114 resultat
Safetica protects your data against insider threats and helps you to be compliant with regulations. Lär dig mer om Safetica
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance. Safetica is a European software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions. Safetica NXT (cloud-native) Safetica ONE (on-prem) Lär dig mer om Safetica

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Lär dig mer om Jamf Protect
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers. Lär dig mer om Jamf Protect

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Automatiserad närhetsbaserad 2FA-autentisering till datorer och hemsidor. Lösenordsfri inloggning och automatisk låsning av datorer, Mac-datorer och hemsidor. Lär dig mer om GateKeeper Enterprise
Beröringsfri, automatiserad närhetsbaserad autentisering av datorer, hemsidor och programvara. Lösenordsfri inloggning och automatisk låsning av datorer med en informationsbärare (token). Autentisera med din närvaro och logga in direkt med lösenordsautofyll. Inga fler spärrade konton. När informationsbäraren flyttas utom räckhåll låser GateKeeper automatiskt datorn. Arbeta förebyggande mot dyra och störande dataintrång. Din lösenordscaddie som ger dig en lösenordsfri upplevelse. Gå aldrig tillbaka till att memorera och skriva in lösenord. Lär dig mer om GateKeeper Enterprise

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Verktyg för övervakning av nätverksprestanda och diagnostik som gör det möjligt för NetOps att analysera nätverkstrafik och felsöka nätverksproblem. Lär dig mer om Flowmon
Flowmon är ett professionellt verktyg för effektiv nätverksfelsökning, prestandaövervakning, kapacitetsplanering, analys av krypterad trafik och molnövervakning. Istället för bara den röda/gröna infrastrukturstatusen får NetOps-teamen hjälp med att förstå användarupplevelsen samtidigt som mängden databrus och analytiskt arbete minimeras. Flowmon-lösningen är en del av Kemps produktportfölj. Lär dig mer om Flowmon

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
A complete XDR solution complete with timely incident alerts, environment monitoring, and expert input that supports full compliance. Lär dig mer om Heimdal eXtended Detection and Response (XDR)
Heimdal eXtended Detection and Response is a fully compliant XDR solution supported by a live team of experts who are always on top of your cybersecurity needs. A centralized monitoring and incident response hub, it is your one-stop-shop for fast attack or infection alerts, policy validation, environment observation, and appropriately delivered responses to any type of cyber threat. Augment your digital defenses and acquire expert input on any scenario with Heimdal XDR today. Lär dig mer om Heimdal eXtended Detection and Response (XDR)

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. Lär dig mer om Endpoint Detection and Response
N-able Endpoint Detection and Response (EDR) helps MSPs prevent, detect, and respond to ever-changing cyberthreats. Powered by SentinelOne, N-able EDR provides next-generation antivirus with behavioral AI threat detection and one-click remediation and rollback capabilities. As an integrated feature of N-able N-central and N-able RMM, N-able EDR lets you gain full monitoring and management of your endpoint security, all from a single dashboard. Lär dig mer om Endpoint Detection and Response

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
An endpoint detection and response solution that takes threat hunting, prevention, and remediation to the next level. Lär dig mer om Heimdal Endpoint Detection and Response (EDR)
Heimdal Endpoint Detection and Response is a seamless EDR solution that consists of six of our top-of-the-line products working in unison to hunt, prevent, and remediate any cybersecurity incidents that might come your way. The products in question are Heimdal Threat Prevention, Patch & Asset Management, Ransomware Encryption Protection, Next-Gen Antivirus, Privileged Access Management, and Application Control. Lär dig mer om Heimdal Endpoint Detection and Response (EDR)

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-based Endpoint Detection and Response (EDR) with 72-hour ransomware recovery for Windows PCs, Windows servers and Linux servers.
Cloud-based Endpoint Detection and Response (EDR) with 72-hour ransomware recovery for Windows PCs, Windows servers and Linux servers. Rated #1 for ease-of-use to help businesses identify, analyze, and remediate threats on a unified platform. Lär dig mer om Malwarebytes for Business

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Lär dig mer om ESET Endpoint Security

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
DNS-baserat webbinnehållsfilter för företag som blockerar skadlig kod, utpressningstrojaner och nätfiske samt en avancerad kontroll över webbinnehållet.
DNS-baserat webbfilter och webbsäkerhetslager för företag och MSP-verksamheter som blockerar skadlig programvara, ransomware och nätfiske samt tillhandahåller kontroll över webbinnehåll. WebTitan filtrerar över 2 miljarder DNS-förfrågningar varje dag, identifierar 300 000 iterationer av skadlig kod om dagen och har över 7 500 kunder. Prova en gratis provperiod av WebTitan idag, inklusive support. Bra månadspris från mindre än 1 USD per användare och månad. Lokalt hyst utan någon latens. Lär dig mer om WebTitan

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Multivektorskydd mot virus och skadlig programvara som ger ett fullständigt skydd mot alla dagens sofistikerade skadeprogramshot.
Skydd mot virus och skadlig programvara med flera vektorer som ger ett fullständigt skydd mot alla dagens sofistikerade hot mot skadlig programvara, inklusive trojaner, tangentloggare, nätfiske, spionprogram, bakdörrar, spökprogram, nolldagsattacker och avancerade långvariga hot. Inbyggt identitets- och integritetsskydd förhindrar att data stjäls eller samlas in när du använder internet och den utgående brandväggen stoppar också skadlig kod från att stjäla data. Du behöver inte oroa dig för eller köra uppdateringar, molndriven säkerhet innebär att slutpunkter alltid är uppdaterade. Lär dig mer om Webroot Business Endpoint Protection

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. Lär dig mer om JumpCloud Directory Platform

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Lär dig mer om Bitdefender GravityZone

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Lär dig mer om Splunk Enterprise

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Lär dig mer om Connect Secure

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates. Lär dig mer om SUPERAntiSpyware

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Maintain complete endpoint visibility and inventory of all software with Automox's cloud-based platform.
Automox allows you to maintain complete visibility into the endpoints and software used in your organization's day-to-day operations, while also providing the information needed to manage patching, risk mitigation, and endpoint hardening decisions. With Automox, you'll have the ability to see all endpoints and applications from a single console which enables administrators to identify misconfigured systems, missing patches, or compliance issues. Lär dig mer om Automox

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment. Lär dig mer om Guardio

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Microsoft 365 Defender enables businesses to stop attacks with automated, cross-domain security and built-in AI.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsofts XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats. Lär dig mer om Microsoft 365 Defender

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Lär dig mer om ConnectWise SIEM

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security.
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security (AV/NGAV), endpoint detection and response (EDR), endpoint management capabilities, and 5 mobile device management (MDM) licenses to deliver exploit prevention, enhanced reporting, and endpoint management from a centralized SaaS platform. Licensed by number of endpoints. Lär dig mer om Zero Threat Advanced

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe! Lär dig mer om Blackpoint MDR

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Apex One is an endpoint detection and response software designed to help businesses investigate threats and protect the system.
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities. Managers can detect the indicators and intent of attackers in real-time and manage threat responses on a unified interface. Apex One allows teams to identify and analyze the impact as we Lär dig mer om Apex One

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Genom att tillhandahålla SIEM, EDR och en SOC 24/7 får du snabbt och effektivt ett avancerat skydd mot hot och säkerhetsorganisering.
Netsurion gör det möjligt för organisationer att framgångsrikt förutsäga, förebygga, upptäcka och reagera på cybersäkerhetshot. SIEM-plattformen EventTracker förenar maskininlärning, beteendeanalys och säkerhetsorganisering. Säkerhetstjänsten EventTracker SIEMphonic levererar en samförvaltad SIEM-tjänst som drivs av SOC 24/7. EventTracker EDR skyddar också kritiska slutpunkter från nolldagsattacker och muterande skadlig kod. Lär dig mer om Netsurion Managed Threat Protection

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Protect your equipment from digital threats. Complete security for small and medium businesses.
This cybersecurity solution includes: Online identity protection, antivirus and antispyware, antispam, protection against public networks, remote administration, web access control, USB device control, corporate mobile management and more. It allows combining protection from 5 to 25 computers + 5 smartphones + 1 or 2 file servers; all options include the remote administration tool. Lär dig mer om ESET Home Office Security Pack

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Qualys Multi-Vector EDR - A new approach to EDR that shortens response times and reduces costs.
Traditional EDR solutions focus only on endpoint activity to detect attacks. Qualys brings a new multi-vector approach and the power of its Cloud Platform to protect the entire attack chain, from attack and breach prevention, to detection and response — all in a single, cloud-based app. Lär dig mer om Qualys Cloud Platform

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. Lär dig mer om SentinelOne

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), & a 24/7 managed hunting service all delivered via a single lightweight agent. Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics to ensure nothing is missed and to stop breaches. Lär dig mer om Falcon

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Robotskydd i realtid som driftsätts på några minuter (SaaS) och körs på autopilot. Stolt över att skydda över 10 000 globala e-handelsföretag.
DataDome är en ledande leverantör av robotskydd med bas i New York, Paris och Singapore. Olaglig trafik slås ut så att känsliga data förblir säkra och online-plattformar kan prestera med optimal hastighet. Cybersäkerhetslösningen är baserad på AI och maskininlärning för att i realtid upptäcka och blockera de mest avancerade robotattackerna, inklusive automatiserade OWASP. - driftsättning på några minuter på all webbinfrastruktur - oöverträffat snabb och precis robotupptäckt - speciella hotundersölnings- och SOC-team Lär dig mer om DataDome

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. Lär dig mer om KACE

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Huntress’ Process Insights feature provides Managed Endpoint Detection & Response (EDR) capabilities backed by 24/7 threat hunters.
Huntress’ Process Insights feature provides Managed Endpoint Detection & Response (EDR) capabilities supported by 24/7 threat hunters. Process Insights provides additional visibility into endpoint activity and strengthens the EDR functionality within the Huntress Managed Security Platform. By monitoring for malicious processes, Process Insights builds an extensive view of cyber threats as they occur. And when a threat is detected, Threat Operations shares an report to help you take action. Lär dig mer om Huntress

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
The ultimate next-generation antivirus powered by market-leading threat intelligence, forensics, and firewall integration.
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis, process and behavior-based examination, and real-time cloud inspection. It is the detection-oriented counterpart to our threat prevention offering, Heimdal Threat Prevention. Besides its EDR features, Heimdal NGAV comes with complete firewall integration, which will further secure your workstations. Lär dig mer om Heimdal Next-Gen Endpoint Antivirus

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Lär dig mer om Emsisoft Anti-Malware

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more. Lär dig mer om Cisco Secure Endpoint

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Lär dig mer om Jazz Platform

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility and proven security.
Protect, secure, recover. From the minds of Commvault—ten times a leader in the Gartner Magic Quadrant—Metallic is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and any other threat out there. No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology. Lär dig mer om Metallic SaaS Backup & Recovery

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
INKY drivs av datorseende och maskininlärning, vilket gör det till en effektiv lösning i kampen mot nätfiske.
INKY drivs av unik datorseende, artificiell intelligens och maskininlärning, vilket gör det till en effektiv lösning i kampen mot nätfiske. INKY använder avancerade detekteringstekniker och en unik bannerteknik för att identifiera och blockera sofistikerade nätfiskemeddelanden som äldre e-postsystem inte kan upptäcka. INKY fungerar med Microsoft O365, Exchange och Google Workspace och på alla mobila enheter. Lär dig mer om Inky

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
GorillaStack helps to automate real-time security remediation, managing backup lifecycles, and optimize cloud bills.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably. Lär dig mer om GorillaStack

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Lär dig mer om Symantec Endpoint Detection and Response

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
BeyondDLP Enables A Safe Data Experience A unique & Proactive Data Loss & Leakage Prevention solution to protect your data - anywhere.
ITsMine provides safety and protection to your shared and distributed work environment, along with regulatory compliance. ITsMine’s technology overcomes the major challenges and complexities of current data security solutions by automatically constructing “Safe Zones." ITsMine is agentless, API-based, and can be deployed in approximately 30 minutes. Proactively protecting against internal and external threats; while covering data at rest, in motion, and in use. Inside and beyond the company. Lär dig mer om Beyond DLP

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment. Lär dig mer om Axonius

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks.
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This includes both fileless and file-based strains for complete, round-the-clock safety. It can detect any encryption attempt, even those that have no signatures or behavioral patterns. Our solution was built to be universally compatible with any antivirus, be it Heimdal’s own NGAV or something else. Lär dig mer om Heimdal Ransomware Encryption Protection

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Protect your equipment from digital threats. Complete security for small and medium businesses.
ESET provides modern Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass. Lär dig mer om ESET PROTECT

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cynet AutoXDR is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet AutoXDR is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Lär dig mer om Cynet 360

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today. Lär dig mer om Cybereason

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact. Lär dig mer om Arctic Wolf SOC-as-a-Service

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks.
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks. Lär dig mer om FortiEDR

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
SOC Prime TDM is a SaaS community delivering threat detection content that can be used across various SIEM formats and EDR solutions.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their SIEM, EDR, NSM and SOAR tools in use. TDM aggregates over 65,000 SIEM & EDR rules, parsers and search queries, and other content mapped directly to the MITRE ATT&CK® framework and compatible with your EDR solution in use, including Microsoft Defender ATP, Carbon Black, CrowdStrike, and Qualys. Lär dig mer om Threat Detection Marketplace

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc. Lär dig mer om NACVIEW

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. Lär dig mer om InsightIDR

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning