Software para Seguridad informática

Utiliza la página Capterra de México para encontrar el mejor Software para Seguridad informática para tu empresa.

¿Por qué Capterra es gratis?
SolarWinds Threat Monitor: Service Provider Edition es una plataforma rápida, escalable y basada en la nube creada para habilitar a los proveedores de gestión de servicios (MSP) una herramienta unificada para supervisar las redes administradas en busca de amenazas, analizar los registros frente a las amenazas más recientes y actualizada información de inteligencia de todo el mundo. Soluciona las amenazas de tus clientes rápidamente y prepara la información necesaria para demostrar tu cumplimiento con los estándares establecidos por los órganos reguladores. Descubre más sobre SolarWinds Threat Monitor SolarWinds® Threat Monitor es la herramienta que necesitas para detectar, remediar e informar sobre eventos de seguridad para todas las redes que administras. Descubre más sobre SolarWinds Threat Monitor

Por Acunetix

(27 reseñas)
Acunetix es una herramienta de seguridad informática que escanea y audita todas las aplicaciones web, incluidas aplicaciones en HTML5, JavaScript y de página única. Realiza exploraciones para detectar 4500 vulnerabilidades, como SQLi y XSS, entre otras. La utilizan sectores militares, de gobierno, educación, telecomunicaciones, banca, finanzas y comercio electrónico, incluidas muchas empresas de la lista Fortune 500. Acunetix ofrece una solución rentable, simple, escalable y de alta disponibilidad. Disponible en Windows, Linux y en línea Descubre más sobre Acunetix Solución de seguridad informática que realiza exploraciones de sitios web, detecta vulnerabilidades como XSS o inyección de SQL y ofrece soluciones. Descubre más sobre Acunetix
Netsparker Security Scanner es una solución precisa que identifica automáticamente XSS, Inyección de SQL y otras vulnerabilidades en aplicaciones web. La tecnología de análisis basada en pruebas única de Netsparker te permite dedicar más tiempo a corregir las fallas informadas explotando automáticamente las vulnerabilidades identificadas de forma segura y de solo lectura, y también presenta una prueba de explotación. Por lo tanto, puedes ver de inmediato el impacto de la vulnerabilidad y no tienes que verificarla manualmente. Descubre más sobre Netsparker Security Scanner Solución precisa que identifica automáticamente XSS, inyección de SQL y otras vulnerabilidades en aplicaciones web. Descubre más sobre Netsparker Security Scanner

Por WhiteCanyon Software

(15 reseñas)
WipeDrive permite que corporaciones, entidades gubernamentales e individuos borren de forma permanente y segura datos de discos duros, medios extraíbles y dispositivos móviles. Proporciona una forma rentable, segura y socialmente responsable de reciclar y pasar a retiro computadoras y almacenamiento informático. WipeDrive es el líder mundial de la destrucción segura de datos. Descubre más sobre WipeDrive Proporciona una forma rentable, segura y socialmente responsable de reciclar y pasar a retiro activos de TI, computadoras y almacenamiento informático. Descubre más sobre WipeDrive

Por Interfocus

(0 reseñas)
Interfocus provides LanScope Cat, a unified endpoint management and security solution in the cloud that simplifies and automates how you control your teams devices in the workplace. LanScope Cat automatically inventories your PCs, laptops, peripherals and software licenses to provide visibility into how users interact with your proprietary data Descubre más sobre LanScope Cat Manage and secure all your endpoints to ensure compliance and protection against malware and other cyber security attacks. Descubre más sobre LanScope Cat
Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy, incluidos troyanos, registradores de pulsaciones de teclas (keyloggers), suplantación de identidad (phishing), spyware, puertas traseras (backdoors), rootkits, día cero y amenazas persistentes avanzadas. El estudio de identidad y privacidad incorporado detiene el robo o la captura de datos cuando se usa Internet y el firewall de salida también detiene el robo de datos mediante malware. No es necesario preocuparse ni ejecutar actualizaciones. La seguridad impulsada por la nube significa que los puntos finales siempre están actualizados. Descubre más sobre Webroot SecureAnywhere Endpoint Protection Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy en día. Descubre más sobre Webroot SecureAnywhere Endpoint Protection

Por Power Admin

(0 reseñas)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Descubre más sobre PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Descubre más sobre PA File Sight

Por ManageEngine

(20 reseñas)
ManageEngine ADAudit Plus es una solución de seguridad y cumplimiento de TI. Con más de 200 informes y alertas en tiempo real, proporciona datos sobre los cambios realizados en el contenido y la configuración de Active Directory, Azure AD y servidores de Windows. Además, proporciona información sobre la estación de trabajo y el acceso al servidor de archivos (incluidos NetApp y EMC). ADAudit Plus te ayuda a rastrear el inicio y cierre de sesión del usuario; analizar bloqueos de cuenta; auditar ADFS, ADLDS e impresoras; reenviar los registros a las herramientas de SIEM, y mucho más. Descubre más sobre ADAudit Plus ADAudit Plus es un software de supervisión de Active Directory, Azure AD, servidores de archivos (incluidos NetApp y EMC) y de cambios de estación de trabajo. Descubre más sobre ADAudit Plus

Por TitanHQ

(176 reseñas)
Filtro de contenido web basado en DNS que bloquea el malware, el ransomware y los intentos de phishing, además de proporcionar control de contenido web. Se filtran más de quinientos millones de solicitudes DNS al día, se identifican 60 000 iteraciones de malware por día y el software cuenta con más de 7500 clientes. Versiones en la nube y puerta de enlace disponibles. Mejora tu seguridad informática y de red ahora. Obtén una prueba gratis de WebTitan hoy, con asistencia incluida. Descubre más sobre WebTitan Filtro de contenido web basado en DNS que bloquea malware, ransomware e intentos de phishing, así como también proporciona control de contenido web. Descubre más sobre WebTitan
EventLog Analyzer es la solución de Gestión de eventos e información de seguridad (SIEM) más rentable disponible en el mercado. EventLog Analyzer cumple con todas las capacidades críticas de SIEM, como agregación de registros, análisis de registros, creación de informes de cumplimiento, supervisión de integridad de archivos, supervisión de la actividad del usuario, correlación de eventos, alertas en tiempo real, análisis forense de registros y retención de registros. Ahora puedes mitigar sofisticados ataques cibernéticos, identificar la causa raíz de los incidentes de seguridad y frustrar las infracciones de datos. Descubre más sobre EventLog Analyzer Ofrece el software de Gestión de eventos e información de seguridad (SIEM) más rentable del mercado. Descubre más sobre EventLog Analyzer

Por WorkPuls

(38 reseñas)
60% of costly digital attacks happen from within. Empluse prevents insider threats to make your workplace safe, secure and productive. Monitor employee behavior around-the-clock, secure your companys data, and protect your bottom line with insider threat detection, data loss prevention, employee monitoring, IT Forensics and more. All from a refreshingly intuitive dashboard. Finally, sophisticated endpoint cybersecurity thats simple to use. Descubre más sobre empulse Endpoint security for companies who care about their data: insider threat detection, data loss prevention, employee monitoring & more. Descubre más sobre empulse
Avast Business Antivirus Pro Plus 2018 es un potente paquete de protección para servidores y puntos finales, todo en uno, para pequeñas y medianas empresas (ideal para 1 a 200 empleados). Funciona en PC, Mac y servidores. El producto está mejorado con 18 características de vanguardia para mantener la vida corporativa totalmente segura. Incluye un poderoso antivirus, seguridad de servidor, correo electrónico y red, CyberCapture, firewall, administrador de contraseñas, VPN y mucho más. Se puede usar con consola en la nube o sin ella. Tú decides. Descubre más sobre Avast Business Antivirus Pro Plus Galardonada solución antivirus todo en uno, lista para proteger cada parte de tu negocio. Disponible para PC, Mac y servidores. Descubre más sobre Avast Business Antivirus Pro Plus

Por Cloud Management Suite

(25 reseñas)
Cloud Management Suite is a cloud-based IT Management and Security solution allowing IT departments to instantly respond to security events. Whether its a ransomware attack or supporting users on the fly, Cloud Management Suite Realtime Security allows you to manage, patch, and remediate your environment with ease. Descubre más sobre Cloud Management Suite Stop breaches in real time and remediate vulnerabilities all from one console. Get live, data from 1000s of devices in under 10 seconds Descubre más sobre Cloud Management Suite

Por Teramind

(52 reseñas)
Teramind proporciona un enfoque de seguridad centrado en el usuario para supervisar el comportamiento del PC del empleado. Este software agiliza la recolección de datos de los empleados para identificar actividades sospechosas, detectar posibles amenazas, supervisar la eficiencia de los empleados y garantizar el cumplimiento con el sector. Ayuda a reducir los incidentes de seguridad al proporcionar acceso en tiempo real a las actividades de los usuarios mediante alertas, advertencias, redirecciones y bloqueos de usuarios, para hacer que tu negocio funcione de la manera más eficiente y segura posible. Descubre más sobre Teramind Realiza la prueba gratis para ver de qué hablan todos los rumores. La supervisión de la actividad del usuario y la prevención del robo de datos se vuelven mucho más fáciles con Teramind. Descubre más sobre Teramind
Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. Descubre más sobre Passworks Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. Descubre más sobre Passworks

Por OneLogin

(34 reseñas)
Diseñado para empresas con más de 100 usuarios, OneLogin proporciona una solución de gestión de acceso e identidad (IAM) basada en la nube que ofrece un inicio de sesión único (SSO) simple que facilita a las empresas asegurar y administrar el acceso a aplicaciones web tanto en la nube como detrás del firewall. ¿Tu empresa tiene tres o más aplicaciones SaaS o web internas? Si es así, te beneficiarás de la seguridad de la solución de inicio de sesión único basada en la nube de OneLogin. Descubre más sobre OneLogin Solución de gestión de identidad (IAM) y de inicio de sesión único (SSO) para empresas de todos los tamaños. Comienza de inmediato con esta prueba gratis. Descubre más sobre OneLogin

Por GlassWire

(17 reseñas)
Ayuda a proteger la red de tu computadora y tu privacidad a través de la supervisión de redes y una herramienta de gestión de firewall integrada. Descubre más sobre GlassWire Ayuda a proteger la red de tu computadora y tu privacidad a través de la supervisión de redes y una herramienta de gestión de firewall integrada. Descubre más sobre GlassWire
AVG Antivirus Business Edition 2018 mantiene tu negocio y los datos de tus clientes a salvo del último ransomware, virus, malware y brotes en tiempo real. Funciona con nuevas características basadas en la nube como CyberCapture, detección mejorada de malware y escudo web mejorado. Este producto incluye también administración remota gratuita y excelente creación de informes. La interfaz de usuario del cliente también se actualiza. Disponible para PC, escritorios y servidores con Windows. AVG ofrece asistencia telefónica gratuita en horario ininterrumpido a tus clientes. Descubre más sobre AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 mantiene tus SMB y los datos de clientes a salvo de amenazas en línea en tiempo real. Descubre más sobre AVG Antivirus Business Edition

Por Netikus.net

(17 reseñas)
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides its users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. Various integrations & multi-tenancy available Descubre más sobre EventSentry Real-Time Log & Event Log Hybrid SIEM monitoring solution with system monitoring, inventory and network monitoring capabilities. Descubre más sobre EventSentry

Por strongDM

(0 reseñas)
strongDM works out of the box with any database or server in any environment. strongDM easily integrates with any identity provider, log aggregator, and change management system to onboard, offboard, and audit staff's access to databases and servers. Descubre más sobre strongDM Companies like Hearst, SoFi, and Peloton rely on strongDM to secure staff's access to databases and servers. Descubre más sobre strongDM

Por TunnelBear

(129 reseñas)
Cuando TunnelBear está activado, tu conexión a internet se protege con cifrado AES de 256 bits y tu dirección IP pública se cambia al país de tu elección. Las empresas confían en TunnelBear para: Proteger empleados remotos y viajeros. Realizar pruebas de garantía de calidad global. Recopilar inteligencia competitiva. Realizar sigilosamente estudios de mercado. Acceder a herramientas de negocio con restricción geográfica. Las empresas tienen acceso a asistencia prioritaria y un administrador de cuenta personal. TunnelBear for Teams es la forma más sencilla en que tu equipo puede trabajar de forma segura y privada desde cualquier lugar.

Por NewSoftwares.net

(478 reseñas)
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.

Por Golden Frog

(26 reseñas)
Administra su propia red y es propietario del hardware, por lo que puede ofrecer las velocidades de VPN más rápidas del mundo. Administra su propia red y es propietario del hardware, por lo que puede ofrecer las velocidades de VPN más rápidas del mundo.

Por AVG Technologies

(926 reseñas)
AVG te ayuda a hacer crecer tu negocio sabiendo que tus datos y comunicaciones en línea están protegidos. AVG te ayuda a hacer crecer tu negocio sabiendo que tus datos y comunicaciones en línea están protegidos.
MiniTool Partition Wizard Free Edition es una pieza de administrador de particiones gratuito dirigido a usuarios domésticos y oficinas en casa. Cierto software posee funciones completas de administración de particiones de disco como Combinar partición, Mover/Redimensionar partición, Copiar partición, Crear partición, Partición dividida, Eliminar partición, Formatear partición y Convertir sistema de archivos. MiniTool Partition Wizard Free Edition es una pieza de administrador de particiones gratuito dirigido a usuarios domésticos y oficinas en casa.

Por Phishme

(3 reseñas)
Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis.
Proteja a los usuarios contra programas maliciosos como virus, gusanos, troyanos, piratas informáticos, correo no deseado y otras formas de intrusión. Proteja a los usuarios contra programas maliciosos como virus, gusanos, troyanos, piratas informáticos, correo no deseado y otras formas de intrusión.

Por Cylance

(36 reseñas)
Olvídate de simplemente detectar los ataques, evítalos usando CylancePROTECT, la solución de punto final que bloquea el 99 % de las amenazas en tiempo real. Olvídate de simplemente detectar los ataques, evítalos usando CylancePROTECT, la solución de punto final que bloquea el 99 % de las amenazas en tiempo real.

Por Bitium

(16 reseñas)
Access control solution for corporate apps that supports integration with third party authentication providers. Access control solution for corporate apps that supports integration with third party authentication providers.

Por TopLang Software

(0 reseñas)
Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.

Por LogPoint

(0 reseñas)
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.

Por DeviceLock

(0 reseñas)
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

Por Logmatrix

(0 reseñas)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.

Por Indeni

(12 reseñas)
Indeni es la plataforma de automatización de fuentes múltiples para infraestructura de red y seguridad. Con Indeni Crowd e Indeni Insight, las organizaciones obtienen acceso al repositorio en vivo de scripts de automatización a través del mantenimiento, la alta disponibilidad, la visibilidad de la red, la seguridad, el cumplimiento y las mejores prácticas de los proveedores. Enseña a tu equipo los procesos de desarrollo conjunto junto con la comunidad más grande de profesionales de TI certificados y reduce el costo total de propiedad con pasos prescriptivos para resolver problemas. Indeni ayuda a los profesionales de TI a detectar problemas de red antes de que se conviertan en problemas importantes mediante el uso de tecnología de análisis predictivo.

Por St. Bernard Software

(0 reseñas)
Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.

Por ComputerProx

(0 reseñas)
Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Solution that automatically locks the system without requiring any keystrokes from the user.

Por Jscrambler

(0 reseñas)
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.

Por ControlCase

(0 reseñas)
ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI. Comprehensive computer security incident management system.

Por Tesline-Service

(0 reseñas)
Two-factor authentication solutions for Windows. Secure USB Key logon. Two-factor authentication solutions for Windows. Secure USB Key logon.

Por Gemnasium

(0 reseñas)
Gemnasium monitors your applications' open source dependencies and alerts you about updates and security vulnerabilities. Your project might be using a dangerous dependency, we will notify you as soon as advisories are public and affect your projects. We support JavaScript, Ruby, Python and PHP applications with more coming soon. We have an enterprise version that supports GitHub Enterprise, GitLab and Bitbucket Server. All versions have free trials. A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities.

Por BlackFog

(1 reseña)
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.

Por PCSecurityShield

(0 reseñas)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.

Por Ntrepid

(0 reseñas)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

Por IS Decisions

(19 reseñas)
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more. Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.

Por IS Decisions

(15 reseñas)
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.

Por Zone Labs

(12 reseñas)
Firewall para PC que mantiene tus datos personales y tu privacidad a salvo de piratas informáticos y ladrones de datos de internet. Firewall para PC que mantiene tus datos personales y tu privacidad a salvo de piratas informáticos y ladrones de datos de internet.
Network security audit system designed to audit network and detect available security vulnerabilities in the network. Network security audit system designed to audit network and detect available security vulnerabilities in the network.

Por Securstar

(0 reseñas)
Protege todos los datos de propiedad guardados en computadoras portátiles y de escritorio el 100 % del tiempo sin que los usuarios tengan que pensar en la seguridad. Protege todos los datos de propiedad guardados en computadoras portátiles y de escritorio el 100 % del tiempo sin que los usuarios tengan que pensar en la seguridad.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.

Por Black Duck

(28 reseñas)
Las organizaciones de todo el mundo utilizan los productos líderes del sector Black Duck Softwares para asegurar y gestionar software de código abierto, eliminando la molestia relacionada con las vulnerabilidades de seguridad, el cumplimiento de licencias de código abierto y el riesgo operacional. Black Duck tiene su sede en Burlington, MA y tiene oficinas en Mountain View, CA, Londres, Fráncfort, Hong Kong, Tokio, Seúl y Pekín. Para obtener más información, visita www.blackducksoftware.com. Los desarrolladores aseguran y gestionan software de código abierto, eliminando los dolores de cabeza relacionados con las vulnerabilidades de seguridad de código abierto y el cumplimiento de las licencias.

Por SSH Communications Security

(4 reseñas)
Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Enables secure system administration, secure file transfer and secure application connectivity with centralized control.

Por Security Stronghold

(1 reseña)
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

Por eEye Digital Security

(0 reseñas)
Combines advanced scanning technology with most comprehensive vulnerability database. Combines advanced scanning technology with most comprehensive vulnerability database.

Por CrowdStrike

(3 reseñas)
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Por NeoByte Solutions

(0 reseñas)
Security software that encrypts your data and files for safe keeping or secure transfer across the net. Security software that encrypts your data and files for safe keeping or secure transfer across the net.

Por Aiko Solutions

(0 reseñas)
AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage for all important and business critical information. AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage

Por AnVir Software

(0 reseñas)
Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.

Por Evolve IP

(9 reseñas)
Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features. Give users streamlined access to the applications they use every day, from anywhere.

Por StillSecure

(0 reseñas)
Security testing, monitoring and management software that defends networks from security breaches. Security testing, monitoring and management software that defends networks from security breaches.

Por Fortres Grand

(1 reseña)
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
La principal elección de administradores de TI y coordinadores de tecnología para proteger los sistemas operativos y equipos de escritorio de Windows de cambios no deseados o malintencionados. La principal elección de administradores de TI y coordinadores de tecnología para proteger los sistemas operativos y equipos de escritorio de Windows de cambios no deseados o malintencionados.

Por Panda Security

(13 reseñas)
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

Por InfoExpress

(0 reseñas)
Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Por Internet Biometric Security Systems

(0 reseñas)
On demand biometric security solution for any type of internet application requiring security of confidential information. On demand biometric security solution for any type of internet application requiring security of confidential information.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

Por MicroWorld Technologies

(1 reseña)
Una completa suite de seguridad que proporciona protección esencial contra virus, contenido censurable, hackers y amenazas de privacidad. Una completa suite de seguridad que proporciona protección esencial contra virus, contenido censurable, hackers y amenazas de privacidad.

Por LiveEnsure

(0 reseñas)
Authenticates users through their mobile device, location, knowledge and behavior. Authenticates users through their mobile device, location, knowledge and behavior.

Por RSA Security

(7 reseñas)
Infraestructura de clave pública; habilita, gestiona y simplifica el uso de certificados digitales. Infraestructura de clave pública; habilita, gestiona y simplifica el uso de certificados digitales.

Por GamaSec

(2 reseñas)
Website security test to protect application and server against hackers. Website security test to protect application and server against hackers.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

Por Viwal Interactive

(0 reseñas)
Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.
Paquete completo de protección antivirus con verificación de comportamiento, control parental y escaneo inactivo. Paquete completo de protección antivirus con verificación de comportamiento, control parental y escaneo inactivo.
Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
CipherCloud for Salesforce addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.The CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with Salesforce. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.

Por BorderWare Technologies

(1 reseña)
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Make decisive, appropriate responses to incidents by automating identification and resolution processes. Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.

Por Great Bay Software

(1 reseña)
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.

Por Secure Hive

(0 reseñas)
Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Create encrypted archives and self-extracting .exe files for secure storage and file sharing.
Manages all crucial security functions, including authentication, encryption and addressing. Manages all crucial security functions, including authentication, encryption and addressing.
A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. A comprehensive security software application that is easy to deploy and scales to the largest of global networks.
Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica. Now NexVue makes 2FA available for Acumatica.

Por ForeScout Technologies

(3 reseñas)
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.

Por Vera

(2 reseñas)
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.

Por Spoon

(1 reseña)
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.

Por White Cloud Security

(1 reseña)
App trust-listing technology. Protects your systems by only allowing trusted applications to execute. App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.

Por TecSec

(0 reseñas)
Enables access to information through encryption, providing information security, privacy and confidentiality. Enables access to information through encryption, providing information security, privacy and confidentiality.
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

Por Radient Software

(0 reseñas)
A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.

Por InetSolution

(0 reseñas)
Utiliza un cifrado potente para proteger las bases de datos a nivel de celda y puede cifrar mensajes de correo electrónico y archivos sin formato en tu red. Utiliza un cifrado potente para proteger las bases de datos a nivel de celda y puede cifrar mensajes de correo electrónico y archivos sin formato en tu red.
Sistema de software de inteligencia para organizaciones de seguridad, prevención de pérdidas y auditoría en los sectores minorista y financiero. Sistema de software de inteligencia para organizaciones de seguridad, prevención de pérdidas y auditoría en los sectores minorista y financiero.
Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.

Por Global Information Technology

(0 reseñas)
IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.
Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software. Secures the Windows Operating System from unwanted or malicious writes.

Por SecurePro Software

(0 reseñas)
File Synchronization and Cloud Storage application that allows users to protect, synchronize, and share files. File Synchronization and Cloud Storage application that allows users to protect, synchronize, and share files.

Por Ensure Technologies

(0 reseñas)
A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.

Por Trustifier

(0 reseñas)
Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network. Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.

Por Mission2Mars

(0 reseñas)
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.
Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.

Por Cofactor Computing

(0 reseñas)
Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.

Por Specops Software

(0 reseñas)
Specops Password Sync simplifies password management for users by allowing them to use one password across multiple systems- including on-premises and SaaS targets. Specops Password Sync instantly synchronizes Active Directory passwords to other systems, which ensures complexity is applied to all business systems. Fights password fatigue by reducing number of passwords to remember
A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.

Por Siwena

(0 reseñas)
We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.

Por DMS Companies

(0 reseñas)
Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables you to securely share sensitive information through a one-time use link.

Por SentryBay

(0 reseñas)
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. Provides real-time protection of user data from malware and phishing attacks

Por NordVPN

(192 reseñas)
Ayuda a las empresas a mantener seguras sus redes y conexiones a Internet. El servicio de VPN agrega una capa adicional de protección para asegurar tus comunicaciones. Esto se logra aplicando un sólido cifrado en todo el tráfico entrante y saliente, para que nadie externo pueda tener acceso a tu información confidencial. Protege a tu organización contra riesgos de seguridad. Acceso seguro de equipos remotos. Simplifica la seguridad de tu red empresarial. Accede a contenido en línea específico de la región desde cualquier parte del mundo. NordVPN aplica un sólido cifrado a todo el tráfico de Internet para que nadie externo pueda tener acceso a tus comunicaciones comerciales.
GravityZone se creó desde cero para la virtualización y la nube con el fin de ofrecer servicios de seguridad empresarial a puntos de conexión físicos, dispositivos móviles, y máquinas virtuales en servidores de correo electrónico Exchange, privados y de la nube pública. GravityZone Enterprise Security ofrece opciones de licencia flexibles para adaptarse a las necesidades de protección de tus oficinas, centros de datos y nube pública. Todos los servicios de seguridad se entregan desde un dispositivo virtual para instalarse a nivel local, y cubre todos los puntos de conexión en tu entorno. Ofrece opciones de licencia flexibles para adaptarse a las necesidades de protección de tus oficinas, centros de datos y nube pública.

Por Windscribe

(40 reseñas)
Windscribe es una aplicación VPN para computadoras de escritorio y una extensión de navegador VPN/proxy que trabajan juntas para bloquear anuncios, rastreadores, restaurar el acceso a contenido bloqueado, proteger las comunicaciones en línea y ayudarte a proteger tu privacidad en línea. Protege tus datos y accede a información sin restricciones, independientemente de tu ubicación geográfica, a través de una VPN y una aplicación de bloqueo de anuncios seguros.
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.

Por F-Secure

(8 reseñas)
Provides strong encryption, supports multiple protocols, security standards & authentication methods. Provides strong encryption, supports multiple protocols, security standards & authentication methods.

Por Prey

(7 reseñas)
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM

Por JumpCloud

(5 reseñas)
JumpCloud Directory-as-a-Service es reimaginado para Active Directory y LDAP. JumpCloud gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes. JumpCloud gestiona los usuarios y sus sistemas, ya sea Mac, Linux o Windows, y proporciona acceso a la nube y a recursos locales, como Office 365, G Suite, AWS, Salesforce y Jira. El mismo inicio de sesión conecta a los usuarios a las redes y archivos compartidos a través de RADIUS y Samba, respectivamente, asegurando el WiFi de tus organizaciones. JumpCloud Directory-as-a-Service gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes.

Por Hushmail

(4 reseñas)
Hushmail es un servicio de correo electrónico seguro que te permite enviar y recibir correos electrónicos y archivos adjuntos privados y cifrados de y para cualquier persona, incluso personas que no usan Hushmail. Con un correo web fácil de usar y una aplicación de iPhone, no hay un proceso de instalación complicado. Simplemente regístrese y comience a enviar de forma segura. Los planes de atención médica vienen configurados para cumplir con HIPAA e incluyen el BAA requerido, una cuenta de archivo y formularios seguros. Un servicio de correo electrónico seguro que permite enviar y recibir correos electrónicos y archivos adjuntos privados y cifrados desde y hacia cualquier persona.

Por Synametrics Technologies

(4 reseñas)
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.

Por Check Point Software Technologies

(2 reseñas)
Firewall that provides access control, content security, authentication and centralized management. Firewall that provides access control, content security, authentication and centralized management.

Por Cisco Cloudlock

(2 reseñas)
Cisco Cloudlock es el proveedor líder de CASB y ciberseguridad como servicio que protege completamente tu empresa. Cisco Cloudlock es el proveedor líder de CASB y ciberseguridad como servicio que protege completamente tu empresa.

Por HackerOne

(2 reseñas)
Una solución de seguridad informática con conexión para el rastreo de problemas, buzón de seguridad, controles de equipo, análisis y métricas, entre otros. Una solución de seguridad informática con conexión para el rastreo de problemas, buzón de seguridad, controles de equipo, análisis y métricas, entre otros.
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.

Por ShieldApps Software Development

(2 reseñas)
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network. On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.

Por Vircom

(1 reseña)
modusGate is an on-premise multi-layer anti-spam email filtering gateway harnessing 2 decades of security and network experience. It incorporates state of the art AI through a real-time machine learning engine to effectively identify threats by reputation and advanced statistical models. We integrate layered scanning with Bitdefender and Avira Anti-Virus, providing leading defense against phishing and malware threats. Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
Protege contra el software de espionaje y supervisión, lo que incluye registradores de teclas, registradores de cámaras web y malware financiero. Protege contra el software de espionaje y supervisión, lo que incluye registradores de teclas, registradores de cámaras web y malware financiero.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Por Pilixo

(1 reseña)
Bodi es una plataforma completa de seguridad de punto final que abarca… Prevención de phishing: impide a los usuarios hacer clic en los enlaces maliciosos; detección de amenazas internas: permite detener el robo de datos con alertas en tiempo real basadas en reglas definidas; análisis de uso: análisis detallado del uso de aplicaciones, navegación web, impresión, actividad; evidencia forense: grabación completa y búsqueda de palabras clave para investigaciones detalladas; recuperación: capacidades completas de control para corregir problemas relacionados con el dispositivo; integración: compatibilidad con la API. Aumenta la productividad de los empleados, impide las amenazas internas y mejora la seguridad de los datos para cumplir con los estrictos requisitos de cumplimiento.
Making Web Browsing Safe Making Web Browsing Safe

Por IDS Global

(1 reseña)
Dhound IDS proporciona recopilación y análisis de eventos de seguridad basados en agentes en tu servidor/dispositivo orientado a internet; recopilación y análisis de eventos de seguridad sin agente para la nube (AWS); detección y alerta de intrusiones y actividad sospechosa; auditoría de tráfico saliente y detección de fugas de datos; control de acceso y análisis completo de direcciones IP para la investigación de incidentes y seguimiento de eventos personalizados que son importantes, especialmente para tu negocio en línea. Dhound es una herramienta de supervisión de seguridad y detección de intrusiones para servidores de internet, nubes y aplicaciones web.

Por Odyssey Technologies

(0 reseñas)
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.

Por PureSight Technologies

(0 reseñas)
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity. Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.
La galardonada puerta de enlace de correo electrónico SEGURO (SEG) Clearswift ofrece un nivel sin precedentes de protección contra ataques cibernéticos y prevención de pérdida de datos salientes para lograr una colaboración segura por correo electrónico. Con su legado en la tecnología MIMEsweeper para SMTP, la SEG Clearswift incorpora lo último en protección contra amenazas entrantes (Sophos o Kaspersky AV), un mecanismo de defensa contra el correo no deseado de múltiples capas, múltiples opciones de cifrado, control de inspección profunda de contenido del tamaño y tipos de adjuntos y características de redacción adaptativa. La galardonada puerta de enlace de correo electrónico SEGURO (SEG) Clearswift ofrece un nivel sin precedentes de protección contra ataques cibernéticos y prevención de pérdida de datos salientes.

Por Marty Soft Conception

(0 reseñas)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Faronics Anti-Executable garantiza la productividad total de la terminal al permitir que solo las aplicaciones aprobadas se ejecuten en una computadora o servidor. Cualquier otro programa, ya sea no deseado, sin licencia o simplemente innecesario, se bloquea para que nunca se ejecute. Faronics Anti-Executable garantiza la productividad total de la terminal al permitir que solo las aplicaciones aprobadas se ejecuten en una computadora o servidor.

Por Open-Xchange

(0 reseñas)
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.

Por Zartech

(0 reseñas)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Por Privacyware

(0 reseñas)
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Por SAI Technology

(0 reseñas)
A computer security solution that limits incorrect employee access privileges and responds to malicious activity. A computer security solution that limits incorrect employee access privileges and responds to malicious activity.

Por SERVERWAT.CH Security Scanner

(0 reseñas)
Are you running an online business and haven't thought about security? Find your vulnerabilities before others do. Schedule vulnerability scans for your servers and get notified when it's time to call your admin. Schedule vulnerability scans for your servers and get notified when it's time to call your admin.
Una solución de seguridad de red diseñada para limpiar virus del sistema, ayudar a restaurar el rendimiento de la computadora, entre otros. Una solución de seguridad de red diseñada para limpiar virus del sistema, ayudar a restaurar el rendimiento de la computadora, entre otros.

Por Forecomm

(0 reseñas)
In a simple and fast way, send your sensible data with full confidentiality. With the BlueFiles virtual printer, send an encrypted copy of your native files with permanent control over printing, download, access period, recipients, even after dispatch, or simply right click on your original files or folders to transfer them. BlueFiles ensures the highest degree of confidentiality until reception of your data with a simple and user-friendly interface. In a simple and fast way, send you sensible data with full confidentiality

Por Stellar Information Technology

(0 reseñas)
It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm. BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.

Por NetLib Security

(0 reseñas)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.

Por South River Technologies

(0 reseñas)
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.

Por SecureCircle

(0 reseñas)
The first security product designed to meet the challenges of securing & managing unstructured data in a zero-trust word. Unlike existing technologies, SecureCircle provides a transparent solution which is always encrypted, trackable, and retractable. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure. Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points

Por SecuredTouch

(0 reseñas)
SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.

Por Avanquest Software

(0 reseñas)
Automatic driver detection: - Schedule the analysis of your drivers - Have Notifications for the new drivers Download: - Download and automatically install from a database of more than 600.000 drivers Backup: - Have a complete history of your drivers - Save your PC drivers - Choose a download location for your drivers - Clone your drivers in an auto-installation file Cleaning and optimisation: - Uninstall the unwanted drivers: - Identify the devices which are not working Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

Por Horizon Datasys

(0 reseñas)
RollBack Rx is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses or even botched software installations can be easily and absolutely reversed in a fast and efficient way. A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.

Por VMRay

(0 reseñas)
VMRay Analyzer is an automated malware analysis and detection product with a revolutionary agentless, hypervisor-centric dynamic analysis engine at its core. Combined with rapid static analysis and reputation engines, it enables malware analysts and incident response professionals to monitor, analyze and identify threats and extract indicators of compromise (IOCs). VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.

Por Treetop Innovation

(0 reseñas)
Anti-hacking software protecting against brute force attacks on Microsoft servers. Anti-hacking software protecting against brute force attacks on Microsoft servers.

Por iSubscribed

(0 reseñas)
Intrusta's goal is to make online security simple. Whether it's using our software, paying your bill, or chatting with a customer service agent, we've taken great efforts to make every interaction enjoyable and easy. Intrusta's software is very lightweight, unlike other products that consume RAM and eat into your battery leaving your system struggling to cope. Intrusta focuses on the bare essentials and fulfills the main purpose efficiently. Completely securing your computer from harm's way. Intelligent scanning software that works quietly in the background finding and fixing issues so you never have to think about it.

Por Digital Shadows

(0 reseñas)
Digital Shadows monitors and manages an organization's digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. Digital Shadows monitors an organization's digital risk, providing relevant threat intelligence across the open, deep, and dark web.

Por Rohde & Schwarz Cybersecurity

(0 reseñas)
The R&S®Web Application Firewall is the holistic security suite for web applications, web services and APIs. The R&S®Web Application Firewall plays an important role in setting up and implementing an application security strategy. It blocks application-level attacks, including the OWASP Top 10, monitors the use of Web applications to guard against insider threats, is highly scalable and available for local deployment as well as cloud environments. R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP

Por ManageEngine

(0 reseñas)
DataSecurity Plus is a data visibility and security solution that offers data discovery, le storage analysis, and real-time Windows le server auditing, alerting & reporting. Furthermore, it monitors le integrity; streamlines compliance requirements; generates instant, user-dened email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.

Por Coronet

(0 reseñas)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

Por BeyondTrust

(0 reseñas)
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.