Software de Proteção de Ponto de Trabalho

Software de Proteção de Ponto de Trabalho: encontre a melhor solução para sua empresa utilizando o Capterra Portugal.

Por que o Capterra é gratuito
A plataforma de supervisão e gestão remoto N-central® da SolarWinds® foi projetada para ajudar os fornecedores de serviços gerenciados a lidarem com redes complexas com facilidade. Com ampla automação e opções detalhadas de configuração, recursos de segurança como antivírus e gestão de patches e backup integrado, o N-central foi construído para ajudar os negócios MSP a gerenciar com eficiência redes complexas a partir de uma plataforma fácil de usar. Saiba mais sobre o SolarWinds N-central A plataforma de supervisão e gestão remoto SolarWinds® N-central® foi projetada para simplificar a gestão de redes de TI complexas. Saiba mais sobre o SolarWinds N-central

da Fyde

(0 avaliações)
Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources for their employees, partners, contractors, and outsourcers. Saiba mais sobre o Fyde Secure access to Internet and corporate resources with a single solution. Saiba mais sobre o Fyde
Um software de gestão de computadores Windows, baseado na Internet, que ajuda no gerenciamento de milhares de desktops a partir de um local central. Pode gerenciar desktops na LAN e na WAN. Automatiza as atividades comuns de gestão dos computadores, como instalar softwares, patches e pacotes de serviço, padroniza as máquinas aplicando configurações uniformes, como papéis de parede, atalhos, impressoras, etc. Em resumo, ajuda os administradores a automatizarem, padronizarem, protegerem e auditarem a rede Windows. Saiba mais sobre o ManageEngine Desktop Central Ajuda os administradores a automatizarem, padronizarem, protegerem e auditarem a rede Windows. Desktop Central agora apoia MDM também. Saiba mais sobre o ManageEngine Desktop Central
Filtro de conteúdo da Internet baseado em DNS que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. Filtra mais de meio bilhão de solicitações de DNS todos os dias, identifica 60.000 iterações de malware por dia e tem mais de 7.500 clientes. Versões disponíveis para nuvem e gateway. Faça uma avaliação gratuita do WebTitan hoje, suporte incluído. Saiba mais sobre o WebTitan Filtro de conteúdo da Internet baseado em DNS para empresas, que bloqueia tentativas de malware, ransomware e phishing e fornece controle de conteúdo da Internet. Saiba mais sobre o WebTitan
O EventLog Analyzer é uma solução abrangente de gestão de registros com detecção e análise de ameaças em tempo real. Ele pode correlacionar eventos díspares que ocorrem em toda a rede e também possui uma inteligência de ameaças integrada e uma plataforma de gestão de incidentes. Ele oferece relatórios de auditoria predefinidos para ajudar a rastrear a atividade em bancos de dados, servidores da Internet, dispositivos Windows, dispositivos de perímetro de rede e muito mais. Ele também ajuda a cumprir os regulamentos de conformidade, como PCI DSS, SOX, HIPAA, FISMA e GDPR. Saiba mais sobre o EventLog Analyzer O EventLog Analyzer é uma solução abrangente de gestão de registros que fornece vários recursos de segurança em uma plataforma unificada. Saiba mais sobre o EventLog Analyzer
O AVG Antivirus Business Edition 2018 mantém os dados de negócios e clientes protegidos contra ransomware, vírus, malware e surtos mais recentes em tempo real. É equipado com novos recursos baseados em nuvem, como CyberCapture, detecção aprimorada de malware e proteção aprimorada da Internet. Este produto inclui também gerenciamento remoto gratuito e excelente geração de relatórios. A interface de usuário do cliente também é atualizada. Disponível para PCs, computadores e servidores do Windows. O AVG oferece suporte telefônico para os clientes gratuito, sem interrupção. Saiba mais sobre o AVG Antivirus Business Edition O AVG Antivirus Business Edition 2018 mantém pequenas e médias empresas e dados de clientes protegidos contra ameaças online em tempo real. Saiba mais sobre o AVG Antivirus Business Edition
Está preocupado com senhas fracas e reutilização de senhas que possam prejudicar a segurança da sua empresa? Sua equipe de TI passa a maior parte do tempo solicitando redefinição de senha? Esses problemas podem ser solucionados com o 1Password! Ele é fácil implantar e gerenciar e tem a confiança de mais de 30.000 empresas e mais de 15 milhões de usuários em todo o mundo. Saiba mais sobre o 1Password Vá em frente. Esqueça suas senhas. O 1Password lembra de todas elas para você. Salve suas senhas e faça login nos sites com um único clique. Saiba mais sobre o 1Password
O Endpoint Protector é uma solução de Prevenção Contra a Perda de Dados (DLP) para Grandes, Médias e Pequenas Empresas, disponível como Hardware e Virtual Appliance ou na Nuvem. O Endpoint Protector impede o vazamentos de dados e oferece controle contínuo de dispositivos portáteis. Seus recursos de filtragem de conteúdo para dados em repouso e em movimento variam de tipo de arquivo a conteúdo predefinido com base em dicionários, expressões regulares ou normas como LGPD, GDPR, PCI DSS, HIPAA etc. Saiba mais sobre o Endpoint Protector Prevenção Contra a Perda de Dados. Recursos de Controle de Dispositivos e eDiscovery no Windows, macOS e Linux Saiba mais sobre o Endpoint Protector
Com o Vulnerability Manager Plus, da detecção e avaliação de vulnerabilidades até sua eliminação com um fluxo de trabalho de correção automatizado, todos os aspectos da gestão de vulnerabilidades são facilitados com um console centralizado. Você também pode gerenciar configurações de segurança, proteger servidores da internet, atenuar vulnerabilidades de dia zero, executar auditorias de fim de vida útil e eliminar software arriscado. Simplifique a gestão de vulnerabilidades com um agente que pode ser implementado à distância, interface baseada na internet e expansibilidade sem fim. Saiba mais sobre o ManageEngine Vulnerability Manager Plus Uma ferramenta baseada em console centralizada, fácil de implantar e acessível para priorizar e eliminar vulnerabilidades e configurações incorretas. Saiba mais sobre o ManageEngine Vulnerability Manager Plus
Patch Manager Plus é um software automatizado de gestão de patches que fornece às empresas uma única interface para todas as tarefas de gestão de patches. Funciona em várias plataformas, ajudando você a corrigir o Windows, Mac, Linux e mais de 300 aplicativos de terceiros. Você pode automatizar a verificação de patches ausentes, testar e aprovar correções sem problemas, personalizar políticas de implantação para atender às necessidades de negócios, recusar correções e gerar relatórios de vulnerabilidade. Patch Manager Plus está agora disponível na nuvem e no local. Saiba mais sobre o Patch Manager Plus Patch Manager Plus é um software automatizado de gestão de patches para corrigir atualizações de Windows, Mac, Linux e mais de 300 aplicativos de terceiros. Saiba mais sobre o Patch Manager Plus
O Netsurion capacita as organizações a prever, prevenir, detectar e responder com êxito as ameaças de segurança cibernética. A plataforma SIEM, EventTracker, unifica o aprendizado de máquina, a análise de comportamento e a orquestração de segurança com reconhecimento de 11 anos consecutivos no Gartner MQ for SIEM. O serviço de segurança gerenciada EventTracker SIEMphonic oferece um serviço de SIEM cogerenciado impulsionado pelo SOC sem interrupção. O EventTracker EDR também protege pontos de extremidade críticos contra ataques de dia zero e mutação de malware. Saiba mais sobre o EventTracker Ao fornecer SIEM, EDR e SOC sem interrupção, ele oferece proteção avançada contra ameaças e orquestração de segurança de maneira rápida e eficiente. Saiba mais sobre o EventTracker
Proteção multivetorial contra vírus e malwares que oferece proteção total contra todas as ameaças de malware sofisticadas de hoje, incluindo cavalos de Tróia, keyloggers, phishing, spyware, backdoors, rootkits, ameaças persistentes avançadas e de dia zero. O Identity and Privacy Shield integrado impede que os dados sejam roubados ou capturados durante o uso da Internet e o firewall de saída também impede o malware de roubar dados. Não é preciso se preocupar ou executar atualizações. A segurança orientada pela nuvem significa que os terminais estejam sempre atualizados. Saiba mais sobre o Webroot SecureAnywhere Endpoint Protection Proteção multivetorial contra vírus e malware, oferecendo proteção total contra todas as ameaças sofisticadas de malware atuais. Saiba mais sobre o Webroot SecureAnywhere Endpoint Protection
O ManageEngine ADAudit Plus é uma solução de segurança e conformidade de TI. Com mais de 200 relatórios e alertas em tempo real, ele fornece conhecimento sobre as alterações feitas no conteúdo e na configuração de servidores Active Directory, Azure AD e Windows. Além disso, fornece informações sobre o acesso a estações de trabalho e servidores de arquivos (incluindo NetApp e EMC). O ADAudit Plus ajuda você a rastrear o logon e o logoff do usuário; analisar bloqueios de conta; auditar ADFS, ADLDS e impressoras; encaminhar registros para ferramentas SIEM e muito mais. Saiba mais sobre o ADAudit Plus O ADAudit Plus é um servidor Active Directory, Azure AD e de arquivos (incluindo NetApp e EMC) e um software de supervisão de alterações de estações de trabalho. Saiba mais sobre o ADAudit Plus
O Avast Business Antivirus Pro Plus 2019 é um poderoso pacote completo de terminais, e-mail, servidor e proteção de rede para pequenas e médias empresas (melhor para empresas de 1 a 500 funcionários). Funciona em PCs, Macs e Windows servers. Ele é aprimorado com 18 recursos de ponta para manter a empresa totalmente segura. Inclui poderoso antivírus, servidor, e-mail e segurança de rede, CyberCapture, firewall, gerenciador de senhas, VPN e muito mais. Pode ser usado com ou sem console na nuvem. Saiba mais sobre o Avast Business Antivirus Pro Plus Solução antivírus completa e premiada pronta para proteger todas as partes do negócio. Disponível para PCs, Macs e servidores. Saiba mais sobre o Avast Business Antivirus Pro Plus
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
LogMeIn Central is a powerful, easy-to-use endpoint protection and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk. Simplified endpoint management for desktops, servers, and mobile laptops.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control. Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices. Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the system of record, presenting detailed, accurate, and actionable data for use in incident response, high-risk insider monitoring, and productivity reporting. Cerebral can be deployed On-prem, in the Cloud or through an MSP provider. Monitor and analyze your employees company-wide whether they are in the office or working remotely.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks. NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks. NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization. Automatic, insightful, all-in-one endpoint security from the trusted leader.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Deep Freeze Reboot to Restore Software provides ultimate endpoint protection by freezing a snapshot of your desired computer configuration and settings. With an instant reboot, any unwanted or unauthorized changes are completely erased from the system, restoring it back to its pristine Frozen state. Deep Freeze provides unrestricted system access to end-users while preventing permanent configuration changes and ensures 100% workstation recovery with every restart.. Reboot to Restore is System Restore technology helps to restore Windows and Mac to a pristine, pre-configured state with just a reboot.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce. Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
O Barkly substitui o antivírus legado com uma proteção mais forte, tecnologia mais inteligente e gerenciamento mais simples. O Barkly bloqueia ataques em todos os vetores e intenções, incluindo explorações, scripts, executáveis e ransomware. A arquitetura patenteada de 3 níveis do Barkly proporciona uma visibilidade inigualável de todos os níveis do sistema, incluindo da CPU, para bloquear ataques. O Barkly é incrivelmente simples de gerenciar e implantar: nenhuma política, configuração ou especialização em segurança é necessária. O Barkly Endpoint Protection substitui o antivírus legado com uma proteção mais forte, tecnologia mais inteligente e gerenciamento mais simples.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over software that is not built for your systems. It boasts one of the most comprehensive sets of virus signatures available and keeps itself up to date by automatically downloading the latest virus definitions. You'll have peace of mind knowing that your scan engine is backed by battle-tested technology. Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers.
Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs. Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Idaptive delivers Next-Gen Access, protecting organizations from data breaches through a Zero Trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). Idaptive Next-Gen Access is an integrated platform delivering identity and access management solutions as a service.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS. Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data. Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automatically eliminate threats in real time for both on-prem and cloud environments and is the only solution to provide visibility into encrypted traffic across networks directly from the endpoint. SentinelOne is a converged EPP + EDR solution that seamlessly integrates with diverse IT environments. Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money. Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
GFI EndPointSecurity reduces risk of data leaks and other malicious activity GFI EndPointSecurity reduces risk of data leaks and other malicious activity
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration. Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors. Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.

da TrustWave

(0 avaliações)
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more. Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.

da Prilink

(0 avaliações)
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI). Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.

da Check Point Software Technologies

(0 avaliações)
Provides a single management console, security compliance verification, media encryption, anti-malware and program control. Provides a single management console, security compliance verification, media encryption, anti-malware and program control.

da SecPod Technologies

(0 avaliações)
SecPod Saner provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy to manage solution. SecPod creates computer security software for proactively managing endpoint computer risks.

da CounterTack

(0 avaliações)
Enables endpoint security control providing behavior-based detection and analysis of malware. Enables endpoint security control providing behavior-based detection and analysis of malware.

da Hypori

(0 avaliações)
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.

da Adept Technologies

(0 avaliações)
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.

da UpGuard

(0 avaliações)
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. Get complete visibility into the configuration of every server, network device, and cloud app you're running.

da OS-Easy Cloud

(0 avaliações)
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc. It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time. Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint. It also supports additional security features including device control, deep content inspection, remediation actions, encryption and comprehensive auditing. Running in the background, utilizing advanced throttling techniques, the agent silently discovers critical information without interrupting end user activity. Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint.

da Proofpoint

(0 avaliações)
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console. Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.

da Sentinel IPS

(0 avaliações)
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

da Safely Open

(0 avaliações)
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer. Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.

da MyDiamo

(0 avaliações)
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required. The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution

da Absolute Software

(0 avaliações)
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users. Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.

da Stellar Data Recovery

(0 avaliações)
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion. Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline

da Micro Focus

(0 avaliações)
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing. Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.

da Deep Instinct

(0 avaliações)
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device. End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.

da Secure Channels

(0 avaliações)
All-in-one data encryption solution that supports all your data protection needs. All-in-one data encryption solution that supports all your data protection needs.
Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain English queries, with a Google-like experience, right in your web browser. Cloud-based endpoint management and protection platform to assess security and enforce compliance of endpoints.

da Kandji

(0 avaliações)
Kandji is the MDM worthy of your Apple devices. You've chosen Apple and we've designed a device management experience to match. Drawing on decades of experience in Apple IT, we saw a dire need for an Apple device management platform that could accommodate growing businesses and increasing regulatory demands. Existing solutions were either overly simplistic or mind-numbingly complex, and didnt meet the needs of today's organizations. We knew there had to be a better way - so we built Kandji. Kandji is the MDM worthy of your Apple devices. You've chosen Apple and we've designed a device management experience to match.

da Silverbolt

(0 avaliações)
AI cybersecurity service and endpoint protection. AI cybersecurity service and endpoint protection.

da REVE Antivirus

(0 avaliações)
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks. REVE Endpoint Security software provides advanced protection for all endpoints of an organization.

da RocketCyber

(0 avaliações)
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

da Humming Heads

(0 avaliações)
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.

da Ziften Technologies

(0 avaliações)
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.

da WP Hacked Help

(0 avaliações)
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites

da EndGame

(0 avaliações)
Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Endpoint protection platform that reduces the cost and complexity of your endpoint environment.

da Instart

(0 avaliações)
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure. Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.

da IntSights

(0 avaliações)
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.

da Sternum

(0 avaliações)
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices. Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components. With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end. Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.

da Morphisec

(0 avaliações)
Ideal for small to large enterprises, the endpoint security solution helps protect data against malware, ransomware & more. Ideal for small to large enterprises, the endpoint security solution helps protect data against malware, ransomware & more.

da enSilo

(0 avaliações)
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response. Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.

da Cisco

(0 avaliações)
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more. Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont