69 Ergebnisse
Warum Capterra kostenlos ist
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors. It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices. KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Prevent misaddressed emails.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server.
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
24/7 SOC-as-a-Service capabilities in a turnkey approach.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations can in a matter of hours add 24/7 dedicated threat monitoring, detection and incident response capabilities.
CipherBox is an end-to-end solution that uses Ciphers state-of-the-art technologies, processes and people to secure the environment of any operation in a rapid, yet comprehensive way. Organizations...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization
Managed detection and response (MDR) service that helps businesses monitor and identify network threats across the organization

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.
Endpoint detection and response solution that helps businesses identify and counter threats across networks and hybrid environments.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.
Endpoint detection and response management solution that helps businesses detect and block threats to prevent data breach.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.
Endpoint detection and response solution that helps businesses with automated patch management and media protection.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Our priority is to protect your business from cyber attacks and most importantly have an incident plant to recover quickly.
Managed Detection and Response combines multiple layers of defence to keep your systems and critical data safe from cyber threats. Driven by a unique, human led approach, we bring together threat intelligence, 24/7 monitoring and incident response. Our managed security services include: SIEM (Managed Security Information and Event Management), EDR (Endpoint Detection and Response) and IDS (Intrusion Detection System).
Managed Detection and Response combines multiple layers of defence to keep your systems and critical data safe from cyber threats. Driven by a unique, human led approach, we bring together threat...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Die Myra Web Application Security Software überwacht Applikationen und Websites, um diese vor Angriffen und Bots zu schützen.
Mit der Myra Web Application Security Software schützt die Myra Security GmbH Institute aus dem Bereich der Finanzen, Versicherungen, des Gesundheitswesens sowie Datenzentren und Onlineshops (E-Commerce). Daneben optimiert die Myra Web Application die Sicherheit der Unternehmen, die für die soziale Ordnung und die Lieferung lebensnotwendiger Lebensmittel verantwortlich sind. Dabei bedient sich das Unternehmen bestimmter Technologien, die unter anderem die Einspeisung bösartigen Codes abwehren.
Mit der Myra Web Application Security Software schützt die Myra Security GmbH Institute aus dem Bereich der Finanzen, Versicherungen, des Gesundheitswesens sowie Datenzentren und Onlineshops...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.
Cloud-based threat detection and response management solution that helps organizations secure networks, access, applications, and more.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
The future of Cyber Defense warfare. Easy to use localized console with toolkit for new and expert users.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential. Payment schedules are flexible.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Endpoint detection and response solution that helps businesses detect malware across devices and systems.
Triage is an endpoint detection and response solution that includes a sandbox, allowing managers to detect and analyze malware. It can be used on macOS, Windows, Linux, and Android systems. The application has a graphic design and presents only the user-relevant data in overviews. A comprehensive REST API is available to gain insights across data generated during analysis on a unified interface.
Triage is an endpoint detection and response solution that includes a sandbox, allowing managers to detect and analyze malware. It can be used on macOS, Windows, Linux, and Android systems. The...

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Microsoft 365 Defender enables businesses to stop attacks with automated, cross-domain security and built-in AI.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsofts XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed....

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.
It is an endpoint detection and response solution that helps businesses receive alerts, detect threats, generate analysis, and more.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
ReaQta-Hive is an Autonomous Detection & Response platform that protects endpoints against threats.
ReaQta-Hive is an Autonomous Detection & Response platform that protects endpoints against threats.
ReaQta-Hive is an Autonomous Detection & Response platform that protects endpoints against threats.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats across endpoints.
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats, incidents, and other online threats across endpoints and systems.
Cloud-based software that helps businesses manage tracking, detection, and remediation operations for cyberthreats, incidents, and other online threats across endpoints and systems.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
The ultimate next-gen Antivirus featuring unparalleled threat intelligence, EDR, forensics, and firewall integration.
The ultimate next-gen Antivirus featuring unparalleled threat intelligence, EDR, forensics, and firewall integration.
The ultimate next-gen Antivirus featuring unparalleled threat intelligence, EDR, forensics, and firewall integration.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring
Universally compatible with any Antivirus, anti-ransomware protection safeguard. Detect. Block. Pursue. Remediate.
Universally compatible with any Antivirus, anti-ransomware protection safeguard. Detect. Block. Pursue. Remediate.
Universally compatible with any Antivirus, anti-ransomware protection safeguard. Detect. Block. Pursue. Remediate.

Funktionen

  • Anomalie- / Malware-Erkennung
  • Sanierungsmanagement
  • Priorisierung
  • Whitelist/Blacklist
  • Kontinuierliches Monitoring