306 résultats
Filtrer les résultats (306)
Déploiement
Catégories connexes
- Logiciels de compliance
- Logiciels de gestion des risques
- Logiciels de mise en conformité PCI DSS
- Logiciels de protection des équipements
- Logiciels de sécurité cloud
- Logiciels de sécurité informatique
- Logiciels de sécurité réseau
- Outils SIEM (Security Information Event Management)
- Outils de test de vulnérabilité
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization.
inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
Let us show you how to monitor AWS and local machines on a single pane of glass.
S3: Intelligent folder management with configurable alerts.
EC2: Go beyond Amazon's limited console.
The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit.
Click to schedule your free demo.
The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.
Twistlock est le principal fournisseur de solutions de cybersécurité natives conteneurs et cloud pour les entreprises modernes. De la gestion des vulnérabilités exploitable à la protection de runtime déployée automatiquement et aux pare-feu, Twistlock protège les applications tout au long du cycle de développement et de la production. Conçu spécialement pour les technologies conteneurs, sans serveur et autres technologies de pointe, Twistlock offre aux développeurs la vitesse qu'ils souhaitent et aux RSSI le contrôle désiré.
Twistlock est la principale plateforme de cybersécurité native cloud pour les entreprises modernes.
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats
We use encryption to hide all the components of your website from hackers.
It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search.
WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks.
Automated Penetration Testing, with a click of a button
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.
Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance.
Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
We make complex cloud security simple
Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks.
Coronet provides end to end data breach protection for companies that use the cloud.
Basé sur des technologies robustes et sur le savoir-faire de Thalès, le service Citadel Team peut prendre en charge des millions d'utilisateurs et offre déjà une technologie chatbot pour intégrer en toute sécurité les applications métiers.
Chaque communication est cryptée (chat, appel, partage de fichiers, etc.).
L'application garantit un haut niveau de sécurité et elle est en passe d'obtenir la certification de niveau élémentaire décernée par l'ANSSI, l'Agence nationale de la sécurité des systèmes d'information française.
Citadel Team est un service sécurisé de communication, développé, hébergé et opéré par le groupe français THALES.
Nowadays source code becomes the most valuable asset of the companies worldwide.
Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code.
There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage.
No longer worries about copying web design of your web site, you will know in seconds about it.
Tracking for your data to avoid data leaks and prevent others from using your source code
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.
An all-in-one platform to simplify cybersecurity for small businesses.
An all-in-one platform to simplify cybersecurity for small businesses.
Detect intentional tampering, user error, software failure, and introductions of malicious software.
Detect intentional tampering, user error, software failure, and introductions of malicious software.
Fournit un cryptage et une protection des données pratiques et fiables, faciles à déployer, à gérer et à utiliser.
Fournit un cryptage et une protection des données pratiques et fiables, faciles à déployer, à gérer et à utiliser.
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions.
Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor.
We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts.
Software to reduce cyber fraud through strict device identification measures and risk report generation.
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI).
Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.
Crypho is group chat and file sharing with end-to-end encryption.
What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys.
Enterprise group chat and file sharing with end-to-end encryption.
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs.
ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world.
Reduce cyber risk, prevent data breaches and protect customer data.
Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface.
Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access.
Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details.
The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data.
PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution
Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.
RIPS est la seule solution d'analyse de code dédiée aux langages Java et PHP. Elle détecte les vulnérabilités de sécurité les plus complexes imbriquées dans les codes Java et PHP qu'aucun autre outil ne peut déceler.
Elle prend en charge les principaux cadres Java et PHP, l'intégration SDLC, les normes industrielles pertinentes et peut être déployée en tant que logiciel autonome ou utilisée comme service cloud. Avec sa haute précision et très peu d'occurrences de bruit résultant de faux positifs, RIPS représente le choix idéal pour l'analyse de votre code.
Détectez automatiquement les problèmes de sécurité réels dans les applications Java et PHP, sans bruit faux positif, pour optimiser l'efficacité de vos équipes.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Plateforme web de business intelligence pour les opérations de sécurité conçue pour protéger les entreprises contre les risques et les menaces.
Plateforme web de business intelligence pour les opérations de sécurité conçue pour protéger les entreprises contre les risques et les menaces.
Automated threat detection and response platform that protects both network and endpoint devices.
Automated threat detection and response platform that protects both network and endpoint devices.
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance.
Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.
Transparent Data Encryption for any application or database on the Windows Platform.
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.
CDCAT fournit une stratégie complète de cybersécurité et un service d'amélioration des capacités.
CDCAT® fournit une stratégie complète de cybersécurité et un service d'amélioration des capacités.
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.
The safest all in-one app for file protection and secure sharing.
The safest all in-one app for file protection and secure sharing.
Élabore des profils biométriques comportementaux des utilisateurs en ligne afin de pouvoir reconnaître un large éventail de menaces liées à la cybersécurité humaine et non humaine.
Élabore des profils biométriques comportementaux des utilisateurs en ligne afin de pouvoir reconnaître un large éventail de menaces liées à la cybersécurité humaine et non humaine.
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.
EclecticIQ aide à transformer les informations de cybermenace en valeur commerciale avec une suite de produits conçus pour la cybersécurité.
EclecticIQ aide à transformer les informations de cybermenace en valeur commerciale avec une suite de produits conçus pour la cybersécurité.
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Namogoo est une solution de prévention des détournements de clients ; la technologie identifie et bloque les publicités non autorisées injectées dans les sessions web grand public.
Namogoo est une solution de prévention des détournements de clients ; la technologie identifie et bloque les publicités non autorisées injectées dans les sessions web grand public.
Kaymera est un logiciel de cybersécurité offrant une protection sur n'importe quel appareil et assurant une cyberdéfense efficace.
Kaymera est un logiciel de cybersécurité offrant une protection sur n'importe quel appareil et assurant une cyberdéfense efficace.
Système de gestion de l'accréditation de sécurité qui aide les organisations à se conformer aux règles de sécurité de l'information.
Système de gestion de l'accréditation de sécurité qui aide les organisations à se conformer aux règles de sécurité de l'information.
KOBIL provides mobile security management on all platforms and communication channels for your mobile business.
KOBIL provides mobile security management on all platforms and communication channels for your mobile business.
Cybersecurity solution that provides 360 degree automated protection against malicious attacks.
Cybersecurity solution that provides 360 degree automated protection against malicious attacks.
OUTSCAN est une solution automatisée de gestion des vulnérabilités qui scanne et sécurise les réseaux externes de sorte que les organisations protègent leurs données sensibles. L’outil analyse l’environnement, détecte les vulnérabilités, notifie les organisations en cas de vulnérabilités détectées et fournit des solutions pour y remédier dans le but d’empêcher les cybercriminels de compromettre leurs réseaux.
Le déploiement de OUTSCAN est simple en mode SaaS, mais l’équipe d’experts de Outpost24 peut aider à la mise en place si nécessaire. Enfin, le support clients est disponible 24h /24, 7j/7 pour répondre aux questions et aider les organisations à sécuriser leurs réseaux externes.
OUTSCAN est une solution automatisée de gestion des vulnérabilités qui scanne et sécurise les réseaux externes et permet également d’anticiper les cyberattaques.
Protect your sensitive mail content with IT-Security made in Germany
Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use.
Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.
Cryptosmart est la seule solution certifiée par l'OTAN et le gouvernement français, développée en collaboration avec Samsung, pour sécuriser de bout en bout les communications (voix, texte, données) et appareils mobiles (Samsung Galaxy).
Les gouvernements (y compris le gouvernement français) et les grandes entreprises font confiance à Cryptosmart.
Cryptosmart, la solution ultime pour sécuriser vos communications et appareils mobiles
Plateforme de sécurité SaaS qui assure la protection des données grâce à la surveillance des appareils connectés au réseau et à l'identification des brèches de sécurité.
Plateforme de sécurité SaaS qui assure la protection des données grâce à la surveillance des appareils connectés au réseau et à l'identification des brèches de sécurité.
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available.
SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Detect the insider threat, security breach, compromised accounts, phishing attacks and more.
Detect the insider threat, security breach, compromised accounts, phishing attacks and more.
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover.
Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO.
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.
Ce logiciel de cybersécurité d'Infocyte fournit des services de détection et de protection rapide contre les menaces sans fichiers, les APT (menaces persistantes avancées), les ransomwares et les logiciels malveillants. Intégrez et améliorez la sécurité de vos points de terminaison (SIEM, SOAR, EDR, etc.) via une console cloud conviviale.
Les fournisseurs de services gérés de sécurité utilisent cette plateforme pour proposer, à un coût raisonnable, une évaluation des risques et des compromis en matière de cybersécurité, une réponse aux incidents de sécurité et des services de sécurité MDR (détection et réponse gérées).
Détectez et répondez aux menaces, risques et vulnérabilités sophistiqués grâce à la plateforme logicielle de cybersécurité facile à utiliser d'Infocyte.
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.
Application security solution that protects web apps with features like automated vulnerability remediation and detection.
Application security solution that protects web apps with features like automated vulnerability remediation and detection.
CloudLayar est un logiciel de protection contre les attaques DDoS pour sites web dans le cloud qui permet aux propriétaires de sites web de bénéficier d'une protection de leurs sites web contre les robots, les logiciels malveillants, les scanners, les hackers et toute autre menace évolutive.
CloudLayar est un logiciel de protection contre les attaques DDoS pour sites web dans le cloud qui permet aux propriétaires de sites web de bénéficier d'une protection de leurs sites web contre les robots, les logiciels malveillants et les scanners.
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall.
Comprehensive web security platform delivered as a service. We focus on expandability and usability.
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases.
nstance Resolve is one of the most secure database solution with 6 solutions in 1 product.
Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation;
Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.
Client-side fraud and attack prevention across sessions, platforms and devices
Client-side fraud and attack prevention across sessions, platforms and devices
Cybersecurity powered by AI and deep learning to fortify your business
Cybersecurity powered by AI and deep learning to fortify your business
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to.
A secure team collaboration and document sharing platform.
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience.
A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility.
IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments.
CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations.
Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.
HTTPCS Cyber Vigilance infiltre les réseaux et forums de hackers pour vous alerter en cas de fuites de données ou de signes de préparation d'une campagne de piratage informatique. Avec plus de 5 millions de données récupérées chaque jour, HTTPCS détient à ce jour la plus grosse base de données critiques au monde. Avec HTTPCS Cyber Vigilance, agissez rapidement et anticipez pour éviter des attaques de grande envergure avant qu'elles n'arrivent. Un indispensable pour assurer votre e-reputation.
Anticipez les cyber attaques avec HTTPCS Cyber Vigilance, votre outil de veille du web et du darknet qui vous alerte en temps réel !
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com.
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.
Monitor and control the development of responsive and secret information over your network.
Monitor and control the development of responsive and secret information over your network.
ClassiDocs delivers comprehensive data classification, governance, discovery, and privacy regulation (GDPR, CCPA & more) compliance within one comprehensive, data security platform, making it truly powerful, yet cost-effective and easy to deploy. ClassiDocs enables the data creator to build, augment, and refine the classification process so they can govern the data they create and communicate its value across the organization.
Inventory, Classify and Secure Every Data Point, Every Time
TokenEx est une plateforme de tokenisation professionnelle qui offre une flexibilité quasi illimitée dans la façon dont les clients peuvent accéder aux données, les stocker et les sécuriser. Elle utilise plusieurs canaux d'acceptation des données, tout en maintenant une approche indépendante du processeur, ce qui signifie qu'elle peut tokeniser et sécuriser presque n'importe quel type de données, y compris PCI, PII, PHI, voire les formats de données non structurées et intégrer presque tous les processeurs ou critères d'évaluation.
Plateforme de sécurité des données hébergée dans le cloud qui offre la tokenisation et le stockage sécurisé des données cloud pour tous les types de données sensibles.
R&STrusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&STrusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team.
R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.
AI cybersecurity service and endpoint protection.
AI cybersecurity service and endpoint protection.
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure.
SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks.
Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.
Wanderas Mobile Security Suite provides a single cloud solution that protects against the broadest range of cyber threats and access-based risks. The Mobile Security Suite consists of Mobile Threat Defense, Data Policy and Broker.
Wanderas Security Suite provides a single cloud solution that protects against the broadest range of cyber threats & access risks.
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories.
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors.
With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats.
Chat to our friendly team of experts about our free, no-obligation, 14-day trial.
Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies.
Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.
The most secure cybersecurity software for enterprise companies.
The most secure cybersecurity software for enterprise companies.
Identity Theft Preventer pays attention to hundreds of micro-parameters on a computer, looking for exposed data that can potentially endanger ones identity. Information logged & stored by browsers, such as login credentials, web-mail services, banking portals, health providers web-accounts & social networks, as well as billing information, such as credit cards numbers, social security information, home address & more, are all reported back and resolved in a couple of clicks!
Identity Theft Preventer protects your digital privacy & locally stored personal information from external/foreign abuse.
Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates.
Anti-fraud technology that stops abuse before it occurs without impacting user experience or conversation rates.