Logiciels de cybersécurité (Cybersecurity Software)

Logiciels de cybersécurité, France : utilisez Capterra.fr pour trouver les meilleurs outils pour votre entreprise.

Pourquoi Capterra est gratuit

MetaPhish

MetaPhish

par MetaCompliance

(1 avis)

The MetaPhish product has the ability to originate emails from a set of prepopulated simulated phishing domains. The software contains a library of smart learning experiences such as infographics, notices and training videos. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator. En savoir plus sur MetaPhish

MetaPhish has the ability to originate emails from a set of prepopulated simulated phishing domains. En savoir plus sur MetaPhish

Barkly

Barkly

par Barkly

(26 avis)

Barkly remplace un antivirus hérité par la protection la plus forte, la technologie la plus intelligente et la gestion la plus simple. Barkly bloque toutes les attaques, quels qu'en soient les vecteurs et les intentions, notamment les codes malveillants, les scripts, les exécutables et les rançongiciels. L'architecture brevetée à 3 niveaux de Barkly offre une visibilité inégalée sur tous les étages du système (processeur inclus) pour bloquer les attaques. Barkly est incroyablement simple à gérer et à déployer : aucune politique, configuration ou expertise de sécurité n'est requise. En savoir plus sur Barkly

En savoir plus sur Barkly

ESET Endpoint Security

ESET Endpoint Security

par ESET

(400 avis)

Élimine tous les types de menaces, notamment les virus, les logiciels malveillants, les ransomwares, les rootkits, les vers et les logiciels espions grâce à l'option de balayage dans le cloud pour une performance et une détection encore meilleures. ESET utilise des technologies multicouches qui vont bien au-delà des capacités de l'antivirus de base. Anti-spyware, antihameçonnage, contrôle web, anti-spam et protection contre les botnets avec gestion à distance. En savoir plus sur ESET Endpoint Security

Anti-spyware, antihameçonnage, contrôle web, anti-spam et protection contre les botnets avec gestion à distance. En savoir plus sur ESET Endpoint Security

Cloud Defender

Cloud Defender

par Alert Logic

(1 avis)

Cloud Defender is an integrated suite of security & compliance controls for cloud, on-premises, hosted & hybrid infrastructures, delivered as-a-service with 24x7 expert GIAC-certified analysts. With a single solution, it identifies vulnerabilities, defends against web app attacks, analyzes logs across the application stack to identify malicious or anomalistic behavior, & assists with meeting compliance mandates - all in a monthly subscription. En savoir plus sur Cloud Defender

Fully managed security & compliance controls for cloud, on-prem, hosted & hybrid infrastructures. Delivered as-a-service with 24x7 SOC. En savoir plus sur Cloud Defender

WebTitan

WebTitan

par TitanHQ

(162 avis)

Filtre web basé sur les DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de hameçonnage, tout en fournissant un contrôle du contenu web. Il filtre plus d'un demi-milliard de requêtes DNS chaque jour, identifie 60 000 itérations de logiciels malveillants par jour et compte plus de 7 500 clients. Il existe des versions via cloud et via plateforme. Améliorez votre cybersécurité dès maintenant. Essayez la version d'essai gratuite de WebTitan dès aujourd'hui, support inclus. En savoir plus sur WebTitan

Filtre web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web En savoir plus sur WebTitan

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

par Webroot Software

(88 avis)

Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles comme les trojans, les keyloggers, le phishing, les logiciels espions, les backdoors, les rootkits (malwares furtifs), les zero-days et les menaces persistantes avancées. La protection de l'identité et des données personnelles incluse dans le logiciel empêche le vol ou l'enregistrement des données pendant l'activité en ligne, et le pare-feu outbound défend les données contre les vols par malware. Pas besoin de vous charger ni de vous préoccuper des mises à jour : grâce à la sécurité basée sur le cloud, les points terminaux sont toujours à jour. En savoir plus sur Webroot SecureAnywhere Endpoint Protection

Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles. En savoir plus sur Webroot SecureAnywhere Endpoint Protection

Netwrix Auditor

Netwrix Auditor

par Netwrix

(86 avis)

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. En savoir plus sur Netwrix Auditor

Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. En savoir plus sur Netwrix Auditor

Perimeter 81

Perimeter 81

par Safer Social

(5 avis)

Perimeter 81 est le service d'accès réseau sécurisé ultime pour votre entreprise. Dites adieu au matériel coûteux, à l'installation fastidieuse et aux heures d'assistance de service client. Accordez instantanément à vos employés un accès sécurisé aux ressources critiques de l'entreprise sur site, sur le web ou dans le cloud. Déployez des serveurs VPN privés avec des adresses IP statiques en quelques secondes et obtenez une visibilité réseau inégalée grâce à un portail de gestion complet. Comprend des applications en un clic pour chaque appareil. En savoir plus sur Perimeter 81

Un VPN cloud économique en un seul clic qui garantit un accès simplifié au réseau et aux ressources SaaS pour les entreprises de toutes tailles. En savoir plus sur Perimeter 81

Log360

Log360

par ManageEngine

(3 avis)

Log360, une solution intégrée qui combine ADAudit Plus et EventLog Analyzer dans une seule console, est la solution complète pour tous les problèmes en matière de gestion des journaux et sécurité réseau. Elle propose la collecte, l'analyse, la corrélation de journaux en temps réel et des capacités d'archivage qui aident à protéger les données confidentielles, contrecarrer les menaces de sécurité internes et combattre les attaques externes. Pour aider à répondre aux exigences en matière de sécurité, d'audit et de conformité, elle est disponible sur plus de 1 200 rapports prédéfinis et critères d'alerte. En savoir plus sur Log360

Log360, une solution complète de SIEM qui aide à protéger des attaques de sécurité internes et externes grâce à la fonctionnalité de gestion des journaux. En savoir plus sur Log360

SolarWinds Threat Monitor

SolarWinds Threat Monitor

par SolarWinds MSP

(0 avis)

SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. En savoir plus sur SolarWinds Threat Monitor

SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. En savoir plus sur SolarWinds Threat Monitor

Cryptosense

Cryptosense

par Cryptosense

(1 avis)

Cryptosense fournit un logiciel d'analyse de pointe pour aider les entreprises à éliminer les vulnérabilités causées par l'utilisation non sécurisée de la cryptographie dans leurs applications et leur infrastructure. En savoir plus sur Cryptosense

Cryptosense fournit un logiciel permettant de détecter et d'éliminer les vulnérabilités causées par l'utilisation abusive de la cryptographie dans les applications et les infrastructures. En savoir plus sur Cryptosense

Acunetix

Acunetix

par Acunetix

(18 avis)

Acunetix est leader sur le marché de la technologie de test automatique de sécurité web, il analyse et audite de manière exhaustive les sites web complexes, authentifiés, HTML5 et JavaScript, entre autres. Utilisé par de nombreux secteurs gouvernementaux, militaires, éducatifs, des télécommunications, bancaires, financiers et du commerce électronique, y compris par de nombreuses entreprises du classement Fortune 500, Acunetix offre une entrée rentable sur le marché de la numérisation web avec une solution simple, évolutive et hautement disponible, sans compromettre la qualité. En savoir plus sur Acunetix

Cette solution de cybersécurité analyse le site web, détecte les vulnérabilités telles que XSS ou SQL Injection et propose des solutions. En savoir plus sur Acunetix

Teramind

Teramind

par Teramind

(47 avis)

Teramind propose une approche de la sécurité centrée sur l'utilisateur pour surveiller le comportement de votre employé sur son PC. Ce logiciel rationalise la collecte des données des employés afin d'identifier les activités suspectes, de détecter les menaces éventuelles, de surveiller l'efficacité des employés et d'assurer la conformité du secteur. Il contribue à réduire les incidents de sécurité en fournissant un accès en temps réel aux activités des utilisateurs et en proposant des alertes, des avertissements, des redirections et des verrouillages d'utilisateurs pour que votre entreprise soit aussi efficace et sécurisée que possible. En savoir plus sur Teramind

Testez la version d'essai gratuite. Teramind simplifie la surveillance de l'activité de l'utilisateur et la prévention du vol de données. En savoir plus sur Teramind

Horangi Web Security Services

Horangi Web Security Services

par Horangi Cyber Security

(1 avis)

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. En savoir plus sur Horangi Web Security Services

Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. En savoir plus sur Horangi Web Security Services

ComplyAssistant

ComplyAssistant

par ComplyAssistant

(0 avis)

ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. En savoir plus sur ComplyAssistant

ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. En savoir plus sur ComplyAssistant

Praetorian

Praetorian

par Praetorian

(0 avis)

Ces solutions permettent aux clients de trouver, réparer, arrêter et résoudre des problèmes de cybersécurité dans l'ensemble de leurs portefeuilles d'entreprise et de produits.

Ces solutions permettent aux clients de trouver, réparer, arrêter et résoudre des problèmes de cybersécurité dans l'ensemble de leurs portefeuilles d'entreprise et de produits.

RansomFree

RansomFree

par Cybereason

(2 avis)

RansomFree est le premier et le seul outil anti-ransomware gratuit conçu pour détecter 99 % des ransomwares et les empêcher de crypter des fichiers.

RansomFree est le premier et le seul outil anti-ransomware gratuit conçu pour détecter 99 % des ransomwares et les empêcher de crypter des fichiers.

SiteLock

SiteLock

par SiteLock

(11 avis)

SiteLock est le leader mondial de la sécurité des sites web, protégeant actuellement plus de cinq millions de sites web.

SiteLock est le leader mondial de la sécurité des sites web, protégeant actuellement plus de cinq millions de sites web.

PowerBroker

PowerBroker

par BeyondTrust

(0 avis)

Une plateforme qui unifie des technologies efficaces pour faire face aux risques internes et externes : compte privilégié et gestion de la vulnérabilité.

Une plateforme qui unifie des technologies efficaces pour faire face aux risques internes et externes : compte privilégié et gestion de la vulnérabilité.

Jscrambler

Jscrambler

par Jscrambler

(0 avis)

Laissez votre application JavaScript se protéger elle-même.

Laissez votre application JavaScript se protéger elle-même.

Indeni

Indeni

par Indeni

(12 avis)

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Heimdal CORP

Heimdal CORP

par Heimdal Security

(1 avis)

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Crypho

Crypho

par Crypho

(0 avis)

Enterprise group chat and file sharing with end-to-end encryption.

Enterprise group chat and file sharing with end-to-end encryption.

ARGUS

ARGUS

par Argus Cyber Security

(0 avis)

ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

Okta

Okta

par Okta

(164 avis)

Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.

Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.

Tandem Software

Tandem Software

par CoNetrix

(20 avis)

Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

TraceCSO

TraceCSO

par TraceSecurity

(1 avis)

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

DataDome bot mitigation

DataDome bot mitigation

par DataDome

(0 avis)

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business

BluSapphire

BluSapphire

par BluSapphire

(0 avis)

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

FICO Enterprise Security Score

FICO Enterprise Security Score

par FICO

(0 avis)

The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

Hybrid Cloud Security

Hybrid Cloud Security

par Trend Micro

(29 avis)

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.

Centrify Infrastructure Services

Centrify Infrastructure Services

par Centrify

(27 avis)

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

EventSentry

EventSentry

par Netikus.net

(16 avis)

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

ThreatAdvice

ThreatAdvice

par ThreatAdvice

(5 avis)

ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

Avast Business CloudCare

Avast Business CloudCare

par Avast

(5 avis)

Deliver powerful, layered protection to multiple customers quickly and easily.

Deliver powerful, layered protection to multiple customers quickly and easily.

SandBlast Threat Emulation

SandBlast Threat Emulation

par Check Point Software Technologies

(4 avis)

CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Virus Vanish

Virus Vanish

par DigitalBulls

(4 avis)

Free tool that scans your computer for viruses, malware, spyware, and other threats.

Free tool that scans your computer for viruses, malware, spyware, and other threats.

Business Suite

Business Suite

par F-Secure

(3 avis)

Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Pulsedive

Pulsedive

par Pulsedive

(3 avis)

Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

Tines

Tines

par Tines

(3 avis)

Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.

Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.

Threat Response

Threat Response

par Proofpoint

(2 avis)

Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Darktrace

Darktrace

par Darktrace

(2 avis)

Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Business VPN

Business VPN

par KeepSolid

(2 avis)

Déployez des serveurs privés pour votre entreprise en quelques clics seulement.

Déployez des serveurs privés pour votre entreprise en quelques clics seulement.

CYBEATS

CYBEATS

par CYBEATS

(2 avis)

Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

RedSeal

RedSeal

par RedSeal Networks

(1 avis)

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Powertech Security Software

Powertech Security Software

par HelpSystems

(1 avis)

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Hybrid Cloud Security

Hybrid Cloud Security

par Symantec

(1 avis)

Security solution for on-premises data centers and public clouds.

Security solution for on-premises data centers and public clouds.

TAP

TAP

par FireEye

(1 avis)

Barriqade

Barriqade

par TulipControls

(1 avis)

Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

Voxility DDoS Protection

Voxility DDoS Protection

par Voxility

(1 avis)

1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

Argent for AWS

Argent for AWS

par Argent Software

(1 avis)

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

Twistlock

Twistlock

par Twistlock

(1 avis)

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

The CyberStrong Platform

The CyberStrong Platform

par CyberSaint Security

(1 avis)

CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.

CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.

WebDefender

WebDefender

par Cobweb Security

(1 avis)

WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection

WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection

OnDMARC

OnDMARC

par Redsift

(1 avis)

OnDMARC est un produit de messagerie sécurisée qui aide les entreprises de toutes tailles à déployer DMARC en toute confiance.

OnDMARC est un produit de messagerie sécurisée qui aide les entreprises de toutes tailles à déployer DMARC en toute confiance.

Ekran System

Ekran System

par Ekran System

(0 avis)

RDS-Shield

RDS-Shield

par Marty Soft Conception

(0 avis)

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Cyberator

Cyberator

par Zartech

(0 avis)

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Twizo

Twizo

par Twizo

(0 avis)

A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

Enterprise Threat Protector

Enterprise Threat Protector

par Akamai Technologies

(0 avis)

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

AbuseSA

AbuseSA

par Synopsys

(0 avis)

Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

Security Intelligence Platform

Security Intelligence Platform

par Exabeam

(0 avis)

Security management and operations platform with detection, analytics, and response capabilities.

Security management and operations platform with detection, analytics, and response capabilities.

GreySpark

GreySpark

par FourV Systems

(0 avis)

Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Fidelis Elevate

Fidelis Elevate

par Fidelis Cybersecurity

(0 avis)

Automated threat detection and response platform that protects both network and endpoint devices.

Automated threat detection and response platform that protects both network and endpoint devices.

inDefend

inDefend

par DataResolve Technologies

(0 avis)

Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Techefix

Techefix

par Techefix

(0 avis)

Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

Securonix UEBA 6.0

Securonix UEBA 6.0

par Securonix

(0 avis)

Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

Avanan Cloud Security Platform

Avanan Cloud Security Platform

par Avanan

(0 avis)

Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.

Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.

Encryptionizer

Encryptionizer

par NetLib Security

(0 avis)

Transparent Data Encryption for any application or database on the Windows Platform.

Transparent Data Encryption for any application or database on the Windows Platform.

Ericom Shield

Ericom Shield

par Ericom Software

(0 avis)

Browser Isolation technology that prevents malware and zero-day attacks.

Browser Isolation technology that prevents malware and zero-day attacks.

Apility.io

Apility.io

par Apility.io

(0 avis)

Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

CDCAT®

CDCAT®

par APMG International

(0 avis)

CDCAT® fournit une stratégie complète de cybersécurité et un service d'amélioration des capacités.

CDCAT® fournit une stratégie complète de cybersécurité et un service d'amélioration des capacités.

Snyk

Snyk

par Snyk

(0 avis)

Vous aide à utiliser l'open source, à rester en sécurité, à trouver et à corriger les vulnérabilités de vos dépendances en continu.

Vous aide à utiliser l'open source, à rester en sécurité, à trouver et à corriger les vulnérabilités de vos dépendances en continu.

inWebo

inWebo

par inWebo

(0 avis)

Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

LoginCat

LoginCat

par TekMonks

(0 avis)

LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

Hush

Hush

par Syneidis

(0 avis)

The safest all in-one app for file protection and secure sharing.

The safest all in-one app for file protection and secure sharing.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

par Rohde & Schwarz Cybersecurity

(0 avis)

BioCatch

BioCatch

par BioCatch

(0 avis)

Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

Uplevel

Uplevel

par Uplevel

(0 avis)

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

Perception Point

Perception Point

par Perception Point

(0 avis)

Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.

Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.

Reveelium

Reveelium

par Reveelium

(0 avis)

Logiciel de détection des menaces qui analyse le comportement des utilisateurs et qui identifie les anomalies pouvant entraîner des failles de sécurité.

Logiciel de détection des menaces qui analyse le comportement des utilisateurs et qui identifie les anomalies pouvant entraîner des failles de sécurité.

EclecticIQ

EclecticIQ

par EclecticIQ

(0 avis)

EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

Cryptomage

Cryptomage

par Cryptomage

(0 avis)

Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

Customer Hijacking Prevention

Customer Hijacking Prevention

par Namogoo

(0 avis)

Namogoo est une solution de prévention des détournements de clients ; la technologie identifie et bloque les publicités non autorisées injectées dans les sessions web grand public.

Namogoo est une solution de prévention des détournements de clients ; la technologie identifie et bloque les publicités non autorisées injectées dans les sessions web grand public.

Kaymera

Kaymera

par Kaymera Technologies

(0 avis)

Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.

Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.

VigiTrust

VigiTrust

par VigiTrust

(0 avis)

Système de gestion de l'accréditation de sécurité qui aide les organisations à se conformer aux règles de sécurité de l'information.

Système de gestion de l'accréditation de sécurité qui aide les organisations à se conformer aux règles de sécurité de l'information.

Cyber Security Essentials

Cyber Security Essentials

par eWranglers

(0 avis)

With Traditional Managed IT Service Contracts, you may pay for MORE than you need!

With Traditional Managed IT Service Contracts, you may pay for MORE than you need!

Kobil

Kobil

par Kobil Systems

(0 avis)

KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

Nexusguard

Nexusguard

par Nexus Guard

(0 avis)

Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

OUTSCAN

OUTSCAN

par Outpost24

(0 avis)

OUTSCAN est une solution automatisée de gestion des vulnérabilités qui scanne et sécurise les réseaux externes et permet également d’anticiper les cyberattaques.

OUTSCAN est une solution automatisée de gestion des vulnérabilités qui scanne et sécurise les réseaux externes et permet également d’anticiper les cyberattaques.

gpg4o

gpg4o

par Giegerich & Partner

(0 avis)

Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

CryptoSmart

CryptoSmart

par Ercom

(0 avis)

The ultimate solution to secure mobile communications and devices

The ultimate solution to secure mobile communications and devices

CybelAngel

CybelAngel

par CybelAngel

(0 avis)

Plateforme de sécurité SaaS qui assure la protection des données grâce à la surveillance des appareils connectés au réseau et à l'identification des brèches de sécurité.

Plateforme de sécurité SaaS qui assure la protection des données grâce à la surveillance des appareils connectés au réseau et à l'identification des brèches de sécurité.

Prot-On

Prot-On

par Cognicase Management Consulting

(0 avis)

A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

MyIP.io VPN

MyIP.io VPN

par MyIP.io

(0 avis)

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

HaXM

HaXM

par XM Cyber

(0 avis)

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

Threat X

Threat X

par Threat X

(0 avis)

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

Interset Proprietory

Interset Proprietory

par Interset Software

(0 avis)

Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

Cynet 360

Cynet 360

par Cynet

(0 avis)

Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

ParaDoxBox

ParaDoxBox

par Secure Channels

(0 avis)

All-in-one data encryption solution that supports all your data protection needs.

All-in-one data encryption solution that supports all your data protection needs.

DARK-i

DARK-i

par SixGill

(0 avis)

DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

Infocyte HUNT

Infocyte HUNT

par Infocyte

(0 avis)

Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices.

Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices.

Hdiv

Hdiv

par Hdiv Security

(0 avis)

Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

DigiCert SSL/PKI Solutions

DigiCert SSL/PKI Solutions

par DigiCert

(0 avis)

Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection

Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection

PortSwigger

PortSwigger

par PortSwigger

(0 avis)

PortSwigger is a Web Security software for web security professionals for testing web applications.

PortSwigger is a Web Security software for web security professionals for testing web applications.

Stealthwatch Cloud

Stealthwatch Cloud

par CISCO

(0 avis)

Protect your cloud assets and private network. Improve security and incident response across the distributed network.

Protect your cloud assets and private network. Improve security and incident response across the distributed network.

Axonius Cybersecurity Asset Management Platform

Integrate with security/management solutions, and get a single view of all assets to continuously validate security policies.

Integrate with security/management solutions, and get a single view of all assets to continuously validate security policies.

Barracuda WAF-as-a-Service

Barracuda WAF-as-a-Service

par Barracuda Networks

(0 avis)

Protect every web app, hosted anywhere, in minutes.

Protect every web app, hosted anywhere, in minutes.

CloudLayar

CloudLayar

par Aqua Networks

(0 avis)

CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

Pcysys

Pcysys

par Pcysys

(0 avis)

Automated Penetration Testing, with a click of a button

Automated Penetration Testing, with a click of a button

Privatize

Privatize

par Introviz

(0 avis)

Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

CyStack Platform

CyStack Platform

par CyStack Security

(0 avis)

Comprehensive web security platform delivered as a service. We focus on expandability and usability.

Comprehensive web security platform delivered as a service. We focus on expandability and usability.

Instance Resolve

Instance Resolve

par Famteck

(0 avis)

Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.

Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.

MDefend

MDefend

par CyberMDX Technologies

(0 avis)

Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

HTTPCS Security

HTTPCS Security

par Ziwit

(0 avis)

Without technical expertise, run automated security audits to detect security flaws on your website.

Without technical expertise, run automated security audits to detect security flaws on your website.