Software de Segurança Informática

Software de segurança informática: os produtos dessa categoria automatizam a segurança e o monitoramento de sistemas de computador. Esses aplicativos examinam e monitoram a rede de computadores da organização para avaliar possíveis vulnerabilidades. Além disso, o software de segurança informática fornece soluções de segurança de rede personalizáveis, bem como pré-configuradas para uma variedade de padrões regulatórios. O software de segurança informática fornece relatórios em tempo real sobre segurança de rede, bem como relatórios de incidentes para possíveis violações de segurança. O software de segurança informática relaciona-se ao sistema de segurança de rede.

Por que o Capterra é gratuito

da NeoByte Solutions

(0 avaliações)
Ver perfil
On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web. On-premise security software that encrypts business data and files for safe keeping or secure transfer across the web.

da Odyssey Technologies

(0 avaliações)
Ver perfil
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.

da DeviceLock

(0 avaliações)
Ver perfil
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

da Secure Hive

(0 avaliações)
Ver perfil
Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Create encrypted archives and self-extracting .exe files for secure storage and file sharing.

da PCSecurityShield

(0 avaliações)
Ver perfil
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Internet security software helping businesses track threats, run device scans and more.

da Nsasoft

(0 avaliações)
Ver perfil
Network security audit system designed to audit network and detect available security vulnerabilities in the network. Network security audit system designed to audit network and detect available security vulnerabilities in the network.

da InfoExpress

(0 avaliações)
Ver perfil
On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints. On-premise network security solution that automatically detects, audits, quarantines and remediates endpoints.

da eEye Digital Security

(0 avaliações)
Ver perfil
Combines advanced scanning technology with most comprehensive vulnerability database. Combines advanced scanning technology with most comprehensive vulnerability database.

da Logmatrix

(0 avaliações)
Ver perfil
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.

da Internet Biometric Security Systems

(0 avaliações)
Ver perfil
On demand biometric security solution for any type of internet application requiring security of confidential information. On demand biometric security solution for any type of internet application requiring security of confidential information.

da ControlCase

(0 avaliações)
Ver perfil
ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI. Comprehensive computer security incident management system.

da PureSight Technologies

(0 avaliações)
Ver perfil
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

da Viwal Interactive

(0 avaliações)
Ver perfil
Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.

da ImageWare Systems

(0 avaliações)
Ver perfil
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.

da EduIQ.com

(0 avaliações)
Ver perfil
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity. Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.

da ComputerProx

(0 avaliações)
Ver perfil
Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Solution that automatically locks the system without requiring any keystrokes from the user.

da Tesline-Service

(0 avaliações)
Ver perfil
On-premise two-factor authentication tool which allows businesses to convert USB drive into a security key, replacing Windows login. On-premise two-factor authentication tool which allows businesses to convert USB drive into a security key, replacing Windows login.

da Securstar

(0 avaliações)
Ver perfil
Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.

da TopLang Software

(0 avaliações)
Ver perfil
Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.

da DTS

(0 avaliações)
Ver perfil
Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software. Secures the Windows Operating System from unwanted or malicious writes.

da LiveEnsure

(0 avaliações)
Ver perfil
Authenticates users through their mobile device, location, knowledge and behavior. Authenticates users through their mobile device, location, knowledge and behavior.

da AnVir Software

(0 avaliações)
Ver perfil
Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.

da Cimcor

(0 avaliações)
Ver perfil
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.

da Pro River Technology

(0 avaliações)
Ver perfil
LifeVest by Pro River Technology provides 24/7 remote monitoring & anti-virus for your business or home computers. Unlike ALL other anti-virus and monitoring software, Pro River has live technicians that monitor your systems 24/7. If something goes wrong, we don't leave it up to you to figure out, our technicians will help you and resolve the issue remotely. Provides 24/7 remote monitoring & anti-virus for your business or home computers.

da Ensure Technologies

(0 avaliações)
Ver perfil
A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.

da Trustifier

(0 avaliações)
Ver perfil
Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network. Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.

da Mission2Mars

(0 avaliações)
Ver perfil
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.

da LogPoint

(0 avaliações)
Ver perfil
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.

da Secure Hunter

(0 avaliações)
Ver perfil
Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.

da Egosecure

(0 avaliações)
Ver perfil
Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.

da Ntrepid

(0 avaliações)
Ver perfil
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

da Cofactor Computing

(0 avaliações)
Ver perfil
Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.

da NetSupport

(0 avaliações)
Ver perfil
Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.

da Clearswift

(0 avaliações)
Ver perfil
Clearswift's award-winning SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, SEG incorporates the latest in inbound threat protection (Avira, Sophos and/or Kaspersky AV), a multi-layer spam defense mechanism, multiple encryption options, advanced security features including DMARC/DKIM. New features include OCR and anti-steganography. Clearswift's SECURE Email Gateway offers an unprecedented level of cyber-attack protection and outbound data loss prevention.

da Nexvue

(0 avaliações)
Ver perfil
Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica. Now NexVue makes 2FA available for Acumatica.

da Votiro

(0 avaliações)
Ver perfil
A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.

da Aiko Solutions

(0 avaliações)
Ver perfil
AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage for all important and business critical information. AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage

da Marty Soft Conception

(0 avaliações)
Ver perfil
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

da Faronics

(0 avaliações)
Ver perfil
Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Any other programs - whether they are unwanted, unlicensed, or simply unnecessary - are blocked from ever executing. Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server.

da Siwena

(0 avaliações)
Ver perfil
We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.

da DMS Companies

(0 avaliações)
Ver perfil
Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables you to securely share sensitive information through a one-time use link.

da SentryBay

(0 avaliações)
Ver perfil
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. On-premise solution that provides real-time protection of user data from malware and phishing attacks

da WipeOS

(0 avaliações)
Ver perfil
A simple solution for permanently wiping data from any storage device in a manner that offers complete transparency to users. A simple solution for permanently wiping data from any storage device in a manner that offers complete transparency to users.

da Zartech

(0 avaliações)
Ver perfil
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

da Privacyware

(0 avaliações)
Ver perfil
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

da SAI Technology

(0 avaliações)
Ver perfil
A computer security solution that limits incorrect employee access privileges and responds to malicious activity. A computer security solution that limits incorrect employee access privileges and responds to malicious activity.

da Gridinsoft

(0 avaliações)
Ver perfil
GridinSoft Anti-Malware targets all kinds of threats on your Windows PC including malware, adware and PUPs. Cure your computer & keep your privacy safe! Defeat viruses within few clicks instead of long-lasting and really boring manual procedures and get the help of security experts whenever you need it. A network security solution to clean system of viruses, help restore computer performance, and more.

da Forecomm

(0 avaliações)
Ver perfil
In a simple and fast way, send your sensible data with full confidentiality. With the BlueFiles virtual printer, send an encrypted copy of your native files with permanent control over printing, download, access period, recipients, even after dispatch, or simply right click on your original files or folders to transfer them. BlueFiles ensures the highest degree of confidentiality until reception of your data with a simple and user-friendly interface. In a simple and fast way, send you sensible data with full confidentiality

da Stellar Information Technology

(0 avaliações)
Ver perfil
It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm. BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.

da NetLib Security

(0 avaliações)
Ver perfil
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

da SecureCircle

(0 avaliações)
Ver perfil
SecureCircle is the world's first opt-out data-centric protection that eliminates insider threats in a zero-trust world. Its patented technology transparently protects sensitive data by default without compromising user experience or business workflow. Headquartered in Mountain View, California, SecureCircle helps organizations in healthcare, finance, manufacturing, pharmaceutical, media, and government meet challenging cybersecurity and compliance requirements. SecureCircle eliminates insider threats by securing data by default and enabling the world's first opt-out security model

da EdgeWave

(0 avaliações)
Ver perfil
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure. Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points

da SecuredTouch

(0 avaliações)
Ver perfil
SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.

da Avanquest Software

(0 avaliações)
Ver perfil
Automatic driver detection: - Schedule the analysis of your drivers - Have Notifications for the new drivers Download: - Download and automatically install from a database of more than 600.000 drivers Backup: - Have a complete history of your drivers - Save your PC drivers - Choose a download location for your drivers - Clone your drivers in an auto-installation file Cleaning and optimisation: - Uninstall the unwanted drivers: - Identify the devices which are not working Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance

da NCR

(0 avaliações)
Ver perfil
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

da Horizon Datasys

(0 avaliações)
Ver perfil
RollBack Rx is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses or even botched software installations can be easily and absolutely reversed in a fast and efficient way. A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.

da VMRay

(0 avaliações)
Ver perfil
VMRay Analyzer is an automated malware analysis and detection product with a revolutionary agentless, hypervisor-centric dynamic analysis engine at its core. Combined with rapid static analysis and reputation engines, it enables malware analysts and incident response professionals to monitor, analyze and identify threats and extract indicators of compromise (IOCs). VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.

da Systancia

(0 avaliações)
Ver perfil
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.

da Digital Shadows

(0 avaliações)
Ver perfil
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

da Rohde & Schwarz Cybersecurity

(0 avaliações)
Ver perfil
The R&SWeb Application Firewall is the holistic security suite for web applications, web services and APIs. The R&SWeb Application Firewall plays an important role in setting up and implementing an application security strategy. It blocks application-level attacks, including the OWASP Top 10, monitors the use of Web applications to guard against insider threats, is highly scalable and available for local deployment as well as cloud environments. R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP

da strongDM

(0 avaliações)
Ver perfil
strongDM works out of the box with any database or server in any environment. strongDM easily integrates with any identity provider, log aggregator, and change management system to onboard, offboard, and audit staff's access to databases and servers. Companies like Hearst, SoFi, and Peloton rely on strongDM to secure staff's access to databases and servers.

da Coronet

(0 avaliações)
Ver perfil
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

da HackEDU

(0 avaliações)
Ver perfil
Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code. Interactive training solution that is effective, has high developer engagement, and reduces vulnerabilities in code.

da Fyde

(0 avaliações)
Ver perfil
A Fyde ajuda empresas com uma força de trabalho cada vez mais distribuída a reduzir o risco de violação ao habilitar o acesso seguro a recursos essenciais da empresa para funcionários, parceiros, contratados e terceirizados. Acesso seguro à Internet e a recursos corporativos com uma única solução.

da Cyber Byte

(0 avaliações)
Ver perfil
Efficient and fast scanning engine with one of the highest detection rates in the market. Efficient and fast scanning engine with one of the highest detection rates in the market.

da Advanced Software Products Group

(0 avaliações)
Ver perfil
Whether your company chooses to secure its on-site data, cloud-stored data, data transmissions, entire files, or specific fields within your IBM Z mainframe environment, MegaCryption can help. MegaCryption is a comprehensive, cryptographic toolkit that not only encrypts for data confidentiality, but also provides data integrity to assure that data has not been compromised, data authentication to verify the origin of the data, and compression to provide the highest level of performance. Enterprise and Mainframe Encryption Toolkit

da Kameleo

(0 avaliações)
Ver perfil
The ultimate solution for online privacy: avoid browser fingerprinting and use virtual profiles. The ultimate solution for online privacy: avoid browser fingerprinting and use virtual profiles.

da Weikawen Technology

(0 avaliações)
Ver perfil
RitaVPN is the best VPN service provider that protects your privacy and security online. RitaVPN masks your IP address with just one click, no way to let your internet privacy out, do whatever you want; RitaVPN encrypts your communication to make sure no information can be used by hackers, even if the government; RitaVPN can change your IP address, make accessing your favorite websites, streaming on the excellent platforms are available all the time. RitaVPN is the best VPN service provider that protects your privacy and security online.

da Shireburn Software

(0 avaliações)
Ver perfil
Data protection tool that enables businesses to manage security across technology infrastructure. Data protection tool that enables businesses to manage security across technology infrastructure.

da Sam Technologies 247

(0 avaliações)
Ver perfil
Antimalware solution that allows users to detect malicious activities on computers and remove temporary files, junk files and more. Antimalware solution that allows users to detect malicious activities on computers and remove temporary files, junk files and more.

da Olfeo

(0 avaliações)
Ver perfil
Solution for web filtering in order to provide better protection for your IT system. Solution for web filtering in order to provide better protection for your IT system.

da Recourse B.V.

(0 avaliações)
Ver perfil
Recourse helps companies guarantee information security and privacy protection in business operations. Recourse helps companies guarantee information security and privacy protection in business operations.

da FortMesa

(0 avaliações)
Ver perfil
Discover the security team you didn't know you had with on-demand team security culture. Build your organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Establish basic governance, assess and manage cyber risk, then deploy the security controls required to defend your organization from cyber attack. Consolidate asset/vulnerability management, threat modeling, and your security control framework all in one place. Discover the security team you didn't know you had. Easy workflows to manage security controls, threats, assets and vulnerabilities.