44 resultados
Por que o Capterra é gratuito?
O SOC Prime Threat Detection Marketplace® (TDM) é uma plataforma de conteúdo SaaS que permite aos profissionais de segurança detectar e responder às ameaças cibernéticas, bem como aumentar o retorno do investimento (ROI na sigla em inglês) da maioria das ferramentas SIEM, EDR, NSM e SOAR em uso. O TDM agrega mais de 65 mil regras SIEM e EDR, analisadores e consultas de pesquisa e outros conteúdos mapeados diretamente para o MITER ATT&CK® e compatíveis com sua solução de resposta e detecção de endpoint (EDR na sigla em inglês) em uso, incluindo Microsoft Defender ATP, Carbon Black, CrowdStrike e Qualys. Saiba mais sobre o Threat Detection Marketplace O SOC Prime TDM é uma comunidade SaaS que oferece conteúdo de detecção de ameaças que pode ser usado em vários formatos SIEM e soluções EDR. Saiba mais sobre o Threat Detection Marketplace
Built to be effective, yet simple to deploy and manage by security professionals of all abilities. Complete and thorough remediation to return endpoints to a truly healthy state. Continuous cloud-based endpoint monitoring. Integrated threat detection that stops threats. Progressive threat detection enrichment intelligence that enables rapid investigation of a successful attack. Guided threat response to isolate, remediate and recover compromised endpoints. Saiba mais sobre o Malwarebytes Endpoint Detection and Response Active threat response that keeps endpoints productive. Endpoint Detection and Response built to respond at the speed of an attack. Saiba mais sobre o Malwarebytes Endpoint Detection and Response
Elimina todos os tipos de ameaças, inclusive vírus, malware, ransomware, rootkits, worms e spyware, com varredura opcional na nuvem para oferecer desempenho e detecção ainda melhores. A ESET usa tecnologias de várias camadas que vão muito além dos recursos do antivírus básico. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota. Inclui proteção contra botnet, antispam, anti-phishing e controle de Internet com capacidade de gestão remota.
Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk é uma plataforma de análise de dados personalizável que permite investigar, supervisionar, analisar e agir. Da TI à segurança e às operações comerciais, o Splunk é uma plataforma de dados para tudo que permite tomar medidas em tempo real. Com o Splunk, é possível prever e prevenir problemas de TI, otimizar toda a pilha de segurança, minimizar o tempo de inatividade não planejado e explorar e visualizar processos de negócios para aumentar a transparência em uma única plataforma. Com a confiança de 92 das 100 maiores empresas da Fortune, o Splunk ajuda a investigar, supervisionar, analisar e atuar em todos os dados da organização.
O Trend Micro Apex One usa uma combinação de técnicas avançadas de proteção contra ameaças para eliminar brechas de segurança em qualquer atividade do usuário e em qualquer endpoint. Ele aprende constantemente, se adapta e compartilha automaticamente a inteligência de ameaças em todo o ambiente. Essa combinação de proteção é fornecida por meio de uma arquitetura que utiliza os recursos de endpoint com mais eficiência e, em última análise, supera a concorrência na utilização da CPU e da rede. Segurança de endpoint automática, criteriosa, tudo-em-um e confiável.
O acesso à empresa foi redefinido por serviços na nuvem, de mobilidade e do tipo traga seu próprio dispositivo (BYOD). Os trabalhadores exigem conectividade segura, não importa a localização: sua mesa pode estar em um carro, num quarto de hotel, em casa ou em um café. O Pulse Connect Secure é resultado de 15 anos de inovação e refinamento, que levaram a uma VPN segura e rica em recursos de última geração. Plataforma baseada na nuvem e no local que permite que as empresas protejam dados críticos com autenticação multifatorial.
Baseado na nuvem e disponível globalmente, o Automox aplica gestão de patches de SO e de terceiros, configurações de segurança e scripts personalizados no Windows, Mac e Linux a partir de um único console intuitivo. A TI e o SecOps podem obter controle e compartilhar rapidamente a visibilidade de endpoints locais, remotos e virtuais sem a necessidade de implantar uma infraestrutura dispendiosa. O Automox é uma plataforma de gestão de patches baseada na nuvem — higiene cibernética moderna para elevar a confiança na segurança do mundo.
Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response. Gain deep visibility across all your endpoints, automate threat prioritization, investigation, and response.
O Netsurion capacita as organizações a prever, prevenir, detectar e responder com êxito as ameaças de segurança cibernética. A plataforma SIEM, EventTracker, unifica o aprendizado de máquina, a análise de comportamento e a orquestração de segurança com reconhecimento de 11 anos consecutivos no Gartner MQ for SIEM. O serviço de segurança gerenciada EventTracker SIEMphonic oferece um serviço de SIEM cogerenciado impulsionado pelo SOC sem interrupção. O EventTracker EDR também protege pontos de extremidade críticos contra ataques de dia zero e mutação de malware. Ao fornecer SIEM, EDR e SOC sem interrupção, ele oferece proteção avançada contra ameaças e orquestração de segurança de maneira rápida e eficiente.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker. Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment. Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics. Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility. CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
(0 avaliações)
Ver perfil
Identifies actual people as they work, not just their logins and passwords, all day long. Identifies actual people as they work, not just their logins and passwords, all day long.
(0 avaliações)
Ver perfil
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.
(0 avaliações)
Ver perfil
An end user support platform to manage and reduce support tickets. An end user support platform to manage and reduce support tickets.
(0 avaliações)
Ver perfil
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
(0 avaliações)
Ver perfil
Effective security starts at the Frontline. Digital Defenses Frontline.Cloud platform provides organizations with a robust, yet easy to deploy security solutions. Frontline.Cloud security Software as a Service (SaaS) platform supports multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Pen Testing (Frontline Pen Test), Frontline Web Application Scanning (Frontline WAS) and Frontline Active Threat Sweep (Frontline ATS). Frontline.Cloud platform provides organization with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
(0 avaliações)
Ver perfil
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
(0 avaliações)
Ver perfil
Arm your security team with cyber threat intelligence to identify and prioritize threats. Arm your security team with cyber threat intelligence to identify and prioritize threats.
(0 avaliações)
Ver perfil
Cortex Data Lake enables AI-based innovations for cybersecurity Cortex Data Lake enables AI-based innovations for cybersecurity
(0 avaliações)
Ver perfil
EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments. EDR platform that makes it possible to detect unknown, advanced and evasive threats in isolated environments.
(0 avaliações)
Ver perfil
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today. The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
(0 avaliações)
Ver perfil
Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats. Threat detection and response solution that automates hunting, investigating, and remediating vulnerabilities and threats.
(0 avaliações)
Ver perfil
Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response. Advanced EDR security solution that streamlines threat hunting and detection and automates endpoint response.
(0 avaliações)
Ver perfil
Endpoint detection and response tool that assists users with guaranteed state of all endpoints, patching, real-time reporting, and more. Endpoint detection and response tool that assist users with guaranteed state of all endpoints, patching, real-time reporting, and more.
(0 avaliações)
Ver perfil
Companies need digital tools to help detect and respond to a cyber incident. Many traditional solutions are simply too expensive. Even worse, traditional solutions often have restrictive tool architectures that prevent investigators from moving quickly when an attack happens. With worldwide availability and by-the-hour pricing, CyFIR Investigator is an endpoint detection and response solution that is affordable and scalable so companies can get the best protection and only pay for what they need On Demand By-the-Hour Forensic Analysis & Remote Remediation
(0 avaliações)
Ver perfil
Automatically detect threats across all attack surfaces. Automatically detect threats across all attack surfaces.
(0 avaliações)
Ver perfil
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact. A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
(0 avaliações)
Ver perfil
Endpoint threat detection, investigation, and responsesimplified. Endpoint threat detection, investigation, and responsesimplified.
(0 avaliações)
Ver perfil
VIPRE SafeSend is a simple Microsoft Outlook add-on that is used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the sender to confirm external recipients and file attachments before their email can be sent. SafeSend also scans attachments for sensitive data and allows companies to build their own DLP rules. VIPRE SafeSend is very scalable, easily deployed and doesn't require a server. Prevent misaddressed emails.
(0 avaliações)
Ver perfil
Advanced, automated endpoint protection, detection, and response Advanced, automated endpoint protection, detection, and response
(0 avaliações)
Ver perfil
Helps businesses protect their Linux infrastructure. Helps businesses protect their Linux infrastructure.
Metallic Endpoint Backup & Recovery delivers proven data protection for your laptops and desktops - with the simplicity of SaaS. Built on Commvaults industry-leading technology, Metallic ensures your data is recoverable from deletion, corruption, ransomware and other malicious attacks. With unlimited Azure storage and one year of data retention included, Metallic SaaS offers hassle-free protection for your employees laptops and desktops wherever they may be. Metallic delivers proven, enterprise-grade data protection for your organization's laptops and desktops - with the simplicity of SaaS.
(0 avaliações)
Ver perfil
Mit Security.Desk kann genau definiert werden, welcher Benutzerkreis welche Dateien von und auf Wechseldatenträger(n) transferieren darf bzw. welche Dateitypen dafür nicht erlaubt sind. Sämtliche Dateibewegungen lassen sich protokollieren. > Freigabe und Blockade bestimmter Schnittstellen > Speichermedien und Dateitypen > Shadowing / Protokollierung von Daten- und Filetransfers > Active Directory-Integration > Rechtemanagement auf allen Ebenen > Zentraler Kontrollstand > Schutz vor Bad-USB uvm. USB- und Endpoint-Security-Lösung