Software de ciberseguridad

Los productos de software de ciberseguridad evitan el acceso no autorizado a datos almacenados electrónicamente. Este tipo de software protege a las empresas del robo de datos y evita que terceros usen el sistema e introduzcan datos maliciosos.

¿Por qué Capterra es gratis?
Visitar la web
Filtro de contenido web basado en DNS que bloquea el malware, el ransomware y los intentos de phishing, además de proporcionar control de contenido web. Se filtran más de quinientos millones de solicitudes DNS al día, se identifican 60 000 iteraciones de malware por día y el software cuenta con más de 7500 clientes. Versiones en la nube y puerta de enlace disponibles. Mejora tu ciberseguridad ahora. Obtén una prueba gratis de WebTitan hoy, con asistencia incluida. Descubre más sobre WebTitan Filtro de contenido web basado en DNS que bloquea malware, ransomware e intentos de phishing, así como también proporciona control de contenido web. Descubre más sobre WebTitan

Por Netacea

(0 opiniones)
Visitar la web
Netacea protege a las empresas del tráfico de bots maliciosos. El análisis de intenciones, impulsado por aprendizaje automático, distingue de manera rápida y precisa a los bots de los humanos para proteger sitios web, aplicaciones móviles y API de amenazas sofisticadas dando prioridad a los usuarios reales. La inteligencia práctica, con visualizaciones repletas de datos, te permite tomar decisiones informadas sobre tu tráfico. Descubre más sobre Netacea Bot Management Netacea proporciona una revolucionaria solución de administración de bots que protege sitios web, aplicaciones móviles y API de bots maliciosos. Descubre más sobre Netacea Bot Management
Visitar la web
Millones de personas y miles de empresas dependen del administrador de contraseñas y bóveda digital de Keeper para reducir sustancialmente el riesgo de una violación de datos. Es el líder mundial en la obtención de contraseñas, documentos y activos digitales confidenciales. Keeper opera sin problemas en todos los dispositivos móviles y computadoras. Genera automáticamente contraseñas de alta resistencia. Protege archivos confidenciales, documentos y fotos y videos en una bóveda digital encriptada. Comparte registros de manera segura con equipos Integración perfecta con SSO, LDAP, 2 FA. Descubre más sobre Keeper for Business Keeper está transformando la forma en que las empresas y las personas protegen contraseñas y activos digitales para reducir significativamente el robo cibernético. Descubre más sobre Keeper for Business
Visitar la web
Acunetix lidera el mercado en cuanto a la tecnología de pruebas automáticas de seguridad web y que analiza y audita sitios web complejos, autenticados, HTML5 y con mucho JavaScript, entre otros. Utilizado por muchos sectores gubernamentales, militares, educativos, de telecomunicaciones, banca, finanzas y comercio electrónico, incluyendo muchas empresas de Fortune 500, Acunetix ofrece una entrada rentable en el mercado de análisis web con una solución simple, escalable y de disponibilidad, sin comprometer la calidad. Descubre más sobre Acunetix Una solución de administración de vulnerabilidades que analiza tu sitio web, detecta vulnerabilidades como XSS o SQL Injection y ofrece soluciones. Descubre más sobre Acunetix
Visitar la web
Netsparker Security Scanner es una solución precisa que identifica automáticamente XSS, Inyección de SQL y otras vulnerabilidades en aplicaciones web. La tecnología de análisis basada en pruebas única de Netsparker te permite dedicar más tiempo a corregir las fallas informadas explotando automáticamente las vulnerabilidades identificadas de forma segura y de solo lectura, y también presenta una prueba de explotación. Por lo tanto, puedes ver de inmediato el impacto de la vulnerabilidad y no tienes que verificarla manualmente. Descubre más sobre Netsparker Security Scanner Solución precisa que identifica automáticamente XSS, inyección de SQL y otras vulnerabilidades en aplicaciones web. Descubre más sobre Netsparker Security Scanner
Visitar la web
Boxcryptor es un software de cifrado, flexible y escalable para la nube, que admite a más de 30 proveedores, así como cifrado NAS en todas las plataformas. Ofrece funciones de colaboración, auditoría y administración que permiten realizar una colaboración segura en los archivos a la vez que cumplen con las regulaciones de privacidad. Define políticas personalizadas, administra usuarios con inicio de sesión único o Active Directory y protege tus cuentas con autenticación en dos pasos (2FA). Elige seguridad desarrollada en Alemania para trabajar de forma segura y eficiente en la nube. Descubre más sobre Boxcryptor Solución de cifrado multiplataforma para la nube y sistemas NAS que admite más de 30 proveedores de la nube (como Dropbox y OneDrive). Descubre más sobre Boxcryptor

Por Flowmon Networks

(8 opiniones)
Visitar la web
Siempre que surjan nuevos problemas de seguridad u operativos, Flowmon brinda control a los profesionales de TI. Aprovechando sus potentes análisis de comportamiento de red, los profesionales de TI pueden tomar medidas decisivas, lidiar con amenazas cibernéticas y administrar redes con confianza. Descubre más sobre Flowmon Flowmon brinda control administrativo a los profesionales de TI. Lidia con las amenazas cibernéticas gracias a sus potentes analíticas de comportamiento de red. Descubre más sobre Flowmon

Por ManageEngine

(4 opiniones)
Visitar la web
Log360, una solución integrada que combina ADAudit Plus y EventLog Analyzer en una sola consola, es la solución integral para toda la gestión de registros y desafíos de seguridad en la red. Ofrece funciones de recopilación de registros, análisis, correlaciones y archivado en tiempo real que ayudan a proteger datos confidenciales, frustran las amenazas de seguridad interna, y combaten ataques externos. Para ayudar a cumplir con las demandas de seguridad, auditoría y cumplimiento más necesarias, viene preempacado con más de 1200 informes predefinidos y criterios de alerta. Descubre más sobre Log360 Log360, una solución integral de SIEM que ayuda a defender los ataques de seguridad internos y externos con función de gestión de registros. Descubre más sobre Log360
Visitar la web
SolarWinds Threat Monitor: Service Provider Edition es una plataforma rápida, escalable y basada en la nube creada para habilitar a los proveedores de gestión de servicios (MSP) una herramienta unificada para supervisar las redes administradas en busca de amenazas, analizar los registros frente a las amenazas más recientes y actualizada información de inteligencia de todo el mundo. Soluciona las amenazas de tus clientes rápidamente y prepara la información necesaria para demostrar tu cumplimiento con los estándares establecidos por los órganos reguladores. Descubre más sobre SolarWinds Threat Monitor SolarWinds® Threat Monitor es la herramienta que necesitas para detectar, remediar e informar sobre eventos de seguridad para todas las redes que administras. Descubre más sobre SolarWinds Threat Monitor

Por Cryptosense

(1 opinión)
Visitar la web
Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e infraestructura. Descubre más sobre Cryptosense Cryptosense proporciona software para detectar y eliminar las vulnerabilidades causadas por el mal uso de la criptografía en aplicaciones e infraestructuras. Descubre más sobre Cryptosense
Ver perfil
Elimina todo tipo de amenazas, incluidos virus, malware, ransomware, rootkits, gusanos y spyware con escaneo opcional con tecnología de la nube para brindar un rendimiento y detección aún mejores. ESET utiliza tecnologías de varias capas que van mucho más allá de las capacidades de un antivirus básico. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota. Incluye antispyware, antiphishing, control web, antispam y protección de redes de bots con capacidad de administración remota.
Ver perfil
Cloudflare Inc. es la empresa líder en el ámbito del rendimiento y la seguridad web que ayuda a construir una mejor internet. Hoy en día, la empresa administra una de las redes más grandes del mundo (de más de 100 centros de datos) que genera más de 10 billones de solicitudes por mes. Esto es casi el 10 % de todas las solicitudes de internet, lo que afecta a más de 2500 millones de personas en todo el mundo. Cloudflare Inc. es una empresa en el ámbito del rendimiento y la seguridad web que ayuda a construir una mejor internet.
Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy, incluidos troyanos, registradores de pulsaciones de teclas (keyloggers), suplantación de identidad (phishing), spyware, puertas traseras (backdoors), rootkits, día cero y amenazas persistentes avanzadas. El estudio de identidad y privacidad incorporado detiene el robo o la captura de datos cuando se usa Internet y el firewall de salida también detiene el robo de datos mediante malware. No es necesario preocuparse ni ejecutar actualizaciones. La seguridad impulsada por la nube significa que los puntos finales siempre están actualizados. Protección multivectorial contra virus y malware que ofrece protección completa contra todas las amenazas de malware sofisticadas de hoy en día.
Ver perfil
Netwrix Auditor es una plataforma de visibilidad para el análisis del comportamiento del usuario y la mitigación de riesgos que permite el control de cambios, configuraciones y acceso en entornos de TI híbridos para proteger los datos independientemente de tu ubicación. La plataforma proporciona inteligencia de seguridad para identificar agujeros de seguridad, identificar y clasificar datos confidenciales, detectar anomalías en el comportamiento del usuario e investigar incidentes a tiempo para evitar daños reales. Ten el control sobre lo que está sucediendo en tu entorno de TI en la nube híbrida para proteger los datos independientemente de tu ubicación.
Ver perfil
A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento. A website security suite that protects websites from hackers, bots & threats, with plugins for WordPress, OpenCart, and Magento.
Ver perfil
DNSFilter está revolucionando el sector de los sistemas de nombres de dominio (DNS). Se proporciona un servicio de filtrado y protección de contenido contra amenazas basado en DNS para profesionales de TI. Este producto está impulsado por inteligencia artificial que analiza los dominios en tiempo real, lo que significa que detiene más amenazas que los competidores, que a menudo tardan semanas a través de la revisión humana. Esta empresa tiene sede en EE. UU. y opera una red global de difusión ilimitada con los pares de red más publicitados del sector y ofrece precios justos y transparentes, sin contratos ni compromisos. Plataforma de ciberseguridad para profesionales de TI que ayuda con el filtrado de contenido, la detección de amenazas, la creación de informes, la integración de API y más.
Ver perfil
Olvídate de simplemente detectar los ataques, evítalos usando CylancePROTECT, la solución de punto final que bloquea el 99 % de las amenazas en tiempo real. Olvídate de simplemente detectar los ataques, evítalos usando CylancePROTECT, la solución de punto final que bloquea el 99 % de las amenazas en tiempo real.

Por Synametrics Technologies

(50 opiniones)
Ver perfil
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Ver perfil
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Ver perfil
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Ver perfil
Cloud App Security enables you to embrace the efficiency of cloud services while maintaining security. It protects incoming and internal Office 365 email from malware and other threats, and enforces compliance on other cloud file-sharing services, including Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business. By integrating directly with Office 365 and other services using APIs, it maintains user functionality without rerouting email traffic or setting up a web proxy. Advanced threat and data protection for Office 365 and cloud file-sharing services.

Por ESM Software Group

(30 opiniones)
Ver perfil
ESM+Strategy ayuda a las organizaciones a diseñar, hacer el seguimiento de su plan estratégico y adaptarlo. Con puntuaciones equilibradas automatizadas, mapas estratégicos, cuadros de mando e informes instantáneos, ESM da vida a la estrategia. En el comienzo, verás un tutorial para ingresar los principales objetivos, medidas e iniciativas de la estrategia. Una vez que la arquitectura estratégica está implementada, las organizaciones utilizan ESM para recopilar actualizaciones sobre el avance de forma centralizada, eliminando la necesidad de confeccionar agotadoras hojas de cálculo y diapositivas. Haz un seguimiento del avance de tu plan estratégico con puntuaciones equilibradas, mapas estratégicos, cuadros de mandos y exportaciones generadas al instante.
Ver perfil
Barkly sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple. Barkly bloquea los ataques a través de todos los vectores e intentos, incluso vulnerabilidades, secuencias de comandos, ejecutables y ransomware. La arquitectura de 3 niveles patentada de Barkly permite una visibilidad inigualable en todos los niveles del sistema, incluida la CPU, para bloquear los ataques. Barkly es increíblemente fácil de administrar e implementar: no se requieren conocimientos de políticas, configuración o seguridad. Barkly Endpoint Protection sustituye al antivirus existente con la más fuerte protección, la tecnología más inteligente y la gestión más simple.
Ver perfil
Apptega is cybersecurity management software helping businesses of all sizes easily build, manage and report their cybersecurity programs for SOC 2, NIST, ISO, PCI, SANS, GDPR, HIPAA and many others. Simplify implementing cybersecurity with real-time compliance scoring, project lifecycle, task management, calendaring, collaboration, budgeting and vendor management all in one place giving you complete control of your cybersecurity program and compliance data. Easily build, manage and report your cybersecurity and compliance 10x more efficiently with an intuitive UI and one-click reporting.
Ver perfil
CyberGRX has the #1 third-party risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manually assessing risk. Third party risk management platform that automates self-assessments and their validation for third-party vendors.
Ver perfil
*MONITOR*: RapidSpike monitors everything from the customers point of view, enabling you to fix issues impacting your customers, maintaining your brands online reputation. *PROTECT*: Detect Magecart, website skimming & form-jacking attacks to reduce exposure to data breaches, reducing both ICO fines & financial losses. This protects your online reputation & customer trust. *IMPROVE*: Make your website, better, faster & more efficient by tracking your websites performance in real time. Monitor, protect & improve website digital experiences - Magecart detection, performance improvement & customer interaction monitoring
Ver perfil
SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios. La empresa ofrece soluciones de seguridad avanzadas basadas en la nube para organizaciones de todos los tamaños. Los productos de SiteLock incluyen escaneo diario con eliminación automática de malware, un firewall de aplicaciones web administradas con un CDN global para un sitio web extremadamente rápido, protección DDoS avanzada y personal de asistencia telefónica en Estados Unidos sin igual, en horario ininterrumpido. SiteLock es el líder mundial en seguridad para sitios web y actualmente protege a más de cinco millones de estos sitios.
Ver perfil
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.

Por PortSwigger

(12 opiniones)
Ver perfil
BurpSuite is web security software for web security professionals for testing web applications. Burp Suite is web security software for web security professionals for testing web applications.
Ver perfil
Alert Logic connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment.
Ver perfil
Indeni es la plataforma de automatización de fuentes múltiples para infraestructura de red y seguridad. Con Indeni Crowd e Indeni Insight, las organizaciones obtienen acceso al repositorio en vivo de scripts de automatización a través del mantenimiento, la alta disponibilidad, la visibilidad de la red, la seguridad, el cumplimiento y las mejores prácticas de los proveedores. Enseña a tu equipo los procesos de desarrollo conjunto junto con la comunidad más grande de profesionales de TI certificados y reduce el costo total de propiedad con pasos prescriptivos para resolver problemas. Indeni ayuda a los profesionales de TI a detectar problemas de red antes de que se conviertan en problemas importantes mediante el uso de tecnología de análisis predictivo.
Ver perfil
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Open source security platform that helps find and remediate riska and vulnerabilities across business environments.
Ver perfil
Probely ayuda a los ingenieros de seguridad y DevOps a entregar aplicaciones web seguras sin comprometer los plazos. Integra fácil y automáticamente las pruebas de seguridad en tu ciclo de vida de desarrollo ágil sin alterar tu flujo de trabajo actual. Realiza labores continuas de seguridad en las primeras etapas del ciclo de vida de desarrollo ágil y repara rápidamente las vulnerabilidades. Obtén instrucciones sencillas paso a paso para solucionar cada vulnerabilidad en la herramienta de supervisión de problemas. Comienza una prueba gratis. 100 % gratuita. Sin tarjeta de crédito. Probely ayuda a expertos en seguridad y desarrolladores de software a encontrar vulnerabilidades, repararlas y automatizar fácilmente las pruebas de seguridad.
Ver perfil
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Based on pre-built automation stories, Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action. Tines can automate time-consuming employee activity confirmation, and in the event of a real threat, quickly perform remediation actions. https://youtu.be/EMVHOkXVWKk Advanced security automation platform which allows teams automate any workflow, regardless of complexity or technology integration.
Ver perfil
LogRhythm is a leader in NextGen SIEM, empowering enterprises to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats. The LogRhythm NextGen SIEM Platform combines security analytics; UEBA; network detection and response (NDR); and SOAR in a single end-to-end solution. LogRhythm's technology serves as the foundation for modern security operations centers (SOCs), helping customers measurably secure their cloud, physical, and virtual infrastructures. LogRhythm empowers organizations to successfully reduce risk by rapidly detecting, responding to, and neutralizing cyberthreats.

Por 4Securitas

(7 opiniones)
Ver perfil
Small businesses increasingly face the same cybersecurity risks as larger companies, but few have the ability to mitigate threats and vulnerabilities. 67 % of SMBs experienced a cyber attack in the last 12 months and 58 percent experiencing a data breach ACSIA is a real-time cyber defense application that monitors and protects critical servers and provides notifications and alerts of threats and anomalous activity. It is the only deep level server monitoring product on the market. ACSIA monitors your servers and captures security threats by notifying you with a severity level enabling instant mitigation.

Por DigitalBulls

(6 opiniones)
Ver perfil
Virus Vanish antivirus combines intelligent technology that directly monitors a program's behavior to determine if it is a virus. It dynamically identifies and characterizes the code in the cloud to quickly eradicate it. It is the US based third party independent virus protection software. The company has branches in the USA and UK. Virus vanish antivirus is an all in one PC security software which helps in keeping your computer safe and your privacy protected.
Ver perfil
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.

Por ComplyAssistant

(5 opiniones)
Ver perfil
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes.
Ver perfil
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Leading client-side security solution for JavaScript protection and webpage real-time monitoring.

Por CrowdStrike

(5 opiniones)
Ver perfil
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Por Perimeter 81

(5 opiniones)
Ver perfil
Instantly protect your team from cyber threats and Wi-Fi attacks. With 256-bit bank-level encryption, Automatic Wi-Fi Security and single-click applications for every device, Perimeter 81's business service keeps your team's communications and online activities completely private and secure - even when employees are on-the-go. Our complete cloud management portal allows business owners and IT managers to easily monitor network access and proactively identify any suspicious activity. A single-click, cost-effective software service that guarantees online privacy and security for businesses of all sizes.
Ver perfil
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems. Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Ver perfil
Self-configuring cyber defense system based on machine learning and probabilistic mathematics. Self-configuring cyber defense system which helps companies with threat detection, network visualization and response management.
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more. ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
Ver perfil
Localización, bloqueo y borrado remotos para computadoras y dispositivos móviles, para todos los sistemas operativos y hardware. Localización, bloqueo y borrado remotos para computadoras y dispositivos móviles, para todos los sistemas operativos y hardware.
Ver perfil
Cerber Tech Inc. offers a comprehensive security solution you can count on. WP Cerber Security protects WordPress against cyber attacks, malware, and spam. With an automatic malware scanner and integrity checker, you can configure malware removal and file recovery policies. A specialized firewall detects traffic anomalies and blocks malicious activity before it harms your data. Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
Ver perfil
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.

Por Heimdal Security

(4 opiniones)
Ver perfil
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Por MetaCompliance

(4 opiniones)
Ver perfil
El producto MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos. El software contiene una biblioteca de experiencias de aprendizaje inteligentes, como infografías, avisos y videos de formación. A diferencia de otras soluciones de phishing, el software permite al usuario confirmar o comunicarse con el administrador. MetaPhish puede crear correos electrónicos a partir de un conjunto de dominios de phishing simulados preestablecidos.

Por Jazz Networks

(4 opiniones)
Ver perfil
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Privva is an award-winning, cloud-based vendor risk assessment platform serving a diverse customer base across industries including legal, financial services, technology, healthcare, education, and media. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk. The most flexible vendor risk management platform to streamline your assessment of 3rd party risk.
Ver perfil
La plataforma FireMon administra dispositivos a través de una organización para reducir la complejidad, aumentar el cumplimiento y mejorar la seguridad de la red. La plataforma FireMon administra dispositivos a través de una organización para reducir la complejidad, aumentar el cumplimiento y mejorar la seguridad de la red.
Ver perfil
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Ver perfil
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process. Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Ver perfil
Data management system with branching validation capability that controls, sorts and seeks for sensitive data such as PII, PCI or ePHI. Data management system with branching validation capability that controls, sorts and seeks for sensitive data such as PII, PCI or ePHI.
Ver perfil
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community. Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates & enforces security policies. Seamlessly integrated with 120+ management and security solutions and covering more than 1M endpoints for companies like AppsFlyer, Schneider Electric, & The New York Times, Axonius is deployed in minutes, enabling organizations to embrace innovation and accelerate speed to value. Axonius is the cybersecurity asset management platform providing actionable visibility and policy enforcement for all assets and users.
Ver perfil
An entry point for implementing structure and diligence in the management of a cybersecurity program An entry point for implementing structure and diligence in the management of a cybersecurity program
Ver perfil
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.

Por Boole Server

(3 opiniones)
Ver perfil
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. Security platform to upload, create, share and work on data, purposely designed for organizations that need to protect sensitive files.

TAP

Por FireEye

(2 opiniones)
Ver perfil
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows. Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Ver perfil
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.

Por Secure Digital Solutions

(2 opiniones)
Ver perfil
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors. Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Ver perfil
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more! Deploy private servers for your Business in a few clicks
Ver perfil
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success. Cloud-based risk management platform that helps firms manage compliance, IT, vendors, audits and documentation.
Ver perfil
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats. Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Ver perfil
OnDMARC es un producto Red Sift. Red Sift es una plataforma de nube abierta que hace que la ciberseguridad sea accesible para todos para prevenir ataques cibernéticos. OnDMARC facilita la implementación y el mantenimiento de una política segura de DMARC. OnDMARC no solo procesa informes XML complejos, sino que utiliza la última tecnología para guiarte hacia la protección total. OnDMARC es un producto de seguridad del correo electrónico que ayuda a las organizaciones de todos los tamaños a implementar DMARC con confianza.
Ver perfil
Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are used to establish an encrypted connection
Ver perfil
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.

Por CyberMDX Technologies

(2 opiniones)
Ver perfil
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control. Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
Ver perfil
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Ver perfil
Wallarm WAF protects websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as CentOS, Ubuntu, AWS, GCP, Azure, K8s, and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. API and SPA automated protection with a built-in vulnerability assessment, cloud inventory, and management service

Por D3 Security Management Systems

(1 opinión)
Ver perfil
A SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture. D3 Security is a SOAR 2.0 platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.

Por RedSeal Networks

(1 opinión)
Ver perfil
Cloud security software to continuously verify hybrid, multi-cloud networks' security within and between physical, cloud, and software defined environments. with a visual interface to ensure control policies, analyze access, and more. Cloud software to continuously verify network set up and access to ensure compliance with policies and regulations..
Ver perfil
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Ver perfil
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
Ver perfil
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company. Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.

Por Magnet Forensics

(1 opinión)
Ver perfil
Solución de automatización de descubrimiento electrónico para búsqueda, análisis y creación de informes de ciencia forense digital. Solución de automatización de descubrimiento electrónico para búsqueda, análisis y creación de informes de ciencia forense digital.
Ver perfil
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk.
Ver perfil
Security solution for on-premises data centers and public clouds. Security solution for on-premises data centers and public clouds.

Por TulipControls

(1 opinión)
Ver perfil
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites. Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

Por DataResolve Technologies

(1 opinión)
Ver perfil
inDefend is a one-stop solution which helps to protect your data from insider threat and prevent the leakage of sensitive data through various communication channels and endpoints. It allows you to monitor the behavioral patterns of the users and also pinpoint the avenues through which confidential data can be leaked. This solution is built to achieve complete transparency over all the digital assets residing within the organization. inDefend, a unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
Ver perfil
1 Tbps + DDoS Protection que funciona con cualquier aplicación. Se utiliza con frecuencia para proteger juegos en línea, DNS, servicios TCP, sitios web HTTPS/HTTP 1 Tbps + DDoS Protection que funciona con cualquier aplicación. Se utiliza con frecuencia para proteger juegos en línea, DNS, servicios TCP, sitios web HTTPS/HTTP

Por Argent Software

(1 opinión)
Ver perfil
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.

Por SecurityScorecard

(1 opinión)
Ver perfil
SecurityScorecard is a cyber security risk rating platform that helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company's approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard's proprietary SaaS platform offers an unmatched breadth and depth of critical data points. Cyber security risk rating platform that provides instant visibility into the security posture of any organization.
Ver perfil
InsightIDR es tu solución de detección y respuestas ante amenazas. Encuentra y responde a todos los vectores de ataque más importantes detrás de las vulneraciones: phishing (suplantación de identidad), malware y uso de contraseñas robadas. InsightIDR recopila de forma nativa datos de tus terminales, registros de seguridad y servicios en la nube. Aplica analíticas de comportamiento de usuarios y atacantes a tus datos para encontrar las actividades de intrusos en cada paso de la cadena de ataque. Unifica tus datos de seguridad. Detecta antes de que las cosas se pongan críticas. Responde 20 veces más rápido con investigaciones visuales y automatización. InsightIDR es tu solución de detección y respuestas ante amenazas. Encuentra y responde a todos los vectores de ataque más importantes detrás de las vulneraciones.
Ver perfil
Twistlock es el proveedor líder de soluciones de seguridad cibernética nativa en contenedores y en la nube para la empresa moderna. Desde una administración de vulnerabilidades precisa y procesable hasta firewalls y protección de tiempo de ejecución implementados automáticamente, Twistlock protege las aplicaciones en todo el ciclo de vida de desarrollo y en la producción. Diseñado para contenedores, sin servidor y otras tecnologías líderes: Twistlock brinda a los desarrolladores la velocidad que desean y a los CISO el control que necesitan. Twistlock es la plataforma líder de ciberseguridad nativa en la nube para la empresa moderna.

Por Cobweb Security

(1 opinión)
Ver perfil
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search. WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Ver perfil
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Ver perfil
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks. Automated Penetration Testing, with a click of a button

Por Cequence Security

(1 opinión)
Ver perfil
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
Ver perfil
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance. Zeguro Cyber Safety: employee security training, customizable pre-built security policies, & web app monitoring in one easy solution.
Ver perfil
AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening AppSealing is mobile app security service which protects mobile applications from advanced threats with one click hardening
Ver perfil
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Ver perfil
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code

Por RapidFire Tools

(1 opinión)
Ver perfil
Cyber Hawk is the #1 cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service. It detects violations of IT security policies, anomalous user activity, suspicious changes to the networks, and threats caused by malware that gets past external protections. Cyber Hawk also includes built-in service plans, marketing materials, & more. MSP licenses allow for unlimited usage for all clients served by each location. 30-day money-back guarantee. Cyber Hawk is the #1 cybersecurity solution for MSPs to create, sell, & deliver their own branded Insider Threat Detection service.

Por Tripwire

(0 opiniones)
Ver perfil
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.

Por PKWARE

(0 opiniones)
Ver perfil
Proporciona cifrado y protección de datos práctica y confiable que es fácil de implementar, mantener y usar. Proporciona cifrado y protección de datos práctica y confiable que es fácil de implementar, mantener y usar.

Por ImageWare Systems

(0 opiniones)
Ver perfil
The ImageWare Digital Identity Platform provides end-to-end digital identity proofing, authentication and lifecycle management solutions as a cloud SaaS and for on-premises systems. The Platform includes both quick-to-deploy turnkey products and APIs for creating specialized solutions. Our biometric engine can support hundreds of millions of digital identities using multiple biometrics from nearly any biometric vendor. We offer turnkey or customized solutions for digital identity proofing, authentication, and user lifecycle management.