72 resultat
Varför Capterra är gratis
Kom igång. Glöm dina lösenord. 1Password kommer ihåg dem alla åt dig. Spara dina lösenord och logga in på webbplatser med ett enda klick.
1Password är en säker, skalbar och lättanvänd lösenordshanterare som världens ledande företag litar på. Genom att använda 1Password blir det enkelt för dina anställda att hålla sig säkra online. När 1Password är en del av deras arbetsflöde blir goda säkerhetsvanor en självklarhet. När alla använder 1Password minskar risken och produktiviteten ökar.
1Password är en säker, skalbar och lättanvänd lösenordshanterare som världens ledande företag litar på. Genom att använda 1Password blir det enkelt för dina anställda att hålla sig säkra online. När ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Fold...
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Keeper är en av de ledande cybersäkerhetsplattformarna för att förhindra lösenordsrelaterade dataintrång och cyberhot.
Keeper är en av de ledande cybersäkerhetsplattformarna för att förhindra lösenordsrelaterade dataintrång och cyberhot. Med Keeper kan ditt företag automatiskt generera starka lösenord, skydda känsliga filer i ett krypterat digitalt valv, säkert dela register med team och sömlöst integrera med SSO, LDAP och 2FA. Lär dig hur du skyddar ditt företag med Keeper nu.
Keeper är en av de ledande cybersäkerhetsplattformarna för att förhindra lösenordsrelaterade dataintrång och cyberhot. Med Keeper kan ditt företag automatiskt generera starka lösenord, skydda känsliga ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear fo...
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that po...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the r...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
DNS-baserat webbinnehållsfilter för företag som blockerar skadlig kod, utpressningstrojaner och nätfiske samt en avancerad kontroll över webbinnehållet.
DNS-baserat webbfilter och webbsäkerhetslager för företag och MSP-verksamheter som blockerar skadlig programvara, ransomware och nätfiske samt tillhandahåller kontroll över webbinnehåll. WebTitan filtrerar över 2 miljarder DNS-förfrågningar varje dag, identifierar 300 000 iterationer av skadlig kod om dagen och har över 7 500 kunder. Prova en gratis provperiod av WebTitan idag, inklusive support. Bra månadspris från mindre än 1 USD per användare och månad. Lokalt hyst utan någon latens.
DNS-baserat webbfilter och webbsäkerhetslager för företag och MSP-verksamheter som blockerar skadlig programvara, ransomware och nätfiske samt tillhandahåller kontroll över webbinnehåll. WebTitan fil...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Multivektorskydd mot virus och skadlig programvara som ger ett fullständigt skydd mot alla dagens sofistikerade skadeprogramshot.
Skydd mot virus och skadlig programvara med flera vektorer som ger ett fullständigt skydd mot alla dagens sofistikerade hot mot skadlig programvara, inklusive trojaner, tangentloggare, nätfiske, spionprogram, bakdörrar, spökprogram, nolldagsattacker och avancerade långvariga hot. Inbyggt identitets- och integritetsskydd förhindrar att data stjäls eller samlas in när du använder internet och den utgående brandväggen stoppar också skadlig kod från att stjäla data. Du behöver inte oroa dig för eller köra uppdateringar, molndriven säkerhet innebär att slutpunkter alltid är uppdaterade.
Skydd mot virus och skadlig programvara med flera vektorer som ger ett fullständigt skydd mot alla dagens sofistikerade hot mot skadlig programvara, inklusive trojaner, tangentloggare, nätfiske, spionp...
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signaturel...
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Industry-leading data protection helps businesses of all sizes through data encryption, compliance, file management and cloud backup.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware failure, and data corruption. Restore data following a ransomware attack without paying ransom and retain business data to meet compliance requirements. Automatic backup, with award winning support makes data protection seamless.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware f...
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Krypterat molnbaserat, integrerat och automatiskt lösenordsskydd för att lagra, hantera och hämta kunders inloggningsuppgifter och kunskap.
En krypterad och effektiv lösning för hantering av lösenord och behörighet som är byggd för MSP. Programvaran erbjuder inloggningsifyllnad, rapportering, granskning, automatisering av lösenordsändringar och dokumentation för kunder med särskilda rättigheter för att effektivisera teknikernas arbete med hjälp av lättillgänglig viktig dokumentation för att standardisera tjänsteleverans och påskynda problemlösning.
En krypterad och effektiv lösning för hantering av lösenord och behörighet som är byggd för MSP. Programvaran erbjuder inloggningsifyllnad, rapportering, granskning, automatisering av lösenordsändringa...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporat...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Identitets- och åtkomsthantering (IAM) och SSO för företag av alla storlekar. Kom igång direkt med en gratis provperiod.
OneLogin är avsett för företag med mer än 100 användare. Det erbjuder en molnbaserad lösning för identitets- och åtkomsthantering (identity and access management, IAM) med enkel inloggning (single sign-on, SSO), vilket gör det enklare för företag att säkra och hantera åtkomst till webbapplikationer, både i molnet och bakom brandväggen. Har ditt företag tre eller fler SaaS-appar eller interna webbappar? I så fall kan du dra nytta av säkerheten hos OneLogins molnbaserade SSO-lösning.
OneLogin är avsett för företag med mer än 100 användare. Det erbjuder en molnbaserad lösning för identitets- och åtkomsthantering (identity and access management, IAM) med enkel inloggning (single sign...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Hong Kong based GZ Systems experimented with a VPN in 2006 and that was the beginning of a revolutionary VPN - PureVPN
Purevpn leads the cybersecurity industry with a self-managed constellation of 300,000+ IPs, 6,500+ servers in 180+ locations, and a 31-day money-back guarantee. PureVPN offers seamless access to content while ensuring users' complete online anonymity.
Purevpn leads the cybersecurity industry with a self-managed constellation of 300,000+ IPs, 6,500+ servers in 180+ locations, and a 31-day money-back guarantee. PureVPN offers seamless access to conten...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network.
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help secur...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Real online privacy. Anywhere.
The most powerful VPN is now simple to use. One subscription protects all your devices. HMA can be used on 5, 10, or unlimited devices simultaneously. Certified No-Log VPN.
The most powerful VPN is now simple to use. One subscription protects all your devices. HMA can be used on 5, 10, or unlimited devices simultaneously. Certified No-Log VPN....
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Simplify complex data center infrastructures by providing services that support all major hardware and software.
Todays employees enjoy the freedom to work from anywhere. Your organizations content is increasingly being accessed and shared outside of the firewall across devices and applications. At the same time, the number of data breaches is on the rise and the consequences to exposed organizations are far-reaching. Symantec offers a broad, comprehensive encryption solution that allows you to protect your information wherever it is, whether at rest or in transit.
Todays employees enjoy the freedom to work from anywhere. Your organizations content is increasingly being accessed and shared outside of the firewall across devices and applications. At the same time...
GlassWire is a modern network monitor & security tool with a built in firewall.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Effectively secures, automates, manages, and protects critical data as well as processes and workflows.
Effectively secure, automate, manage, and protect your most critical data as well as the resulting processes and workflows. Ipswitch MOVEit solutions allow you to manage, provision, and automate all internal and external file and data interactions, create and enforce security policies and file-expiration rules, ensure privacy and confidentiality, schedule workflows and processes and more--all without any manual scripting. Request a Trial Today!
Effectively secure, automate, manage, and protect your most critical data as well as the resulting processes and workflows. Ipswitch MOVEit solutions allow you to manage, provision, and automate all in...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see...
We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compl...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Hushmail is a secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and iPhone app, there's no complicated installation. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance, and our legally binding e-signatures comply with ESIGN and UETA.
Hushmail is a secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Hybrid SIEM-övervakningslösning med händelselogg och realtidslogg, med övervakning av Active Directory, systemhälsa, inventarier och nätverksövervakning.
Hybrid SIEM-lösning som kombinerar loggövervakning i realtid (för händelseloggar) med omfattande övervakning av systemhälsa och nätverk vilket ger användarna en komplett bild av deras servrar och slutpunkter. Korrelationsmotorn för säkerhetsloggsnormalisering som ingår har beskrivande e-postvarningar som ger ytterligare kontext och presenterar kryptiska Windows-säkerhetshändelser i lättförståeliga rapporter som ger mer insikter än vad man kan få från råa händelser. Olika integrationer och multitenans tillgängliga
Hybrid SIEM-lösning som kombinerar loggövervakning i realtid (för händelseloggar) med omfattande övervakning av systemhälsa och nätverk vilket ger användarna en komplett bild av deras servrar och slutp...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Citrix Workspace är en enhetlig, säker och intelligent digital arbetsplats som organiserar och vägleder arbetet och förändrar medarbetarnas upplevelser.
Citrix Workspace är lösningen för den digitala arbetsplats – en enhetlig, säker och intelligent arbetsplattform som organiserar, vägleder och automatiserar den viktigaste informationen som användarna behöver för att fatta snabba beslut och samarbeta med andra. Ett anpassat gränssnitt organiserar viktiga data, uppgifter och verktyg i ett personligt flöde så att användarna kan fokusera på sitt arbete och öka de anställdas produktivitet och engagemang. Glöm att behöva hoppa mellan appar eller sålla igenom irrelevant information och aktiviteter.
Citrix Workspace är lösningen för den digitala arbetsplats – en enhetlig, säker och intelligent arbetsplattform som organiserar, vägleder och automatiserar den viktigaste informationen som användarna b...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers....
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution that includes web vulnerability scanning, vulnerability assessment, and vulnerability management. Its strongest points are scanning precision, unique asset discovery technology, and integration with leading issue management and CI/CD solutions.
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution that includes web vulnerability scanning, vulnerability assessment, and vulnerability management. Its strongest po...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat manageme...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Molnkryptering för över 30 molnleverantörer, inklusive OneDrive, Dropbox och Google Drive med ny Microsoft Teams-integration.
Boxcryptor är en lättanvänd krypteringsprogramvara som är optimerad för molnet. Programvaran möjliggör säker användning av molnlagringstjänster utan att offra komforten. Boxcryptor stöder alla större molnlagringsleverantörer (t.ex. OneDrive, SharePoint, Microsoft Teams, Dropbox och Google Drive) och stöder alla moln som använder WebDAV-standarden. Med Boxcryptor skyddas dina filer från det ögonblick du skickar dem till din molnleverantör.
Boxcryptor är en lättanvänd krypteringsprogramvara som är optimerad för molnet. Programvaran möjliggör säker användning av molnlagringstjänster utan att offra komforten. Boxcryptor stöder alla större m...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Radering, låsning och lokalisering på distans för datorer och mobiltelefoner oavsett operativsystem och maskinvara.
Radera, lås och lokalisera på distans för alla operativsystem. DriveStrike är en lösning för skydd av data och enheter för förlorade, stulna, saknade eller indragna enheter. Programvaran ger dig möjlighet att skydda enheter som du förlorat kontrollen över från att drabbas av dataintrång. Från personliga konton till Fortune 500-organisationer inom sjukvård, juridik, finansiella tjänster, myndigheter, e-handel och underhållning. DriveStrike förhindrar dataintrång för att säkerställa sekretess, efterlevnad och konkurrensmässigt försprång.
Radera, lås och lokalisera på distans för alla operativsystem. DriveStrike är en lösning för skydd av data och enheter för förlorade, stulna, saknade eller indragna enheter. Programvaran ger dig möjlig...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security. You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal. Make IT Easy with RG System!
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same ...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivir...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience...
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing int...
Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business host...
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results.
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe.
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situation...
Give users streamlined access to the applications they use every day, from anywhere.
Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features.
Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps t...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Filsynkronisering och fildelning enligt företagsstandard hjälper ditt team att samarbeta, automatisera och få saker gjorda. Obegränsat antal användare tillåter tillväxt.
Filsynkronisering enligt företagsstandard och delning för alla. Files.com är smart molnlagring för moderna team. Med Files.com kan ditt team samarbeta, automatisera och få saker gjorda utan att kompromissa med säkerheten. Säkerhet och efterlevnad behöver inte vara störande. Files.com är en plattform som dina användare verkligen kommer att älska. Sätt igång och skapa konton för dina kunder, leverantörer, entreprenörer med mera. Files.com är för alla.
Filsynkronisering enligt företagsstandard och delning för alla. Files.com är smart molnlagring för moderna team. Med Files.com kan ditt team samarbeta, automatisera och få saker gjorda utan att kompro...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Avira Antivirus Pro is an award-winning antivirus program that offers comprehensive protection when surfing the Internet.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and make purchases without having to fear external attacks in the form of infected pages and harmful downloads. The program includes a number of features that do not significantly affect the performance of the device.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and ma...
Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript...
Skydda ditt teams molninfrastruktur, databaser och servrar med deras prisvärda dedikerade IP-VPN för team. Prova gratis i 14 dagar.
Passar perfekt för små och medelstora team för att säkra sin molninfrastruktur, databaser och servrar med deras prisvärda dedikerade IP-VPN. Säg adjö till manuell vitlistning. Appar för mobil och dator. Lättanvänd åtkomstkontroll och övervakning. Bra pris. 19 USD/månad per 10 användare och 1 dedikerad VPN-gateway. Prova den 14 dagar långa kostnadsfria versionen – inget kreditkort krävs.
Passar perfekt för små och medelstora team för att säkra sin molninfrastruktur, databaser och servrar med deras prisvärda dedikerade IP-VPN. Säg adjö till manuell vitlistning. Appar för mobil och dator...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It pro...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++...
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors yo...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
EventLog Analyzer är en omfattande logghanteringslösning som erbjuder flera säkerhetsfunktioner på en enhetlig plattform.
EventLog Analyzer är en omfattande lösning för logghantering med hotdetektering och hotanalys i realtid. Den kan korrelera olikartade händelser som inträffar i ditt nätverk och har också en inbyggd hotinformations- och incidenthanteringsplattform. Den erbjuder fördefinierade granskningsrapporter för att hjälpa till att spåra aktiviteter i databaser och på webbservrar, Windows-enheter, nätverksperimeterenheter med mera. Den hjälper också till att uppfylla efterlevnadsbestämmelser som betalkortsindustrins standard för datasäkerhet (Payment Card Industry Data Security Standard, PCI DSS), Sarbanes-Oxley-lagen (Sarbanes–Oxley Act, SOX), lagen om sjukförsäkringsportabilitet och ansvarsskyldighet (Health Insurance Portability and Accountability Act, HIPAA), den federala lagen om hantering av informationssäkerhet (Federal Information Security Management Act, FISMA) och GDPR.
EventLog Analyzer är en omfattande lösning för logghantering med hotdetektering och hotanalys i realtid. Den kan korrelera olikartade händelser som inträffar i ditt nätverk och har också en inbyggd hot...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering
Secure, store and control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data.
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault's main use cases include: - Secrets Management - Identity Brokering - Data Encryption
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault e...
  • Åtkomstkontroller / behörigheter
  • Policyhantering
  • Lösenordshantering
  • Tokenisering
  • File Encryption
  • Disk Encryption
  • Nyckelhantering