Software para ciberseguridad

Utiliza la página Capterra.mx de México para encontrar el mejor software de Software para ciberseguridad para tu empresa.

Descubre por qué Capterra es gratis

MetaPhish

MetaPhish

Por MetaCompliance

(1 reseña)

The MetaPhish product has the ability to originate emails from a set of prepopulated simulated phishing domains. The software contains a library of smart learning experiences such as infographics, notices and training videos. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator. Descubre más sobre MetaPhish

MetaPhish has the ability to originate emails from a set of prepopulated simulated phishing domains. Descubre más sobre MetaPhish

Barkly

Barkly

Por Barkly

(26 reseñas)

Barkly sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Barkly bloquea los ataques a través de todos los vectores e intentos, incluso vulnerabilidades, secuencias de comandos, ejecutables y ransomware. La arquitectura de 3 niveles patentada de Barkly permite una visibilidad inigualable en todos los niveles del sistema, incluida la CPU, para bloquear los ataques. Barkly es increíblemente fácil de administrar e implementar: no se requieren conocimientos de políticas, configuración o seguridad. Descubre más sobre Barkly

Barkly Endpoint Protection sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Descubre más sobre Barkly

ESET Endpoint Security

ESET Endpoint Security

Por ESET

(397 reseñas)

Elimina todo tipo de amenazas, incluidos virus, malware, ransomware, rootkits, gusanos y spyware con escaneo opcional con tecnología de la nube para brindar un rendimiento y detección aún mejores. ESET utiliza tecnologías de varias capas que van mucho más allá de las capacidades de un antivirus básico. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security

Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Descubre más sobre ESET Endpoint Security

Cloud Defender

Cloud Defender

Por Alert Logic

(1 reseña)

Cloud Defender is an integrated suite of security & compliance controls for cloud, on-premises, hosted & hybrid infrastructures, delivered as-a-service with 24x7 expert GIAC-certified analysts. With a single solution, it identifies vulnerabilities, defends against web app attacks, analyzes logs across the application stack to identify malicious or anomalistic behavior, & assists with meeting compliance mandates - all in a monthly subscription. Descubre más sobre Cloud Defender

Fully managed security & compliance controls for cloud, on-prem, hosted & hybrid infrastructures. Delivered as-a-service with 24x7 SOC. Descubre más sobre Cloud Defender

WebTitan

WebTitan

Por TitanHQ

(161 reseñas)

Filtro de contenido web basado en DNS que bloquea el malware, el ransomware y los intentos de phishing, además de proporcionar control de contenido web. Se filtran más de quinientos millones de solicitudes DNS al día, se identifican 60 000 iteraciones de malware por día y el software cuenta con más de 7500 clientes. Versiones en la nube y puerta de enlace disponibles. Mejora tu ciberseguridad ahora. Obtén una prueba gratis de WebTitan hoy, con asistencia incluida. Descubre más sobre WebTitan

Filtro de contenido web basado en DNS que bloquea malware, ransomware e intentos de phishing, así como también proporciona control de contenido web. Descubre más sobre WebTitan

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

Por Webroot Software

(87 reseñas)

Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy, incluidos troyanos, registradores de pulsaciones de teclas (keyloggers), suplantación de identidad (phishing), spyware, puertas traseras (backdoors), rootkits, día cero y amenazas persistentes avanzadas. El estudio de identidad y privacidad incorporado detiene el robo o la captura de datos cuando se usa Internet y el firewall de salida también detiene el robo de datos mediante malware. No es necesario preocuparse ni ejecutar actualizaciones. La seguridad impulsada por la nube significa que los puntos finales siempre están actualizados. Descubre más sobre Webroot SecureAnywhere Endpoint Protection

Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy en día. Descubre más sobre Webroot SecureAnywhere Endpoint Protection

Netwrix Auditor

Netwrix Auditor

Por Netwrix

(86 reseñas)

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, identify and classify sensitive data, detect anomalies in user behavior and investigate incidents in time to prevent real damage. Descubre más sobre Netwrix Auditor

Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Descubre más sobre Netwrix Auditor

Perimeter 81

Perimeter 81

Por Safer Social

(5 reseñas)

Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device. Descubre más sobre Perimeter 81

A single-click, cost-effective cloud VPN that ensures simplified secure network and SaaS resource access for businesses of all sizes. Descubre más sobre Perimeter 81

SolarWinds Threat Monitor

SolarWinds Threat Monitor

Por SolarWinds MSP

(0 reseñas)

SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. Descubre más sobre SolarWinds Threat Monitor

SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. Descubre más sobre SolarWinds Threat Monitor

Cryptosense

Cryptosense

Por Cryptosense

(1 reseña)

Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e infraestructura. Descubre más sobre Cryptosense

Cryptosense proporciona software para detectar y eliminar las vulnerabilidades causadas por el mal uso de la criptografía en aplicaciones e infraestructuras. Descubre más sobre Cryptosense

Acunetix

Acunetix

Por Acunetix

(18 reseñas)

Acunetix lidera el mercado en cuanto a la tecnología de pruebas automáticas de seguridad web y que analiza y audita sitios web complejos, autenticados, HTML5 y con mucho JavaScript, entre otros. Utilizado por muchos sectores gubernamentales, militares, educativos, de telecomunicaciones, banca, finanzas y comercio electrónico, incluyendo muchas empresas de Fortune 500, Acunetix ofrece una entrada rentable en el mercado de análisis web con una solución simple, escalable y de disponibilidad, sin comprometer la calidad. Descubre más sobre Acunetix

Una solución de administración de vulnerabilidades que analiza tu sitio web, detecta vulnerabilidades como XSS o SQL Injection y ofrece soluciones. Descubre más sobre Acunetix

Teramind

Teramind

Por Teramind

(47 reseñas)

Teramind proporciona un enfoque de seguridad centrado en el usuario para supervisar el comportamiento del PC del empleado. Este software agiliza la recolección de datos de los empleados para identificar actividades sospechosas, detectar posibles amenazas, supervisar la eficiencia de los empleados y garantizar el cumplimiento con el sector. Ayuda a reducir los incidentes de seguridad al proporcionar acceso en tiempo real a las actividades de los usuarios mediante alertas, advertencias, redirecciones y bloqueos de usuarios, para hacer que tu negocio funcione de la manera más eficiente y segura posible. Descubre más sobre Teramind

Realiza la prueba gratis para ver de qué hablan todos los rumores. La supervisión de la actividad del usuario y la prevención del robo de datos se vuelven mucho más fáciles con Teramind. Descubre más sobre Teramind

ComplyAssistant

ComplyAssistant

Por ComplyAssistant

(0 reseñas)

ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Descubre más sobre ComplyAssistant

ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. Descubre más sobre ComplyAssistant

Horangi Web Security Services

Horangi Web Security Services

Por Horangi Cyber Security

(1 reseña)

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Descubre más sobre Horangi Web Security Services

Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Descubre más sobre Horangi Web Security Services

Praetorian

Praetorian

Por Praetorian

(0 reseñas)

Estas soluciones permiten que los clientes encuentren, solucionen, detengan y resuelvan problemas de ciberseguridad en tu empresa y carteras de productos.

Estas soluciones permiten que los clientes encuentren, solucionen, detengan y resuelvan problemas de ciberseguridad en tu empresa y carteras de productos.

SiteLock

SiteLock

Por SiteLock

(10 reseñas)

SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios.

SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios.

PowerBroker

PowerBroker

Por BeyondTrust

(0 reseñas)

Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.

Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.

RansomFree

RansomFree

Por Cybereason

(2 reseñas)

RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.

RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.

Indeni

Indeni

Por Indeni

(12 reseñas)

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Jscrambler

Jscrambler

Por Jscrambler

(0 reseñas)

Make Your JavaScript Application Protect Itself

Make Your JavaScript Application Protect Itself

Crypho

Crypho

Por Crypho

(0 reseñas)

Enterprise group chat and file sharing with end-to-end encryption.

Enterprise group chat and file sharing with end-to-end encryption.

TraceCSO

TraceCSO

Por TraceSecurity

(1 reseña)

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.

FICO Enterprise Security Score

FICO Enterprise Security Score

Por FICO

(0 reseñas)

The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

The FICO Enterprise Security Score provides a stable, long-term indicator of network security risk.

Heimdal CORP

Heimdal CORP

Por Heimdal Security

(1 reseña)

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

BluSapphire

BluSapphire

Por BluSapphire

(0 reseñas)

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.

ARGUS

ARGUS

Por Argus Cyber Security

(0 reseñas)

ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

ARGUS helps to protect commercial vehicles, fleets and dealership platforms from cyber attacks.

Okta

Okta

Por Okta

(163 reseñas)

Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.

Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.

Tandem Software

Tandem Software

Por CoNetrix

(20 reseñas)

Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.

DataDome bot mitigation

DataDome bot mitigation

Por DataDome

(0 reseñas)

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business

Hybrid Cloud Security

Hybrid Cloud Security

Por Trend Micro

(29 reseñas)

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.

Centrify Infrastructure Services

Centrify Infrastructure Services

Por Centrify

(27 reseñas)

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.

EventSentry

EventSentry

Por Netikus.net

(16 reseñas)

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

ThreatAdvice

ThreatAdvice

Por ThreatAdvice

(5 reseñas)

ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.

Avast Business CloudCare

Avast Business CloudCare

Por Avast

(5 reseñas)

Deliver powerful, layered protection to multiple customers quickly and easily.

Deliver powerful, layered protection to multiple customers quickly and easily.

SandBlast Threat Emulation

SandBlast Threat Emulation

Por Check Point Software Technologies

(4 reseñas)

CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Virus Vanish

Virus Vanish

Por DigitalBulls

(4 reseñas)

Free tool that scans your computer for viruses, malware, spyware, and other threats.

Free tool that scans your computer for viruses, malware, spyware, and other threats.

Business Suite

Business Suite

Por F-Secure

(3 reseñas)

Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Log360

Log360

Por ManageEngine

(3 reseñas)

Log360, una solución integral de SIEM que ayuda a defender los ataques de seguridad internos y externos con función de gestión de registros.

Log360, una solución integral de SIEM que ayuda a defender los ataques de seguridad internos y externos con función de gestión de registros.

Pulsedive

Pulsedive

Por Pulsedive

(3 reseñas)

Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.

Threat Response

Threat Response

Por Proofpoint

(2 reseñas)

Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Darktrace

Darktrace

Por Darktrace

(2 reseñas)

Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Business VPN

Business VPN

Por KeepSolid

(2 reseñas)

Deploy private servers for your Business in a few clicks

Deploy private servers for your Business in a few clicks

CYBEATS

CYBEATS

Por CYBEATS

(2 reseñas)

Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

RedSeal

RedSeal

Por RedSeal Networks

(1 reseña)

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Powertech Security Software

Powertech Security Software

Por HelpSystems

(1 reseña)

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Hybrid Cloud Security

Hybrid Cloud Security

Por Symantec

(1 reseña)

Security solution for on-premises data centers and public clouds.

Security solution for on-premises data centers and public clouds.

TAP

TAP

Por FireEye

(1 reseña)

Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

Barriqade

Barriqade

Por TulipControls

(1 reseña)

Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

Voxility DDoS Protection

Voxility DDoS Protection

Por Voxility

(1 reseña)

1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

Argent for AWS

Argent for AWS

Por Argent Software

(1 reseña)

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

Twistlock

Twistlock

Por Twistlock

(1 reseña)

Twistlock es la plataforma líder de ciberseguridad nativa en la nube para la empresa moderna.

Twistlock es la plataforma líder de ciberseguridad nativa en la nube para la empresa moderna.

The CyberStrong Platform

The CyberStrong Platform

Por CyberSaint Security

(1 reseña)

CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.

CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.

WebDefender

WebDefender

Por Cobweb Security

(1 reseña)

WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection

WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection

OnDMARC

OnDMARC

Por Redsift

(1 reseña)

OnDMARC is an email security product that helps organisations of all sizes deploy DMARC with confidence.

OnDMARC is an email security product that helps organisations of all sizes deploy DMARC with confidence.

Ekran System

Ekran System

Por Ekran System

(0 reseñas)

Ekran Systems® is universal software that can help you monitor employees, control subcontractors, and handle compliance-related tasks.

Ekran Systems® is universal software that can help you monitor employees, control subcontractors, and handle compliance-related tasks.

RDS-Shield

RDS-Shield

Por Marty Soft Conception

(0 reseñas)

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Cyberator

Cyberator

Por Zartech

(0 reseñas)

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Twizo

Twizo

Por Twizo

(0 reseñas)

A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.

Enterprise Threat Protector

Enterprise Threat Protector

Por Akamai Technologies

(0 reseñas)

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

AbuseSA

AbuseSA

Por Synopsys

(0 reseñas)

Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

Security Intelligence Platform

Security Intelligence Platform

Por Exabeam

(0 reseñas)

Security management and operations platform with detection, analytics, and response capabilities.

Security management and operations platform with detection, analytics, and response capabilities.

GreySpark

GreySpark

Por FourV Systems

(0 reseñas)

Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Fidelis Elevate

Fidelis Elevate

Por Fidelis Cybersecurity

(0 reseñas)

Automated threat detection and response platform that protects both network and endpoint devices.

Automated threat detection and response platform that protects both network and endpoint devices.

inDefend

inDefend

Por DataResolve Technologies

(0 reseñas)

Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Techefix

Techefix

Por Techefix

(0 reseñas)

Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

Securonix UEBA 6.0

Securonix UEBA 6.0

Por Securonix

(0 reseñas)

Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.

Avanan Cloud Security Platform

Avanan Cloud Security Platform

Por Avanan

(0 reseñas)

Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.

Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.

Encryptionizer

Encryptionizer

Por NetLib Security

(0 reseñas)

Transparent Data Encryption for any application or database on the Windows Platform.

Transparent Data Encryption for any application or database on the Windows Platform.

Ericom Shield

Ericom Shield

Por Ericom Software

(0 reseñas)

Browser Isolation technology that prevents malware and zero-day attacks.

Browser Isolation technology that prevents malware and zero-day attacks.

Apility.io

Apility.io

Por Apility.io

(0 reseñas)

Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

CDCAT®

CDCAT®

Por APMG International

(0 reseñas)

CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

CDCAT® provides a comprehensive cyber security strategy and capability improvement service.

Snyk

Snyk

Por Snyk

(0 reseñas)

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.

inWebo

inWebo

Por inWebo

(0 reseñas)

Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.

LoginCat

LoginCat

Por TekMonks

(0 reseñas)

LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.

Hush

Hush

Por Syneidis

(0 reseñas)

The safest all in-one app for file protection and secure sharing.

The safest all in-one app for file protection and secure sharing.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Por Rohde & Schwarz Cybersecurity

(0 reseñas)

Rohde & Schwarz Cybersecurity helps to secure your cloud applications and web services.

Rohde & Schwarz Cybersecurity helps to secure your cloud applications and web services.

BioCatch

BioCatch

Por BioCatch

(0 reseñas)

Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.

Uplevel

Uplevel

Por Uplevel

(0 reseñas)

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.

Perception Point

Perception Point

Por Perception Point

(0 reseñas)

Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.

Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.

Reveelium

Reveelium

Por Reveelium

(0 reseñas)

Threat detection software that monitors user behavior and identifies anomalies that can lead to security breeches.

Threat detection software that monitors user behavior and identifies anomalies that can lead to security breeches.

EclecticIQ

EclecticIQ

Por EclecticIQ

(0 reseñas)

EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.

Cryptomage

Cryptomage

Por Cryptomage

(0 reseñas)

Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.

Customer Hijacking Prevention

Customer Hijacking Prevention

Por Namogoo

(0 reseñas)

Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores.

Namogoo es una solución de prevención de secuestro de clientes, cuya tecnología identifica y bloquea anuncios no autorizados inyectados en sesiones web de los consumidores.

Kaymera

Kaymera

Por Kaymera Technologies

(0 reseñas)

Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.

Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.

VigiTrust

VigiTrust

Por VigiTrust

(0 reseñas)

Security accreditation management system that helps organizations comply with information security regulations.

Security accreditation management system that helps organizations comply with information security regulations.

Cyber Security Essentials

Cyber Security Essentials

Por eWranglers

(0 reseñas)

With Traditional Managed IT Service Contracts, you may pay for MORE than you need!

With Traditional Managed IT Service Contracts, you may pay for MORE than you need!

Kobil

Kobil

Por Kobil Systems

(0 reseñas)

KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

KOBIL provides mobile security management on all platforms and communication channels for your mobile business.

Nexusguard

Nexusguard

Por Nexus Guard

(0 reseñas)

Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

Cybersecurity solution that provides 360 degree automated protection against malicious attacks.

OUTSCAN

OUTSCAN

Por Outpost24

(0 reseñas)

OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.

gpg4o

gpg4o

Por Giegerich & Partner

(0 reseñas)

Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.

CryptoSmart

CryptoSmart

Por Ercom

(0 reseñas)

The ultimate solution to secure mobile communications and devices

The ultimate solution to secure mobile communications and devices

CybelAngel

CybelAngel

Por CybelAngel

(0 reseñas)

SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.

Prot-On

Prot-On

Por Cognicase Management Consulting

(0 reseñas)

A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.

MyIP.io VPN

MyIP.io VPN

Por MyIP.io

(0 reseñas)

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

VPN solution architectured via cloud, dedicated IPs on all dedicated plans with no extra charge for the static IP.

HaXM

HaXM

Por XM Cyber

(0 reseñas)

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.

Threat X

Threat X

Por Threat X

(0 reseñas)

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.

Interset Proprietory

Interset Proprietory

Por Interset Software

(0 reseñas)

Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

Detect the insider threat, security breach, compromised accounts, phishing attacks and more.

Cynet 360

Cynet 360

Por Cynet

(0 reseñas)

Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

ParaDoxBox

ParaDoxBox

Por Secure Channels

(0 reseñas)

All-in-one data encryption solution that supports all your data protection needs.

All-in-one data encryption solution that supports all your data protection needs.

DARK-i

DARK-i

Por SixGill

(0 reseñas)

DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

DARK-i is a cybersecurity software that helps you to prevent attacks, observe attackers and their plans and detect data leaks.

Infocyte HUNT

Infocyte HUNT

Por Infocyte

(0 reseñas)

Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices.

Simple, powerful threat hunting software. Easily identify and investigate hidden threats across your network and devices.

Hdiv

Hdiv

Por Hdiv Security

(0 reseñas)

Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

Hdiv is a cybersecurity solution that protects your data integration for web applications an API's.

DigiCert SSL/PKI Solutions

DigiCert SSL/PKI Solutions

Por DigiCert

(0 reseñas)

Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection

Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection

PortSwigger

PortSwigger

Por PortSwigger

(0 reseñas)

PortSwigger is a Web Security software for web security professionals for testing web applications.

PortSwigger is a Web Security software for web security professionals for testing web applications.

Stealthwatch Cloud

Stealthwatch Cloud

Por CISCO

(0 reseñas)

Protect your cloud assets and private network. Improve security and incident response across the distributed network.

Protect your cloud assets and private network. Improve security and incident response across the distributed network.

Axonius Cybersecurity Asset Management Platform

Integrate with security/management solutions, and get a single view of all assets to continuously validate security policies.

Integrate with security/management solutions, and get a single view of all assets to continuously validate security policies.

Barracuda WAF-as-a-Service

Barracuda WAF-as-a-Service

Por Barracuda Networks

(0 reseñas)

Protect every web app, hosted anywhere, in minutes.

Protect every web app, hosted anywhere, in minutes.

CloudLayar

CloudLayar

Por Aqua Networks

(0 reseñas)

CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

CloudLayar is a cloud website DDoS protection software that allows website owners to get website protection from bots, malware, scanner

Pcysys

Pcysys

Por Pcysys

(0 reseñas)

Automated Penetration Testing, with a click of a button

Automated Penetration Testing, with a click of a button

Privatize

Privatize

Por Introviz

(0 reseñas)

Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

Stop Cyber Stalkers from targeting and tracking your employees and stop targeted malware entering your network as they browse the web.

CyStack Platform

CyStack Platform

Por CyStack Security

(0 reseñas)

Comprehensive web security platform delivered as a service. We focus on expandability and usability.

Comprehensive web security platform delivered as a service. We focus on expandability and usability.

Instance Resolve

Instance Resolve

Por Famteck

(0 reseñas)

Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.

Mobile dashboard provides database cyber security, machine learning, audit & Risk Management reduces resources & prevent data breaches.

MDefend

MDefend

Por CyberMDX Technologies

(0 reseñas)

Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.

HTTPCS Security

HTTPCS Security

Por Ziwit

(0 reseñas)

Without technical expertise, run automated security audits to detect security flaws on your website.

Without technical expertise, run automated security audits to detect security flaws on your website.