deployments for higher performance, greater connectivity and broader functionality than ever before. Organizations can deploy a combination of SmartWall TDS DDoS protection appliances to deliver the performance, connectivity and security required for advanced threat protection.

shareOptic

shareOptic

par shareOptic

(0 avis)

Security solution that allows you to remain compliant while uncovering data security threats.

BluSapphire

BluSapphire

par BluSapphire

(0 avis)

BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs.

HaltDos

HaltDos

par HaltDos

(0 avis)

HaltDos protects your Website from the wide range of DDoS attacks. It ensures high-availability of your website by providing you an in-depth network monitoring and custom dashboards.

Unistal Anti Virus

Unistal Anti Virus

par Unistal Systems

(0 avis)

Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology.

NTP Software File Auditor

NTP Software File Auditor

par NTP Software

(0 avis)

With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your companys sensitive file data and intellectual property.

ZEVENET

ZEVENET

par ZEVENET

(0 avis)

POWERFUL AND EASY TO USE. The virtual appliance is aimed to provide massive scalability, high availability and increased security for your services, applications and networks. FAST DEPLOYMENT, READY TO GO. No need of installation solution, what allows a quick production consolidation. The ZVA lightweight and portable format allows to be deployed in the most popular hypervisors with a broad integration capabilities to be integrated easily in your infrastructure ensuring a cost-effective solution.

Kiuwan Code Security

Kiuwan Code Security

par Kiuwan

(0 avis)

We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security, risk, cost, activity, quality, maintainability, efficiency and dependencies of your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, software technical security certifications and outsourcing agreement management, to name but a few of the possibilities brought about by our platform.

Compromise Detection System

Compromise Detection System

par StreamScan

(0 avis)

A sophisticated Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach

eVigilPro

eVigilPro

par Moonshot Technologies

(0 avis)

A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting.

SecureNok

SecureNok

par SecureNok

(0 avis)

Secure-NOK offers SNOK, an easy-to-use, state-of-the-art tool for monitoring, detection, and early warning of cybersecurity events in industrial control and automation systems. Through our products and services, Secure-NOK enables well-informed security decisions. We provide knowledge and awareness of security risks and their consequences and support our customers with holistic defense strategies and solutions.

EntryProtect

EntryProtect

par SentryBay

(0 avis)

Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data.

Intruder

Intruder

par Intruder

(0 avis)

A solution to find weaknesses in your online digital estate, explain the risks, & help with remediation before a breach can occur.

Cigloo Browser Isolation Management Platform

CIGLOO is the next generation browser isolation management platform, It provides organizations with the ability to enforce web isolation and assures that all malicious browsers code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data.

Constellation Analytics Platform

Constellation Analytics Platform

par Haystax Technology

(0 avis)

Constellation enables organizations to move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities, and people. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems.

ClrStream

ClrStream

par Mithi Software Technologies

(0 avis)

ClrStream is the email security, continuity and durability solution for your MS Exchange, Office 365, MDaemon, Postfix, PostMaster, Zimbra & other mail solutions. ClrStream protects your email servers from Spam, Virus, Ransomware and DDOS attacks. It also provides email continuity when the primary mail server is unavailable or down. When bundled with Vaultastic, email data durability is guaranteed at 99.99999999999%. All without any lengthy and costly email service migrations.

The ZoneRanger

The ZoneRanger

par Tavve

(0 avis)

Security and network management software that securely manages applications and devices across firewall partitioned networks.

Devasted Antivirus

Devasted Antivirus

par Digital Hospital Technologies

(0 avis)

An anti-virus solution that detects and eliminates viruses, spyware, adware, worms, Trojans, rootkits, and other malware.

Google Cloud Platform

Google Cloud Platform

par Google

(281 avis)

Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Avast Business Managed Workplace

Avast Business Managed Workplace

par Avast

(216 avis)

With Managed Workplace, IT service providers can quickly assess vulnerabilities, secure weak points, monitor anomalies, and seamlessly recover data in the event of an attack, all from a single dashboard. Managed Workplace brings a cost-effective, easy-to- use, multi-tenant security lens to remote monitoring and management, enabling MSPs to grow their business, differentiate their services, and build customer loyalty.

Spiceworks Network Monitor

Spiceworks Network Monitor

par Spiceworks

(198 avis)

Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now.

NordVPN

NordVPN

par NordVPN

(45 avis)

Les entreprises peuvent sécuriser leurs réseaux et connexions Internet. Le service VPN ajoute une couche de protection supplémentaire pour sécuriser vos communications. Cela se fait en appliquant un cryptage fort à tout le trafic entrant et sortant afin qu'aucun tiers ne puisse accéder à vos informations confidentielles. Protégez votre organisation contre les failles de sécurité. Accès sécurisé de l'équipe à distance. Simplifiez la sécurité du réseau d'entreprise. Accédez à du contenu en ligne spécifique à une région depuis n'importe où dans le monde

bitdefender GravityZone

bitdefender GravityZone

par bitdefender

(30 avis)

GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.

Centrify Infrastructure Services

Centrify Infrastructure Services

par Centrify

(18 avis)

Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...

Webroot SecureAnywhere DNS Protection.

Webroot SecureAnywhere DNS Protection.

par Webroot Software

(18 avis)

Webroot SecureAnywhere DNS Protection offers a straightforward, effective way to prevent everyday web usage from becoming a major security risk. The intuitive web-based console enables admins to finely tune web access policies by IP and limit access to other potentially risky websites. Webroot offers over 82 URL categories for admins to tailor their usage policies to their organization's needs.

SPAMfighter

SPAMfighter

par SPAMfighter

(12 avis)

Block the spam mail using spam filter application that comes with spam reporting, phishing attack protection, and automatic whitelist.

Smart Protection

Smart Protection

par Trend Micro

(11 avis)

Antivirus and content security SMTP gateway designed to protect against email viruses and spam.

Nessus

Nessus

par Tenable Network Security

(10 avis)

Nessus, the industry's most widely deployed vulnerability management solutions, helps you reduce your organizations attack surface and ensure compliance. Nessus features high-speed asset discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and more. With the world's largest continuously-updated library of vulnerability and configuration checks, Nessus sets the standard for vulnerability scanning speed and accuracy.

PracticeProtect

PracticeProtect

par PracticeProtect

(8 avis)

PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications.

Bot Mitigation and Management

Bot Mitigation and Management

par ShieldSquare

(7 avis)

ShieldSquare helps online businesses filter non-human (bot) traffic on websites and mobile applications through a non-intrusive API based approach. With ShieldSquare's real-time protection, online businesses can protect themselves against web scraping, carding, account takeover, skewed analytics and other forms of bot abuse. ShieldSquare processes tens of billions of page requests every month. We protect 80,000+ internet properties of global online brands spread across 70+ countries.

Unified Threat Management

Unified Threat Management

par WatchGuard

(5 avis)

Highest performing all-in-one network security platform.

Astra Security

Astra Security

par Astra Security

(4 avis)

A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.

Perimeter 81

Perimeter 81

par Safer Social

(3 avis)

Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device.

EventLog Analyzer

EventLog Analyzer

par ManageEngine

(3 avis)

EventLog Analyzer est la solution SIEM (Security Information and Event Management) la plus rentable disponible sur le marché. EventLog Analyzer répond à toutes les fonctionnalités SIEM critiques telles que l'agrégation de journaux, l'analyse de journaux, le reporting de conformité, la surveillance de l'intégrité des fichiers, la surveillance de l'activité utilisateur, la corrélation d'événements, les alertes en temps réel, l'investigation des journaux et la rétention des journaux. Désormais, vous pouvez limiter les cyberattaques sophistiquées, identifier la cause première des incidents de sécurité et contrecarrer les violations de données.

F-Secure Anti-Virus

F-Secure Anti-Virus

par F-Secure

(1 avis)

Protects your office computer against viruses, spyware, worms, and Trojans.

Netskope Cloud Security Platform

Netskope Cloud Security Platform

par Netskope

(1 avis)

Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.

Endpoint Modeling

Endpoint Modeling

par Observable Networks

(1 avis)

Endpoint modeling learns the behavior of every endpoint on your network, combines it with threat intelligence algorithms in the cloud, and monitors activity in real time allowing you to identify and remediate threats. With unprecedented visibility into your network, configurable alerts, and an intuitive UI, endpoint modeling closes the widening gaps left by traditional security methods.

Cisco Cloudlock

Cisco Cloudlock

par Cisco Cloudlock

(1 avis)

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

X-VPN - Change and Hide IP

X-VPN - Change and Hide IP

par Free Connected

(1 avis)

No Annoying Pop-up Ads! The best VPN to Enjoy Private, Secure surfing experience.Lightning fast connection.Easy to download and use across your devices.All you have to do is to tap the Connect button then you are protected. Unblock All Websites And Apps Change IP as you want Secure Your Internet Activity And WiFi Connection. Come to experience the real Trustworthy VPN service by the independent developer team!X-VPN Is Definitely Your Online Bodyguards!

SpyHunter

SpyHunter

par Enigma Software Group USA

(1 avis)

Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware.

Spam Marshall

Spam Marshall

par ITA Networks

(1 avis)

Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring.

iSecurity

iSecurity

par Raz-Lee Security

(1 avis)

Provides companies with auditing, monitoring, compliance and prevention solutions for IBM i servers.

modusCloud

modusCloud

par Vircom

(1 avis)

With modusCloud, secure your business email with cloud based spam protection, targeted phishing protection, email archiving, secure encryption, Office 365 integrations, and much more. The modusCloud solution provides the essentials for email continuity, advanced threat protection, URL and attachment defense, along with machine learning to ensure industry leading catch rates and lowest false positives. 24/7/365 Customer support will ensure your email security is always in good hands.

Argent for AWS

Argent for AWS

par Argent Software

(1 avis)

Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo.

Twistlock

Twistlock

par Twistlock

(1 avis)

Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need.

Security Manager

Security Manager

par NetIQ

(0 avis)

Provides an advanced, central security console for real-time security event monitoring and automated response, host-based intrusion detection, event log consolidation, and security configuration management.

Firewall-1

Firewall-1

par Check Point Software Technologies

(0 avis)

Firewall that provides access control, content security, authentication and centralized management.

bt-Enterprise

bt-Enterprise

par Burstek

(0 avis)

Eliminate risk and regain control with enterprise solutions for Web and email filtering.

PureSight CSDK/OEM

PureSight CSDK/OEM

par PureSight Technologies

(0 avis)

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Mailstream Anti-Abuse

Mailstream Anti-Abuse

par Sendmail

(0 avis)

Uses cutting-edge technologies to prevent spam, phishing, viruses, and other malware from entering the email network.

Security Solutions

Security Solutions

par Dimension Data

(0 avis)

We develop security strategies for companies around the world based on our Protect, Detect Respond strategy.

Web Security-as-a-Service

Web Security-as-a-Service

par ScanSafe Services

(0 avis)

Ensures a safe web environment for businesses, keeping viruses and spyware off networks and ensuring secure Web and instant messaging.

CX-Mask

CX-Mask

par Camouflage

(0 avis)

Protect sensitive information in environments that include training, development and outsourcing.

RedSeal

RedSeal

par RedSeal Networks

(0 avis)

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Avatier Identity Anywhere

Avatier Identity Anywhere

par Avatier

(0 avis)

Identity-as-a-Container (IDaaC) platform that integrates business user-centric solutions for password management, single sign-on, and access governance.

east-tec InvisibleSecrets

east-tec InvisibleSecrets

par East-Tec

(0 avis)

east-tec InvisibleSecrets 4 hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution & real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.

Security Manager

Security Manager

par FireMon

(0 avis)

The FireMon platform manages devices across an organization to reduce complexity, increase compliance and improve network security.

Evident.io

Evident.io

par Evident.io

(0 avis)

The Evident Security Platform (ESP) streamlines and optimizes vulnerability and risk management. It continuously monitors your AWS cloud, automatically identifies security misconfigurations, and enables rapid mitigation of risk through guided remediation. ESP's automation, customization, and ease-of-use enables cloud teams to securely deploy and migrate workloads to AWS and implement a process of continuous compliance. Start your free trial and get results immediately.

SecureSphere

SecureSphere

par Imperva

(0 avis)

Imperva delivers cyber security that protects all your data and applications.

Intelligent Management Center

Intelligent Management Center

par Hewlett Packard Enterprise

(0 avis)

The HPE Intelligent Management Center Standard Software Platform and Enterprise platform are comprehensive wired and wireless network management tools supporting the FCAPS (Fault, Configuration, Accounting, Performance, Security) model, providing for end-to-end business management of IT, scalability of system architecture, and accommodation of new technology and infrastructure.

CacheGuard-OS

CacheGuard-OS

par CacheGuard Technologies

(0 avis)

An Appliance oriented Operating System dedicated to Web traffic Security and Optimization. CacheGuard embeds a gateway antivirus, a URL filtering facility, a firewall, a traffic shaping facility, an SSL inspection facility, a Web proxy, a reverse proxy, a Web application load balancer, a Web application firewall, a traffic logger and much more.

RDS-Shield

RDS-Shield

par Marty Soft Conception

(0 avis)

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access.

Safe@Office

Safe@Office

par SafeDNS

(0 avis)

A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content.

Ozon

Ozon

par Ozon

(0 avis)

Ozon protects e-commerce solutions from cyber-attacks, fraudulent transactions, vulnerabilities, and malware threats

DNS Firewall

DNS Firewall

par GSLB.me

(0 avis)

Authoritative, dynamic and geo-DNS, traffic balancing, CDN offload, domain services and DNS firewall. With full DNSSEC support.

Speedify for Teams

Speedify for Teams

par Connectify

(0 avis)

Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.

Ezeelogin SSH Gateway

Ezeelogin SSH Gateway

par Ezeelogin

(0 avis)

A secure ssh gateway software that helps you configure your own custom linux based ssh jump host or bastion host.

AIONCLOUD

AIONCLOUD

par AIONCLOUD

(0 avis)

AIONCLOUD is a simple way to secure your website. AIONCLOUD is total web security service to safeguard websites from various attacks and improve your business performance. AIONCLOUD detects and blocks malicious activities and protects critical data from the latest threats such as SQL injection, DDos, homepage defacement, information leaks, identity theft and malware.

B@mbu cloud

B@mbu cloud

par B@mbu cloud

(0 avis)

B@mbu cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers

DATCOM

DATCOM

par DATCOM

(0 avis)

Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture.

Cyberator

Cyberator

par Zartech

(0 avis)

Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution

Constellix

Constellix

par DNS Made Easy

(0 avis)

An ITO solution that offers DNS traffic management with integrated network monitoring services.

ThreatSentry

ThreatSentry

par Privacyware

(0 avis)

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Ridgeback

Ridgeback

par Ridgeback Network Defense

(0 avis)

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea of Interactive Deception. The Ridgeback Interactive Deception Platform influences adversary behavior, leading the adversary to engage in behaviors that reveal malicious intent. Ridgeback creates the appearance of billions of unavoidable phantom resources in the network, each a landmine that stops lateral exploits in real time. Up and running in ten minutes.

Access Watch

Access Watch

par Access Watch Technologies

(0 avis)

Access Watch enhances your security layer against costly and malicious robotic traffic. Mitigate attacks and abuse of your website from bad bots and reduce hosting costs by up to 30%.

Primo VPN

Primo VPN

par IAInnocationLab

(0 avis)

Network security solution for VPN with Mac OS that supports PPTP and L2TP from 10.7 to the latest version of Mac.

BroadBot

BroadBot

par Invinsec

(0 avis)

It doesnt matter what you buy.. Our technology sits on top of your existing systems. We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network This real time view constantly monitors for potential threats, and compliance issues 24/7/365. If we find something nasty we tell you. Our response speed is the fastest in the industry. Its all designed to put you back in control (fast)

Twizo

Twizo

par Twizo

(0 avis)

A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

Trojan Killer

Trojan Killer

par Gridinsoft

(0 avis)

A network security solution to clean system of viruses, help restore computer performance, and more.

Violet

Violet

par Threatcare

(0 avis)

Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations.

Perfecto Encryptor

Perfecto Encryptor

par Black Bird Cleaner Software

(0 avis)

A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more.

CloudEye

CloudEye

par Cloudnosys

(0 avis)

Cloudnosys platform delivers security, compliance, cost and DevOps automation. Continually scan entire your AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc. Provides DevOps automation such as on/off/snooze, snapshot management and identifies costs savings by improving asset utilization for Azure and AWS. Meet PCI, HIPAA, FISMA, AWS CIS Benchmark compliance quickly. Provides easy guided remediation and audit functions.

Cornerstone MFT Server

Cornerstone MFT Server

par South River Technologies

(0 avis)

Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes.

NTFS Permission Tool

NTFS Permission Tool

par G-TAC Software

(0 avis)

NTFS permission tool to get effective security of data on system through permissions for files and folders.

Sentinel IPS

Sentinel IPS

par Sentinel IPS

(0 avis)

Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.

Snyk

Snyk

par Snyk

(0 avis)

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.

Aruba ClearPass

Aruba ClearPass

par Aruba Networks

(0 avis)

Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.

Comodo cWatch

Comodo cWatch

par Comodo Group

(0 avis)

Comodo cWatch Web is a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) that leverages data from over 85 million endpoints to detect and mitigate threats before they occur.

Akku

Akku

par CloudNow Technologies

(0 avis)

Akku is a powerful, flexible enterprise cloud security solution created to help you manage identity and access across your cloud. With versatile features to improve data security, privacy, standards compliance and productivity, Akku is a Cloud Access Security Broker (CASB) that truly puts you in control of your cloud.

CertHat

CertHat

par ProMDM

(0 avis)

CertHat Tools for Microsoft PKI provides you with a web based tools for PKI management. It is easy to install and can manage all of your AD CS servers but can also import external certificates. With CertHat you will be able to track all your certificates and create alerts before they expire. CertHat help you to increase productivity and dramatically reduce the risk of system or business incidents due to expired certificate

NCP

NCP

par NCP engineering

(0 avis)

NCP is an innovative software that allows enterprises to rethink their remote access and create secure network access.

HIAB

HIAB

par Outpost24

(0 avis)

HIAB (Hacker-In-A-Box) est un outil automatisé de gestion des vulnérabilités qui scanne et sécurise les réseaux internes (en relation avec les employés, les consultants, les fournisseurs par exemple). La solution édite des rapports contenant des solutions de remédiation concrètes. HIAB intègre également un scanner d'application Web. HIAB peut être déployé sur serveurs physiques ou virtuels. Et même s'il s'agit d'un outil d'analyse autonome, il peut être implémenté avec d'autres outils ou services gérés d'Outpost24. L'équipe de support est disponible 24h/24 et 7j/7.

ditno. Network Firewall

ditno. Network Firewall

par ditno

(0 avis)

ditno Network Firewall has taken traditional server protection and simplified it. We have enabled every organisation, irrespective of size or complexity to utilize enterprise-grade protection across any server in any environment with minimal effort and no upfront commitment. ditno Network Firewall provides a single pane of glass to visualize and manage all of your servers consistently, significantly reducing requirements for specialist FTE's and high operating costs.