157 Ergebnisse
Warum Capterra kostenlos ist
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.
Cloud-based security solution that provides businesses with detection and remediation tools to protect against virus attacks.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Reduziere Risiken, halte die Bestimmungen ein und optimiere die Cybersicherheit mit Infocyte – der Plattform für proaktive Cybersicherheit.
Infocyte hilft Sicherheitsteams dabei, ihre Endpunkte mithilfe von erweiterter Bedrohungserkennung, automatisierter Reaktion auf Vorfälle und sofortigen Bedrohungsbewertungen zu schützen. Integriere und optimiere deinen vorhandenen Endpunkt-Security-Stack (SIEM, SOAR, EDR und andere) in der nutzerfreundlichen Cloud-Konsole. MSSPs nutzen Infocyte, um kosteneffektive Risikobewertungen für Cybersicherheit, Reaktion auf Sicherheitsvorfälle sowie Dienste wie Threat Hunting und Managed Detection and Response (MDR) zu liefern.
Infocyte hilft Sicherheitsteams dabei, ihre Endpunkte mithilfe von erweiterter Bedrohungserkennung, automatisierter Reaktion auf Vorfälle und sofortigen Bedrohungsbewertungen zu schützen. Integriere...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Remote Wipe auf Computern und mobilen Endgeräten sowie Sperren und Orten für alle Betriebssysteme und Geräte.
Remote Wipe auf Computern und mobilen Endgeräten sowie Sperren und Orten für alle Betriebssysteme und Geräte.
Remote Wipe auf Computern und mobilen Endgeräten sowie Sperren und Orten für alle Betriebssysteme und Geräte.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Sicherheitsmanagementplattform, die Web-URL-Filterung, Antivirenprogramm, Auto-Sandboxing, Verhaltensanalyse und HIPS bietet.
Sicherheitsmanagementplattform, die Web-URL-Filterung, Antivirenprogramm, Auto-Sandboxing, Verhaltensanalyse und HIPS bietet.
Sicherheitsmanagementplattform, die Web-URL-Filterung, Antivirenprogramm, Auto-Sandboxing, Verhaltensanalyse und HIPS bietet.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpoint-Protection-Software der nächsten Generation, die Angriffe erkennt, verhindert und auf sie reagiert.
Endpoint-Protection-Software der nächsten Generation, die Angriffe erkennt, verhindert und auf sie reagiert.
Endpoint-Protection-Software der nächsten Generation, die Angriffe erkennt, verhindert und auf sie reagiert.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Bietet eine proaktive Lösung für die Sicherung der Endpunkte eines Unternehmens (USBs, CDs/DVDs, BlueTooth, WLAN, FireWire, iPods, MP3s).
AccessPatrol bietet eine proaktive Lösung für die Sicherung der Endpunkte eines Unternehmens (USBs, CDs/DVDs, BlueTooth, WLAN, FireWire, iPods, MP3s).
AccessPatrol bietet eine proaktive Lösung für die Sicherung der Endpunkte eines Unternehmens (USBs, CDs/DVDs, BlueTooth, WLAN, FireWire, iPods, MP3s).

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Protect & manage your organizations devices wherever they are & wherever you are. With HiddenApp, peace of mind is fitted as standard.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes, with zero-touch deployment with our MDM ready solution.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpunktschutz stoppt Bedrohungen auf dem Endpunkt und koordiniert die Durchsetzung mit Cloud- und Netzwerksicherheit.
Der erweiterte Endpunktschutz von Trap stoppt Bedrohungen auf dem Endpunkt und koordiniert die Durchsetzung mit Cloud- und Netzwerksicherheit, um erfolgreiche Cyberangriffe zu verhindern.
Der erweiterte Endpunktschutz von Trap stoppt Bedrohungen auf dem Endpunkt und koordiniert die Durchsetzung mit Cloud- und Netzwerksicherheit, um erfolgreiche Cyberangriffe zu verhindern.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Ermöglicht dir, Daten einfach zu durchsuchen und zu finden, die erforderlichen Daten auszuwählen und sie schnell und effizient wiederherzustellen.
Ermöglicht dir, Daten einfach zu durchsuchen und zu finden, die erforderlichen Daten auszuwählen und sie schnell und effizient wiederherzustellen.
Ermöglicht dir, Daten einfach zu durchsuchen und zu finden, die erforderlichen Daten auszuwählen und sie schnell und effizient wiederherzustellen.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more.
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
DeepArmor is the first AI-based endpoint protection software built specifically for small businesses.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading efficacy. Stay protected wherever you work with security that works both online and off, and take advantage of DeepArmor's simple management and low impact to users. You can install and activate in less than 5 minutes without needing any IT or security skills.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Enterprise mobility management solution coupled with turn-key enterprise applications to increase productivity and efficiency.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both Apple iOS and Google Android operating systems are support under one unified console.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Imperva Sonar offers cloud-based solutions for application, data, and edge security.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect business traffic.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Policy-driven endpoint security. Add enterprise grade technologies such as application whitelisting, ringfencing and storage control.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
For on-premises, SaaS, and cloud-native data, Metallic gives you the best choice for your hybrid cloud data protection journey.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade solution to protect their data. Built on Microsoft Azure, Metallic offers coverage across apps, endpoints, on-premise, & cloud environments - proven to safeguard critical business data from deletion, corruption, & attack. Stay secure, stay compliant, stay recoverable with Metallic backup & recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Verhindere macOS-Malware, erkenne Mac-spezifische Bedrohungen und überwache Endpunkte auf Compliance mit Jamf Protect.
Jamf Protect bietet eine umfassende Endpunktschutzlösung, um die Einhaltung der macOS-Compliance zu gewährleisten, macOS-Malware zu verhindern, Mac-spezifische Bedrohungen zu erkennen und mit minimalen Auswirkungen auf die Endnutzererfahrung zu beheben. Mit bekannter anpassbarer Prävention, intuitiven Dashboards, Echtzeitwarnungen und umfangreicher Berichterstattung, die nur für Macs entwickelt wurde, kannst du sicher sein, dass deine Mac-Flotte gut gesichert ist und stets vollständige Transparenz bei deinen Apple-Computern gegeben ist.
Jamf Protect bietet eine umfassende Endpunktschutzlösung, um die Einhaltung der macOS-Compliance zu gewährleisten, macOS-Malware zu verhindern, Mac-spezifische Bedrohungen zu erkennen und mit...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion.
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Dhound ist ein Sicherheitsüberwachungs- und Angriffserkennungsprogramm für Server, Clouds und Webanwendungen, die mit dem Internet verbunden sind.
Dhound IDS bietet eine assistentenbasierte Erfassung und Analyse von Sicherheitsereignissen auf deinem mit dem Internet verbundenen Gerät/Server, assistentenlose Erfassung und Analyse von Sicherheitsereignissen für die Cloud (AWS), Erkennung/Aufdeckung von Eindringlingen und verdächtigen Aktivitäten, Überwachung des ausgehenden Datenverkehrs und Erkennung von Datenlecks, Zugriffskontrolle und umfassende IP-Adressenanalyse für die Untersuchung von Vorfällen, Verfolgung nutzerdefinierter Ereignisse, die besonders für dein Online-Geschäft wichtig sind.
Dhound IDS bietet eine assistentenbasierte Erfassung und Analyse von Sicherheitsereignissen auf deinem mit dem Internet verbundenen Gerät/Server, assistentenlose Erfassung und Analyse von...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Cloud-based RMM software for patch management, endpoint management, remote desktop, IT asset management made for MSPs and IT admins
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support remote end-users. The cloud-based platform enables automatic patch management, remote desktop access, software deployment and distribution, IT asset inventory, network monitoring, reporting, and more. Action1 RMM is Free Forever for up to 50 endpoints, and it includes all the paid version features.
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Sicherer Zugriff auf Internet- und Unternehmensressourcen mit einer einzigen Lösung.
Fyde hilft Unternehmen mit zunehmend verteiltem Personal, das Risiko von Verstößen zu minimieren, indem es den Mitarbeiter*innen, Partner*innen, Auftragnehmer*innen und Outsourcer*innen einen sicheren Zugriff auf kritische Unternehmensressourcen ermöglicht.
Fyde hilft Unternehmen mit zunehmend verteiltem Personal, das Risiko von Verstößen zu minimieren, indem es den Mitarbeiter*innen, Partner*innen, Auftragnehmer*innen und Outsourcer*innen einen...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Ein einfach zu implementierendes, erschwingliches, zentrales konsolenbasiertes Tool zur Priorisierung und Beseitigung von Schwachstellen und Fehlkonfigurationen.
Mit Vulnerability Manager Plus werden alle Aspekte des Vulnerability-Managements, von der Erkennung und Bewertung von Schwachstellen bis hin zur Beseitigung durch einen automatisierten Patch-Workflow, mit einer zentralisierten Konsole erleichtert. Du kannst außerdem Sicherheitskonfigurationen verwalten, Webserver besser schützen, Zero-Day-Schwachstellen beseitigen, End-of-Life-Audits durchführen und riskante Software vermeiden. Vereinfache das Vulnerability-Management mit einem remote einsetzbaren Agenten, einer webbasierten Schnittstelle und unendlicher Skalierbarkeit.
Mit Vulnerability Manager Plus werden alle Aspekte des Vulnerability-Managements, von der Erkennung und Bewertung von Schwachstellen bis hin zur Beseitigung durch einen automatisierten...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, and Threat Hunting.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Windows-Cybersicherheitsprodukt für Unternehmen.
Windows-Cybersicherheitsprodukt für Unternehmen.
Windows-Cybersicherheitsprodukt für Unternehmen.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI).
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc. It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Reduce the challenges of todays IT environment and improve working practices to protect critical information with Endpoint DLP.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable devices can connect to a company network. The second is to regulate what company data (or files) can be copied to removable media, and encrypt it (if necessary). The third is a data at rest scanning capability which locates where critical information is stored across a network.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable...

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.

Funktionen

  • Verschlüsselung
  • Whitelist/Blacklist
  • Aktivitäts-Verfolgung
  • Gerätemanagement