Netzwerksicherheit Software

Nutze Capterra.com.de in Deutschland um die beste Netzwerksicherheit Software für dein Unternehmen zu finden.

Erfahre warum Capterra kostenlos ist

Erfahre mehr über die Sortierungsoptionen

Softwareprodukte filtern:

312 Produkte gefunden

Produktbewertung

Einsatz

Funktionen

Threat Manager

Threat Manager

von Alert Logic

(1 Bewertung)

Intrusion Detection System (IDS) & Vulnerability Management for hybrid infrastructure, applications & cloud workloads. Combine with ActiveWatch for fully managed security-as-a-service with 24x7 monitoring, expert incident analysis & live notifications of critical attacks by security analysts in our global SOCs. Erfahre mehr über Threat Manager

Intrusion Detection System (IDS) & Vulnerability Management for hybrid infrastructure, applications & cloud workloads. Erfahre mehr über Threat Manager

OneLogin

OneLogin

von OneLogin

(21 Bewertungen)

Entwickelt für Unternehmen mit mehr als 100 Anwendern, bietet ONELOGIN eine Cloud-basierte Identity und Access Management (IAM) Lösung, die einfaches Single-Sign-On bietet (SSO) und es einfacher für Unternehmen macht, den Zugriff auf Web-Anwendungen sowohl in der Cloud als auch hinter der Firewall zu sichern und zu verwalten. Hat Dein Unternehmen drei oder mehr SaaS oder interne Web-Anwendungen? Wenn ja, dann wirst Du von der Sicherheit der Cloud-basierten Single Sign-On-Lösung ONELOGIN profitieren. Erfahre mehr über OneLogin

Identity-Management (IAM) und Single Sign-On (SSO) Lösung für Unternehmen aller Größen. Starte sofort mit unserer kostenlosen Testversion. Erfahre mehr über OneLogin

ESET Endpoint Security

ESET Endpoint Security

von ESET

(373 Bewertungen)

Eliminiert alle Arten von Bedrohungen, einschließlich Viren, Malware, Ransomware, Rootkits, Würmer und Spyware, mit optionalem Cloud-basiertem Scannen für noch bessere Leistung und Erkennung. ESET verwendet mehrschichtige Technologien, die weit über die Möglichkeiten von Antivirenprogrammen hinausgehen. Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Erfahre mehr über ESET Endpoint Security

Enthält Anti-Spyware-, Anti-Phishing-, Web-Kontroll-, Anti-Spam- und Botnet-Schutz mit Remote-Management-Funktion. Erfahre mehr über ESET Endpoint Security

LogicMonitor

LogicMonitor

von LogicMonitor

(34 Bewertungen)

LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures. Erfahre mehr über LogicMonitor

LogicMonitor is the SaaS-based performance monitoring platform for modern IT infrastructure. Erfahre mehr über LogicMonitor

ConnectWise Automate

ConnectWise Automate

von ConnectWise

(54 Bewertungen)

In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. Erfahre mehr über ConnectWise Automate

ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Erfahre mehr über ConnectWise Automate

OnDMARC

OnDMARC

von Redsift

(1 Bewertung)

OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but uses the latest technology to guide you to full protection. Erfahre mehr über OnDMARC

OnDMARC is an email security product that helps organisations of all sizes deploy DMARC with confidence. Erfahre mehr über OnDMARC

WebTitan

WebTitan

von TitanHQ

(154 Bewertungen)

DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing-Versuche und stellt Webinhaltskontrolle bereit. Wir filtern über 1/2 Milliarden DNS-Anfragen täglich, identifizieren 60.000 Malware-Iterationen pro Tag und haben mehr als 7.500 Kunden. Cloud und Gateway-Versionen stehen zur Verfügung. Verbessere jetzt deine Netzwerksicherheit. Nutze die kostenlose Testversion von WebTitan heute, inkl. Erfahre mehr über WebTitan

DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing Versuche und stellt Webinhaltskontrolle bereit Erfahre mehr über WebTitan

NetFlow Analyzer

NetFlow Analyzer

von ManageEngine

(3 Bewertungen)

NetFlow Analyzer benutzt die Flow-Technologie zur Überwachung und um Netzwerkbandbreitennutzung zu analysieren. Es hilft dir, Bandbreiten- Verzögerungen und Engpässe mit kundenspezifischen Berichten und eingestellten schwellwertbasierten E-Mail / SMS-Benachrichtigungen zu verstehen sowie die Schwere eines Problems zu erkennen und zu vermeiden. Dieses einfach zu bedienende Analyse-Tool erkennt Diagnosen und behebt Fehler von Netzwerkanomalien und Zero-Day-Intrusionen in Echtzeit und plant deine Bedürfnisse in Sachen Bandbreite. Auch die Bandbreitennutzung wird optimiert. Erfahre mehr über NetFlow Analyzer

Ein flowbasiertes, komplettes Traffic- Analyse-Tool, das eine ganzheitliche Sicht auf Deine Netzwerk-Traffic-Aktivität in Echtzeit gibt. Erfahre mehr über NetFlow Analyzer

Perimeter 81

Perimeter 81

von Safer Social

(4 Bewertungen)

Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device. Erfahre mehr über Perimeter 81

A single-click, cost-effective cloud VPN that ensures simplified secure network and SaaS resource access for businesses of all sizes. Erfahre mehr über Perimeter 81

SolarWinds RMM

SolarWinds RMM

von SolarWinds MSP

(14 Bewertungen)

Remote Monitoring & Management ist die führende Remote-Management-Plattform auf dem Markt, aus gutem Grund: Sie bietet dir das umfassendste Tool-Set, um IT-Vorgänge zu sichern, zu verwalten und zu verbessern. Die webbasierte Konsole bietet integriertes Patch-Management, Anti-Virus, Web-Content-Filterung, Backup und Wiederherstellung, Fernzugriff, automatische Überwachung, Wartung und vieles mehr. Automatisierungsfunktionen ermöglichen, dass Routineaufgaben einfach automatisiert werden und robuste Berichte liefern einen vollständigen Überblick. Erfahre mehr über SolarWinds RMM

Leistungsstarkes, flexibles IT-Management-Tool, das Fernzugriff, Patch-Management, Anti-Virus, Asset Tracking, Sicherung und Überwachung einschließt. Erfahre mehr über SolarWinds RMM

Log360

Log360

von ManageEngine

(3 Bewertungen)

Log360, eine integrierte Lösung, die ADAudit Plus und EventLog Analyzer in einer einzigen Konsole vereint, ist die Lösung aus einer Hand für das gesamte Log-Management und die Netzwerksicherheitsherausforderungen. Es bietet Echtzeit-Log-Erfassung, Analyse, Korrelation und Archivierungsfähigkeiten, die zum Schutz vertraulicher Daten beitragen, interne Sicherheitsbedrohungen verhindern und Bekämpfung externer Angriffe. Um die dringendste Sicherheit und Compliance-Anforderungen zu gewährleisten, kommt es vorverpackt mit über 1.200 vordefinierten Berichten und Warnungskriterien. Erfahre mehr über Log360

Log360, eine umfassende SIEM-Lösung, mit der interne und externe Sicherheitsangriffe mit Protokollverwaltungsfunktionen geschützt werden können. Erfahre mehr über Log360

EventLog Analyzer

EventLog Analyzer

von ManageEngine

(3 Bewertungen)

EventLog Analyzer ist die kosteneffektivste SIEM-Lösung (Security Information and Event Management) auf dem Markt. EventLog Analyzer erfüllt alle wichtigen SIEM-Funktionen wie Log-Aggregation, Log-Analyse, Compliance-Reporting, Dateiintegritätsüberwachung, Überwachung der Benutzeraktivität, Ereigniskorrelation, Echtzeitalarmierung, Protokollforensik und Protokollaufbewahrung. Jetzt kannst du komplexe Cyber-Angriffe abmildern, die Ursache von Sicherheitsvorfällen erkennen und Datenverstöße verhindern. Erfahre mehr über EventLog Analyzer

Bietet die wirtschaftlichste Sicherheitsinformations- und Event-Management-(SIEM)-Software auf dem Markt. Erfahre mehr über EventLog Analyzer

Horangi Web Security Services

Horangi Web Security Services

von Horangi Cyber Security

(1 Bewertung)

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Erfahre mehr über Horangi Web Security Services

Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Erfahre mehr über Horangi Web Security Services

DSRAZOR for Windows

DSRAZOR for Windows

von Visual Click Software

(0 Bewertungen)

Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. Erfahre mehr über DSRAZOR for Windows

DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports. Erfahre mehr über DSRAZOR for Windows

Avast Business Antivirus Pro Plus

Avast Business Antivirus Pro Plus

von Avast

(312 Bewertungen)

Avast Business Antivirus Pro Plus ist ein All-in-one-Paket zum Schutz von Endgeräten und Servern für kleine und mittelständische Unternehmen (das von einem bis 200 Mitarbeiter besonders gut geeignet ist). Funktioniert auf PCs, Macs und Servern. Das Produkt ist mit 18 hochmodernen Funktionen ausgestattet, um dein Geschäftsleben vollumfassend zu schützen, einschließlich Virenschutz für Server, Netzwerksicherheit und VPN-Schutz für unterwegs. Der ultimative Schutz für Daten, Identitäten und Endpunkte. Das Produkt kann ohne Konsole, mit Cloud oder mit On-Premise-Konsole verwendet werden. Erfahre mehr über Avast Business Antivirus Pro Plus

Preisgekrönte umfassende Antivirus-Lösung, die jeden Teil deines Unternehmens schützt. Erhältlich für PCs, Macs und Server. Erfahre mehr über Avast Business Antivirus Pro Plus

Acunetix

Acunetix

von Acunetix

(13 Bewertungen)

Acunetix ist Marktführer in der automatischen Sicherheitssoftware für Webanwendungen. Es durchsucht deine Website nach Sicherheitslücken wie SQL Injection und XSS. Die Acunetix Online-Lösung umfasst Netzwerksicherheitsscans, die bis zu einem Jahr kostenlos zur Verfügung stehen. Erfahre mehr über Acunetix

Acunetix Online umfasst Netzwerksicherheitsscans, die bis zu einem Jahr kostenlos zur Verfügung stehen. Erfahre mehr über Acunetix

EventSentry

EventSentry

von Netikus.net

(16 Bewertungen)

Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Erfahre mehr über EventSentry

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities. Erfahre mehr über EventSentry

CloudSploit

CloudSploit

von CloudSploit

(0 Bewertungen)

CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. Erfahre mehr über CloudSploit

Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Erfahre mehr über CloudSploit

AdRem NetCrunch

AdRem NetCrunch

von AdRem Software

(23 Bewertungen)

Ein All-in-one und agentenloses Netzwerk-Monitoring und-Management-System, das fähig ist, jedes Gerät im Netzwerk zu überwachen. Überwache die Bandbreite, Verfügbarkeit, Leistung, Dienstleistungen und Verkehrsfluss. Erstelle automatisch Karten und dependencies.Support für alle führenden OS-Typen: Windows, Linux, Mac OS X, VMWare ESX / ESXi, BSD, und vieles mehr. Erweitertes Schicht-2-Mapping und automatische Benachrichtigungs-Korrelation. Baseline-Schwellenwerte und Bereich-Trigger. 7000+ MIBs und eingebauter MIB-Compiler für die vollständige SNMP-Unterstützung Erfahre mehr über AdRem NetCrunch

Ein leistungsfähiges All-in-one, agentenfreies Netzwerk-Monitoring und Management-System, einfach zu nutzen und zu automatisieren Erfahre mehr über AdRem NetCrunch

AVG Antivirus Business Edition

AVG Antivirus Business Edition

von AVG

(313 Bewertungen)

AVG Antivirus Business Edition 2018 schützt deine Geschäfts- und Kundendaten in Echtzeit vor Ransomware, Viren, Malware und Ausbrüchen. Es ist mit neuen cloudbasierten Funktionen wie CyberCapture, verbesserter Malware-Erkennung und verbesserter Web-Abschirmung ausgestattet. Dieses Produkt beinhaltet auch eine kostenlose remote Verwaltung und eine ausgezeichnete Berichterstattung. Die Benutzeroberfläche des Kunden wird ebenfalls aktualisiert. Verfügbar für Windows PCs, Desktops und Server. AVG bietet seinen Kunden rund um die Uhr kostenlose telefonische Betreuung. Erfahre mehr über AVG Antivirus Business Edition

AVG Antivirus Business Edition 2018 schützt deine KMUs und Kundendaten in Echtzeit vor Online-Bedrohungen. Erfahre mehr über AVG Antivirus Business Edition

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

von Webroot Software

(81 Bewertungen)

Multi-Vektor-Schutz vor Viren und Malware, der vollständigen Schutz gegen alle heutigen hoch entwickelten Malware-Bedrohungen wie Trojaner, Keylogger, Phishing, Spyware, Hintertüren, Rootkits, Zero-Day und fortgeschrittene hartnäckige Bedrohungen bietet. Integriertes Identitäts- & Privacy Shield verhindert, dass Daten gestohlen oder erfasst werden, wenn das Internet genutzt wird, und die ausgehende Firewall verhindert ebenfalls, dass Malware deine Daten stiehlt. Du musst dir keine Sorgen um Updates machen - Cloud-basierte Sicherheit bedeutet, dass die Endpunkte immer auf dem neuesten Stand sind. Erfahre mehr über Webroot SecureAnywhere Endpoint Protection

Multi-Vektor-Schutz vor Viren und Malware, der vollständigen Schutz gegen alle heutigen hoch entwickelten Schadprogramm-Bedrohungen bietet. Erfahre mehr über Webroot SecureAnywhere Endpoint Protection

DataSense Data Protection

DataSense Data Protection

von Avexta

(1 Bewertung)

Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Erfahre mehr über DataSense Data Protection

Centrally managed system that scans for sensitive data such as social security numbers for data at rest. Erfahre mehr über DataSense Data Protection

Avatier Identity Anywhere

Avatier Identity Anywhere

von Avatier

(0 Bewertungen)

Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform for assess certification, lifecycle and password management with workflow, & SSO. Each customer has their own private instance; maximizing security. With deep integrations to enterprise and cloud apps, our identity management solution automates IT administration tasks through self-service and workflow. Millions of customers trust Avatier to increase productivity, reduce cost and ensure security. Erfahre mehr über Avatier Identity Anywhere

Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform. Erfahre mehr über Avatier Identity Anywhere

Malwarebytes

Malwarebytes

von Malwarebytes

(428 Bewertungen)

Leistungsstarker, mehrschichtiger Schutz für intelligenten Endpunkt-Schutz

Leistungsstarker, mehrschichtiger Schutz für intelligenten Endpunkt-Schutz

Norton Security

Norton Security

von Symantec

(493 Bewertungen)

Zentrale Richtlinienverwaltung mit skalierbarem, Plattform-übergreifendem Virenschutz auf unternehmensweiter Basis.

Zentrale Richtlinienverwaltung mit skalierbarem, Plattform-übergreifendem Virenschutz auf unternehmensweiter Basis.

CryptoMite

CryptoMite

von BAxBEx Software

(0 Bewertungen)

Ein Programm zur Verschlüsselung persönlicher Dateien, E-Mails und sensibler Daten: schnell, einfach und sicher.

Ein Programm zur Verschlüsselung persönlicher Dateien, E-Mails und sensibler Daten: schnell, einfach und sicher.

TunnelBear

TunnelBear

von TunnelBear

(55 Bewertungen)

TunnelBear für Teams ist der einfachste Weg, damit Dein Team von überall aus sicher und privat arbeiten kann.

TunnelBear für Teams ist der einfachste Weg, damit Dein Team von überall aus sicher und privat arbeiten kann.

PureVPN

PureVPN

von PureVPN

(29 Bewertungen)

Eine Lösung zum Schutz gegen die Drittpartei-Spionage durch eingeschränkten Zugriff auf Websites und ISP-Geschwindigkeitsdrosselung.

Eine Lösung zum Schutz gegen die Drittpartei-Spionage durch eingeschränkten Zugriff auf Websites und ISP-Geschwindigkeitsdrosselung.

SUPERAntiSpyware

SUPERAntiSpyware

von SUPERAntiSpyware

(15 Bewertungen)

Mehrdimensionale Technologie zum Scannen und zur Prozessabfrage, die Spyware erkennt und entfernt.

Mehrdimensionale Technologie zum Scannen und zur Prozessabfrage, die Spyware erkennt und entfernt.

Sophos UTM

Sophos UTM

von Sophos

(13 Bewertungen)

Das ultimative Sicherheitspaket: Wesentlicher Schutz für Dein Netzwerk, Deine Website, E-Mail, Anwendungen und Benutzer durch Next-Gen-Firewall.

Das ultimative Sicherheitspaket: Wesentlicher Schutz für Dein Netzwerk, Deine Website, E-Mail, Anwendungen und Benutzer durch Next-Gen-Firewall.

Praetorian

Praetorian

von Praetorian

(0 Bewertungen)

Corax

Corax

von Corax

(0 Bewertungen)

Eine Cloud-basierte Software, die hilft, Entscheidungen zu treffen und Maßnahmen zu ergreifen, um Cyberkriminalität und Datenverlust zu verhindern.

Eine Cloud-basierte Software, die hilft, Entscheidungen zu treffen und Maßnahmen zu ergreifen, um Cyberkriminalität und Datenverlust zu verhindern.

Kaspersky Endpoint Security

Kaspersky Endpoint Security

von Kaspersky Lab

(185 Bewertungen)

MB

MB

von MalleableByte

(0 Bewertungen)

Web based solution to eliminate web traffic spam. Sixty percent of all web traffic on our Internet today is spam.

Web based solution to eliminate web traffic spam. Sixty percent of all web traffic on our Internet today is spam.

Netmon

Netmon

von Netmon

(0 Bewertungen)

Umfassende Netzwerküberwachung. Überwache Netzwerkverkehr, Geräte und Dienste. Integriertes Warnsystem.

Umfassende Netzwerküberwachung. Überwache Netzwerkverkehr, Geräte und Dienste. Integriertes Warnsystem.

SiteLock

SiteLock

von SiteLock

(8 Bewertungen)

SiteLock ist der weltweit führende Anbieter von Websitesicherheit und schützt derzeit mehr als fünf Millionen Websites.

SiteLock ist der weltweit führende Anbieter von Websitesicherheit und schützt derzeit mehr als fünf Millionen Websites.

RansomFree

RansomFree

von Cybereason

(1 Bewertung)

RansomFree ist das erste und einzige kostenlose Anti-Ransomware-Tool, das entwickelt wurde, um 99 % der Ransomware aufzufinden und noch vor der Verschlüsselung von Dateien zu stoppen.

RansomFree ist das erste und einzige kostenlose Anti-Ransomware-Tool, das entwickelt wurde, um 99 % der Ransomware aufzufinden und noch vor der Verschlüsselung von Dateien zu stoppen.

VIPole

VIPole

von VIPole

(0 Bewertungen)

Sichere Geschäftskommunikation mit verschlüsselten Nachrichten-, Anruf-, Video-, Freigabe- und Kollaborations-Tools in einer einzigen Plattform.

Sichere Geschäftskommunikation mit verschlüsselten Nachrichten-, Anruf-, Video-, Freigabe- und Kollaborations-Tools in einer einzigen Plattform.

OpenVPN Access Server

OpenVPN Access Server

von OpenVPN

(39 Bewertungen)

Voll ausgestattete VPN-Lösung für sicheres Netzwerk-Tunneling für Windows-, Mac- und Linux-Umgebungen.

Voll ausgestattete VPN-Lösung für sicheres Netzwerk-Tunneling für Windows-, Mac- und Linux-Umgebungen.

RMail

RMail

von RPost

(23 Bewertungen)

RMail ist eine All-in-one-Serviceerweiterung für leistungsstarke E-Mails, die E-Mail-Verschlüsselung, E-Delivery-Proof, E-Signaturen und vieles mehr bietet.

RMail ist eine All-in-one-Serviceerweiterung für leistungsstarke E-Mails, die E-Mail-Verschlüsselung, E-Delivery-Proof, E-Signaturen und vieles mehr bietet.

GFI LanGuard

GFI LanGuard

von GFI Software

(7 Bewertungen)

We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.

We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.

KerioControl

KerioControl

von Kerio Technologies

(2 Bewertungen)

Kenna

Kenna

von Kenna Security

(0 Bewertungen)

Kenna Security verwendet Exploit Intelligence-Feeds, um Schwachstellen zu identifizieren, die stark ausgenutzt werden und dein Unternehmen in Gefahr bringen.

Kenna Security verwendet Exploit Intelligence-Feeds, um Schwachstellen zu identifizieren, die stark ausgenutzt werden und dein Unternehmen in Gefahr bringen.

MailWasher

MailWasher

von Firetrust

(17 Bewertungen)

Security Testing

Security Testing

von tieBridge

(0 Bewertungen)

LogPoint

LogPoint

von LogPoint

(0 Bewertungen)

LogPoint ist eine effektive und wertvolle SIEM-Lösung für Unternehmen aller Größen wegen ihres einzigartigen Designs und der reichhaltigen Funktionen.

LogPoint ist eine effektive und wertvolle SIEM-Lösung für Unternehmen aller Größen wegen ihres einzigartigen Designs und der reichhaltigen Funktionen.

Sumo Logic

Sumo Logic

von Sumo Logic

(6 Bewertungen)

Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence.

Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence.

DeviceLock

DeviceLock

von DeviceLock

(0 Bewertungen)

Bietet sowohl kontextbezogene als auch inhaltsbasierte Kontrolle für maximale Leckageprävention bei minimalen Vorab- und Betriebskosten.

Bietet sowohl kontextbezogene als auch inhaltsbasierte Kontrolle für maximale Leckageprävention bei minimalen Vorab- und Betriebskosten.

Vormetric

Vormetric

von Vormetric

(0 Bewertungen)

Vertrauen, Geschwindigkeit und Sicherheit durch Verschlüsselung der Daten, die das Geschäft aufbauen, mit Vormetrics Data Security.

Vertrauen, Geschwindigkeit und Sicherheit durch Verschlüsselung der Daten, die das Geschäft aufbauen, mit Vormetrics Data Security.

CylancePROTECT

CylancePROTECT

von Cylance

(20 Bewertungen)

Höre auf, Angriffe nur zu erkennen, sondern verhindere sie, indem du CylancePROTECT verwendest, die Endpunktlösung, die 99 % der Bedrohungen in Echtzeit blockiert.

Höre auf, Angriffe nur zu erkennen, sondern verhindere sie, indem du CylancePROTECT verwendest, die Endpunktlösung, die 99 % der Bedrohungen in Echtzeit blockiert.

Fusion

Fusion

von Panda Security

(10 Bewertungen)

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

NANO Antivirus

NANO Antivirus

von NANO Security

(7 Bewertungen)

Freeware-Antivirus-Anwendung, die gepackte und archivierte Malware schnell und effizient finden kann.

Freeware-Antivirus-Anwendung, die gepackte und archivierte Malware schnell und effizient finden kann.

Privatoria

Privatoria

von Privatoria

(1 Bewertung)

Application Security

Application Security

von F5 Networks

(0 Bewertungen)

Bietet proaktive und umfassende Schutzmaßnahmen vor unbefugtem Zugriff und Angriffe bösartiger Anwendungen.

Bietet proaktive und umfassende Schutzmaßnahmen vor unbefugtem Zugriff und Angriffe bösartiger Anwendungen.

CloudFish

CloudFish

von CloudFish

(0 Bewertungen)

Eine Netzwerksicherheitslösung, die die nächste Generation von Sicherheitsinfrastrukturprodukten für die Cloud erstellt.

Eine Netzwerksicherheitslösung, die die nächste Generation von Sicherheitsinfrastrukturprodukten für die Cloud erstellt.

Barracuda Spam Firewall

Barracuda Spam Firewall

von Barracuda Networks

(73 Bewertungen)

An integrated hardware and software solution for complete protection of your email server.

An integrated hardware and software solution for complete protection of your email server.

Splunk

Splunk

von Splunk

(56 Bewertungen)

Software that lets you search and analyze all your IT infrastructure data from a single location in real time.

Software that lets you search and analyze all your IT infrastructure data from a single location in real time.

LogMeIn Pro

LogMeIn Pro

von LogMeIn

(47 Bewertungen)

Fernverwaltung von Systemen für Desktops, Server und mobile Laptops.

Fernverwaltung von Systemen für Desktops, Server und mobile Laptops.

DNSFilter

DNSFilter

von DNSFilter

(27 Bewertungen)

DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.

DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.

ZoneAlarm Pro

ZoneAlarm Pro

von Zone Labs

(9 Bewertungen)

Eine PC-Firewall, die deine persönlichen Daten und deine Privatsphäre vor Internet-Hackern und Datendieben schützt.

Eine PC-Firewall, die deine persönlichen Daten und deine Privatsphäre vor Internet-Hackern und Datendieben schützt.

Active Shield

Active Shield

von Security Stronghold

(1 Bewertung)

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

DESlock

DESlock

von DESlock

(0 Bewertungen)

Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.

Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.

SmartFlow

SmartFlow

von Solana Networks

(0 Bewertungen)

SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks.

SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks.

Qrator

Qrator

von Qrator Labs

(0 Bewertungen)

Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds.

Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds.

Artica Proxy

Artica Proxy

von Artica Tech

(0 Bewertungen)

A powerful solution for large and multinational companies to log internet performance, filter requests, and manage reporting.

A powerful solution for large and multinational companies to log internet performance, filter requests, and manage reporting.

Security Framework

Security Framework

von PrimeSoft Solutions

(0 Bewertungen)

A network security solution with access agent, service controller, and secure service gateway functions.

A network security solution with access agent, service controller, and secure service gateway functions.

Avira Antivirus Server

Avira Antivirus Server

von Avira Operations

(77 Bewertungen)

File server security solution that offers network protection, scan scheduling, and traffic filtering.

File server security solution that offers network protection, scan scheduling, and traffic filtering.

Red Hat Enterprise Virtualization

Red Hat Enterprise Virtualization

von Red Hat

(1 Bewertung)

Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.

Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.

Vera

Vera

von Vera

(1 Bewertung)

Vera secures any kind of data, wherever it goes

Vera secures any kind of data, wherever it goes

Dome9

Dome9

von Dome9 Security

(1 Bewertung)

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments.

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments.

Abusix

Abusix

von Abusix

(1 Bewertung)

Monitor and protect your network from abuse using this all in one solution.

Monitor and protect your network from abuse using this all in one solution.

UserLock

UserLock

von IS Decisions

(0 Bewertungen)

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.

Sqreen

Sqreen

von Sqreen

(0 Bewertungen)

An automated and real-time security solution for developers. It protects web applications against attacks at runtime.

An automated and real-time security solution for developers. It protects web applications against attacks at runtime.

EventTracker

EventTracker

von EventTracker

(19 Bewertungen)

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration.

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration.

eTrust Antivirus

eTrust Antivirus

von CA Technologies

(10 Bewertungen)

Reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices.

Reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices.

NG Firewall

NG Firewall

von Untangle

(1 Bewertung)

Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.

Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.

ACL Manager

ACL Manager

von Cyber Operations

(0 Bewertungen)

Centrally managing thousands of router ACLs from a single software application.

Centrally managing thousands of router ACLs from a single software application.

SecureZIP

SecureZIP

von PKWARE

(0 Bewertungen)

Provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use.

Provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use.

Security Shield

Security Shield

von PCSecurityShield

(0 Bewertungen)

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.

SecureTrack

SecureTrack

von Tufin

(0 Bewertungen)

Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.

Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.

vArmour

vArmour

von vArmour

(0 Bewertungen)

Software-based distributed security system delivers the industry's only integrated micro-segmentation solution with security analytics.

Software-based distributed security system delivers the industry's only integrated micro-segmentation solution with security analytics.

Themis

Themis

von Cossack Labs

(0 Bewertungen)

Solution providing data security and offering open-source and commercial instruments for data protection and security in your business.

Solution providing data security and offering open-source and commercial instruments for data protection and security in your business.

Pulse

Pulse

von Pwnie Express

(0 Bewertungen)

Pulse continuously identifies and assesses all devices and IoT systems, and provides the ability to respond to network threats.

Pulse continuously identifies and assesses all devices and IoT systems, and provides the ability to respond to network threats.

Black Duck Hub

Black Duck Hub

von Black Duck

(28 Bewertungen)

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.

Axence nVision

Axence nVision

von Axence

(13 Bewertungen)

Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.

Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.

AlienVault USM

AlienVault USM

von AlienVault

(10 Bewertungen)

Sicherheitsmanagementplattform mit vollständig integrierten Sicherheitskontrollen für die Erkennung von Bedrohungen und das Compliance-Management.

Sicherheitsmanagementplattform mit vollständig integrierten Sicherheitskontrollen für die Erkennung von Bedrohungen und das Compliance-Management.

ECS2

ECS2

von SecuCloud

(1 Bewertung)

Modular cloud security system designed to provide security framework for any devices.

Modular cloud security system designed to provide security framework for any devices.

NerveCenter

NerveCenter

von Logmatrix

(0 Bewertungen)

Delivers integrated, real-time security management in a single, seamless suite.

Delivers integrated, real-time security management in a single, seamless suite.

PDF Restrictions Remover

PDF Restrictions Remover

von Axommsoft

(0 Bewertungen)

PDF decryption software is fast desktop utility which helps to remove security from pdf documents.

PDF decryption software is fast desktop utility which helps to remove security from pdf documents.

Fortscale

Fortscale

von Fortscale

(0 Bewertungen)

Detect and Eliminate Threats with User Behavior Analytics

Detect and Eliminate Threats with User Behavior Analytics

Biocoded

Biocoded

von Biocoded

(0 Bewertungen)

Safest end-to-end encrypted voice call and messaging app by opinion of independent security research groups.

Safest end-to-end encrypted voice call and messaging app by opinion of independent security research groups.

PerimeterX

PerimeterX

von PerimeterX

(0 Bewertungen)

A new approach for Accurate, Easy to Integrate Protection from Automated Attacks

A new approach for Accurate, Easy to Integrate Protection from Automated Attacks

Okta

Okta

von Okta

(150 Bewertungen)

Okta ist die Grundlage für sichere Verbindungen zwischen Menschen und Technologie. Verwende die Cloud, um jederzeit auf jedem Gerät auf Apps zuzugreifen.

Okta ist die Grundlage für sichere Verbindungen zwischen Menschen und Technologie. Verwende die Cloud, um jederzeit auf jedem Gerät auf Apps zuzugreifen.

Cloudflare

Cloudflare

von Cloudflare

(63 Bewertungen)

Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.

Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.

ConnectWise Automate

ConnectWise Automate

von ConnectWise

(54 Bewertungen)

Automate collaborates with industry leaders to deliver the integrated tools needed to optimize servers & keep your clients' network up.

Automate collaborates with industry leaders to deliver the integrated tools needed to optimize servers & keep your clients' network up.

VMware VirtualCenter

VMware VirtualCenter

von VMware

(42 Bewertungen)

Virtual infrastructure management software, provides a central point of control for virtual computing resources.

Virtual infrastructure management software, provides a central point of control for virtual computing resources.

REVE Antivirus

REVE Antivirus

von REVE Antivirus

(19 Bewertungen)

REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.

REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.

Connect Secure

Connect Secure

von Pulse Secure

(18 Bewertungen)

Delivers end-user access to corporate networks and resources. Ensures connectivity for both trusted & untrusted devices.

Delivers end-user access to corporate networks and resources. Ensures connectivity for both trusted & untrusted devices.

My Digital Shield

My Digital Shield

von My Digital Shield

(15 Bewertungen)

My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.

My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.

GlassWire

GlassWire

von GlassWire

(12 Bewertungen)

Schützt dein Computer-Netzwerk und die Privatsphäre über Netzwerk-Monitoring und ein eingebautes Firewall-Management-Tool.

Schützt dein Computer-Netzwerk und die Privatsphäre über Netzwerk-Monitoring und ein eingebautes Firewall-Management-Tool.

Adguard

Adguard

von Adguard

(11 Bewertungen)

Gets rid of annoying ads, rejects online tracking, and protects your computer from malware.

Gets rid of annoying ads, rejects online tracking, and protects your computer from malware.

Indeni

Indeni

von Indeni

(11 Bewertungen)

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

The Email Laundry

The Email Laundry

von The Email Laundry

(10 Bewertungen)

Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.

Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.

RG System

RG System

von RG System

(10 Bewertungen)

RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.

RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.

STOPzilla AntiVirus

STOPzilla AntiVirus

von STOPzilla

(4 Bewertungen)

Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.

Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.

PhishingBox

PhishingBox

von PhishingBox

(4 Bewertungen)

PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.

PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.

Saint Security Suite

Saint Security Suite

von SAINT

(2 Bewertungen)

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.

TRITON Enterprise

TRITON Enterprise

von Forcepoint

(2 Bewertungen)

Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.

Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.

BorderWare Firewall Server

BorderWare Firewall Server

von BorderWare Technologies

(1 Bewertung)

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

Cloudmark Authority

Cloudmark Authority

von Cloudmark

(1 Bewertung)

Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.

Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.

PerfectMail

PerfectMail

von XPMsoftware

(1 Bewertung)

An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.

An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.

TraceCSO

TraceCSO

von TraceSecurity

(1 Bewertung)

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

DLP Suite

DLP Suite

von Spirion

(1 Bewertung)

This software helps to prevent data leaks and protect your information wherever it is or what form its in.

This software helps to prevent data leaks and protect your information wherever it is or what form its in.

Privileged Account Security Solution

Privileged Account Security Solution

von CyberArk Software

(1 Bewertung)

Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

Flextivity

Flextivity

von Intego

(1 Bewertung)

Anti-virus Mac solution designed to monitor online employee activity and protect your network.

Anti-virus Mac solution designed to monitor online employee activity and protect your network.

WildFire

WildFire

von Palo Alto Networks

(1 Bewertung)

Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.

Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.

RanStop

RanStop

von Temasoft

(1 Bewertung)

Protects computers and networks against present and future ransomware of any type.

Protects computers and networks against present and future ransomware of any type.

DynaZip Max Secure

DynaZip Max Secure

von Inner Media

(0 Bewertungen)

Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.

Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.

CyberGatekeeper

CyberGatekeeper

von InfoExpress

(0 Bewertungen)

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Cryptainer PE

Cryptainer PE

von Cypherix

(0 Bewertungen)

Corporate network security solution that provides for a network wide encryption based security implementation.

Corporate network security solution that provides for a network wide encryption based security implementation.

CyBlock

CyBlock

von Wavecrest Computing

(0 Bewertungen)

Web-use filtering and monitoring in a powerful proxy server. Covers 500 million Web pages with 80 blocking categories.

Web-use filtering and monitoring in a powerful proxy server. Covers 500 million Web pages with 80 blocking categories.

Spam and Virus Blocker

Spam and Virus Blocker

von ClearMyMail

(0 Bewertungen)

Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.

Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.

Infiltrator

Infiltrator

von Infiltration Systems

(0 Bewertungen)

Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations.

Network security scanner that scans and audits your network computers for vulnerabilities, exploits and information enumerations.

Max Secure Spyware Detector

Max Secure Spyware Detector

von Max Secure Software

(0 Bewertungen)

Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.

Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.

SafenSec

SafenSec

von SafenSoft

(0 Bewertungen)

Intrusion prevention system that blocks spyware, new viruses and other malware.

Intrusion prevention system that blocks spyware, new viruses and other malware.

602LAN SUITE

602LAN SUITE

von Software602

(0 Bewertungen)

Secure mail server with anti-virus & anti-spam,built-in firewall with NAT and web content filter proxy.

Secure mail server with anti-virus & anti-spam,built-in firewall with NAT and web content filter proxy.

CIAgent

CIAgent

von SNMP Research

(0 Bewertungen)

It is a new Web-based, SNMP agent for system and application management.

It is a new Web-based, SNMP agent for system and application management.

Armor2net Personal Firewall

Armor2net Personal Firewall

von Armor2net Software

(0 Bewertungen)

Stops hackers and data thieves and protects your PC from Internet-borne threats.

Stops hackers and data thieves and protects your PC from Internet-borne threats.

PrivacyKeyboard

PrivacyKeyboard

von Global Information Technology

(0 Bewertungen)

Protects computers against ALL types of keylogging programs and keylogging hardware devices.

Protects computers against ALL types of keylogging programs and keylogging hardware devices.

Active Wall

Active Wall

von Active Network CO

(0 Bewertungen)

Provides continuous enterprise-wide protection against the full range of Internet threats.

Provides continuous enterprise-wide protection against the full range of Internet threats.

SpamJadoo

SpamJadoo

von Data Infocom

(0 Bewertungen)

Anti Spam service which eliminates spam at protocol level.

Anti Spam service which eliminates spam at protocol level.

Netsweeper

Netsweeper

von Netsweeper

(0 Bewertungen)

Web content filtering specialist, focusing on protecting networks from spam, phishing, spyware and other malicious applications.

Web content filtering specialist, focusing on protecting networks from spam, phishing, spyware and other malicious applications.

QualysGuard Enterprise

QualysGuard Enterprise

von Qualys

(0 Bewertungen)

Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

Business Email Security

Business Email Security

von Grove Group

(0 Bewertungen)

Secure boundary services that protect email communications by providing complete email intrusion prevention.

Secure boundary services that protect email communications by providing complete email intrusion prevention.

Safend Protector

Safend Protector

von Safend

(0 Bewertungen)

Endpoint data protection and leakage prevention solutions that protect against corporate data loss.

Endpoint data protection and leakage prevention solutions that protect against corporate data loss.

Enterprise Security

Enterprise Security

von Protegrity

(0 Bewertungen)

It defines and manages organization wide security policy, provides embedded enterprise data security and more.

It defines and manages organization wide security policy, provides embedded enterprise data security and more.

Specops Password Policy

Specops Password Policy

von Specops Software

(0 Bewertungen)

Specops Password Policy helps you increase password security in your Active Directory environment.

Specops Password Policy helps you increase password security in your Active Directory environment.

Catbird

Catbird

von Catbird

(0 Bewertungen)

Software-Defined Segmentation and Security for the Hybrid IT Infrastructure

Software-Defined Segmentation and Security for the Hybrid IT Infrastructure

CounterStorm

CounterStorm

von Raytheon

(0 Bewertungen)

An advanced network security solution specifically designed to stop zero-day, and targeted attacks in seconds.

An advanced network security solution specifically designed to stop zero-day, and targeted attacks in seconds.

AuthenWare

AuthenWare

von AuthenWare

(0 Bewertungen)

Ferifies that a user's ID and password is the actual owner of those credentials - technology requires only a PC logon.

Ferifies that a user's ID and password is the actual owner of those credentials - technology requires only a PC logon.

Cybersecurity

Cybersecurity

von Intelligent Technologies Labs

(0 Bewertungen)

Security system that offers data loss prevention, backup and disaster recovery, web, email, and mobile security features.

Security system that offers data loss prevention, backup and disaster recovery, web, email, and mobile security features.

Attack Mitigation System

Attack Mitigation System

von Radware

(0 Bewertungen)

Network attack mitigation solution with several security modules, including network behavioral analysis & intrusion prevention.

Network attack mitigation solution with several security modules, including network behavioral analysis & intrusion prevention.

FlowTraq

FlowTraq

von FlowTraq

(0 Bewertungen)

Scalable full-fidelity netflow/sFlow/IPFIX solution.

Scalable full-fidelity netflow/sFlow/IPFIX solution.

Aobo Internet Filter for Mac

Aobo Internet Filter for Mac

von Awosoft

(0 Bewertungen)

A stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications.

A stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications.

Marble Security

Marble Security

von Marble Security

(0 Bewertungen)

Security solution for corporate mobile devices that facilitates remote authentication for access to corporate networks.

Security solution for corporate mobile devices that facilitates remote authentication for access to corporate networks.

IWASSA

IWASSA

von IWASSA

(0 Bewertungen)

Single-sign-in for each user and secured service for file sharing.

Single-sign-in for each user and secured service for file sharing.

Nfusion

Nfusion

von Ntrepid

(0 Bewertungen)

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

Illumio ASP

Illumio ASP

von Illumio

(0 Bewertungen)

Go beyond network-level visibility. Gain information on systems and processes on physical and virtual hosts and their communications.

Go beyond network-level visibility. Gain information on systems and processes on physical and virtual hosts and their communications.

Tanium Endpoint Platform

Tanium Endpoint Platform

von Tanium

(0 Bewertungen)

15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

FireLayers

FireLayers

von FireLayers

(0 Bewertungen)

Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.

Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.

Onion ID

Onion ID

von Onion ID

(0 Bewertungen)

Solution for IT Infrastructure Security to prevent insider threats.

Solution for IT Infrastructure Security to prevent insider threats.

SQL Safe Backup

SQL Safe Backup

von IDERA

(0 Bewertungen)

Perform a SQL Backup Across Your Servers

Perform a SQL Backup Across Your Servers

InfiSecure

InfiSecure

von InfiSecure Technologies

(0 Bewertungen)

InfiSecure is a robust bot protection platform to detect and block automated attacks on websites.

InfiSecure is a robust bot protection platform to detect and block automated attacks on websites.

LogRhythm Network Monitor

LogRhythm Network Monitor

von LogRhythm

(0 Bewertungen)

LogRhythm Network Monitor provides full network visibility critical for advanced threat detection and rapid incident response.

LogRhythm Network Monitor provides full network visibility critical for advanced threat detection and rapid incident response.

Lynis Enterprise

Lynis Enterprise

von CISOfy

(0 Bewertungen)

Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.

Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.

Terabit Security

Terabit Security

von Terabit Security

(0 Bewertungen)

Our system offers significant technical and financial advantages. DPS functions at the network edge and conducts automatic traffic

Our system offers significant technical and financial advantages. DPS functions at the network edge and conducts automatic traffic

Cloudbric

Cloudbric

von Cloudbric

(0 Bewertungen)

With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.

With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.

Metapacket

Metapacket

von Metapacket

(0 Bewertungen)

Defend your network against any malware.

Defend your network against any malware.

Virtual Mobile Infrastructure

Virtual Mobile Infrastructure

von Hypori

(0 Bewertungen)

Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

Genian NAC

Genian NAC

von GENIANS

(0 Bewertungen)

Re-imagined Network Access Control for the World of IoT

Re-imagined Network Access Control for the World of IoT

RBLTracker

RBLTracker

von RBLTracker

(0 Bewertungen)

Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.

Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.

E8 Security

E8 Security

von E8 Security

(0 Bewertungen)

Machine-learning analytics solution to identify unknown threats already inside the network

Machine-learning analytics solution to identify unknown threats already inside the network

BluSapphire

BluSapphire

von BluSapphire

(0 Bewertungen)

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

Leakwatch

Leakwatch

von Leakwatch

(0 Bewertungen)

Solution that monitors your data to detect leaks in real time and enable you to take action quickly.

Solution that monitors your data to detect leaks in real time and enable you to take action quickly.

NTP Software File Auditor

NTP Software File Auditor

von NTP Software

(0 Bewertungen)

With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment

With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment

Key Manager Plus

Key Manager Plus

von ManageEngine

(0 Bewertungen)

Web-based SSH Key and SSL Certificate Management Solution for Enterprises

Web-based SSH Key and SSL Certificate Management Solution for Enterprises

IMMUNIO

IMMUNIO

von IMMUNIO

(0 Bewertungen)

A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.

A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.

Cyberint

Cyberint

von Cyberint

(0 Bewertungen)

CyberInt provides Managed Detection and Response for the Digital Business.

CyberInt provides Managed Detection and Response for the Digital Business.

MePin

MePin

von MePin

(0 Bewertungen)

One API delivering compliance, digital signatures, biometrics, payment authorization, multi-factor authentication and more.

One API delivering compliance, digital signatures, biometrics, payment authorization, multi-factor authentication and more.

Sepior

Sepior

von Sepior

(0 Bewertungen)

Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys

Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys

Intruder

Intruder

von Intruder

(0 Bewertungen)

A solution to find weaknesses in your online digital estate, explain the risks, & help with remediation before a breach can occur.

A solution to find weaknesses in your online digital estate, explain the risks, & help with remediation before a breach can occur.

Difenso

Difenso

von Difenso

(0 Bewertungen)

Difenso is a data security software that helps companies protect sensitive data in cloud and intranet

Difenso is a data security software that helps companies protect sensitive data in cloud and intranet

BlueTalon

BlueTalon

von BlueTalon

(0 Bewertungen)

Delivers data-centric security across big data environments and eliminates security blind spots.

Delivers data-centric security across big data environments and eliminates security blind spots.

McAfee Preventsys Risk Analyzer

McAfee Preventsys Risk Analyzer

von McAfee

(13 Bewertungen)

Consolidate data. Identify risks. Automate security compliance reporting.

Consolidate data. Identify risks. Automate security compliance reporting.

CryptoPhoto

CryptoPhoto

von CryptoPhoto

(4 Bewertungen)

Blocks phishing & malware attacks by giving you a fast new way to log in.

Blocks phishing & malware attacks by giving you a fast new way to log in.

ForeScout CounterACT Edge

ForeScout CounterACT Edge

von ForeScout Technologies

(3 Bewertungen)

Security hardware that monitors the perimeter and preempts targeted attacks.

Security hardware that monitors the perimeter and preempts targeted attacks.

SecureAd

SecureAd

von Oxford BioChronometrics

(2 Bewertungen)

Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.

Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.

SecurenceMail

SecurenceMail

von Securence

(1 Bewertung)

A simple switch of your MX records will demonstrate why Securence is the secret weapon in email filtering, security and archiving.

A simple switch of your MX records will demonstrate why Securence is the secret weapon in email filtering, security and archiving.

NetSpective Content Filter

NetSpective Content Filter

von TeleMate.Net Software

(1 Bewertung)

Passive, deep packet inspection identifies URL, VoIP, and P2P signatures regardless of port with unprecedented scalability.

Passive, deep packet inspection identifies URL, VoIP, and P2P signatures regardless of port with unprecedented scalability.

AVDS

AVDS

von Beyond Security

(1 Bewertung)

Automated network Vulnerability Assessment and Management. Eliminate time consuming false positives and scan 50-500,000 IPs.

Automated network Vulnerability Assessment and Management. Eliminate time consuming false positives and scan 50-500,000 IPs.

Blesk

Blesk

von Prival

(1 Bewertung)

A suite of applications for network monitoring and management. Monitor availability, security, event logs, bandwidth consumption, etc.

A suite of applications for network monitoring and management. Monitor availability, security, event logs, bandwidth consumption, etc.

Bot Detection and Mitigation

Bot Detection and Mitigation

von Distil Networks

(1 Bewertung)

Web based solution designed to protect your website and content from bad bots.

Web based solution designed to protect your website and content from bad bots.

PerfectMail Antispam

PerfectMail Antispam

von PerfectMail

(1 Bewertung)

Protects mail servers and users from unwanted and malicious e-mail.

Protects mail servers and users from unwanted and malicious e-mail.

SafeInternetEmail

SafeInternetEmail

von FreeStone Software

(0 Bewertungen)

Email virus protection, spam and Server-based website content filtering.

Email virus protection, spam and Server-based website content filtering.

StealthDisk Mobile

StealthDisk Mobile

von Security Group Six

(0 Bewertungen)

Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.

Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.

SSProtect

SSProtect

von Definitive Data Security

(0 Bewertungen)

SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.

SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.

Outpost Firewall Personal Pro

Outpost Firewall Personal Pro

von Agnitum

(0 Bewertungen)

Hides your computer identity from hackers, stops hacker attacks automatically, and blocks transmission of private data.

Hides your computer identity from hackers, stops hacker attacks automatically, and blocks transmission of private data.

Encrypted Data Gateway Engine

Encrypted Data Gateway Engine

von Authora

(0 Bewertungen)

An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data.

An OpenPGP encryption software command line solution for encrypting, signing and decrypting large volumes of data.

Safenet ProtectApp

Safenet ProtectApp

von Gemalto

(0 Bewertungen)

Network security management with a robust, Java-based management platform that authenticates your SafeNet solutions.

Network security management with a robust, Java-based management platform that authenticates your SafeNet solutions.

Casper BlackBox

Casper BlackBox

von CrypKey

(0 Bewertungen)

E-commerce solution that provides the ultimate in automated integrated software protection.

E-commerce solution that provides the ultimate in automated integrated software protection.

Calyx Suite

Calyx Suite

von Open Seas

(0 Bewertungen)

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Vaccine46

Vaccine46

von 46Soft.com

(0 Bewertungen)

Virus & spyware removal utility that detects, removes and protects your PC from malware threats like adware, trojans, worms, etc.

Virus & spyware removal utility that detects, removes and protects your PC from malware threats like adware, trojans, worms, etc.

VFind Security ToolKit

VFind Security ToolKit

von CyberSoft

(0 Bewertungen)

It is a suite of State-Of-The-Art Computer Security Virus and Intrusion Tools.

It is a suite of State-Of-The-Art Computer Security Virus and Intrusion Tools.

MailSite Fusion

MailSite Fusion

von Rockliffe Systems

(0 Bewertungen)

ISP Grade Exchange Alternative Email Server Software with Calender and Contact Sync

ISP Grade Exchange Alternative Email Server Software with Calender and Contact Sync

Declude Security Suite

Declude Security Suite

von Declude

(0 Bewertungen)

Integrated suite of security software applications designed to detect and halt all email vulnerabilities from infiltrating the network.

Integrated suite of security software applications designed to detect and halt all email vulnerabilities from infiltrating the network.

Lockspam Pro 3.0

Lockspam Pro 3.0

von Polesoft

(0 Bewertungen)

Safe anti-spam program for all POP3 mail clients like Microsoft Outlook, Outlook Express, Eudora, Incredimail, the Bat!

Safe anti-spam program for all POP3 mail clients like Microsoft Outlook, Outlook Express, Eudora, Incredimail, the Bat!

DragonSoft DVM

DragonSoft DVM

von DragonSoft Security Associates

(0 Bewertungen)

Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.

Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.

Zada Suite

Zada Suite

von Zada Partners

(0 Bewertungen)

Wide array of solutions for various industries, ranging from Waste & Recycling to Government and Defense to Health Care & Life Sciences

Wide array of solutions for various industries, ranging from Waste & Recycling to Government and Defense to Health Care & Life Sciences

XD Air

XD Air

von Tresys

(0 Bewertungen)

Security software for mobile networks allowing only designated content to be sent or received over a given network.

Security software for mobile networks allowing only designated content to be sent or received over a given network.

CimTrak Integrity Suite

CimTrak Integrity Suite

von Cimcor

(0 Bewertungen)

A comprehensive security software application that is easy to deploy and scales to the largest of global networks.

A comprehensive security software application that is easy to deploy and scales to the largest of global networks.

Secure My Files

Secure My Files

von SecuSimple

(0 Bewertungen)

Prevent other people from seeing your files with the new program Secure My Files.

Prevent other people from seeing your files with the new program Secure My Files.

AtomOS Kwick Key

AtomOS Kwick Key

von Atom AMPD

(0 Bewertungen)

A software platform that allows customers to streamline their network by running multiple applications from a single source.

A software platform that allows customers to streamline their network by running multiple applications from a single source.

Vallum GMI Agent

Vallum GMI Agent

von Vallum Software

(0 Bewertungen)

Vallum Halo is web based is a web based enterprise network monitoring solution.

Vallum Halo is web based is a web based enterprise network monitoring solution.

DESwrap

DESwrap

von Data Encryption Systems

(0 Bewertungen)

Security solution that allows software authors to protect their applications against unpaid use.

Security solution that allows software authors to protect their applications against unpaid use.

CPTRAX for Windows

CPTRAX for Windows

von Visual Click Software

(0 Bewertungen)

Provides real-time enterprise-wide alerting and auditing for your Windows Servers, Workstations and Active Directory environments.

Provides real-time enterprise-wide alerting and auditing for your Windows Servers, Workstations and Active Directory environments.

Data Rover EP

Data Rover EP

von Mission2Mars

(0 Bewertungen)

Calculates the Effective Permissions on Microsoft Windows File Servers.

Calculates the Effective Permissions on Microsoft Windows File Servers.

CyberReveal

CyberReveal

von BAE Systems

(0 Bewertungen)

Advanced Threat Detection helps you to stop sophisticated attacks with the potential for serious impact to your business.

Advanced Threat Detection helps you to stop sophisticated attacks with the potential for serious impact to your business.

FireScope Dash

FireScope Dash

von FireScope

(0 Bewertungen)

Provides end-to-end monitoring of your critical IT infrastructure and applications.

Provides end-to-end monitoring of your critical IT infrastructure and applications.

Lancera

Lancera

von Lancera

(0 Bewertungen)

Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness.

Accelerates business growth through intelligent software technology and cyber security solutions with a focus on customer happiness.

FireEye Enterprise

FireEye Enterprise

von FireEye

(0 Bewertungen)

Fully integrated security for every communication channel in your organization

Fully integrated security for every communication channel in your organization

Unified VRM

Unified VRM

von NopSec

(0 Bewertungen)

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

DataDome bot mitigation

DataDome bot mitigation

von DataDome

(0 Bewertungen)

Provides innovative technology and human expertise to block bad bots from hurting your website & business.

Provides innovative technology and human expertise to block bad bots from hurting your website & business.

L7 Defense

L7 Defense

von L7 Defense

(0 Bewertungen)

Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks.

Fully auto discovery of the application layer (SLA), Building dynamic whitelist, identifying the DDoS attacks.

IronSFTP

IronSFTP

von IronCore Labs

(0 Bewertungen)

An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption.

An open-source fork of OpenSSH and alternative to command-line SFTP that brings painless end-to-end encryption.

BluKrypt

BluKrypt

von Parablu

(0 Bewertungen)

TOTAL SECURITY AND PRIVACY ON THE CLOUD

TOTAL SECURITY AND PRIVACY ON THE CLOUD

Devknox

Devknox

von Appknox

(0 Bewertungen)

Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck.

Helps developers detect and resolve security issues as they write code. It is as simple to use as autocorrect for spellcheck.

ChurchDNS

ChurchDNS

von ChurchDNS

(0 Bewertungen)

Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads.

Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads.

SmartWall TDS

SmartWall TDS

von Corero

(0 Bewertungen)

Threat Defense System that is in a family of DDoS protection appliances that eliminate DDoS threats in real-time.

Threat Defense System that is in a family of DDoS protection appliances that eliminate DDoS threats in real-time.

shareOptic

shareOptic

von shareOptic

(0 Bewertungen)

Security solution that allows you to remain compliant while uncovering data security threats.

Security solution that allows you to remain compliant while uncovering data security threats.

HaltDos

HaltDos

von HaltDos

(0 Bewertungen)

HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.

HaltDos provides DDoS protection + Web Application Firewall + Load Balancing capabilities in a single platform.

Unistal Anti Virus

Unistal Anti Virus

von Unistal Systems

(0 Bewertungen)

Unistal provides best Data Recovery Software that Recovers Lost or Deleted Files From Windows,Mac,Linux,Hard Disk,Pen Drive,etc

Unistal provides best Data Recovery Software that Recovers Lost or Deleted Files From Windows,Mac,Linux,Hard Disk,Pen Drive,etc

ZEVENET

ZEVENET

von ZEVENET

(0 Bewertungen)

Multi layered Application Delivery Controller for application, services, networks and datacenters.

Multi layered Application Delivery Controller for application, services, networks and datacenters.

Kiuwan Code Security

Kiuwan Code Security

von Kiuwan

(0 Bewertungen)

Broadest SAST platform to shield your applications from external threats

Broadest SAST platform to shield your applications from external threats

Compromise Detection System

Compromise Detection System

von StreamScan

(0 Bewertungen)

A sophisticated Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach

A sophisticated Data Breach Detection Solution primarily focused on detecting unknown malware & threats using a behavior-based approach

eVigilPro

eVigilPro

von Moonshot Technologies

(0 Bewertungen)

A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting.

A big data SIEM tool that collects security log data from numerous hosts to provide centralized analysis & reporting.

SecureNok

SecureNok

von SecureNok

(0 Bewertungen)

SNOK from SecureNok is a cybersecurity monitoring system for industrial networks to detect espionage, sabotage, and malware intrusion

SNOK from SecureNok is a cybersecurity monitoring system for industrial networks to detect espionage, sabotage, and malware intrusion

EntryProtect

EntryProtect

von SentryBay

(0 Bewertungen)

Provides real-time protection of user data from malware and phishing attacks

Provides real-time protection of user data from malware and phishing attacks

Cigloo Browser Isolation Management Platform

CIGLOO is A browser isolation management platform, you can browse on a remote browser so all browsers malicious code will be out.

CIGLOO is A browser isolation management platform, you can browse on a remote browser so all browsers malicious code will be out.

Constellation Analytics Platform

Constellation Analytics Platform

von Haystax Technology

(0 Bewertungen)

A platform that applies multiple artificial intelligence techniques to monitor threats and prioritizes security risk.

A platform that applies multiple artificial intelligence techniques to monitor threats and prioritizes security risk.

ClrStream

ClrStream

von Mithi Software Technologies

(0 Bewertungen)

Protect business system and critical data against malicious intent with ClrStream

Protect business system and critical data against malicious intent with ClrStream

The ZoneRanger

The ZoneRanger

von Tavve

(0 Bewertungen)

Security and network management software that securely manages applications and devices across firewall partitioned networks.

Security and network management software that securely manages applications and devices across firewall partitioned networks.

Devasted Antivirus

Devasted Antivirus

von Digital Hospital Technologies

(0 Bewertungen)

An anti-virus solution that detects and eliminates viruses, spyware, adware, worms, Trojans, rootkits, and other malware.

An anti-virus solution that detects and eliminates viruses, spyware, adware, worms, Trojans, rootkits, and other malware.

Google Cloud Platform

Google Cloud Platform

von Google

(403 Bewertungen)

Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Spiceworks Network Monitor

Spiceworks Network Monitor

von Spiceworks

(282 Bewertungen)

Real-time monitoring, email alerts, monitor multiple devices in one dashboard, easy-to-use for Windows and Linux servers & switches.

Real-time monitoring, email alerts, monitor multiple devices in one dashboard, easy-to-use for Windows and Linux servers & switches.

NordVPN

NordVPN

von NordVPN

(75 Bewertungen)

NordVPN bietet eine leistungsstarke Verschlüsselung für deinen Internetverkehr, damit keine dritten Personen auf deine Unternehmenskommunikation zugreifen können.

NordVPN bietet eine leistungsstarke Verschlüsselung für deinen Internetverkehr, damit keine dritten Personen auf deine Unternehmenskommunikation zugreifen können.

bitdefender GravityZone

bitdefender GravityZone

von bitdefender

(45 Bewertungen)

Centrify Infrastructure Services

Centrify Infrastructure Services

von Centrify

(27 Bewertungen)

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

Smart Protection

Smart Protection

von Trend Micro

(22 Bewertungen)

Antivirus and content security SMTP gateway designed to protect against email viruses and spam.

Antivirus and content security SMTP gateway designed to protect against email viruses and spam.

Webroot SecureAnywhere DNS Protection.

Webroot SecureAnywhere DNS Protection.

von Webroot Software

(21 Bewertungen)

DNS Protection prevents internet abuse, web-borne malware threats while enforcing employee content and web access policies.

DNS Protection prevents internet abuse, web-borne malware threats while enforcing employee content and web access policies.

SPAMfighter

SPAMfighter

von SPAMfighter

(14 Bewertungen)

Nessus

Nessus

von Tenable Network Security

(14 Bewertungen)

Nessus, the industry's most widely deployed vulnerability management solution, helps you reduce your organization's attack surface.

Nessus, the industry's most widely deployed vulnerability management solution, helps you reduce your organization's attack surface.

PracticeProtect

PracticeProtect

von PracticeProtect

(9 Bewertungen)

A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.

A cloud security solution designed especially for Accountants to manage passwords, control access and protect data online.

Bot Mitigation and Management

Bot Mitigation and Management

von ShieldSquare

(8 Bewertungen)

ShieldSquare protects online businesses from web scraping, account takeover, carding, content theft and other forms of bot abuse.

ShieldSquare protects online businesses from web scraping, account takeover, carding, content theft and other forms of bot abuse.

Avast Business Managed Workplace

Avast Business Managed Workplace

von Avast

(8 Bewertungen)

Put security at the core of your practice.

Put security at the core of your practice.

Unified Threat Management

Unified Threat Management

von WatchGuard

(7 Bewertungen)

All-in-One-Netzwerksicherheitsplattform mit der höchsten Leistung.

All-in-One-Netzwerksicherheitsplattform mit der höchsten Leistung.

Astra Security

Astra Security

von Astra Security

(4 Bewertungen)

A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.

A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.

Firewall-1

Firewall-1

von Check Point Software Technologies

(2 Bewertungen)

Firewall, die Zugriffskontrolle, Inhaltssicherheit, Authentifizierung und zentralisierte Verwaltung bietet.

Firewall, die Zugriffskontrolle, Inhaltssicherheit, Authentifizierung und zentralisierte Verwaltung bietet.

F-Secure Anti-Virus

F-Secure Anti-Virus

von F-Secure

(2 Bewertungen)

Protects your office computer against viruses, spyware, worms, and Trojans.

Protects your office computer against viruses, spyware, worms, and Trojans.

X-VPN - Change and Hide IP

X-VPN - Change and Hide IP

von Free Connected

(2 Bewertungen)

The best choice to unblock sites, protect online privacy and surf anonymously with no annoying pop-up ads!

The best choice to unblock sites, protect online privacy and surf anonymously with no annoying pop-up ads!

RedSeal

RedSeal

von RedSeal Networks

(1 Bewertung)

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Netskope Cloud Security Platform

Netskope Cloud Security Platform

von Netskope

(1 Bewertung)

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.

Endpoint Modeling

Endpoint Modeling

von Observable Networks

(1 Bewertung)

Endpoint modeling secures networks by learning & analyzing every endpoint's behavior- including those in encrypted or VPC environments.

Endpoint modeling secures networks by learning & analyzing every endpoint's behavior- including those in encrypted or VPC environments.

Powertech Security Software

Powertech Security Software

von HelpSystems

(1 Bewertung)

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Cisco Cloudlock

Cisco Cloudlock

von Cisco Cloudlock

(1 Bewertung)

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

SpyHunter

SpyHunter

von Enigma Software Group USA

(1 Bewertung)

Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware.

Malware remediation against the latest online security threats, custom-made fixes, remove, detect and eliminate malware.

Spam Marshall

Spam Marshall

von ITA Networks

(1 Bewertung)

Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring.

Exchange server spam filter software with real-time graphical reports, anti-phishing, mail archiving, forwarding, and monitoring.

iSecurity

iSecurity

von Raz-Lee Security

(1 Bewertung)

Bietet Unternehmen Auditing-, Überwachungs-, Compliance- und Präventionslösungen für IBM-i-Server.

Bietet Unternehmen Auditing-, Überwachungs-, Compliance- und Präventionslösungen für IBM-i-Server.

modusCloud

modusCloud

von Vircom

(1 Bewertung)

Eliminate spam and viruses from your mail via email security tool with machine-learning, anti-virus, and archiving capabilities.

Eliminate spam and viruses from your mail via email security tool with machine-learning, anti-virus, and archiving capabilities.

Argent for AWS

Argent for AWS

von Argent Software

(1 Bewertung)

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

Twistlock

Twistlock

von Twistlock

(1 Bewertung)

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

Security Manager

Security Manager

von NetIQ

(0 Bewertungen)

Provides an advanced, central security console for real-time security event monitoring and automated response.

Provides an advanced, central security console for real-time security event monitoring and automated response.

bt-Enterprise

bt-Enterprise

von Burstek

(0 Bewertungen)

Eliminate risk and regain control with enterprise solutions for Web and email filtering.

Eliminate risk and regain control with enterprise solutions for Web and email filtering.

PureSight CSDK/OEM

PureSight CSDK/OEM

von PureSight Technologies

(0 Bewertungen)

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Mailstream Anti-Abuse

Mailstream Anti-Abuse

von Sendmail

(0 Bewertungen)

Uses cutting-edge technologies to prevent spam, phishing, viruses, and other malware from entering the email network.

Uses cutting-edge technologies to prevent spam, phishing, viruses, and other malware from entering the email network.

Security Solutions

Security Solutions

von Dimension Data

(0 Bewertungen)

Basierend auf einer Protect, Detect Respond-Strategie werden Sicherheitsstrategien für Unternehmen auf der ganzen Welt entwickelt.

Basierend auf einer Protect, Detect Respond-Strategie werden Sicherheitsstrategien für Unternehmen auf der ganzen Welt entwickelt.

Web Security-as-a-Service

Web Security-as-a-Service

von ScanSafe Services

(0 Bewertungen)

Ensures a safe web environment for businesses, keeping viruses and spyware off networks and ensuring secure Web and instant messaging.

Ensures a safe web environment for businesses, keeping viruses and spyware off networks and ensuring secure Web and instant messaging.

CX-Mask

CX-Mask

von Camouflage

(0 Bewertungen)

Protect sensitive information in environments that include training, development and outsourcing.

Protect sensitive information in environments that include training, development and outsourcing.

east-tec InvisibleSecrets

east-tec InvisibleSecrets

von East-Tec

(0 Bewertungen)

The complete security suite for all your data/communication needs

The complete security suite for all your data/communication needs

Security Manager

Security Manager

von FireMon

(0 Bewertungen)

Die FireMon-Plattform verwaltet Geräte in einer Organisation, um die Komplexität zu reduzieren, die Compliance zu erhöhen und die Netzwerksicherheit zu verbessern.

Die FireMon-Plattform verwaltet Geräte in einer Organisation, um die Komplexität zu reduzieren, die Compliance zu erhöhen und die Netzwerksicherheit zu verbessern.

Evident.io

Evident.io

von Evident.io

(0 Bewertungen)

Cloud Infrastructure Security for AWS

Cloud Infrastructure Security for AWS

SecureSphere

SecureSphere

von Imperva

(0 Bewertungen)

Imperva delivers cyber security that protects all your data and applications.

Imperva delivers cyber security that protects all your data and applications.

Intelligent Management Center

Intelligent Management Center

von Hewlett Packard Enterprise

(0 Bewertungen)

Comprehensive wired and wireless network management tools supporting the FCAPS model.

Comprehensive wired and wireless network management tools supporting the FCAPS model.

CacheGuard-OS

CacheGuard-OS

von CacheGuard Technologies

(0 Bewertungen)

An Appliance oriented Operating System dedicated to Web traffic Security and Optimization.

An Appliance oriented Operating System dedicated to Web traffic Security and Optimization.

RDS-Shield

RDS-Shield

von Marty Soft Conception

(0 Bewertungen)

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Safe@Office

[email protected]

von SafeDNS

(0 Bewertungen)

Ein Cloud-Service für die Internetsicherheit und das Filtern von Inhalten für Unternehmen jeder Größe, um Unternehmensnetzwerke zu sichern und den Webzugriff zu verwalten

Ein Cloud-Service für die Internetsicherheit und das Filtern von Inhalten für Unternehmen jeder Größe, um Unternehmensnetzwerke zu sichern und den Webzugriff zu verwalten

Ozon

Ozon

von Ozon

(0 Bewertungen)

OZON protect eCommerce site, data and transactions against all web cyber-attacks, hackers, fraudsters and malicious bots.

OZON protect eCommerce site, data and transactions against all web cyber-attacks, hackers, fraudsters and malicious bots.

DNS Firewall

DNS Firewall

von GSLB.me

(0 Bewertungen)

Authoritative, dynamic and geo-DNS, traffic balancing, CDN offload, domain services and DNS firewall. With full DNSSEC support.

Authoritative, dynamic and geo-DNS, traffic balancing, CDN offload, domain services and DNS firewall. With full DNSSEC support.

Speedify for Teams

Speedify for Teams

von Connectify

(0 Bewertungen)

Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.

Fast VPN app with bonding technology using multiple connections in parallel for speed and failover protection.

Ezeelogin SSH Gateway

Ezeelogin SSH Gateway

von Ezeelogin

(0 Bewertungen)

A secure ssh gateway software that helps you configure your own custom linux based ssh jump host or bastion host.

A secure ssh gateway software that helps you configure your own custom linux based ssh jump host or bastion host.

AIONCLOUD

AIONCLOUD

von AIONCLOUD

(0 Bewertungen)

A cloud-based web security service to protect your website that provides Cloud WAF and SITECHECKER.

A cloud-based web security service to protect your website that provides Cloud WAF and SITECHECKER.

B@mbu cloud

[email protected] cloud

von [email protected] cloud

(0 Bewertungen)

[email protected] cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers

[email protected] cloud is a cloud management software that provides encryption techniques and monitoring of data processing centers

DATCOM

DATCOM

von DATCOM

(0 Bewertungen)

Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture.

Supporting business growth through Managed IT Services, Cloud Computing, IT Procurement & Solution Architecture.

Cyberator

Cyberator

von Zartech

(0 Bewertungen)

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Constellix

Constellix

von DNS Made Easy

(0 Bewertungen)

An ITO solution that offers DNS traffic management with integrated network monitoring services.

An ITO solution that offers DNS traffic management with integrated network monitoring services.

ThreatSentry

ThreatSentry

von Privacyware

(0 Bewertungen)

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Ridgeback

Ridgeback

von Ridgeback Network Defense

(0 Bewertungen)

An enterprise security software platform that defeats malicious network invasion in real time.

An enterprise security software platform that defeats malicious network invasion in real time.

Access Watch

Access Watch

von Access Watch Technologies

(0 Bewertungen)

Advanced robot detection delivering precision security, lower hosting costs and increased application performance.

Advanced robot detection delivering precision security, lower hosting costs and increased application performance.

Primo VPN

Primo VPN

von IAInnocationLab

(0 Bewertungen)

Network security solution for VPN with Mac OS that supports PPTP and L2TP from 10.7 to the latest version of Mac.

Network security solution for VPN with Mac OS that supports PPTP and L2TP from 10.7 to the latest version of Mac.

BroadBot

BroadBot

von Invinsec

(0 Bewertungen)

We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network

We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network

GridinSoft Anti-Malware

GridinSoft Anti-Malware

von Gridinsoft

(0 Bewertungen)

Eine Netzwerksicherheitslösung zur Säuberung von Viren, zur Wiederherstellung der Computerleistung und mehr.

Eine Netzwerksicherheitslösung zur Säuberung von Viren, zur Wiederherstellung der Computerleistung und mehr.

Violet

Violet

von Threatcare

(0 Bewertungen)

Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations.

Violet simplifies security controls monitoring and product evaluations and by carrying out on-demand, highly customizable simulations.

Perfecto Encryptor

Perfecto Encryptor

von Black Bird Cleaner Software

(0 Bewertungen)

A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more.

A network security solution with features for files & folder encryption, 4 encryption algorithms, privacy protection, and more.

CloudEye

CloudEye

von Cloudnosys

(0 Bewertungen)

CloudEye Continuously Secure your cloud services and automate compliance. Continuous Security Scanning and Alert on Vulnerabilities.

CloudEye Continuously Secure your cloud services and automate compliance. Continuous Security Scanning and Alert on Vulnerabilities.

Cornerstone MFT Server

Cornerstone MFT Server

von South River Technologies

(0 Bewertungen)

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.

NTFS Permission Tool

NTFS Permission Tool

von G-TAC Software

(0 Bewertungen)

NTFS permission tool to get effective security of data on system through permissions for files and folders.

NTFS permission tool to get effective security of data on system through permissions for files and folders.

Sentinel IPS

Sentinel IPS

von Sentinel IPS

(0 Bewertungen)

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

Snyk

Snyk

von Snyk

(0 Bewertungen)

Hilft dir, Open Source zu verwenden und sicher zu bleiben und kontinuierlich Sicherheitslücken in deinen Abhängigkeiten zu finden und zu beheben.

Hilft dir, Open Source zu verwenden und sicher zu bleiben und kontinuierlich Sicherheitslücken in deinen Abhängigkeiten zu finden und zu beheben.

ManageEngine Firewall Analyzer

ManageEngine Firewall Analyzer

von ManageEngine

(0 Bewertungen)

Firewall Analyzer ist eine Protokollanalyse- und Konfigurationsmanagementsoftware für vollständige Visualisierung der gesamten Netzwerksicherheit.

Firewall Analyzer ist eine Protokollanalyse- und Konfigurationsmanagementsoftware für vollständige Visualisierung der gesamten Netzwerksicherheit.

Aruba ClearPass

Aruba ClearPass

von Aruba Networks

(0 Bewertungen)

Comodo cWatch

Comodo cWatch

von Comodo Group

(0 Bewertungen)

Comodo cWatch Web is a Managed Security Service (MSS) operating in a Security-as-a-Service (SaaS) model.

Comodo cWatch Web is a Managed Security Service (MSS) operating in a Security-as-a-Service (SaaS) model.

CertHat

CertHat

von ProMDM

(0 Bewertungen)

CertHat provides tools for managing and monitoring digital certificates from Microsoft AD CS but also mother/external PKI sources

CertHat provides tools for managing and monitoring digital certificates from Microsoft AD CS but also mother/external PKI sources

NCP

NCP

von NCP engineering

(0 Bewertungen)

NCP is an innovative software that allows enterprises to rethink their remote access and create secure network access.

NCP is an innovative software that allows enterprises to rethink their remote access and create secure network access.

HIAB

HIAB

von Outpost24

(0 Bewertungen)

HIAB is an automated vulnerability management solution that scans and secures internal networks (used by employee, suppliers...).

HIAB is an automated vulnerability management solution that scans and secures internal networks (used by employee, suppliers...).

ditno. Network Firewall

ditno. Network Firewall

von ditno

(0 Bewertungen)

Network Firewall that has taken traditional server protection and simplified it.

Network Firewall that has taken traditional server protection and simplified it.

NCR Network & Security Services

NCR Network & Security Services

von NCR

(0 Bewertungen)

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

Cybowall

Cybowall

von Cybonet

(0 Bewertungen)

Single, affordable network security solution providing network visibility, vulnerability management and breach detection.

Single, affordable network security solution providing network visibility, vulnerability management and breach detection.

MyIP.io VPN

MyIP.io VPN

von MyIP.io

(0 Bewertungen)

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

BufferZone

BufferZone

von Buffer Zone

(0 Bewertungen)

BufferZone provides next-generation endpoint security solutions protecting organizations from ransomware, zero-days and phishing scams.

BufferZone provides next-generation endpoint security solutions protecting organizations from ransomware, zero-days and phishing scams.

HaXM

HaXM

von XM Cyber

(0 Bewertungen)

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

Threat X

Threat X

von Threat X

(0 Bewertungen)

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

Stormshield Management Center

Stormshield Management Center

von Stormshield

(0 Bewertungen)

Stormshield provides a Management Center software that helps you to monitor and secure interconnections between several hundred sites.

Stormshield provides a Management Center software that helps you to monitor and secure interconnections between several hundred sites.