Software de seguridad de red

Software de seguridad de red: encuentra el mejor producto para tu empresa utilizando la página Capterra España.

¿Por qué Capterra es gratis?
Aobo Internet Filter for Mac is a stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications. Support multi-computer setup with easy steps. A stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications.

Por Vallum Software

(0 opiniones)
The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data and alerts. Installation of a free universal agent, included as part of the installation, will provide more extensive metrics on CPU, Memory, Disk, Network, processes and services. Vallum Halo is web based is a web based enterprise network monitoring solution.
east-tec InvisibleSecrets 4 hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution & real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer. The complete security suite for all your data/communication needs

Por Data Encryption Systems

(0 opiniones)
Security solution that allows software authors to protect their applications against unpaid use. Security solution that allows software authors to protect their applications against unpaid use.

Por Visual Click Software

(0 opiniones)
Email alerts when users are locked out of Active Directory? Email alerts when folders are 'drag-n-dropped'? Failed logon alerting that can be isolated to the kerberos error? CPTRAX for Windows provides real-time enterprise-wide alerting and auditing for your Windows and Active Directory environments. Areas covered include Windows File Systems (NTFS) including permission changes, Active Directory, Server Authentication and Group Policy. Does not use or rely on Windows Event Logs. Provides real-time enterprise-wide alerting and auditing for your Windows Servers, Workstations and Active Directory environments.

Por Mission2Mars

(0 opiniones)
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.

Por LogPoint

(0 opiniones)
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.

Por BAE Systems

(0 opiniones)
Our CyberReveal platform analyses the behaviour of devices on your network and their connections with the internet to pick out attacks from within legitimate network traffic. Skilled security analysts investigate suspicious activity and raise security incidents when you need to take action. Our Threat Intelligence function monitors key attack groups, ensuring that the latest techniques can be detected. Advanced Threat Detection helps you to stop sophisticated attacks with the potential for serious impact to your business.

Por IWASSA

(0 opiniones)
Single-sign-in for each user and secured service for file sharing. Single-sign-in for each user and secured service for file sharing.

Por Ntrepid

(0 opiniones)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

Por Solana Networks

(0 opiniones)
SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks. SmartFlow distills network traffic & flow data into more than 20 different stat measures. SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks.

Por USEReady

(0 opiniones)
Be self reliant on data with our agile analytics, governance and security solutions. Be self reliant on data with our agile analytics, governance and security solutions.

Por Qrator Labs

(0 opiniones)
Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds. Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds.

Por Lancera

(0 opiniones)
Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness. Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness.

Por Vormetric

(0 opiniones)
Vormetric ayuda a las empresas a moverse con confianza y rapidez y a crear confianza al asegurar la información en descanso a través de todos los canales y ambientes. Sabiendo que sus datos son seguros, los clientes pueden responder más rápido y generar confianza entre usuarios y a través de canales, aplicaciones y entornos. Vormetric ayuda a hacer de la adopción segura de los nuevos entornos de datos una realidad. Vormetric Data Security permite confianza, velocidad y seguridad al cifrar los datos que construyen el negocio.

Por Illumio

(0 opiniones)
Adaptive security tool that enables processes on physical and virtual hosts through prevention of the spread of breaches. Adaptive security tool that enables processes on physical and virtual hosts through prevention of the spread of breaches.

Por VIPole

(0 opiniones)
VIPole is an encrypted communication platform for individuals, teams and companies. It delivers secure messaging, file sharing, calls and video conferencing as well as a whole host of collaboration tools for business, such an organizer, notes, daily planner and a password vault. Everything within the system is fully e2e encrypted in transit and at rest. A set of advanced admin tools enables centralized control and comprehensive user management for complete security. Secure business communications with encrypted messages, calls, video, sharing and collaboration tools, all in one platform.

Por vArmour

(0 opiniones)
vArmour's software-based distributed security system delivers the industry's only integrated micro-segmentation solution with advanced security analytics across networks, applications, and users. vArmour's extensible architecture provides security across private and public clouds, with a single point of policy management. In addition, vArmour provides contextual visibility traffic from Layer 2 to Layer 7, combined with inline security policy controls prevent and quarantine lateral attacks. Software-based distributed security system delivers the industry's only integrated micro-segmentation solution with security analytics.

Por NopSec

(0 opiniones)
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

Por FireLayers

(0 opiniones)
Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application. Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.

Por Kenna Security

(0 opiniones)
Kenna Security integra datos de exploración de vulnerabilidades con analíticas de big data y múltiples fuentes de explotación para predecir el riesgo de abuso de una vulnerabilidad. Calcula los índices de riesgo de tu empresa, de las organizaciones y de los grupos de activos críticos. La orientación de remediación prioriza los parches que son los que tienen la mayor reducción de riesgo. Los resultados procesables se obtienen en pocas horas después de instalados los datos de exploración. Kenna Security utiliza fuentes de inteligencia de vulnerabilidades de seguridad para identificar el uso libre de las vulnerabilidades que puedan poner a tu empresa en riesgo.

Por Onion ID

(0 opiniones)
Solution for IT Infrastructure Security to prevent insider threats. Solution for IT Infrastructure Security to prevent insider threats.
DataDome se especializa en proteger y acelerar los negocios digitales. Gracias a la solución de administración de bots con IA, las empresas pueden mejorar el rendimiento de los sitios web agobiados por el raspado intensivo, proteger los datos de los usuarios de los piratas informáticos y tomar mejores decisiones comerciales y de marketing, gracias a datos analíticos que no están contaminados por el tráfico de bots. Desarrolla y ejecuta tu estrategia de administración de bots mediante el panel de control, informes y alertas en tiempo real. La solución de administración de bots con IA que protege todos tus puntos de vulnerabilidad (sitios web, aplicaciones...) y acelera tu negocio digital.

Por Cossack Labs

(0 opiniones)
We aim to mitigate risks in data security through the development of easy-to-use, cross-platform solutions that are designed to provide a simple means to protect data within corporate infrastructures or stand-alone applications and over both a distributed application setting and in the open Internet. Solution providing data security and offering open-source and commercial instruments for data protection and security in your business.

Por InfiSecure Technologies

(0 opiniones)
InfiSecure Technologies Inc is a cutting-edge Web Application Security company that specializes in protecting WebsitesI from OWASP Top Automated Threats such as web scraping / price scraping, account hijacking, carding fraud, form spam and application-level DDoS attacks. It is designed to give online businesses finely tuned control over bot traffic on their websites. InfiSecure is a robust bot protection platform to detect and block automated attacks on websites in real-time.

Por LogRhythm

(0 opiniones)
Gain real-time visibility into your network to detect threats, perform forensic investigations, support audits, and identify operational issues. LogRhythm NetMon is a highly-functional, intuitive, and cost-effective network monitoring and forensics solution that delivers enterprise-wide network visibility. From automatic application identification to full packet capture and customizable Deep Packet Analytics, NetMon provides the data you need to protect your organization. Get started for free. LogRhythm NetMon provides full and intuitive network visibility critical for threat detection and rapid incident response.

Por PerimeterX

(0 opiniones)
Un nuevo enfoque para la protección de los ataques automatizados precisa y fácil de integrar. Un nuevo enfoque para la protección de los ataques automatizados precisa y fácil de integrar.

Por Terabit Security

(0 opiniones)
Network security tool that provides elimination of DoS/DDoS attacks through 64-bit multivendor compatibility. Network security tool that provides elimination of DoS/DDoS attacks through 64-bit multivendor compatibility.

Por L7 Defense

(0 opiniones)
Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks. Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks.

Por Corax

(0 opiniones)
Software basado en la nube que te ayudará a tomar las decisiones y medidas correctas para prevenir el delito cibernético y la pérdida de datos. Software basado en la nube que te ayudará a tomar las decisiones y medidas correctas para prevenir el delito cibernético y la pérdida de datos.

Por Hypori

(0 opiniones)
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

Por IronCore Labs

(0 opiniones)
An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption. An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption.

Por GENIANS

(0 opiniones)
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution. Re-imagined Network Access Control for the World of IoT

Por RBLTracker

(0 opiniones)
Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media. Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.

Por E8 Security

(0 opiniones)
Machine-learning analytics solution to identify unknown threats already inside the network Machine-learning analytics solution to identify unknown threats already inside the network

Por Parablu

(0 opiniones)
BluKrypt is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt also protects data at rest within the secure storage container it creates within the cloud storage target. Secure Cloud Storage Gateway

Por Sqreen

(0 opiniones)
Sqreen is the industrys first provider of Application Security Management (ASM), unifying application security needs into one single platform, giving over 500 companies unprecedented visibility and protection in production. Sqreen enables developers, operations and security teams to scale their security without impacting engineering velocity. The company was founded by security veterans who previously led the offensive security team at Apple. Sqreen is a monitoring and protection platform made to be incredibly powerful yet very easy to use.

Por Appknox

(0 opiniones)
Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck. Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck.

Por CloudSploit

(0 opiniones)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment.
Corero Network Security is a leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and digital enterprises rely on Corero's award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, with comprehensive visibility, analytics and reporting. This industry leading technology delivers flexible protection that scales to tens of terabits, with a lower cost of ownership than formerly possible. Leader in real-time, high-performance, automatic DDoS detection and mitigation, with comprehensive visibility, analytics and reporting.

Por shareOptic

(0 opiniones)
Security solution that allows you to remain compliant while uncovering data security threats. Security solution that allows you to remain compliant while uncovering data security threats.

Por Pwnie Express

(0 opiniones)
Pulse discovers, inventories and classifies all IT and IoT devices and builds a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes. Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks. Respond directly from from Pulse to neutralize IoT device threats to your systems. Pulse continuously identifies and assesses all devices and IoT systems, and provides the ability to respond to network threats.

Por BluSapphire

(0 opiniones)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

Por Leakwatch

(0 opiniones)
Solution that monitors your data to detect leaks in real time and enable you to take action quickly. Solution that monitors your data to detect leaks in real time and enable you to take action quickly.

Por HaltDos

(0 opiniones)
HaltDos offers comprehensive AI based Web Application Firewall and DDoS Mitigation to protect your Website from the wide range of DDoS attacks, OWASP Top 10, Zero-Day attacks and many more. It ensures high-availability of your website along with in-depth network monitoring and predefined ruleset custom dashboards. HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.

Por Unistal Systems

(0 opiniones)
Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology. Unistal provides best Data Recovery Software that Recovers Lost or Deleted Files From Windows,Mac,Linux,Hard Disk,Pen Drive,etc

Por UpGuard

(0 opiniones)
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. Get complete visibility into the configuration of every server, network device, and cloud app you're running.

Por Abusix

(0 opiniones)
Supervisa y protege tu red contra el abuso utilizando esta solución integral. Supervisa y protege tu red contra el abuso utilizando esta solución integral.
With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your companys sensitive file data and intellectual property. With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment

Por CacheGuard Technologies

(0 opiniones)
An Appliance oriented Operating System dedicated to Web traffic Security and Optimization. CacheGuard embeds a gateway antivirus, a URL filtering facility, a firewall, a traffic shaping facility, an SSL inspection facility, a Web proxy, a reverse proxy, a Web application load balancer, a Web application firewall, a traffic logger and much more. An Appliance oriented Operating System dedicated to Web traffic Security and Optimization.

Por ManageEngine

(0 opiniones)
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Web-based SSH Key and SSL Certificate Management Solution for Enterprises

Por ZEVENET

(0 opiniones)
PODEROSO Y FÁCIL DE USAR. El aparato virtual está destinado a proporcionar escalabilidad masiva, alta disponibilidad y mayor seguridad para tus servicios, aplicaciones y redes. IMPLEMENTACIÓN RÁPIDA; TODO LISTO PARA USAR. No necesita solución de instalación, lo que permite una rápida consolidación de la producción. El formato ligero y portátil de ZVA permite implementarlo en los hipervisores más populares con una amplia capacidad de integración para integrarse fácilmente en tu infraestructura, lo que garantiza una solución rentable. Controlador de entrega de aplicaciones multicapa para aplicaciones, servicios, redes y centros de datos.

Por Marty Soft Conception

(0 opiniones)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Por IMMUNIO

(0 opiniones)
A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time. A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.

Por CloudFish

(0 opiniones)
A network security solution creating the next generation of security infrastructure products for the cloud. A network security solution creating the next generation of security infrastructure products for the cloud.

Por Cyberint

(0 opiniones)
In an age of digital transformation, businesses are exposed to far greater cyber risks and threats. CyberInt's Managed Detection and Response services track your digital channels, responding to advanced cyber threats missed by standard security controls, protecting your brand, digital assets and customers. CyberInt is trusted by the world's top finance, retail and telecommunication organizations. CyberInt provides Managed Detection and Response for the Digital Business.

Por Artica Tech

(0 opiniones)
Una solución poderosa para empresas grandes y multinacionales para registrar el rendimiento de Internet, filtrar solicitudes y administrar informes. Una solución poderosa para empresas grandes y multinacionales para registrar el rendimiento de Internet, filtrar solicitudes y administrar informes.
Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach. Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach.

Por Moonshot Technologies

(0 opiniones)
A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting. A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting.

Por SecureNok

(0 opiniones)
Secure-NOK offers SNOK, an easy-to-use, state-of-the-art tool for monitoring, detection, and early warning of cybersecurity events in industrial control and automation systems. Through our products and services, Secure-NOK enables well-informed security decisions. We provide knowledge and awareness of security risks and their consequences and support our customers with holistic defense strategies and solutions. SNOK from SecureNok is a cybersecurity monitoring system for industrial networks to detect espionage, sabotage, and malware intrusion

Por MePin

(0 opiniones)
MePIN is a mobile app authenticator and a universal authentication service, providing compliance and strong security with exceptional user experience. Use MePIN as a service or on-premise as a white label strong authentication platform. MePIN supports two-factor authentication, passwordless login, digital signatures, biometrics, FIDO & legacy OTPs; choose your authentication methods and policies, or offer them all for the end-users to choose. Integration is easy with unified MePIN Services API. One API delivering compliance, digital signatures, biometrics, payment authorization, multi-factor authentication and more.

Por Sepior

(0 opiniones)
Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys

Por SentryBay

(0 opiniones)
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. On-premise solution that provides real-time protection of user data from malware and phishing attacks

Por Difenso

(0 opiniones)
Difenso is a data security software that helps companies protect sensitive data in cloud and intranet Difenso is a data security software that helps companies protect sensitive data in cloud and intranet

Por PrimeSoft Solutions

(0 opiniones)
A network security solution with access agent, service controller, and secure service gateway functions. A network security solution with access agent, service controller, and secure service gateway functions.
CIGLOO is the next generation browser isolation management platform, It provides organizations with the ability to enforce web isolation and assures that all malicious browsers code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data. CIGLOO is A browser isolation management platform, you can browse on a remote browser so all browsers malicious code will be out.

Por Haystax

(0 opiniones)
Constellation permite a las organizaciones pasar a una postura dinámica y predictiva en cuanto al riesgo, tomar decisiones más rápidas y acelerar la corrección para una protección más efectiva de sus sistemas, datos, instalaciones y personas fundamentales. En lugar de comenzar con un conjunto enorme de datos y luego explotarlos para obtener inteligencia de amenazas utilizable, primero se construyó un sistema para transformar la experiencia humana en modelos que puedan evaluar problemas de seguridad complejos. Plataforma que aplica múltiples técnicas de inteligencia artificial para vigilar amenazas y establecer prioridades de los riesgos para la seguridad.

Por Mithi Software Technologies

(0 opiniones)
ClrStream is the email security, continuity and durability solution for your MS Exchange, Office 365, MDaemon, Postfix, PostMaster, Zimbra & other mail solutions. ClrStream protects your email servers from Spam, Virus, Ransomware and DDOS attacks. It also provides email continuity when the primary mail server is unavailable or down. When bundled with Vaultastic, email data durability is guaranteed at 99.99999999999%. All without any lengthy and costly email service migrations. Protect business system and critical data against malicious intent with ClrStream

Por BlueTalon

(0 opiniones)
Delivers data-centric security across big data environments and eliminates security blind spots. Delivers data-centric security across big data environments and eliminates security blind spots.
Security and network management software that securely manages applications and devices across firewall partitioned networks. Security and network management software that securely manages applications and devices across firewall partitioned networks.

Por Ozon

(0 opiniones)
OZON protege el sitio de comercio electrónico, los datos y las transacciones contra todos los ciberataques, piratas informáticos, estafadores y robots maliciosos de la web. OZON protege el sitio de comercio electrónico, los datos y las transacciones contra todos los ciberataques, piratas informáticos, estafadores y robots maliciosos de la web.

Por GSLB.me

(0 opiniones)
Authoritative, dynamic and geo-DNS, traffic balancing, CDN offload, domain services and DNS firewall. With full DNSSEC support. Authoritative, dynamic and geo-DNS, traffic balancing, CDN offload, domain services and DNS firewall. With full DNSSEC support.

Por AIONCLOUD

(0 opiniones)
AIONCLOUD is a simple way to secure your website. AIONCLOUD is total web security service to safeguard websites from various attacks and improve your business performance. AIONCLOUD detects and blocks malicious activities and protects critical data from the latest threats such as SQL injection, DDos, homepage defacement, information leaks, identity theft and malware. A cloud-based web security service to protect your website that provides Cloud WAF and SITECHECKER.

Por B@mbu cloud

(0 opiniones)
B@mbu cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers B@mbu cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers

Por DATCOM

(0 opiniones)
Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture. Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture.

Por Zartech

(0 opiniones)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Por Privacyware

(0 opiniones)
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Por Ridgeback Network Defense

(0 opiniones)
Ridgeback es una plataforma de software de seguridad empresarial que derrota las invasiones maliciosas de la red en tiempo real. Ridgeback defiende la idea del engaño interactivo. La plataforma de engaño interactivo de Ridgeback influye en el comportamiento del adversario, lo que lleva al adversario a realizar conductas que revelan intenciones maliciosas. Ridgeback crea la apariencia de miles de millones de recursos fantasma inevitables en la red, y cada uno de ellos es una mina que detiene los exploits laterales en tiempo real. Se pone en funcionamiento en diez minutos. Plataforma de software de seguridad empresarial que derrota las invasiones maliciosas de la red en tiempo real.

Por Access Watch Technologies

(0 opiniones)
Access Watch enhances your security layer against costly and malicious robotic traffic. Mitigate attacks and abuse of your website from bad bots and reduce hosting costs by up to 30%. Advanced robot detection delivering precision security, lower hosting costs and increased application performance.

Por IAInnocationLab

(0 opiniones)
Solución de seguridad de red para VPN con Mac OS que admite PPTP y L2 TP desde 10.7 hasta la última versión de Mac. Solución de seguridad de red para VPN con Mac OS que admite PPTP y L2 TP desde 10.7 hasta la última versión de Mac.

Por Invinsec

(0 opiniones)
It doesnt matter what you buy.. Our technology sits on top of your existing systems. We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network This real time view constantly monitors for potential threats, and compliance issues 24/7/365. If we find something nasty we tell you. Our response speed is the fastest in the industry. Its all designed to put you back in control (fast) Helps aggregate all business technology systems into one security dashboard giving a real-time and on-demand view of required network.
Una solución de seguridad de red diseñada para limpiar virus del sistema, ayudar a restaurar el rendimiento de la computadora, entre otros. Una solución de seguridad de red diseñada para limpiar virus del sistema, ayudar a restaurar el rendimiento de la computadora, entre otros.

Por Threatcare

(0 opiniones)
Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations. Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations.

Por Black Bird Cleaner Software

(0 opiniones)
A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more. A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more.

Por Cloudnosys

(0 opiniones)
Cloudnosys platform delivers security, compliance, cost and DevOps automation. Continually scan entire your AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc. Provides DevOps automation such as on/off/snooze, snapshot management and identifies costs savings by improving asset utilization for Azure and AWS. Meet PCI, HIPAA, FISMA, AWS CIS Benchmark compliance quickly. Provides easy guided remediation and audit functions. CloudEye Continuously Secure your cloud services and automate compliance. Continuous Security Scanning and Alert on Vulnerabilities.

Por Flowmon Networks

(0 opiniones)
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics.

Por South River Technologies

(0 opiniones)
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cloud & on-premise tool that helps manage file transfer across servers with multi-layer security, collaboration & automation.

Por G-TAC Software

(0 opiniones)
NTFS permission tool to get effective security of data on system through permissions for files and folders. NTFS permission tool to get effective security of data on system through permissions for files and folders.

Por Sentinel IPS

(0 opiniones)
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure. Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points

Por Comodo Group

(0 opiniones)
Web security tool that enables endpoint malware detection through scanning and cleaning. Web security tool that enables endpoint malware detection through scanning and cleaning.

Por Cato Networks

(0 opiniones)
The Cato Cloud securely connects all business locations, people, and applications. Cato reduces MPLS costs, eliminates distributed appliances, provides secure internet access, and globally extends the WAN to mobile users and cloud datacenters. Cato provides a global SD-WAN with built-in network security, delivered as a cloud service.

Por Fox and Geese

(0 opiniones)
Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Website change monitoring to catch outages, bugs, and monitor overall web app integrity.

Por NCP engineering

(0 opiniones)
NCP develops universally applicable software components enabling end devices to easily and securely connect to the corporate network via public networks in conjunction with a fully automated central remote access VPN management. NCP's Secure Communication Products are made for many different scenarios e.g. mobility, M2M, IIoT and classic VPN scenarios. NCP offers solutions for professional work in a VPN, VPN client/server components, central VPN management and software for IIoT.

Por Outpost24

(0 opiniones)
HIAB is an automated vulnerability management tool that scans & secures internal networks (in relation with employee, consultants,suppliersforexample).The solution edits reports with concrete remediation solutions. It also integrates a web application scanner. HIAB can be deployed as physical or virtual servers. And even if it is a stand-alone scanning tool, it can be implemented with other Outpost24 tools or managed services. The Oupost24's support team is available 24/7. HIAB is an automated vulnerability management solution that scans and secures internal networks (used by employee, suppliers...).
ditno Network Firewall has taken traditional server protection and simplified it. We have enabled every organisation, irrespective of size or complexity to utilize enterprise-grade protection across any server in any environment with minimal effort and no upfront commitment. ditno Network Firewall provides a single pane of glass to visualize and manage all of your servers consistently, significantly reducing requirements for specialist FTE's and high operating costs. Network Firewall that has taken traditional server protection and simplified it.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

Por Cybonet

(0 opiniones)
Single, affordable network security solution providing network visibility, vulnerability management and breach detection. Single, affordable network security solution providing network visibility, vulnerability management and breach detection.

Por MyIP.io

(0 opiniones)
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

Por Buffer Zone

(0 opiniones)
Network security solution that provides endpoint security solutions protecting organizations from ransomware and phishing scams. Network security solution that provides endpoint security solutions protecting organizations from ransomware and phishing scams.