80 resultat
Varför Capterra är gratis
DNS-baserat webbinnehållsfilter för företag som blockerar skadlig kod, utpressningstrojaner och nätfiske samt en avancerad kontroll över webbinnehållet. Lär dig mer om WebTitan
DNS-baserat webbfilter och webbsäkerhetslager för företag och MSP-verksamheter som blockerar skadlig programvara, ransomware och nätfiske samt tillhandahåller kontroll över webbinnehåll. WebTitan filtrerar över 2 miljarder DNS-förfrågningar varje dag, identifierar 300 000 iterationer av skadlig kod om dagen och har över 7 500 kunder. Prova en gratis provperiod av WebTitan idag, inklusive support. Bra månadspris från mindre än 1 USD per användare och månad. Lokalt hyst utan någon latens. Lär dig mer om WebTitan
DNS-baserat webbfilter och webbsäkerhetslager för företag och MSP-verksamheter som blockerar skadlig programvara, ransomware och nätfiske samt tillhandahåller kontroll över webbinnehåll. WebTitan...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Robotskydd i realtid som driftsätts på några minuter (SaaS) och körs på autopilot. Stolt över att skydda över 10 000 globala e-handelsföretag. Lär dig mer om DataDome
DataDome är en ledande leverantör av robotskydd med bas i New York, Paris och Singapore. Olaglig trafik slås ut så att känsliga data förblir säkra och online-plattformar kan prestera med optimal hastighet. Cybersäkerhetslösningen är baserad på AI och maskininlärning för att i realtid upptäcka och blockera de mest avancerade robotattackerna, inklusive automatiserade OWASP. - driftsättning på några minuter på all webbinfrastruktur - oöverträffat snabb och precis robotupptäckt - speciella hotundersölnings- och SOC-team Lär dig mer om DataDome
DataDome är en ledande leverantör av robotskydd med bas i New York, Paris och Singapore. Olaglig trafik slås ut så att känsliga data förblir säkra och online-plattformar kan prestera med optimal...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing. Lär dig mer om Inky
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices. Lär dig mer om Inky
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
An integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats. Lär dig mer om Endpoint Detection and Response
N-able™ Endpoint Detection and Response (EDR), an integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats—and recover quickly when ransomware or other exploits strike. Remediation and rollback help reverse the effects of an attack and restore endpoints to their pre-attack healthy state to minimize customer downtime. Gain full monitoring and management of your endpoint security, all from a single dashboard. Lär dig mer om Endpoint Detection and Response
N-able™ Endpoint Detection and Response (EDR), an integrated feature in N-able RMM, helps MSPs prevent, detect, and respond to ever-changing threats—and recover quickly when ransomware or other...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Enterprise-class threat detection, isolation, and remediation. Lär dig mer om Malwarebytes Endpoint Detection and Response
Enterprise-class threat detection, isolation, and remediation. Lär dig mer om Malwarebytes Endpoint Detection and Response
Enterprise-class threat detection, isolation, and remediation.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Komplett lösning för hotskydd och åtgärdande, centralt hanterad från molnet för organisationer i alla storlekar.
Malwarebytes Endpoint Protection ger ett fullständigt skydd mot skadliga program och åtgärder med exakt hotdetektering, proaktiv hotblockering och åtgärdande som drivs från molnet och är enkel att använda för organisationer i alla storlekar.
Malwarebytes Endpoint Protection ger ett fullständigt skydd mot skadliga program och åtgärder med exakt hotdetektering, proaktiv hotblockering och åtgärdande som drivs från molnet och är enkel att...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Maintain complete endpoint visibility and inventory of all software with Automox's cloud-based platform.
Automox allows you to maintain complete visibility into the endpoints and software used in your organization's day-to-day operations, while also providing the information needed to manage patching, risk mitigation, and endpoint hardening decisions. With Automox, you'll have the ability to see all endpoints and applications from a single console which enables administrators to identify misconfigured systems, missing patches, or compliance issues.
Automox allows you to maintain complete visibility into the endpoints and software used in your organization's day-to-day operations, while also providing the information needed to manage patching,...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe!
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Genom att tillhandahålla SIEM, EDR och en SOC 24/7 får du snabbt och effektivt ett avancerat skydd mot hot och säkerhetsorganisering.
Netsurion gör det möjligt för organisationer att framgångsrikt förutsäga, förebygga, upptäcka och reagera på cybersäkerhetshot. SIEM-plattformen EventTracker förenar maskininlärning, beteendeanalys och säkerhetsorganisering. Säkerhetstjänsten EventTracker SIEMphonic levererar en samförvaltad SIEM-tjänst som drivs av SOC 24/7. EventTracker EDR skyddar också kritiska slutpunkter från nolldagsattacker och muterande skadlig kod.
Netsurion gör det möjligt för organisationer att framgångsrikt förutsäga, förebygga, upptäcka och reagera på cybersäkerhetshot. SIEM-plattformen EventTracker förenar maskininlärning, beteendeanalys...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Apex One is an endpoint detection and response software designed to help businesses investigate threats and protect the system.
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities. Managers can detect the indicators and intent of attackers in real-time and manage threat responses on a unified interface. Apex One allows teams to identify and analyze the impact as we
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Automatiserad närhetsbaserad 2FA-autentisering till datorer och hemsidor. Lösenordsfri inloggning och automatisk låsning av datorer, Mac-datorer och hemsidor.
Beröringsfri, automatiserad närhetsbaserad autentisering av datorer, hemsidor och programvara. Lösenordsfri inloggning och automatisk låsning av datorer med en informationsbärare (token). Autentisera med din närvaro och logga in direkt med lösenordsautofyll. Inga fler spärrade konton. När informationsbäraren flyttas utom räckhåll låser GateKeeper automatiskt datorn. Arbeta förebyggande mot dyra och störande dataintrång. Din lösenordscaddie som ger dig en lösenordsfri upplevelse. Gå aldrig tillbaka till att memorera och skriva in lösenord.
Beröringsfri, automatiserad närhetsbaserad autentisering av datorer, hemsidor och programvara. Lösenordsfri inloggning och automatisk låsning av datorer med en informationsbärare (token). Autentisera...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Qualys Multi-Vector EDR - A new approach to EDR that shortens response times and reduces costs.
Traditional EDR solutions focus only on endpoint activity to detect attacks. Qualys brings a new multi-vector approach and the power of its Cloud Platform to protect the entire attack chain, from attack and breach prevention, to detection and response — all in a single, cloud-based app.
Traditional EDR solutions focus only on endpoint activity to detect attacks. Qualys brings a new multi-vector approach and the power of its Cloud Platform to protect the entire attack chain, from...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), & a 24/7 managed hunting service all delivered via a single lightweight agent. Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics to ensure nothing is missed and to stop breaches.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
GorillaStack helps to automate real-time security remediation, managing backup lifecycles, and optimize cloud bills.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
For on-premises, SaaS, and cloud-native data, Metallic gives you data protection that perfectly matches your hybrid cloud strategy.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade solution to protect their data. Built on Microsoft Azure, Metallic offers coverage across apps, endpoints, on-premise, & cloud environments - proven to safeguard critical business data from deletion, corruption, & attack. Stay secure, stay compliant, stay recoverable with Metallic backup & recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
SOC Prime TDM is a SaaS community delivering threat detection content that can be used across various SIEM formats and EDR solutions.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their SIEM, EDR, NSM and SOAR tools in use. TDM aggregates over 65,000 SIEM & EDR rules, parsers and search queries, and other content mapped directly to the MITRE ATT&CK® framework and compatible with your EDR solution in use, including Microsoft Defender ATP, Carbon Black, CrowdStrike, and Qualys.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Microsoft 365 Defender enables businesses to stop attacks with automated, cross-domain security and built-in AI.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsofts XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed....

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks.
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks.
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, and Threat Hunting.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
All-in-one unified threat management platform that aims to simplify cybersecurity and reduce its cost.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log Management (SIEM), Vulnerability Management, Access Rights Auditor, Incident Response, HIPS/NIPS, Endpoint Protection, and Dark Web Monitoring. You can monitor almost any cloud environment or SaaS application with ready to use Integrations. UTMStack is currently integrated with Azure, AWS, etc.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: Log...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.
Cybersecurity solution that helps businesses detect and investigate threats in real-time to prepare and execute action plans.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
ReaQta-Hive is an Autonomous Detection & Response platform that protects endpoints against threats.
ReaQta is Europe’s top-tiered AI Autonomous Detection & Response platform, built by an elite group of cyber security experts & AI/ML researchers. ReaQta allows organizations to eliminate the most advanced endpoint threats in real-time. Equipped with proprietary NanoOS technology, ReaQta-Hive delivers unprecedented visibility into processes and applications running on endpoints and is tamper-free to malware & attackers. ReaQta was named a 2020 Gartner Cool Vendor in Endpoint Security.
ReaQta is Europe’s top-tiered AI Autonomous Detection & Response platform, built by an elite group of cyber security experts & AI/ML researchers. ReaQta allows organizations to eliminate the most...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
DEFEND is a continuous authentication platform that confirms user identity or alerts security teams to detected in real time.
Plurilock DEFEND is an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real time, as regular work is carried out, without otherwise inconveniencing or interrupting users. DEFEND confirms a user’s identity continuously, every 3-5 seconds, for the duration of open session work with no gaps or uncertainty. Preserve a full-day identity trail with the standard keyboards and pointing devices already used.
Plurilock DEFEND is an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real time, as regular work is carried out, without...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.
An end user support platform to manage and reduce support tickets.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection,...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Frontline.Cloud platform provides organizations with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS).
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as...

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.
Arm your security team with cyber threat intelligence to identify and prioritize threats.

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity
Cortex Data Lake enables AI-based innovations for cybersecurity

Funktioner

  • Anomali / sabotageupptäckter
  • Restaureringshantering
  • Prioritering
  • Vitlistning / svartlistning
  • Kontinuerlig övervakning