253 results
Filter Results (253)
Pricing Options
Deployment
EaseUS Partition Master Pro makes it effortless to partition hard drives and take full advantage of your disk space.
Organize your hard drive and empty disk space to enhance system performance. Cloning function adjustment and quality improvement. Easily optimize disk partitions to extend your computers life and capableness. Support Windows 10/8/7/Vista/XP.
Organize your hard drive and empty disk space to enhance system performance. Cloning function adjustment and quality improvement. Easily optimize disk partitions to extend your computers life and...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler,...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Improve effectiveness of Security Awareness Programs & condition users to defend organizations against an evolving threat landscape
Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers lack. We believe that real phish are the real problem. Through
experiential learning - simulations of current phishing threats - you'll condition smarter email behavior, transforming vulnerable targets into an essential layer of defense.
Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
BeyondTrust Password Safe centralizes the management and control of all privileged account credentials.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux.
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure.
Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc.
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure.
Endpoint Protector puts an end to...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Security hardware that monitors the perimeter and preempts targeted attacks.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
WhiteSource
(5)
Local product
Find & fix security and compliance issues in open source libraries in real-time
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.
We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.
It...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
On-premise security solution which assists firms with by scanning, detecting and blocking ransomware within a business network.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
JupiterOne is a cloud-native security platform providing visibility security and governance to your entire cyber asset environment.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and much more are collected, graphed, and analyzed automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relationships as the single source of truth for an organization’s security and infrastructure operations.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript.
Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities.
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code.
HackEDUs hands-on training covers over 115 topics in Python, Java,...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently adopt cloud services.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based applications. The cloud native CASB+ platform provides end-to-end data protection for enterprises
adopting cloud services, ensuring confidential and sensitive data is protected at
all locations - in the cloud and on users devices.
The CipherCloud CASB+ platform provides deep visibility, end-to-end data
protection, advanced threat protection, and comprehensive compliance
capabilities for enterprises embracing cloud-based...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
CWIS Antivirus Scanner
(3)
Local product
Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
A Professional Security Protection Antivirus scanner
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats.
Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
A Professional Security Protection Antivirus scanner
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform.
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR.
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Backup software that allows businesses to manage data security, infrastructure scalability, data loss, application solutions, and more.
Backup software that allows businesses to manage data security, infrastructure scalability, data loss, application solutions, and more.
Backup software that allows businesses to manage data security, infrastructure scalability, data loss, application solutions, and more.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business with minimum impact to your daily operations. We build long-term relationships with our customers.
From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Data security management platform for enterprises that monitors and protects information shared across users, devices, etc.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
15-Second Visibility and Control Over Every
Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every
Endpoint. Even Across the Largest Networks.
15-Second Visibility and Control Over Every
Endpoint. Even Across the Largest Networks.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords.
InsightIDR natively...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Web-based solution that provides computer security through fixing, ransomware, malware, adware, spyware and more.
Web-based solution that provides computer security through fixing, ransomware, malware, adware, spyware and more.
Web-based solution that provides computer security through fixing, ransomware, malware, adware, spyware and more.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Mac performance optimization and online protection app, protecting you from malware attacks in real time.
Mac performance optimization and online protection app, protecting you from malware attacks in real time.
Mac performance optimization and online protection app, protecting you from malware attacks in real time.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
NetFlow Auditor
(2)
Local product
Helps monitor and analyze networks.
Advanced Dropless Collection capabilities.
A complete Network Monitoring solution.
Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.
A complete Network Monitoring solution.
Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Centralized management of users, groups and roles, role-based access control,
entitlements and access policies.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy.
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Manages all crucial security functions, including authentication, encryption and addressing.
Manages all crucial security functions, including authentication, encryption and addressing.
Manages all crucial security functions, including authentication, encryption and addressing.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
Anti-virus tool that helps remove and protect your computer from trojans, adware, keyloggers, dialers, malware, hijackers, and more.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity.
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Website security test to protect application and server against hackers.
Website security test to protect application and server against hackers.
Website security test to protect application and server against hackers.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
On-premise computer security solution that protects businesses from external viruses & restricts removable disks from exchanging data.
On-premise computer security solution that protects businesses from external viruses & restricts removable disks from exchanging data.
On-premise computer security solution that protects businesses from external viruses & restricts removable disks from exchanging data.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC.
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Promisec Endpoint Manager
(1)
Local product
PEM provides holistic endpoint security management solution for medium and large enterprises.
PEM (Promisec Endpoint Manager) is the first agentless solution that delivers complete endpoint detection and remediation capabilities across the enterprise. PEM leverages proprietary technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps.
PEM (Promisec Endpoint Manager) is the first agentless solution that delivers complete endpoint detection and remediation capabilities across the enterprise. PEM leverages proprietary technology to...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Security and compliance solution that enables businesses to control network access and enhance visibility to unauthorized activities.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Security solution that manages data privacy, threat protection and tracking activity.
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer.
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Clearswift's SECURE Email Gateway offers an unprecedented level of cyber-attack protection and outbound data loss prevention.
Clearswift's award-winning SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, SEG incorporates the latest in inbound threat protection (Avira, Sophos and/or Kaspersky AV), a multi-layer spam defense mechanism, multiple encryption options, advanced security features including DMARC/DKIM. New features include OCR and anti-steganography.
Clearswift's award-winning SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software
Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements.
Bodi is a complete end-point security platform encompassing...
Phishing prevention- prevents users from accidentally clicking on malicious links
Insider threat detection stop data theft with real time alerts based on defined rules
Usage analysis detailed analysis of app usage, web browsing, printing, activity
Forensic evidence full recording and keyword search for detailed investigations
Remediation full remote control capabilities to correct device related issues
Integrate- API Support
Bodi is a complete end-point security platform encompassing...
Phishing prevention- prevents users from accidentally clicking on malicious links
Insider threat detection stop data theft with real...
Features
- Anti Virus
- Audit Trail
- Access Control
- Compliance Management
- Maintenance Scheduling
- Real Time Monitoring
- Network Security Software