Software para ciberseguridad

Utiliza la página Capterra de España para encontrar el mejor Software para ciberseguridad para tu empresa.

¿Por qué Capterra es gratis?
Agiliza la agregación y la correlación de los datos de activos, amenazas, vulnerabilidades y solicitudes de atención al cliente. Obtén una mejor visibilidad de la postura de tu organización ante el riesgo con algoritmos avanzados de calificación de riesgo que proporcionan un contexto empresarial más allá de las puntuaciones de CVSS, como la importancia de los activos. Ayuda a tu equipo de TI a priorizar las vulnerabilidades correctas y comunicar de manera efectiva el progreso a todas las partes interesadas. Amplía fácilmente estos procesos a millones de activos y decenas de millones de vulnerabilidades cibernéticas. Descubre más sobre IT Risk & Compliance Obtén una mayor inteligencia de riesgo al priorizar tus vulnerabilidades cibernéticas en función de la importancia para el negocio, a fin de lograr una corrección más eficiente. Descubre más sobre IT Risk & Compliance

Por Acunetix

(28 reseñas)
Acunetix lidera el mercado en cuanto a la tecnología de pruebas automáticas de seguridad web y que analiza y audita sitios web complejos, autenticados, HTML5 y con mucho JavaScript, entre otros. Utilizado por muchos sectores gubernamentales, militares, educativos, de telecomunicaciones, banca, finanzas y comercio electrónico, incluyendo muchas empresas de Fortune 500, Acunetix ofrece una entrada rentable en el mercado de análisis web con una solución simple, escalable y de disponibilidad, sin comprometer la calidad. Descubre más sobre Acunetix Una solución de administración de vulnerabilidades que analiza tu sitio web, detecta vulnerabilidades como XSS o SQL Injection y ofrece soluciones. Descubre más sobre Acunetix
Netsparker Security Scanner es una solución precisa que identifica automáticamente XSS, Inyección de SQL y otras vulnerabilidades en aplicaciones web. La tecnología de análisis basada en pruebas única de Netsparker te permite dedicar más tiempo a corregir las fallas informadas explotando automáticamente las vulnerabilidades identificadas de forma segura y de solo lectura, y también presenta una prueba de explotación. Por lo tanto, puedes ver de inmediato el impacto de la vulnerabilidad y no tienes que verificarla manualmente. Descubre más sobre Netsparker Security Scanner Solución precisa que identifica automáticamente XSS, inyección de SQL y otras vulnerabilidades en aplicaciones web. Descubre más sobre Netsparker Security Scanner
Elimina todo tipo de amenazas, incluidos virus, malware, ransomware, rootkits, gusanos y spyware con escaneo opcional con tecnología de la nube para brindar un rendimiento y detección aún mejores. ESET utiliza tecnologías de varias capas que van mucho más allá de las capacidades de un antivirus básico. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security
SolarWinds Threat Monitor: Service Provider Edition es una plataforma rápida, escalable y basada en la nube creada para habilitar a los proveedores de gestión de servicios (MSP) una herramienta unificada para supervisar las redes administradas en busca de amenazas, analizar los registros frente a las amenazas más recientes y actualizada información de inteligencia de todo el mundo. Soluciona las amenazas de tus clientes rápidamente y prepara la información necesaria para demostrar tu cumplimiento con los estándares establecidos por los órganos reguladores. Descubre más sobre SolarWinds Threat Monitor SolarWinds® Threat Monitor es la herramienta que necesitas para detectar, remediar e informar sobre eventos de seguridad para todas las redes que administras. Descubre más sobre SolarWinds Threat Monitor

Por CyberGRX

(1 reseña)
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Descubre más sobre CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Descubre más sobre CyberGRX

Por Indeni

(12 reseñas)
Indeni es la plataforma de automatización de fuentes múltiples para infraestructura de red y seguridad. Con Indeni Crowd e Indeni Insight, las organizaciones obtienen acceso al repositorio en vivo de scripts de automatización a través del mantenimiento, la alta disponibilidad, la visibilidad de la red, la seguridad, el cumplimiento y las mejores prácticas de los proveedores. Enseña a tu equipo los procesos de desarrollo conjunto junto con la comunidad más grande de profesionales de TI certificados y reduce el costo total de propiedad con pasos prescriptivos para resolver problemas. Descubre más sobre Indeni Indeni ayuda a los profesionales de TI a detectar problemas de red antes de que se conviertan en problemas importantes mediante el uso de tecnología de análisis predictivo. Descubre más sobre Indeni
Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy, incluidos troyanos, registradores de pulsaciones de teclas (keyloggers), suplantación de identidad (phishing), spyware, puertas traseras (backdoors), rootkits, día cero y amenazas persistentes avanzadas. El estudio de identidad y privacidad incorporado detiene el robo o la captura de datos cuando se usa Internet y el firewall de salida también detiene el robo de datos mediante malware. No es necesario preocuparse ni ejecutar actualizaciones. La seguridad impulsada por la nube significa que los puntos finales siempre están actualizados. Descubre más sobre Webroot SecureAnywhere Endpoint Protection Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy en día. Descubre más sobre Webroot SecureAnywhere Endpoint Protection
TokenEx es una plataforma de tokenización de clase empresarial que ofrece una flexibilidad virtualmente ilimitada sobre cómo los clientes pueden acceder, almacenar y proteger datos. Trabaja con múltiples canales de aceptación de datos mientras mantiene un enfoque independiente de procesador, lo que significa que es posible tokenizar y proteger casi cualquier tipo de datos, incluidos PCI, PII, PHI e incluso formatos de datos no estructurados, y se integra con casi cualquier procesador o punto final. Descubre más sobre Cloud-Based Tokenization Plataforma de seguridad de datos basada en la nube que ofrece tokenización y guardado en bóveda segura de datos en la nube para todos los tipos de datos confidenciales. Descubre más sobre Cloud-Based Tokenization
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Descubre más sobre Alert Logic Cybersecurity Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Descubre más sobre Alert Logic Cybersecurity

Por Safer Social

(5 reseñas)
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. Descubre más sobre Perimeter 81 A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes. Descubre más sobre Perimeter 81
Netwrix Auditor es una plataforma de visibilidad para el análisis del comportamiento del usuario y la mitigación de riesgos que permite el control de cambios, configuraciones y acceso en entornos de TI híbridos para proteger los datos independientemente de tu ubicación. La plataforma proporciona inteligencia de seguridad para identificar agujeros de seguridad, identificar y clasificar datos confidenciales, detectar anomalías en el comportamiento del usuario e investigar incidentes a tiempo para evitar daños reales. Descubre más sobre Netwrix Auditor Ten el control sobre lo que está sucediendo en tu entorno de TI en la nube híbrida para proteger los datos independientemente de tu ubicación. Descubre más sobre Netwrix Auditor
Axonius is the only cybersecurity asset management platform that provides actionable visibility and automated policy enforcement for all assets, devices, and users. Seamlessly integrated with 100+ management and security solutions and covering more than one million endpoints for companies like AppsFlyer, Natera, and The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Descubre más sobre Axonius Cybersecurity Asset Management Platform Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users. Descubre más sobre Axonius Cybersecurity Asset Management Platform

Por ManageEngine

(4 reseñas)
Log360, una solución integrada que combina ADAudit Plus y EventLog Analyzer en una sola consola, es la solución integral para toda la gestión de registros y desafíos de seguridad en la red. Ofrece funciones de recopilación de registros, análisis, correlaciones y archivado en tiempo real que ayudan a proteger datos confidenciales, frustran las amenazas de seguridad interna, y combaten ataques externos. Para ayudar a cumplir con las demandas de seguridad, auditoría y cumplimiento más necesarias, viene preempacado con más de 1200 informes predefinidos y criterios de alerta. Descubre más sobre Log360 Log360, una solución integral de SIEM que ayuda a defender los ataques de seguridad internos y externos con función de gestión de registros. Descubre más sobre Log360

Por TitanHQ

(186 reseñas)
Filtro de contenido web basado en DNS que bloquea el malware, el ransomware y los intentos de phishing, además de proporcionar control de contenido web. Se filtran más de quinientos millones de solicitudes DNS al día, se identifican 60 000 iteraciones de malware por día y el software cuenta con más de 7500 clientes. Versiones en la nube y puerta de enlace disponibles. Mejora tu ciberseguridad ahora. Obtén una prueba gratis de WebTitan hoy, con asistencia incluida. Descubre más sobre WebTitan Filtro de contenido web basado en DNS que bloquea malware, ransomware e intentos de phishing, así como también proporciona control de contenido web. Descubre más sobre WebTitan

Por Cryptosense

(1 reseña)
Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e infraestructura. Descubre más sobre Cryptosense Cryptosense proporciona software para detectar y eliminar las vulnerabilidades causadas por el mal uso de la criptografía en aplicaciones e infraestructuras. Descubre más sobre Cryptosense
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. Descubre más sobre HTTPCS Cyber Vigilance The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you. Descubre más sobre HTTPCS Cyber Vigilance

Por MetaCompliance

(4 reseñas)
El producto MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos. El software contiene una biblioteca de experiencias de aprendizaje inteligentes, como infografías, avisos y videos de formación. A diferencia de otras soluciones de phishing, el software permite al usuario confirmar o comunicarse con el administrador. Descubre más sobre MetaPhish MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos. Descubre más sobre MetaPhish
RIPS es la única solución de análisis de código dedicada a los lenguajes Java y PHP. Detecta las vulnerabilidades de seguridad más complejas y profundamente anidadas dentro del código Java y PHP que ninguna otra herramienta puede encontrar. Es compatible con todos los principales marcos de Java y PHP, integración con SDLC, normas pertinentes del sector y puede ser implementado como un software autoalojado o utilizado como un servicio en la nube. Con su alta precisión y muy pocos casos de falsos positivos de ruido, RIPS es la opción ideal para analizar tu código. Descubre más sobre RIPS Static Code Analysis Detecta automáticamente problemas de seguridad reales en aplicaciones Java y PHP sin falsos positivos de ruido para optimizar la eficiencia del equipo. Descubre más sobre RIPS Static Code Analysis

Por Teramind

(52 reseñas)
Teramind proporciona un enfoque de seguridad centrado en el usuario para supervisar el comportamiento del PC del empleado. Este software agiliza la recolección de datos de los empleados para identificar actividades sospechosas, detectar posibles amenazas, supervisar la eficiencia de los empleados y garantizar el cumplimiento con el sector. Ayuda a reducir los incidentes de seguridad al proporcionar acceso en tiempo real a las actividades de los usuarios mediante alertas, advertencias, redirecciones y bloqueos de usuarios, para hacer que tu negocio funcione de la manera más eficiente y segura posible. Descubre más sobre Teramind Realiza la prueba gratis para ver de qué hablan todos los rumores. La supervisión de la actividad del usuario y la prevención del robo de datos se vuelven mucho más fáciles con Teramind. Descubre más sobre Teramind

Por Secomba

(11 reseñas)
Boxcryptor es un software de cifrado, flexible y escalable para la nube, que admite a más de 30 proveedores, así como cifrado NAS en todas las plataformas. Ofrece funciones de colaboración, auditoría y administración que permiten realizar una colaboración segura en los archivos a la vez que cumplen con las regulaciones de privacidad. Define políticas personalizadas, administra usuarios con inicio de sesión único o Active Directory y protege tus cuentas con autenticación en dos pasos (2FA). Elige seguridad desarrollada en Alemania para trabajar de forma segura y eficiente en la nube. Descubre más sobre Boxcryptor Solución de cifrado multiplataforma para la nube y sistemas NAS que admite más de 30 proveedores de la nube (como Dropbox y OneDrive). Descubre más sobre Boxcryptor

Por SolarWinds Security Management

(8 reseñas)
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Descubre más sobre Log & Event Manager Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance. Descubre más sobre Log & Event Manager

Por ComplyAssistant

(5 reseñas)
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Descubre más sobre ComplyAssistant ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. Descubre más sobre ComplyAssistant
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Descubre más sobre Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Descubre más sobre Horangi Web Security Services

Por DriveStrike

(1 reseña)
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Descubre más sobre DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Descubre más sobre DriveStrike
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Descubre más sobre Agari Secure Email Cloud Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO. Descubre más sobre Agari Secure Email Cloud

Por Okta

(267 reseñas)
Okta es el proveedor líder de identidad para la empresa. Okta Identity Cloud conecta y protege a los empleados de muchas de las empresas más grandes del mundo. También conecta de forma segura a las empresas con tus socios, proveedores y clientes. Con integraciones profundas a más de 5000 aplicaciones, Okta Identity Cloud permite el acceso simple y seguro desde cualquier dispositivo. Miles de clientes, incluidos Experian, 20th Century Fox, LinkedIn y Adobe confían en que Okta trabajará más rápido, aumentará los ingresos y se mantendrá seguro. Okta es la base para conexiones seguras entre personas y tecnología. Usa la nube para acceder a las aplicaciones en cualquier dispositivo en cualquier momento.

Por DNSFilter

(59 reseñas)
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.

Por Incapsula

(46 reseñas)
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.

Por ESM Software Group

(30 reseñas)
ESM+Strategy ayuda a las organizaciones a diseñar, hacer el seguimiento de su plan estratégico y adaptarlo. Con puntuaciones equilibradas automatizadas, mapas estratégicos, cuadros de mando e informes instantáneos, ESM da vida a la estrategia. En el comienzo, verás un tutorial para ingresar los principales objetivos, medidas e iniciativas de la estrategia. Una vez que la arquitectura estratégica está implementada, las organizaciones utilizan ESM para recopilar actualizaciones sobre el avance de forma centralizada, eliminando la necesidad de confeccionar agotadoras hojas de cálculo y diapositivas. Haz un seguimiento del avance de tu plan estratégico con puntuaciones equilibradas, mapas estratégicos, cuadros de mandos y exportaciones generadas al instante.
Centrify Application Services improves end-user productivity, securing every users access to cloud & on-premises applications. How? Single Sign-On with Adaptive MFA for access to your cloud, mobile & on-premises apps. Workflow & Lifecycle Management routes app requests & provisions users across all apps, from a central control point. Our App Gateway secures granular access to infrastructure assets regardless of location & without the hassles of a VPN. Mobility Management (EMM) is included. Improve end-user productivity, securing every users access to cloud & on-premises applications.

Por Barkly

(26 reseñas)
Barkly sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Barkly bloquea los ataques a través de todos los vectores e intentos, incluso vulnerabilidades, secuencias de comandos, ejecutables y ransomware. La arquitectura de 3 niveles patentada de Barkly permite una visibilidad inigualable en todos los niveles del sistema, incluida la CPU, para bloquear los ataques. Barkly es increíblemente fácil de administrar e implementar: no se requieren conocimientos de políticas, configuración o seguridad. Barkly Endpoint Protection sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple.

Por CoNetrix

(20 reseñas)
Tandem Security & Compliance Software by CoNetrix is an innovative suite of information security and compliance management tools used by more than 1400 U.S. financial institutions. Modules include: Risk Assessment, Policies, Business Continuity Planning, Vendor Management, Social Media Management, Audit Management, Phishing, Cybersecurity, and more. Software features include secure document storage, unlimited users, roles & responsibilities, tasks, email reminders, and incredible support. Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

Por Astra Security

(20 reseñas)
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.

Por Synametrics Technologies

(16 reseñas)
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.

Por Apptega

(14 reseñas)
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.

Por SiteLock

(13 reseñas)
SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios. La empresa ofrece soluciones de seguridad avanzadas basadas en la nube para organizaciones de todos los tamaños. Los productos de SiteLock incluyen escaneo diario con eliminación automática de malware, un firewall de aplicaciones web administradas con un CDN global para un sitio web extremadamente rápido, protección DDoS avanzada y personal de asistencia telefónica en Estados Unidos sin igual, en horario ininterrumpido. SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.

Por Cobweb Security

(10 reseñas)
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection

Por Snyk

(7 reseñas)
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.

Por 4Securitas

(7 reseñas)
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.

Por JumpCloud

(6 reseñas)
JumpCloud Directory-as-a-Service es reimaginado para Active Directory y LDAP. JumpCloud gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes. JumpCloud gestiona los usuarios y sus sistemas, ya sea Mac, Linux o Windows, y proporciona acceso a la nube y a recursos locales, como Office 365, G Suite, AWS, Salesforce y Jira. El mismo inicio de sesión conecta a los usuarios a las redes y archivos compartidos a través de RADIUS y Samba, respectivamente, asegurando el WiFi de tus organizaciones. JumpCloud Directory-as-a-Service gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes.

Por SecurityStudio

(6 reseñas)
Backed by more than 100 years of combined information security expertise, VENDEFENSE was custom built and designed specifically for organizations that use third-party vendors. This vendor risk management tool eases the burden on program managers who are tasked with evaluating and managing vendors. Vendor Risk Management software that simplifies managing your VRM program. Simplify. Standardize. Defend.

Por F-Secure

(5 reseñas)
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Por NxtSoft

(5 reseñas)
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

Por DigitalBulls

(5 reseñas)
VirusVanish is a US based third party independent virus protection software. The company has its branches in U.S.A. and U.K. VirusVanish is a US based third party independent virus protection software. The company has its branches in U.S.A. and U.K.

Por Tines

(5 reseñas)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.

Por Ekran System

(4 reseñas)
Ekran Systems is an advanced insider threat detection solution for companies of any size, can record all terminal, remote, local user sessions and alert security personnel to suspicious events. Ekran offers more than just session review tools and increased internal visibility. Enhanced multi-layer search indexes, flexible alerts, reports, access management and incident response tools - we are ready to assist in your investigations, audits, continuous monitoring, and regulation compliance. Ekran Systems® is universal software that can help you monitor employees, control subcontractors, PAM and handle compliance tasks.

Por Heimdal Security

(4 reseñas)
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Por Check Point Software Technologies

(4 reseñas)
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks. CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Por Darktrace

(4 reseñas)
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Por FireMon

(3 reseñas)
La plataforma FireMon administra dispositivos a través de una organización para reducir la complejidad, aumentar el cumplimiento y mejorar la seguridad de la red. La plataforma FireMon administra dispositivos a través de una organización para reducir la complejidad, aumentar el cumplimiento y mejorar la seguridad de la red.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Por CrowdStrike

(3 reseñas)
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Por Cybereason

(3 reseñas)
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.

Por KeepSolid

(3 reseñas)
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks

Por Pulsedive

(3 reseñas)
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

Por PortSwigger

(3 reseñas)
BurpSuite is web security software for web security professionals for testing web applications. Burp Suite is web security software for web security professionals for testing web applications.

Por Enginsight

(3 reseñas)
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.

Por Jscrambler

(2 reseñas)
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.

Por Proofpoint

(2 reseñas)
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Por FireEye

(2 reseñas)
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows. Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Security management and operations platform with detection, analytics, and response capabilities. Security management and operations platform with detection, analytics, and response capabilities.

Por Secure Digital Solutions

(2 reseñas)
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.

Por CYBEATS

(2 reseñas)
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Por Redsift

(2 reseñas)
OnDMARC es un producto Red Sift. Red Sift es una plataforma de nube abierta que hace que la ciberseguridad sea accesible para todos para prevenir ataques cibernéticos. OnDMARC facilita la implementación y el mantenimiento de una política segura de DMARC. OnDMARC no solo procesa informes XML complejos, sino que utiliza la última tecnología para guiarte hacia la protección total. OnDMARC es un producto de seguridad del correo electrónico que ayuda a las organizaciones de todos los tamaños a implementar DMARC con confianza.
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.

Por Swascan

(2 reseñas)
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.

Por TraceSecurity

(1 reseña)
Proporciona un proceso de seguridad continuo, no solo un punto en el tiempo. Permite a las organizaciones supervisar y desarrollar políticas. Proporciona un proceso de seguridad continuo, no solo un punto en el tiempo. Permite a las organizaciones supervisar y desarrollar políticas.

Por RedSeal

(1 reseña)
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Por Power Admin

(1 reseña)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.

Por TulipControls

(1 reseña)
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
1 Tbps + DDoS Protection que funciona con cualquier aplicación. Se utiliza con frecuencia para proteger juegos en línea, DNS, servicios TCP, sitios web HTTPS/HTTP 1 Tbps + DDoS Protection que funciona con cualquier aplicación. Se utiliza con frecuencia para proteger juegos en línea, DNS, servicios TCP, sitios web HTTPS/HTTP

Por Argent Software

(1 reseña)
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

Por Twistlock

(1 reseña)
Twistlock es el proveedor líder de soluciones de seguridad cibernética nativa en contenedores y en la nube para la empresa moderna. Desde una administración de vulnerabilidades precisa y procesable hasta firewalls y protección de tiempo de ejecución implementados automáticamente, Twistlock protege las aplicaciones en todo el ciclo de vida de desarrollo y en la producción. Diseñado para contenedores, sin servidor y otras tecnologías líderes: Twistlock brinda a los desarrolladores la velocidad que desean y a los CISO el control que necesitan. Twistlock es la plataforma líder de ciberseguridad nativa en la nube para la empresa moderna.

Por CyberSaint Security

(1 reseña)
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Cloud-based risk management platform that helps firms manage compliance, IT, vendors, audits and documentation.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Por Pcysys

(1 reseña)
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button

Por Cequence Security

(1 reseña)
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

Por Zeguro

(1 reseña)
Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks. Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening

Por Thales SIX GTS

(1 reseña)
Based on robust technologies and on the Thales savoir-faire, the Citadel Team service can support millions of users and already offers a Chatbot technology to safely integrates business applications. The application guarantees a high level of security and is in the process of elementary qualification by the ANSSI (The French National Cubersecurity Agency). Today, the Citadel community represents tens of thousands members among more than 50 companies and organizations. Citadel Team is an instant and trustworthy communication service, developped, hosted and operated by the french Group, Thales.

Por Entrust Datacard

(1 reseña)
Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.

Por Hivecode

(1 reseña)
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

Por PKWARE

(0 reseñas)
Proporciona cifrado y protección de datos práctica y confiable que es fácil de implementar, mantener y usar. Proporciona cifrado y protección de datos práctica y confiable que es fácil de implementar, mantener y usar.

Por TransUnion

(0 reseñas)
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.

Por Praetorian

(0 reseñas)
Como colectivo de ingenieros y desarrolladores altamente técnicos que ofrecen una experiencia de seguridad profunda, Praetorian resuelve los desafíos más difíciles que enfrentan las organizaciones líderes de la actualidad en un ambiente de amenazas digitales en constante evolución. Estas soluciones permiten que los clientes encuentren, solucionen, detengan y, en última instancia, resuelvan problemas de ciberseguridad en toda tu empresa y carteras de productos. Estas soluciones permiten que los clientes encuentren, solucionen, detengan y resuelvan problemas de ciberseguridad en tu empresa y carteras de productos.
DataDome se especializa en proteger y acelerar los negocios digitales. Gracias a la solución de administración de bots con IA, las empresas pueden mejorar el rendimiento de los sitios web agobiados por el raspado intensivo, proteger los datos de los usuarios de los piratas informáticos y tomar mejores decisiones comerciales y de marketing, gracias a datos analíticos que no están contaminados por el tráfico de bots. Desarrolla y ejecuta tu estrategia de administración de bots mediante el panel de control, informes y alertas en tiempo real. La solución de administración de bots con IA que protege todos tus puntos de vulnerabilidad (sitios web, aplicaciones...) y acelera tu negocio digital.

Por Crypho

(0 reseñas)
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.

Por BluSapphire

(0 reseñas)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

Por Marty Soft Conception

(0 reseñas)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

Por Zartech

(0 reseñas)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Por Twizo

(0 reseñas)
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

Por Akamai Technologies

(0 reseñas)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

Por FourV Systems

(0 reseñas)
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Por Fidelis Cybersecurity

(0 reseñas)
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.

Por DataResolve Technologies

(0 reseñas)
Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information. Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Por Techefix

(0 reseñas)
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

Por Flowmon Networks

(0 reseñas)
Whenever new security or operational issues arise, Flowmon gives back control to IT professionals. Leveraging its powerful network behavior analytics, IT professionals can take decisive actions, deal with cyber threats and manage networks with confidence. Flowmon gives back control to IT professionals. Deal with cyber threats with its powerful network behavior analytics.

Por NetLib Security

(0 reseñas)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

Por Ericom Software

(0 reseñas)
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security. Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.

Por Apility.io

(0 reseñas)
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

Por APMG International

(0 reseñas)
CDCAT provides a comprehensive cyber security strategy and capability improvement service. CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

Por inWebo

(0 reseñas)
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

Por TekMonks

(0 reseñas)
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

Por Syneidis

(0 reseñas)
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.

Por BioCatch

(0 reseñas)
Desarrolla perfiles biométricos de comportamiento de usuarios en línea para reconocer una amplia gama de amenazas de ciberseguridad humanas y no humanas. Desarrolla perfiles biométricos de comportamiento de usuarios en línea para reconocer una amplia gama de amenazas de ciberseguridad humanas y no humanas.

Por Uplevel

(0 reseñas)
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

Por Perception Point

(0 reseñas)
Perception Point ayuda a detener los ataques por correo electrónico en la etapa más temprana posible con una protección más precisa. Perception Point ayuda a detener los ataques por correo electrónico en la etapa más temprana posible con una protección más precisa.

Por EclecticIQ

(0 reseñas)
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

Por Cryptomage

(0 reseñas)
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores. Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores.

Por Kaymera Technologies

(0 reseñas)
Cybersecurity solution providing protection on any device and maintain effective cyber defense. Cybersecurity solution providing protection on any device and maintain effective cyber defense.

Por VigiTrust

(0 reseñas)
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.
Network security platform that assists users with data protection, dark web monitoring, anti-malware and mobile device security. Network security platform that assists users with data protection, dark web monitoring, anti-malware and mobile device security.

Por Kobil Systems

(0 reseñas)
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

Por Nexus Guard

(0 reseñas)
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

Por Outpost24

(0 reseñas)
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

Por Giegerich & Partner

(0 reseñas)
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.
CRYPTOSMART is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises The ultimate solution to secure mobile communications and devices

Por CybelAngel

(0 reseñas)
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

Por Cognicase Management Consulting

(0 reseñas)
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

Por MyIP.io

(0 reseñas)
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

Por XM Cyber

(0 reseñas)
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

Por Threat X

(0 reseñas)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

Por Interset Software

(0 reseñas)
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

Por Secure Channels

(0 reseñas)
All-in-one data encryption solution that supports all your data protection needs. All-in-one data encryption solution that supports all your data protection needs.

Por SixGill

(0 reseñas)
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

Por Argus Cyber Security

(0 reseñas)
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

Por Infocyte

(0 reseñas)
Infocyte helps you proactively fight back against sophisticated cyber threats. Our award-winning threat detection and incident response platform, Infocyte HUNT, helps security teams detect, isolate, and respond to advanced cyber threats10x faster. What is proactive cyber security? Rather than waiting for alerts to appear and incidents to occur, Infocyte HUNT automatically and continuously scans your environment to proactively identify attackers capable of evading your defensive tooling. Defend your data and fight back against sophisticated cyber attacks. We help you identify, contain, and eradicate threats10x faster.

Por Hdiv Security

(0 reseñas)
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

Por Barracuda Networks

(0 reseñas)
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.

Por Aqua Networks

(0 reseñas)
CloudLayar es un software de protección de sitios web contra DDoS en la nube que permite a los propietarios de sitios web protegerlos de bots, malware, escáneres, hackers y todas las demás amenazas en evolución. CloudLayar es un software de protección de sitios web contra DDoS en la nube que permite a los propietarios de sitios web protegerlos de bots, malware, escáneres.

Por Introviz

(0 reseñas)
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

Por CyStack Security

(0 reseñas)
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases. nstance Resolve is one of the most secure database solution with 6 solutions in 1 product. Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation; Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.

Por CyberMDX Technologies

(0 reseñas)
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

Por Group-IB

(0 reseñas)
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices

Por Gleam AI

(0 reseñas)
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business

Por Apptimi

(0 reseñas)
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.

Por A-LIGN

(0 reseñas)
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience. A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.

Por Indusface

(0 reseñas)
Indusface secures thousands of cloud apps, from small companies to large enterprise. Indusface secures thousands of cloud apps, from small companies to large enterprise.

Por Strategix Application Solutions

(0 reseñas)
An Information Security Management System (ISMS) is a set of policies and procedures implemented by organisations to manage information risks such as cyber attacks or data theft. ISO 27001 is the auditable international standard that requires a company to establish, implement and maintain best-practice information processes via its ISMS. An Information Security Management System (ISMS) is a set of policies and procedures implemented.

Por Digital Shadows

(0 reseñas)
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

Por Hacker Combat

(0 reseñas)
Monitor and control the development of responsive and secret information over your network. Monitor and control the development of responsive and secret information over your network.

Por Rohde & Schwarz Cybersecurity

(0 reseñas)
R&STrusted Gate fulfills compliance requirements for data storage and enables safe and data protection-compliant work. With R&STrusted Gate you benefit from highest security standards without compromizing full performance and flexibility of your chosen cloud environments and collaboration tools. Next-Generation security technologies combined with easy administration and user-friendliness ensures security policies are enforced throughout your team. R&S®Trusted Gate protects sensitive information in public clouds and collaboration tools against cyberattacks and data theft.
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks. Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.

Por Silverbolt

(0 reseñas)
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

Por Alyne

(0 reseñas)
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program

Por Coronet

(0 reseñas)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

Por Lucy Security

(0 reseñas)
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.

Por Wandera

(0 reseñas)
Wandera is a mobile security software, providing visibility and protection for your device from cyber threats. Wandera is a mobile security software, providing visibility and protection for your device from cyber threats.

Por ITrust.fr

(0 reseñas)
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems

Por RiskSense

(0 reseñas)
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

Por BeyondTrust

(0 reseñas)
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. MailGuard is a leading cloud-based email security provider. MailGuard detects and stop new threats 2-48 hours ahead of competitors.

Por Brinqa

(0 reseñas)
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.