320 Ergebnisse
Warum Capterra kostenlos ist
Centrify Application Services verbessert die Produktivität der Endnutzer und sichert den Zugriff aller Nutzer auf die Cloud und lokale Anwendungen. Wie? Single Sign-On mit adaptiver MFA für den Zugriff auf deine Cloud, mobile und lokale Anwendungen. Workflow- und Lifecycle-Management leitet App-Anforderungen weiter und versorgt Nutzer über alle Apps hinweg von einem zentralen Kontrollpunkt aus. Das App-Gateway sichert den granularen Zugriff auf Infrastrukturressourcen unabhängig vom Standort und ohne den Aufwand eines VPN. Mobilitätsmanagement (EMM) ist enthalten. Verbessere die Produktivität der Endnutzer und sichere den Zugriff aller Nutzer auf die Cloud und lokale Anwendungen.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.

von Magnet Forensics

5/5 (1 Bewertung)
Produktdetails
eDiscovery-Automatisierungslösung für die Ermittlung, Analyse und Berichterstellung digitaler Forensik. eDiscovery-Automatisierungslösung für die Ermittlung, Analyse und Berichterstellung digitaler Forensik.
Cryptosense bietet modernste Analysesoftware, die Unternehmen dabei hilft, Schwachstellen zu beseitigen, die durch die unsichere Verwendung von Kryptographie in ihren Anwendungen und ihrer Infrastruktur entstehen. Cryptosense bietet Software zur Erkennung und Beseitigung von Sicherheitslücken, die durch den Missbrauch von Kryptografie in Apps und Infrastrukturen verursacht werden.
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.

von TulipControls

4/5 (1 Bewertung)
Produktdetails
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

von DataResolve Technologies

4/5 (1 Bewertung)
Produktdetails
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
1 TBit/s + DDoS-Schutz, der mit jeder Anwendung funktioniert. Wird häufig zum Schutz von Online-Spielen, DNS-, TCP-Diensten und HTTPS-/HTTP-Websites verwendet. 1 TBit/s + DDoS-Schutz, der mit jeder Anwendung funktioniert. Wird häufig zum Schutz von Online-Spielen, DNS-, TCP-Diensten und HTTPS-/HTTP-Websites verwendet.
Produktdetails
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Produktdetails
Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security. Cloud-based browser isolation tool that helps businesses with malware blocking, file sanitization and data security.
Produktdetails
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.
Twistlock ist der führende Anbieter netzübergreifender Container- und Cloud-Sicherheitslösungen für moderne Unternehmen. Von einem präzisen, umsetzbaren Vulnerability Management bis hin zu automatisch bereitgestelltem Laufzeitschutz und Firewalls schützt Twistlock Anwendungen über den gesamten Entwicklungszyklus hinweg bis hin zur Produktion. Speziell für Container-, Serverless- und andere führende Technologien entwickelt – Twistlock bietet Entwicklern die Geschwindigkeit, die sie wollen, und CISOs die Steuerung, die sie benötigen. Twistlock ist die führende native Cloud-Cybersicherheitsplattform für moderne Unternehmen.

von Cobweb Security

5/5 (1 Bewertung)
Produktdetails
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.
Produktdetails
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.
Produktdetails
Der Citadel-Team-Service basiert auf robusten Technologien und dem Know-how von Thales und kann Millionen von Nutzer*innen unterstützen. Der Service bietet eine Chatbot-Technologie, um Geschäftsanwendungen sicher zu integrieren. Jede Kommunikation ist verschlüsselt (Chat, Anruf, Dateifreigabe usw.). Die Anwendung garantiert ein hohes Maß an Sicherheit und ist im Prozess der Grundqualifizierung durch das ANSSI (nationale Agentur für Sicherheit der Informationssysteme in Frankreich). Citadel Team ist ein sofortiger und vertrauenswürdiger Kommunikationsdienst, der von der französischen Gruppe Thales entwickelt, gehostet und betrieben wird.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
Secureworks combines machine learning with human intelligence to predict and prevent more threats. Secureworks combines machine learning with human intelligence to predict and prevent more threats.

von RapidFire Tools

4/5 (1 Bewertung)
Produktdetails
Cyber Hawk ist eine führende Cybersicherheitslösung für MSPs zum Erstellen, Verkaufen und Bereitstellen eines eigenen, gebrandeten Insider-Threat-Detection-Dienstes. Die Anwendung erkennt Verstöße gegen IT-Sicherheitsrichtlinien, anomale Nutzeraktivitäten, verdächtige Änderungen an den Netzwerken und Bedrohungen durch Malware, die externe Schutzmaßnahmen überwindet. Cyber Hawk enthält auch integrierte Servicepläne, Marketingmaterialien und mehr. MSP-Lizenzen ermöglichen eine unbegrenzte Nutzung für alle Kund*innen an jedem Standort. 30-Tage-Geld-zurück-Garantie. Cyber Hawk ist eine führende Cybersicherheitslösung für MSPs zum Erstellen, Verkaufen und Bereitstellen eines eigenen, gebrandeten Insider-Threat-Detection-Dienstes.
Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores. Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.
An all-in-one platform to simplify cybersecurity for small businesses. An all-in-one platform to simplify cybersecurity for small businesses.

von PKWARE

(0 Bewertungen)
Produktdetails
Bietet praktische, zuverlässige Datenverschlüsselung und -schutz, die einfach bereitgestellt, verwaltet und verwendet werden können. Bietet praktische, zuverlässige Datenverschlüsselung und -schutz, die einfach bereitgestellt, verwaltet und verwendet werden können.

von ImageWare Systems

(0 Bewertungen)
Produktdetails
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. Identity management platform that helps businesses manage digital ID proofing, biometric authentication, duplicity checking, and more.

von TransUnion

(0 Bewertungen)
Produktdetails
iovation, protects online businesses against fraud and abuse through our industry-leading combination of shared device reputation and real-time risk evaluation. Retail, financial services, social network, gaming and other companies make real-time queries to iovation's knowledge base of 650 million devices from every country in the world. Every day, iovation protects more than 8 million transactions and stops over 150,000 fraud attempts. Software to reduce cyber fraud through strict device identification measures and risk report generation.

von Prilink

(0 Bewertungen)
Produktdetails
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.

von Crypho

(0 Bewertungen)
Produktdetails
Crypho ist Gruppenchat und Dateifreigabe mit Ende-zu-Ende-Verschlüsselung. Was es von ähnlichen Systemen unterscheidet, ist der kompromisslose Fokus auf Sicherheit und End-to-End-Verschlüsselung. Alle Daten werden mit einer End-to-End-Verschlüsselung versehen, ohne dass Crypho oder andere Personen Zugriff auf die Verschlüsselungsschlüssel haben. Es besteht keine Möglichkeit für Crypho oder Dritte, auf die Daten zuzugreifen. Selbst wenn die Daten abgefangen, gestohlen oder beschlagnahmt werden, sind sie ohne Zugriff auf die Mitgliederschlüssel wertlos. Gruppenchat und Dateifreigabe für Unternehmen mit End-to-End-Verschlüsselung.

von BluSapphire

(0 Bewertungen)
Produktdetails
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

von UpGuard

(0 Bewertungen)
Produktdetails
UpGuard continuously monitors and reduces cybersecurity risk. Our integrated risk platform combines security ratings, security assessment questionnaires and vendor risk management. We also proactively find and close data breaches for hundreds of companies around the world. Reduce cyber risk, prevent data breaches and protect customer data.

von Marty Soft Conception

(0 Bewertungen)
Produktdetails
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

von FICO

(0 Bewertungen)
Produktdetails
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

von PreEmptive Solutions

(0 Bewertungen)
Produktdetails
PreEmptive Protection is the #1 choice to harden your apps making them more resistant to data and ip theft, hacking and tampering. Dotfuscator for .NET/Xamarin, DashO for Java/Android and JSDefender for JavaScript provide quick to implement, premium, multilayered in-app protection. They instill passive and active defending capabilities to help protect trade secrets (IP), reduce piracy/counterfeiting, and prevent inspection/tampering of code and sensitive data. PreEmptive Protection (Dotfuscator, DashO, JSDefender) secures apps running in untrusted environments to protect brand, IP and revenue.

von Zartech

(0 Bewertungen)
Produktdetails
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

von Twizo

(0 Bewertungen)
Produktdetails
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

von RIPS Technologies

(0 Bewertungen)
Produktdetails
RIPS ist die einzige Codeanalyse-Lösung für die PHP-Sprache. Es erkennt die komplexesten Sicherheitslücken, die tief im PHP-Code versteckt sind und von keinem anderen Tool gefunden werden können. Es unterstützt alle wichtigen PHP-Frameworks, die SDLC-Integration und relevante Industriestandards. Es kann als selbst gehostete Software eingesetzt oder als Cloud-Dienst verwendet werden. RIPS ist aufgrund seiner hohen Genauigkeit und der wenigen Fälle von falschem Rauschen die ideale Wahl für die Analyse von PHP-Anwendungen. Erkenne automatisch echte Sicherheitsprobleme in PHP-Anwendungen ohne falsches Rauschen zur Optimierung der Teameffizienz.

von Akamai Technologies

(0 Bewertungen)
Produktdetails
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

von FourV Systems

(0 Bewertungen)
Produktdetails
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

von Fidelis Cybersecurity

(0 Bewertungen)
Produktdetails
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.

von Techefix

(0 Bewertungen)
Produktdetails
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

von Securonix

(0 Bewertungen)
Produktdetails
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

von NetLib Security

(0 Bewertungen)
Produktdetails
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

von Apility.io

(0 Bewertungen)
Produktdetails
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

von APMG International

(0 Bewertungen)
Produktdetails
CDCAT® bietet eine umfassende Cyber-Sicherheitsstrategie und einen Leistungsverbesserungsdienst. CDCAT® bietet eine umfassende Cyber-Sicherheitsstrategie und einen Service zur Verbesserung der Leistungsfähigkeit.

von inWebo

(0 Bewertungen)
Produktdetails
Multi-Faktor-Authentifizierungs- und Identitätsschutzplattform zur Sicherung und Kontrolle des Zugriffs auf Unternehmensanwendungen und Websites. Multi-Faktor-Authentifizierungs- und Identitätsschutzplattform zur Sicherung und Kontrolle des Zugriffs auf Unternehmensanwendungen und Websites.

von TekMonks

(0 Bewertungen)
Produktdetails
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

von Syneidis

(0 Bewertungen)
Produktdetails
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.

von BioCatch

(0 Bewertungen)
Produktdetails
Entwickelt verhaltensbasierte und biometrische Profile von Online-Benutzern, um verschiedenste Bedrohungen durch menschliche und nicht-menschliche Angreifer erkennen zu können. Entwickelt verhaltensbasierte und biometrische Profile von Online-Benutzern, um verschiedenste Bedrohungen durch menschliche und nicht-menschliche Angreifer erkennen zu können.

von Uplevel

(0 Bewertungen)
Produktdetails
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

von EclecticIQ

(0 Bewertungen)
Produktdetails
EclecticIQ trägt dazu bei aus Cyber-Threat-Intelligence mit einer Reihe von Produkten, die für die Cyber-Sicherheit entwickelt wurden, einen Geschäftswert zu schaffen. EclecticIQ trägt dazu bei aus Cyber-Threat-Intelligence mit einer Reihe von Produkten, die für die Cyber-Sicherheit entwickelt wurden, einen Geschäftswert zu schaffen.

von Cryptomage

(0 Bewertungen)
Produktdetails
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

von Namogoo

(0 Bewertungen)
Produktdetails
Namogoo ist eine Kunden-Hijacking-Vorbeugung, die Technologie identifiziert und nicht autorisierte Anzeigen blockiert, die in Consumer-Web-Sitzungen eingefügt werden. Namogoo ist eine Kunden-Hijacking-Vorbeugung, die Technologie identifiziert und nicht autorisierte Anzeigen blockiert, die in Consumer-Web-Sitzungen eingefügt werden.

von Kaymera Technologies

(0 Bewertungen)
Produktdetails
Cybersecurity solution providing protection on any device and maintain effective cyber defense. Cybersecurity solution providing protection on any device and maintain effective cyber defense.

von VigiTrust

(0 Bewertungen)
Produktdetails
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.

von Kobil Systems

(0 Bewertungen)
Produktdetails
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

von Nexus Guard

(0 Bewertungen)
Produktdetails
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

von Outpost24

(0 Bewertungen)
Produktdetails
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

von Giegerich & Partner

(0 Bewertungen)
Produktdetails
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

von Ercom

(0 Bewertungen)
Produktdetails
Cryptosmart is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises Cryptosmart, the ultimate solution to secure mobile communications and devices

von CybelAngel

(0 Bewertungen)
Produktdetails
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

von Cognicase Management Consulting

(0 Bewertungen)
Produktdetails
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

von MyIP.io

(0 Bewertungen)
Produktdetails
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

von XM Cyber

(0 Bewertungen)
Produktdetails
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

von ThreatX

(0 Bewertungen)
Produktdetails
ThreatX protects web applications and APIs from cyber threats across cloud and on-prem environments. By combining behavior profiling and collective threat intelligence with deep analytics, ThreatX delivers precise protection and complete threat visibility. ThreatXs AppSec-as-a-Service combines threat hunting with 24/7 access to security experts along with operational management, virtually eliminating costs associated with legacy WAFs. ThreatX protects modern web applications and APIs from complex cyber threats combining intelligent defense with 24/7 AppSec expertise.

von Interset Software

(0 Bewertungen)
Produktdetails
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

von AGARI Data

(0 Bewertungen)
Produktdetails
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud powered by predictive AI. Leveraging data science and real-time intelligence from trillions of emails, the Agari Identity Graph detects, defends against, and deters costly advanced email attacks including business email compromise, spear phishing and account takeover. Agari Secure Email Cloud detects, defends against, and deters costly advanced email attacks including BEC, spear phishing, and ATO.

von SixGill

(0 Bewertungen)
Produktdetails
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

von Argus Cyber Security

(0 Bewertungen)
Produktdetails
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

von Infocyte

(0 Bewertungen)
Produktdetails
Mit der Cybersicherheitssoftware Infocyte können Sicherheitsteams dateilose Bedrohungen, APTs, Ransomware und Malware schneller erkennen und darauf reagieren. Integriere und erweitere deine Endgerätesicherheit (SIEM, SOAR, EDR und andere) mit der nutzerfreundlichen, in der Cloud gehosteten Konsole. MSSPs nutzen die Plattform, um kosteneffektive Risiko- und Kompromissbewertungen für Cybersicherheit, Reaktion auf Sicherheitsvorfälle sowie Sicherheitsdienste wie Managed Detection and Response (MDR) bereitzustellen. Erkenne und reagiere auf ausgefeilte Bedrohungen, Risiken und Schwachstellen mit der nutzerfreundlichen Cybersicherheitssoftwareplattform von Infocyte.

von Hdiv Security

(0 Bewertungen)
Produktdetails
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

von Precognitive

(0 Bewertungen)
Produktdetails
Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts. Combines device intelligence, behavioral analytics, and real-time decisions to stop fraud before it starts.

von Barracuda Networks

(0 Bewertungen)
Produktdetails
Application security solution that protects web apps with features like automated vulnerability remediation and detection. Application security solution that protects web apps with features like automated vulnerability remediation and detection.

von Aqua Networks

(0 Bewertungen)
Produktdetails
CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanners, hackers and all other evolving threats. CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

von Introviz

(0 Bewertungen)
Produktdetails
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

von CyStack Security

(0 Bewertungen)
Produktdetails
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.

von Famteck

(0 Bewertungen)
Produktdetails
Database Management mobile dashboard that simplify and streamline the number of tools use to manage Oracle and SQL Server databases. nstance Resolve is one of the most secure database solution with 6 solutions in 1 product. Database content/element cyber security; Database and application capacity planning and trending; Database machine learning and resolutions; Database predictive analytics to reduce downtime; Database license management and risk litigation; Resolve your Oracle and SQL Server databases challenges with a centralize mobile database management dashboard.

von Group-IB

(0 Bewertungen)
Produktdetails
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices

von Gleam AI

(0 Bewertungen)
Produktdetails
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business

von Apptimi

(0 Bewertungen)
Produktdetails
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.

von A-LIGN

(0 Bewertungen)
Produktdetails
A-LIGN is one of a limited number of solution providers that can offer a consolidated approach to information technology and information security audits. A-LIGN simplifies the audit and assessment process with A-SCEND, A-LIGN's proprietary governance, risk management, and compliance (GRC) software. A-SCEND was developed in-house with the goal of solving our clients' needs, by creating a more efficient, organized auditing process experience. A-SCEND is A-LIGN's proprietary governance, risk management, and compliance (GRC) software solution.

von Systancia

(0 Bewertungen)
Produktdetails
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.

von CounterCraft

(0 Bewertungen)
Produktdetails
Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations. Empower your cyber security posture with the CounterCraft Cyber Deception Platform. Control the reality your adversaries see.

von Ziwit

(0 Bewertungen)
Produktdetails
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates the web and the dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Counteract hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you.

von Digital Shadows

(0 Bewertungen)
Produktdetails
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

von Hacker Combat

(0 Bewertungen)
Produktdetails
Monitor and control the development of responsive and secret information over your network. Monitor and control the development of responsive and secret information over your network.

von Data443 Risk Mitigation

(0 Bewertungen)
Produktdetails
ClassiDocs delivers comprehensive data classification, governance, discovery, and privacy regulation (GDPR, CCPA & more) compliance within one comprehensive, data security platform, making it truly powerful, yet cost-effective and easy to deploy. ClassiDocs enables the data creator to build, augment, and refine the classification process so they can govern the data they create and communicate its value across the organization. Inventory, Classify and Secure Every Data Point, Every Time

von TokenEx

(0 Bewertungen)
Produktdetails
TokenEx ist eine Plattform der Unternehmensklasse zur Tokenisierung, die praktisch unbegrenzte Flexibilität hinsichtlich dessen bietet, wie Kunden auf Daten zugreifen, diese speichern und sichern können. Es wird mit mehreren Datenakzeptanzkanälen zusammengearbeitet, während ein Prozessor-agnostischer Ansatz beibehalten wird, d. h., nahezu alle Arten von Daten, einschließlich PCI, PII, PHI und sogar unstrukturierte Datenformate, können tokenisiert und gesichert und mit nahezu jedem Prozessor oder Endpunkt integriert werden. Cloudbasierte Datensicherheitsplattform, die Tokenisierung und sicheres Cloud-Datenvaulting für alle sensiblen Datentypen bietet.

von EdGuards

(0 Bewertungen)
Produktdetails
Protects PeopleSoft and Ellucian apps against cyber attacks and security risks. Protects PeopleSoft and Ellucian apps against cyber attacks and security risks.

von Silverbolt

(0 Bewertungen)
Produktdetails
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

von Alyne

(0 Bewertungen)
Produktdetails
Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities. Digital platform that enables enterprises to evaluate their compliance, cybersecurity, and risk management capabilities.

von SecureStack

(0 Bewertungen)
Produktdetails
SecureStacks hybrid cloud management platform centralizes the management of cloud solutions into a self-service, simple to use online platform. Multi-cloud provisioning and orchestration lets you build the same secure infrastructure everywhere. Manage it with roles & profiles you create in our platform targeting subsets of your servers with security tools. Real time events, alerts & mitigations are visible in your SIEM server out of the box. See whats running in your cloud & know its secure. SecureStack helps you build secure infrastructure in a multi-cloud environment and manage security controls across it all from 1 place.

von Lucy Security

(0 Bewertungen)
Produktdetails
Protect your IT infrastructure and prevent cyber crime by running cyber attack simulations, training employees, and performing cyber security checks. Protect your IT infrastructure by running cyber attack simulations, training employees, and performing cyber security checks.

von Wandera

(0 Bewertungen)
Produktdetails
Wanderas Mobile Security Suite provides a single cloud solution that protects against the broadest range of cyber threats and access-based risks. The Mobile Security Suite consists of Mobile Threat Defense, Data Policy and Broker. Wanderas Security Suite provides a single cloud solution that protects against the broadest range of cyber threats & access risks.

von ITrust.fr

(0 Bewertungen)
Produktdetails
Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems. Reveelium was developed to provide an expert anomaly detection system based on intelligent algorithms that ITrust has been developing for 5 years with the support of 3 international laboratories. Reveelium is a behavioural analysis engine for detecting weak signals and anomalies in information systems

von RiskSense

(0 Bewertungen)
Produktdetails
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.

von RocketCyber

(0 Bewertungen)
Produktdetails
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

von MailGuard

(0 Bewertungen)
Produktdetails
MailGuard is a leading cloud-based email security provider, offering a simple customer experience with a targeted focus on detecting and stopping malicious new threats 2-48 hours ahead of competitors. With no software to install, immediate security updates & a team of experts available to help you 24/7, your business will always have the most current protection & support against emerging threats. Chat to our friendly team of experts about our free, no-obligation, 14-day trial. Cloud-based solution designed for businesses to help manage security by detecting and blocking email spams, phishing, spyware, and more