Software para ciberseguridad

Utiliza la página Capterra.mx de México para encontrar el mejor software de Software para ciberseguridad para tu empresa.

Por qué Capterra es gratis
MetaPhish

MetaPhish

Por MetaCompliance

(1 reseña)
El producto MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos. El software contiene una biblioteca de experiencias de aprendizaje inteligentes, como infografías, avisos y videos de formación. A diferencia de otras soluciones de phishing, el software permite al usuario confirmar o comunicarse con el administrador. Descubre más sobre MetaPhish MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos. Descubre más sobre MetaPhish
DataDome bot management solution
DataDome se especializa en proteger y acelerar los negocios digitales. Gracias a la solución de administración de bots con IA, las empresas pueden mejorar el rendimiento de los sitios web agobiados por el raspado intensivo, proteger los datos de los usuarios de los piratas informáticos y tomar mejores decisiones comerciales y de marketing, gracias a datos analíticos que no están contaminados por el tráfico de bots. Desarrolla y ejecuta tu estrategia de administración de bots mediante el panel de control, informes y alertas en tiempo real. Descubre más sobre DataDome bot management solution La solución de administración de bots con IA que protege todos tus puntos de vulnerabilidad (sitios web, aplicaciones...) y acelera tu negocio digital. Descubre más sobre DataDome bot management solution
ESET Endpoint Security
Elimina todo tipo de amenazas, incluidos virus, malware, ransomware, rootkits, gusanos y spyware con escaneo opcional con tecnología de la nube para brindar un rendimiento y detección aún mejores. ESET utiliza tecnologías de varias capas que van mucho más allá de las capacidades de un antivirus básico. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security
WebTitan

WebTitan

Por TitanHQ

(165 reseñas)
Filtro de contenido web basado en DNS que bloquea el malware, el ransomware y los intentos de phishing, además de proporcionar control de contenido web. Se filtran más de quinientos millones de solicitudes DNS al día, se identifican 60 000 iteraciones de malware por día y el software cuenta con más de 7500 clientes. Versiones en la nube y puerta de enlace disponibles. Mejora tu ciberseguridad ahora. Obtén una prueba gratis de WebTitan hoy, con asistencia incluida. Descubre más sobre WebTitan Filtro de contenido web basado en DNS que bloquea malware, ransomware e intentos de phishing, así como también proporciona control de contenido web. Descubre más sobre WebTitan
Alert Logic Cybersecurity

Alert Logic Cybersecurity

Por Alert Logic

(1 reseña)
Cloud Defender is an integrated suite of security & compliance controls for cloud, on-premises, hosted & hybrid infrastructures, delivered as-a-service with 24x7 expert GIAC-certified analysts. With a single solution, it identifies vulnerabilities, defends against web app attacks, analyzes logs across the application stack to identify malicious or anomalistic behavior, & assists with meeting compliance mandates - all in a monthly subscription. Descubre más sobre Alert Logic Cybersecurity Fully managed security & compliance controls for cloud, on-prem, hosted & hybrid infrastructures. Delivered as-a-service with 24x7 SOC. Descubre más sobre Alert Logic Cybersecurity
CyberGRX

CyberGRX

Por CyberGRX

(1 reseña)
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Descubre más sobre CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Descubre más sobre CyberGRX
Webroot SecureAnywhere Endpoint Protection
Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy, incluidos troyanos, registradores de pulsaciones de teclas (keyloggers), suplantación de identidad (phishing), spyware, puertas traseras (backdoors), rootkits, día cero y amenazas persistentes avanzadas. El estudio de identidad y privacidad incorporado detiene el robo o la captura de datos cuando se usa Internet y el firewall de salida también detiene el robo de datos mediante malware. No es necesario preocuparse ni ejecutar actualizaciones. La seguridad impulsada por la nube significa que los puntos finales siempre están actualizados. Descubre más sobre Webroot SecureAnywhere Endpoint Protection Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy en día. Descubre más sobre Webroot SecureAnywhere Endpoint Protection
Netwrix Auditor

Netwrix Auditor

Por Netwrix

(88 reseñas)
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. Descubre más sobre Netwrix Auditor Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Descubre más sobre Netwrix Auditor
Perimeter 81

Perimeter 81

Por Safer Social

(5 reseñas)
Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device. Descubre más sobre Perimeter 81 A single-click, cost-effective cloud VPN that ensures simplified secure network and SaaS resource access for businesses of all sizes. Descubre más sobre Perimeter 81
Log360

Log360

Por ManageEngine

(3 reseñas)
Log360, una solución integrada que combina ADAudit Plus y EventLog Analyzer en una sola consola, es la solución integral para toda la gestión de registros y desafíos de seguridad en la red. Ofrece funciones de recopilación de registros, análisis, correlaciones y archivado en tiempo real que ayudan a proteger datos confidenciales, frustran las amenazas de seguridad interna, y combaten ataques externos. Para ayudar a cumplir con las demandas de seguridad, auditoría y cumplimiento más necesarias, viene preempacado con más de 1200 informes predefinidos y criterios de alerta. Descubre más sobre Log360 Log360, una solución integral de SIEM que ayuda a defender los ataques de seguridad internos y externos con función de gestión de registros. Descubre más sobre Log360
SolarWinds Threat Monitor

SolarWinds Threat Monitor

Por SolarWinds MSP

(1 reseña)
SolarWinds Threat Monitor: Service Provider Edition es una plataforma rápida, escalable y basada en la nube creada para habilitar a los proveedores de gestión de servicios (MSP) una herramienta unificada para supervisar las redes administradas en busca de amenazas, analizar los registros frente a las amenazas más recientes y actualizada información de inteligencia de todo el mundo. Soluciona las amenazas de tus clientes rápidamente y prepara la información necesaria para demostrar tu cumplimiento con los estándares establecidos por los órganos reguladores. Descubre más sobre SolarWinds Threat Monitor SolarWinds® Threat Monitor es la herramienta que necesitas para detectar, remediar e informar sobre eventos de seguridad para todas las redes que administras. Descubre más sobre SolarWinds Threat Monitor
Cryptosense

Cryptosense

Por Cryptosense

(1 reseña)
Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e infraestructura. Descubre más sobre Cryptosense Cryptosense proporciona software para detectar y eliminar las vulnerabilidades causadas por el mal uso de la criptografía en aplicaciones e infraestructuras. Descubre más sobre Cryptosense
JumpCloud DaaS

JumpCloud DaaS

Por JumpCloud

(4 reseñas)
JumpCloud Directory-as-a-Service es reimaginado para Active Directory y LDAP. JumpCloud gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes. JumpCloud gestiona los usuarios y sus sistemas, ya sea Mac, Linux o Windows, y proporciona acceso a la nube y a recursos locales, como Office 365, G Suite, AWS, Salesforce y Jira. El mismo inicio de sesión conecta a los usuarios a las redes y archivos compartidos a través de RADIUS y Samba, respectivamente, asegurando el WiFi de tus organizaciones. Descubre más sobre JumpCloud DaaS JumpCloud Directory-as-a-Service gestiona y conecta de forma segura a tus usuarios con sus sistemas, aplicaciones, archivos y redes. Descubre más sobre JumpCloud DaaS
Acunetix

Acunetix

Por Acunetix

(21 reseñas)
Acunetix lidera el mercado en cuanto a la tecnología de pruebas automáticas de seguridad web y que analiza y audita sitios web complejos, autenticados, HTML5 y con mucho JavaScript, entre otros. Utilizado por muchos sectores gubernamentales, militares, educativos, de telecomunicaciones, banca, finanzas y comercio electrónico, incluyendo muchas empresas de Fortune 500, Acunetix ofrece una entrada rentable en el mercado de análisis web con una solución simple, escalable y de disponibilidad, sin comprometer la calidad. Descubre más sobre Acunetix Una solución de administración de vulnerabilidades que analiza tu sitio web, detecta vulnerabilidades como XSS o SQL Injection y ofrece soluciones. Descubre más sobre Acunetix
Teramind

Teramind

Por Teramind

(49 reseñas)
Teramind proporciona un enfoque de seguridad centrado en el usuario para supervisar el comportamiento del PC del empleado. Este software agiliza la recolección de datos de los empleados para identificar actividades sospechosas, detectar posibles amenazas, supervisar la eficiencia de los empleados y garantizar el cumplimiento con el sector. Ayuda a reducir los incidentes de seguridad al proporcionar acceso en tiempo real a las actividades de los usuarios mediante alertas, advertencias, redirecciones y bloqueos de usuarios, para hacer que tu negocio funcione de la manera más eficiente y segura posible. Descubre más sobre Teramind Realiza la prueba gratis para ver de qué hablan todos los rumores. La supervisión de la actividad del usuario y la prevención del robo de datos se vuelven mucho más fáciles con Teramind. Descubre más sobre Teramind
PA File Sight

PA File Sight

Por Power Admin

(0 reseñas)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Descubre más sobre PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Descubre más sobre PA File Sight
ComplyAssistant

ComplyAssistant

Por ComplyAssistant

(0 reseñas)
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Descubre más sobre ComplyAssistant ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. Descubre más sobre ComplyAssistant
Horangi Web Security Services

Horangi Web Security Services

Por Horangi Cyber Security

(1 reseña)
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Descubre más sobre Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Descubre más sobre Horangi Web Security Services
Barkly

Barkly

Por Barkly

(26 reseñas)
Barkly sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Barkly bloquea los ataques a través de todos los vectores e intentos, incluso vulnerabilidades, secuencias de comandos, ejecutables y ransomware. La arquitectura de 3 niveles patentada de Barkly permite una visibilidad inigualable en todos los niveles del sistema, incluida la CPU, para bloquear los ataques. Barkly es increíblemente fácil de administrar e implementar: no se requieren conocimientos de políticas, configuración o seguridad. Descubre más sobre Barkly Barkly Endpoint Protection sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Descubre más sobre Barkly
EventSentry

EventSentry

Por Netikus.net

(17 reseñas)
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Descubre más sobre EventSentry Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities. Descubre más sobre EventSentry
Praetorian

Praetorian

Por Praetorian

(0 reseñas)
Como colectivo de ingenieros y desarrolladores altamente técnicos que ofrecen una experiencia de seguridad profunda, Praetorian resuelve los desafíos más difíciles que enfrentan las organizaciones líderes de la actualidad en un ambiente de amenazas digitales en constante evolución. Estas soluciones permiten que los clientes encuentren, solucionen, detengan y, en última instancia, resuelvan problemas de ciberseguridad en toda tu empresa y carteras de productos. Estas soluciones permiten que los clientes encuentren, solucionen, detengan y resuelvan problemas de ciberseguridad en tu empresa y carteras de productos.
SiteLock

SiteLock

Por SiteLock

(11 reseñas)
SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios. La empresa ofrece soluciones de seguridad avanzadas basadas en la nube para organizaciones de todos los tamaños. Los productos de SiteLock incluyen escaneo diario con eliminación automática de malware, un firewall de aplicaciones web administradas con un CDN global para un sitio web extremadamente rápido, protección DDoS avanzada y personal de asistencia telefónica en Estados Unidos sin igual, en horario ininterrumpido. SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios.
PowerBroker

PowerBroker

Por BeyondTrust

(0 reseñas)
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
RansomFree

RansomFree

Por Cybereason

(2 reseñas)
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
Indeni

Indeni

Por Indeni

(12 reseñas)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Jscrambler

Jscrambler

Por Jscrambler

(0 reseñas)
Jscrambler is the leader in security for JavaScript Applications, working on highly innovative security products to protect Web and Mobile apps. Their products are used by 30.000 users in 145 countries, including some of the most innovative companies in the world and Fortune 500 organizations, in a number of sectors including Finance, Advertising, Media and Gaming. Recently, a new Webpage Integrity module was introduced that extends their code protection expertize to the webpage. Make Your JavaScript Application Protect Itself
Crypho

Crypho

Por Crypho

(0 reseñas)
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys. Enterprise group chat and file sharing with end-to-end encryption.
TraceCSO

TraceCSO

Por TraceSecurity

(1 reseña)
Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies. Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.
FICO Enterprise Security Score
The FICO Enterprise Security Score employs a complex assessment of network assets, applies advanced predictive algorithms, and then condenses the results down to an easy-to-interpret metric that effectively measures enterprise risk exposure. Organizations can use this metric to understand and track their own performance, or share it with business partners as an easy-to-understand surrogate for a more in-depth exchange of security posture details. The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.
Heimdal CORP

Heimdal CORP

Por Heimdal Security

(3 reseñas)
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
BluSapphire

BluSapphire

Por BluSapphire

(0 reseñas)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
ARGUS

ARGUS

Por Argus Cyber Security

(0 reseñas)
ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks. ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.
Okta

Okta

Por Okta

(184 reseñas)
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.
Tandem Software

Tandem Software

Por CoNetrix

(20 reseñas)
Tandem Security & Compliance Software by CoNetrix is an innovative suite of information security and compliance management tools used by more than 1400 U.S. financial institutions. Modules include: Risk Assessment, Policies, Business Continuity Planning, Vendor Management, Social Media Management, Audit Management, Phishing, Cybersecurity, and more. Software features include secure document storage, unlimited users, roles & responsibilities, tasks, email reminders, and incredible support. Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.
Trend Micro Deep Security

Trend Micro Deep Security

Por Trend Micro

(32 reseñas)
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security platform lowers the cost and complexity of securing workloads across multiple environments. Protect your business across physical, virtual cloud and container environments with central visibility and control.
Centrify Infrastructure Services

Centrify Infrastructure Services

Por Centrify

(27 reseñas)
Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud... Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.
Avast Business CloudCare

Avast Business CloudCare

Por Avast

(6 reseñas)
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
ThreatAdvice

ThreatAdvice

Por ThreatAdvice

(5 reseñas)
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
Tines

Tines

Por Tines

(5 reseñas)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Business Suite

Business Suite

Por F-Secure

(4 reseñas)
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
SandBlast Threat Emulation

SandBlast Threat Emulation

Por Check Point Software Technologies

(4 reseñas)
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks. CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
Virus Vanish

Virus Vanish

Por DigitalBulls

(4 reseñas)
Free tool that scans your computer for viruses, malware, spyware, and other threats. Free tool that scans your computer for viruses, malware, spyware, and other threats.
TrustMAPP

TrustMAPP

Por Secure Digital Solutions

(3 reseñas)
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
WebDefender

WebDefender

Por Cobweb Security

(3 reseñas)
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Pulsedive

Pulsedive

Por Pulsedive

(3 reseñas)
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Threat Response

Threat Response

Por Proofpoint

(2 reseñas)
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Darktrace

Darktrace

Por Darktrace

(2 reseñas)
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system based on machine learning and probabilistic mathematics.
Business VPN

Business VPN

Por KeepSolid

(2 reseñas)
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
CYBEATS

CYBEATS

Por CYBEATS

(2 reseñas)
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
RedSeal

RedSeal

Por RedSeal Networks

(1 reseña)
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more. Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Powertech Security Software

Powertech Security Software

Por HelpSystems

(1 reseña)
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Hybrid Cloud Security

Hybrid Cloud Security

Por Symantec

(1 reseña)
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.
TAP

TAP

Por FireEye

(1 reseña)
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows. Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Security Intelligence Platform

Security Intelligence Platform

Por Exabeam

(1 reseña)
Security management and operations platform with detection, analytics, and response capabilities. Security management and operations platform with detection, analytics, and response capabilities.
Barriqade

Barriqade

Por TulipControls

(1 reseña)
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
Voxility DDoS Protection

Voxility DDoS Protection

Por Voxility

(1 reseña)
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites 1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
Argent for AWS

Argent for AWS

Por Argent Software

(1 reseña)
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Twistlock

Twistlock

Por Twistlock

(1 reseña)
Twistlock es el proveedor líder de soluciones de seguridad cibernética nativa en contenedores y en la nube para la empresa moderna. Desde una administración de vulnerabilidades precisa y procesable hasta firewalls y protección de tiempo de ejecución implementados automáticamente, Twistlock protege las aplicaciones en todo el ciclo de vida de desarrollo y en la producción. Diseñado para contenedores, sin servidor y otras tecnologías líderes: Twistlock brinda a los desarrolladores la velocidad que desean y a los CISO el control que necesitan. Twistlock es la plataforma líder de ciberseguridad nativa en la nube para la empresa moderna.
The CyberStrong Platform

The CyberStrong Platform

Por CyberSaint Security

(1 reseña)
The CyberStrong Platform implements the language of cyber for the future of business. Empower your team to streamline continuous compliance and risk management with CyberStrong's unparalleled time-to-value, breakthrough AI and Machine Learning, and agile workflow. Get instant visibility into any combination of compliance standards and experience what immediate cybersecurity ROI feels like. Get a Free Demo: https://www.cybersaint.io CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.
OnDMARC

OnDMARC

Por Redsift

(1 reseña)
OnDMARC es un producto Red Sift. Red Sift es una plataforma de nube abierta que hace que la ciberseguridad sea accesible para todos para prevenir ataques cibernéticos. OnDMARC facilita la implementación y el mantenimiento de una política segura de DMARC. OnDMARC no solo procesa informes XML complejos, sino que utiliza la última tecnología para guiarte hacia la protección total. OnDMARC es un producto de seguridad del correo electrónico que ayuda a las organizaciones de todos los tamaños a implementar DMARC con confianza.
PortSwigger

PortSwigger

Por PortSwigger

(1 reseña)
PortSwigger is a Web Security software for web security professionals for testing web applications. PortSwigger is a Web Security software for web security professionals for testing web applications.
Ekran System

Ekran System

Por Ekran System

(0 reseñas)
Ekran Systems is an advanced insider threat detection solution for companies of any size, can record all terminal, remote, local user sessions and alert security personnel to suspicious events. Ekran offers more than just session review tools and increased internal visibility. Enhanced multi-layer search indexes, flexible alerts, reports, access management and incident response tools - we are ready to assist in your investigations, audits, continuous monitoring, and regulation compliance. Ekran Systems® is universal software that can help you monitor employees, control subcontractors, and handle compliance-related tasks.
RDS-Shield

RDS-Shield

Por Marty Soft Conception

(0 reseñas)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Cyberator

Cyberator

Por Zartech

(0 reseñas)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
Twizo

Twizo

Por Twizo

(0 reseñas)
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more. A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.
Enterprise Threat Protector

Enterprise Threat Protector

Por Akamai Technologies

(0 reseñas)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
AbuseSA

AbuseSA

Por Synopsys

(0 reseñas)
Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses. Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.
GreySpark

GreySpark

Por FourV Systems

(0 reseñas)
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats. Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.
Fidelis Elevate

Fidelis Elevate

Por Fidelis Cybersecurity

(0 reseñas)
Automated threat detection and response platform that protects both network and endpoint devices. Automated threat detection and response platform that protects both network and endpoint devices.
inDefend

inDefend

Por DataResolve Technologies

(0 reseñas)
Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information. Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
Techefix

Techefix

Por Techefix

(0 reseñas)
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more. Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Securonix UEBA 6.0

Securonix UEBA 6.0

Por Securonix

(0 reseñas)
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance. Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.
Avanan Cloud Security Platform

Avanan Cloud Security Platform

Por Avanan

(0 reseñas)
Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users. Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.
Encryptionizer

Encryptionizer

Por NetLib Security

(0 reseñas)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.
Ericom Shield

Ericom Shield

Por Ericom Software

(0 reseñas)
Browser Isolation technology that prevents malware and zero-day attacks. Browser Isolation technology that prevents malware and zero-day attacks.
Apility.io

Apility.io

Por Apility.io

(0 reseñas)
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists. Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.
CDCAT®

CDCAT®

Por APMG International

(0 reseñas)
CDCAT provides a comprehensive cyber security strategy and capability improvement service. CDCAT® provides a comprehensive cyber security strategy and capability improvement service.
Snyk

Snyk

Por Snyk

(0 reseñas)
Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies. Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.
inWebo

inWebo

Por inWebo

(0 reseñas)
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites. Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
LoginCat

LoginCat

Por TekMonks

(0 reseñas)
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer. LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.
Hush

Hush

Por Syneidis

(0 reseñas)
The safest all in-one app for file protection and secure sharing. The safest all in-one app for file protection and secure sharing.
Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Por Rohde & Schwarz Cybersecurity

(0 reseñas)
Rohde & Schwarz Cybersecurity helps to secure your cloud applications and web services. Rohde & Schwarz Cybersecurity helps to secure your cloud applications and web services.
BioCatch

BioCatch

Por BioCatch

(0 reseñas)
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats. Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.
Uplevel

Uplevel

Por Uplevel

(0 reseñas)
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.
Perception Point

Perception Point

Por Perception Point

(0 reseñas)
Perception Point helps to stop email attacks at the earliest possible stage more accurate protection. Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.
Reveelium

Reveelium

Por Reveelium

(0 reseñas)
Threat detection software that monitors user behavior and identifies anomalies that can lead to security breeches. Threat detection software that monitors user behavior and identifies anomalies that can lead to security breeches.
EclecticIQ

EclecticIQ

Por EclecticIQ

(0 reseñas)
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security. EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.
Cryptomage

Cryptomage

Por Cryptomage

(0 reseñas)
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area. Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Customer Hijacking Prevention

Customer Hijacking Prevention

Por Namogoo

(0 reseñas)
Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores. Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores.
Kaymera

Kaymera

Por Kaymera Technologies

(0 reseñas)
Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense. Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.
VigiTrust

VigiTrust

Por VigiTrust

(0 reseñas)
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.
Cyber Security Essentials

Cyber Security Essentials

Por eWranglers

(0 reseñas)
With Traditional Managed IT Service Contracts, you may pay for MORE than you need! With Traditional Managed IT Service Contracts, you may pay for MORE than you need!
Kobil

Kobil

Por Kobil Systems

(0 reseñas)
KOBIL provides mobile security management on all platforms and communication channels for your mobile business. KOBIL provides mobile security management on all platforms and communication channels for your mobile business.
Nexusguard

Nexusguard

Por Nexus Guard

(0 reseñas)
Cybersecurity solution that provides 360 degree automated protection against malicious attacks. Cybersecurity solution that provides 360 degree automated protection against malicious attacks.
OUTSCAN

OUTSCAN

Por Outpost24

(0 reseñas)
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7. OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.
gpg4o

gpg4o

Por Giegerich & Partner

(0 reseñas)
Protect your sensitive mail content with IT-Security made in Germany Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft Outlook 2010/2013/2016 safely once and for all with gpg4o, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o is suitable both for private and enterprise use. Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.
CryptoSmart

CryptoSmart

Por Ercom

(0 reseñas)
CRYPTOSMART is the only Restricted French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications (voice, text, data) and devices (Samsung Galaxy) CRYPTOSMART is trusted by Governments (incl. French Presidency) and large enterprises The ultimate solution to secure mobile communications and devices
CybelAngel

CybelAngel

Por CybelAngel

(0 reseñas)
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks. SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.
Prot-On

Prot-On

Por Cognicase Management Consulting

(0 reseñas)
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel. A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
MyIP.io VPN

MyIP.io VPN

Por MyIP.io

(0 reseñas)
VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP. VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.
HaXM

HaXM

Por XM Cyber

(0 reseñas)
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets. HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.
Threat X

Threat X

Por Threat X

(0 reseñas)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Interset Proprietory

Interset Proprietory

Por Interset Software

(0 reseñas)
Detect the insider threat, security breach, compromised accounts, phishing attacks and more. Detect the insider threat, security breach, compromised accounts, phishing attacks and more.
Agari Enterprise Protect

Agari Enterprise Protect

Por AGARI Data

(0 reseñas)
Agari Enterprise Protect detects targeted email attacks, such as business email compromise, email account takeovers, or spear phishing to empower your employees, partners, and customers to communicate freely without fear of being breached. Agari leverages global email telemetry of more than 2 trillion emails per year and real-time data pipelines to train its machine learning models and stay ahead of the modern, sophisticated, identity-based attacks. Agari Enterprise Protect detects targeted email attacks, such as BEC, account takeovers, or spear phishing to protect your business.
Cynet 360

Cynet 360

Por Cynet

(0 reseñas)
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
ParaDoxBox

ParaDoxBox

Por Secure Channels

(0 reseñas)
All-in-one data encryption solution that supports all your data protection needs. All-in-one data encryption solution that supports all your data protection needs.
DARK-i

DARK-i

Por SixGill

(0 reseñas)
DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks. DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.
Infocyte HUNT

Infocyte HUNT

Por Infocyte

(0 reseñas)
Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices. Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices.
Hdiv

Hdiv

Por Hdiv Security

(0 reseñas)
Hdiv is a cybersecurity solution that protects your data integration for web applications an API's. Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.
DigiCert SSL/PKI Solutions

DigiCert SSL/PKI Solutions

Por DigiCert

(0 reseñas)
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Stealthwatch Cloud

Stealthwatch Cloud

Por CISCO

(0 reseñas)
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Axonius Cybersecurity Asset Management Platform
For organizations that see opportunity in todays always-on and always-connected reality, Axonius is the Cyber Security Asset Management (CSAM) platform that lets IT and Security teams see devices for what they are in order to manage and secure all. By easily integrating with customers existing management and security technologies and using an extensible plugin infrastructure to add custom logic, customers are able to get a unified view of all devices both known and unknown. Integrate with security/management solutions, and get a single view of all assets to continuously validate security policies.
Barracuda WAF-as-a-Service

Barracuda WAF-as-a-Service

Por Barracuda Networks

(0 reseñas)
Protect every web app, hosted anywhere, in minutes. Protect every web app, hosted anywhere, in minutes.
Pcysys

Pcysys

Por Pcysys

(0 reseñas)
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button
Privatize

Privatize

Por Introviz

(0 reseñas)
Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web. Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.
CyStack Platform

CyStack Platform

Por CyStack Security

(0 reseñas)
CyStack Platform is a comprehensive web security platform delivered as a service. Our product can detect vulnerabilities in your web application, monitor your website's availability and performance round-the-clock, detect and remove malwares in web servers and prevent attacks by serving as a web application firewall. Comprehensive web security platform delivered as a service. We focus on expandability and usability.
Instance Resolve

Instance Resolve

Por Famteck

(0 reseñas)
Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches. Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.
MDefend

MDefend

Por CyberMDX Technologies

(0 reseñas)
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Secure Bank

Secure Bank

Por Group-IB

(0 reseñas)
Client-side fraud and attack prevention across sessions, platforms and devices Client-side fraud and attack prevention across sessions, platforms and devices
Gleam AI

Gleam AI

Por Gleam AI

(0 reseñas)
Cybersecurity powered by AI and deep learning to fortify your business Cybersecurity powered by AI and deep learning to fortify your business
Dropvault

Dropvault

Por Apptimi

(0 reseñas)
A secure team collaboration and document sharing platform. Every conversation, note, comment or document shared with your team or your customer is encrypted with a key that only you or your business has access to. A secure team collaboration and document sharing platform.
IPdiva Cleanroom

IPdiva Cleanroom

Por Systancia

(0 reseñas)
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
CounterCraft

CounterCraft

Por CounterCraft

(0 reseñas)
Use CounterCraft's Cyber Deception Platform to detect targeted attacks with real-time active response. Use CounterCraft's Cyber Deception Platform to detect targeted attacks with real-time active response.
Panda Adaptive Defense 360

Panda Adaptive Defense 360

Por Panda Security

(0 reseñas)
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
HTTPCS Cyber Vigilance

HTTPCS Cyber Vigilance

Por Ziwit

(0 reseñas)
The cyber watch tool to anticipate cyber attacks. HTTPCS Cyber Vigilance infiltrates web and dark web to alert you in case of data leaks or signs of preparation for a hacking campaign. With 5 million data records a day, HTTPCS owns the largest source of critical data. Avoid hackers' plans with real-time alerts about malicious sites, phishing sites, vulnerable sites, employee passwords stolen etc. With HTTPCS Cyber Vigilance, stay ahead of hackers and avoid large-scale cyber attacks. The cyber watch tool to anticipate cyber attacks. In real time, HTTPCS detects worldwide web attacks and notifies what concerns you.
Apptega

Apptega

Por Apptega

(0 reseñas)
Apptega makes it easy to build, manage and report all of your cybersecurity functions through a series of specialized apps. Each app represents an important element or control of your cybersecurity program and automatically shares its data with other apps through a single online dashboard saving hundreds of hours of manual administrative work and providing unprecedented visibility and control of your entire cybersecurity program. Build, manage and report all of your cybersecurity functions through a series of specialized apps.
Indusface

Indusface

Por Indusface

(0 reseñas)
Indusface secures thousands of cloud apps, from small companies to large enterprise. Indusface secures thousands of cloud apps, from small companies to large enterprise.
ACSIA

ACSIA

Por DKSU4Securitas

(0 reseñas)
ACSIA is a server based cybersecurity monitoring, alerting and mitigation tool. It is environment agnostic and it can be installed both on cloud and on-premise. It comes in 2 different editions and also available on AWS Marketplace: 1) ACSIA Lite Edition - Designed and tailored for SMEs - https://acsia.io/docs/ACSIA_Lite_Version.pdf 2) ACSIA Enterprise Edition - Designed for large organizations - https://acsia.io/docs/ACSIA_Enterprise_Version.pdf ACSIA monitors your servers and captures any threats by notifying you with a severity level and enabling you to mitigate instantly.
Zeguro

Zeguro

Por Zeguro

(0 reseñas)
Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks. Cyber security that not only protects you from attacks around the clock but also teaches your employees how to prevent attacks.