Software para Seguridad de red
Utiliza la página Capterra.co de Colombia para encontrar el mejor software de Software para Seguridad de red para tu empresa.
Kaseya Backup and Disaster Recovery (BUDR) provides real-time automated disk backup, disk imaging, file level backup and bare metal restore for Windows servers and workstations. Unlike conventional file-based only products, Kaseya BUDR creates an image of the entire system state - including operating system, business applications, user settings, drivers and data - giving administrators the framework to completely rebuild a downed system in less than an hour. Learn more about Kaseya VSA
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Learn more about Okta
Avast Business Antivirus Pro Plus is all-in-one powerful endpoint and server protection package for small and medium size businesses (best for 1-200 employees). Works on PCs, Macs and servers. The product is enhanced with 18 cutting - edge features to keep your corporate life fully secure, including server antivirus, network security, and on-the-go VPN protection. It is just ultimate data, identity and endpoint protection. It can be used without console, with cloud or on-premise console. Learn more about Avast Business Antivirus Pro Plus
Por Safer Social
Recognized as the leading business VPN, we offer a fast and cost-effective cloud service that ensures secure network access for businesses of all sizes. Deploy private VPN servers with dedicated IPs in a matter of seconds, manage multiple team members and say goodbye to expensive hardware, tedious installation and hours of help desk support. Includes a complete management portal and single-click apps for every device. Learn more about Perimeter 81
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan
ConnectWise Automate, formerly LabTech is the only RMM platform designed to work the way you work, because it was built by a managed service provider (MSP) specifically for MSPs. Designed with cutting-edge agent technology, Automate delivers unprecedented centralized visibility into your clients IT systems. Its powerful built-in monitors alert you when IT issues are found, so you can resolve problems proactively, before they result in downtime for your clients. Start your free trial today! Learn more about ConnectWise Automate
Por Horangi Cyber Security
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Learn more about Horangi Web Security Services
NetFlow Analyzer avails flow technology to monitor and analyse your network bandwidth usage. It helps you identify and avoid bandwidth delays and bottlenecks with customized reports and set threshold-based email/SMS alerts to understand the severity of an issue. This easy-to-use analytics tool detects, diagnoses and troubleshoots network anomalies and zero-day intrusions in real-time and plans your future bandwidth need based on usage trend pattern thereby optimizing your bandwidth usage. Learn more about NetFlow Analyzer
Por SolarWinds MSP
Remote Monitoring & Management is the number one remote management platform on the market for a reason: it gives you the most comprehensive set of tools to secure, maintain, and improve IT operations. The web-based console provides integrated patch management, antivirus, web content filtering, backup and recovery, remote access, automated monitoring and maintenance, and more. Automation capabilities allow routine tasks to be easily automated and robust reports deliver complete visibility. Learn more about SolarWinds RMM
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Learn more about Log & Event Manager
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Learn more about EventSentry
LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures. Learn more about LogicMonitor
Por AdRem Software
An all-in-one and agentless network monitoring and management system, capable of monitoring every device in your network. Monitor bandwidth, availability, performance, services and traffic flow. Automatically generate maps and dependencies.Support for all leading OS types: Windows, Linux, Mac OS X, VMWare ESX/ESXi, BSD, and more. Advanced layer-2 mapping and automatic alert correlation. Baseline thresholds and range triggers. 7000+ MIBs and a built-in MIB compiler for complete SNMP support Learn more about AdRem NetCrunch
Marshal is a free, online tool that connects to your cloud services (Box, Dropbox, Google Drive, Microsoft OneDrive, Onehub) to uncover any exposed sensitive data you are sharing. Within minutes, Marshal delivers a secure, sanitized report outlining any exposed Social Security Numbers, credit card numbers, email addresses or phone numbers you are sharing. Learn more about Marshal
Por Webroot Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager.
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money.
RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end.
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios.
VIPole is an encrypted communication platform for individuals, teams and companies. It delivers secure messaging, file sharing, calls and video conferencing as well as a whole host of collaboration tools for business, such an organizer, notes, daily planner and a password vault. Everything within the system is fully e2e encrypted in transit and at rest. A set of advanced admin tools enables centralized control and comprehensive user management for complete security.
SiteLock is the Global Leader in website security, currently protecting more than five million websites. The company provides advanced, cloud-based security solutions for organizations of all sizes. SiteLock products include daily scanning with automatic malware removal, a managed web application firewall with a global CDN for a blazing fast website, advanced DDoS protection and an unrivaled 24/7 U.S. based phone support staff.
Sophos UTM helps you consolidate your security without compromising its effectiveness. By combining multiple security layers, its simple to protect your users everywhere while making security easier to deploy and manage. Sophos UTM provides essential next-gen firewall protection for your network, web, email, applications, and users.
Por Kenna Security
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data.
Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses.
With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products.
Vormetric helps enterprises move confidently and quickly and create trust by securing data-at-rest across all channels and environments. Knowing their data is secure, customers can respond faster and generate trust between users and across channels, applications and environments. Vormetric helps make secure adoption of new data environments a reality.
Por GFI Software
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively.
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2.
vArmour's software-based distributed security system delivers the industry's only integrated micro-segmentation solution with advanced security analytics across networks, applications, and users. vArmour's extensible architecture provides security across private and public clouds, with a single point of policy management. In addition, vArmour provides contextual visibility traffic from Layer 2 to Layer 7, combined with inline security policy controls prevent and quarantine lateral attacks.
Por Solana Networks
SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks. SmartFlow distills network traffic & flow data into more than 20 different stat measures.
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user.
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. UpGuard is headquartered in Mountain View, CA with offices in Portland, OR.
Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites.
Runtime Application Self-Protection (RASP) for developers. It protects web applications against attacks at runtime. The protection logic is brought into applications with no source code modification or traffic redirection. Once deployed, Sqreen provides real-time monitoring and protection against a large set of vulnerabilities incl. SQL injections, XSS, account takeovers, bad bots,Security scanners etc. Sqreen gets installed in 30 seconds and doesn't require any configuration or maintenance.
Por RG System
Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most.
Por REVE Antivirus
REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up.
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without.
Netsweeper Inc. provides web content filtering and web threat management that protects more than 50 million users worldwide. Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience. Netsweeper supports customers worldwide with offices in North America, the UK, the UAE, India and Australia as well as a network of partners and distributors.
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop.
Por Barracuda Networks
The Barracuda Spam & Virus Firewall provides a powerful, easy-to-use and affordable solution for complete protection of an organization's email infrastructure. It eliminates spam and virus intrusions while safeguarding an organization's reputation through content inspection based on policy for both inbound and outbound email. Outbound filtering also prevents confidential or sensitive information from being purposely or inadvertently leaked outside the organization.
Por IS Decisions
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.
In an age of digital transformation, businesses are exposed to far greater cyber risks and threats. CyberInt's Managed Detection and Response services track your digital channels, responding to advanced cyber threats missed by standard security controls, protecting your brand, digital assets and customers. CyberInt is trusted by the world's top finance, retail and telecommunication organizations.
EventTracker SIEM is a comprehensive security platform that delivers advanced security tools with audit-ready compliance capabilities. It offers a wide range of security essentials from endpoint threat detection to behavioral correlation. SIEMphonic, our flagship managed detection and response (MDR) service combines our 24/7 iSOC and our leading SIEM platform. While typical SIEM implementations fail, EventTracker SIEMphonic succeeds.
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
Por Black Duck
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.
Por The Email Laundry
The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe.
MePIN is a mobile app authenticator and a universal authentication service, providing compliance and strong security with exceptional user experience. Use MePIN as a service or on-premise as a white label strong authentication platform. MePIN supports two-factor authentication, passwordless login, digital signatures, biometrics, FIDO & legacy OTPs; choose your authentication methods and policies, or offer them all for the end-users to choose. Integration is easy with unified MePIN Services API.
FlowTraq is network security software that uses full-fidelity network flow records to provide unified security, monitoring, and forensics. Its behavioral analytics and alerting helps IT administrators identify and investigate data leaks, compromises, spammers, botnets, worms, and DDoS attacks in high-volume networks. FlowTraq monitors network performance and bandwidth consumption, catalogs applications in use, and detects problematic changes in network activity.
Server & network infrastructure provide the backbone for your clients' businesses & they depend on you to ensure its always available. As an IT service provider, if you are tasked with the mission critical functions of network & server management, you are responsible for detecting, troubleshooting and repairing faults; configuring services; controlling resource access; ensuring up-time & measuring performance. Automate collaborates with industry leaders to deliver the integrated tools you need.
Por My Digital Shield
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
Por CA Technologies
eTrust Antivirus is CA's award-winning antivirus solution, providing superior protection against today's most prevalent security threat - viruses. eTrust Antivirus reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices. Extensive features include multiple scanning engine support, realtime detection with system cure, unmatched manageability, and centralized event logging and alerting.
Por InfiSecure Technologies
InfiSecure is a robust bot protection platform to detect and block automated threats. The service bundles all aspects of website security, including Bot Protection, Click Fraud Protection and Fake Traffic Prevention. InfiSecure serves multiple geographies through direct and partner channels. Built on a highly scalable open-source stack, InfiSecure functions as an easy-to-deploy SaaS offering.
Organizations need visibility into their networks to detect threats, perform forensic investigations, support audits, and identify operational issues. LogRhythm Network Monitor is a highly-functional, intuitive and cost-effective network monitoring and forensics solution that provides enterprise-wide network visibility in more detail than traditional network and security solutions like flow analysis tools and next-generation firewalls.
Por Wavecrest Computing
CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team.
Por Specops Software
You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users. Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution.
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cyber security objectives.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.
AuthenWare is a leading cybersecurity software provider focused on fighting identity theft. The Company's innovative tokenless 2-factor authentication system delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and other system vulnerabilities. The AuthenWare solution measures how a user types to ensure only authorized users access a system or web page, while stopping hackers and password sharing.
Por Global Information Technology
PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible.
Safend is a leading provider of endpoint data protection solutions that protect against corporate data loss or theft by offering comprehensive products for data encryption and data transfer devices. The Safend Data Protection Suite encrypts internal and external hard drives, removable storage and CD/DVDs and provides granular control over all physical ports, wireless ports and removable media devices, ensuring compliance with regulatory data security and privacy standards.
Por Pwnie Express
Pulse discovers, inventories and classifies all IT and IoT devices and builds a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes. Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks. Respond directly from from Pulse to neutralize IoT device threats to your systems.
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues.
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA.
DBAs need a powerful backup and recovery solution that greatly reduces backup and recovery time, minimizes storage requirements, and provides enterprise management capabilities to conduct backups across a large numbers of servers simultaneously. SQL Safe has been specifically designed to meet these requirements, resulting in increased application and business availability for your critical SQL Server infrastructure.
Por Cyber-Ark Software
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Por Distil Networks
Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure.
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments.
Aobo Internet Filter for Mac is a stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications. Support multi-computer setup with easy steps.
Por Visual Click Software
Receive comprehensive NTFS Permissions Reports for your servers + workstations. Easily audit file system permissions across your network. Includes hundreds of specific reports and features. Simple and comprehensive delegation of Active Directory and File System duties via customizable Helpdesk applets. Does not use or require native AD delegation, uses an independent technology with full audit logs of each action, who performed and from where as well as when.
Por Cossack Labs
We aim to mitigate risks in data security through the development of easy-to-use, cross-platform solutions that are designed to provide a simple means to protect data within corporate infrastructures or stand-alone applications and over both a distributed application setting and in the open Internet.
Por Unistal Systems
Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology.
Code42 is a global enterprise SaaS provider of endpoint data protection and security to more than 37,000 organizations, including the most recognized brands in business and education. Our highly secure cloud solutions enable IT and security teams to limit risk, meet data privacy regulations and recover from data loss, no matter the cause.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
ShieldSquare helps online businesses filter non-human (bot) traffic on websites and mobile applications through a non-intrusive API based approach. With ShieldSquare's real-time protection, online businesses can protect themselves against web scraping, carding, account takeover, skewed analytics and other forms of bot abuse. ShieldSquare processes tens of billions of page requests every month. We protect 80,000+ internet properties of global online brands spread across 70+ countries.
Securence is a leading provider of email filtering software equipped with anti-spam filters to avoid spammy emails. Our email security and management solutions include inbound and outbound filtering, cyphermail, email archiving, continuing and shadowing, hosted exchange, PDP email hosting and security services for Office 365. We guarantee a 99.99% availability on our software and have lowest false positive ratings in the industry.
Por Beyond Security
The AVDS family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. AVDS is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Finds new active IPs, applications, Wireless Access Points. Sends no data out of network.
Blesk is a suite of applications for network monitoring and management. It is comprised of a mix of open source and proprietary tools that come pre-installed and configured on an optimized 64-bit version of CentOS Linux. Blesk integrates many popular tools including Nagios, Snort, Ntop, Cacti, Elasticsearch, Rancid, Netdisco, and GLPI. Each of these have been streamlined for optimal performance, and all run harmoniously on a single server.
SafeNet ProtectApp offers the highest level of application security available in a commercial encryption solution for business applications like CRM, ERP and human capital management (HCM). Data is secured transparently, without affecting application performance or the user experience. Centralized key and policy management provided with the integrated SafeNet DataSecure appliance enables administrators to support a large number of applications.
Por Rockliffe Systems
MailSite Fusion is a windows email, calendar and contact server with over-the-air push to all types of smartphones, Full native Outlook sync, a sophisticated AJAX web client and a calendar and contact sharing server, which can synchronize and publish to many other clients. MailSite has been voted in the top 3 mail server products by readers of Windows IT Pro Magazine 3 years running.
Catbird is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbirds software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.
Por Vallum Software
The Vallum Halo Manager is a web based enterprise network monitoring solution. Vallum Halo is a simple install that will automatically discover all devices and immediately provide availability data and alerts. Installation of a free universal agent, included as part of the installation, will provide more extensive metrics on CPU, Memory, Disk, Network, processes and services.
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization.
Por BAE Systems
Our CyberReveal platform analyses the behaviour of devices on your network and their connections with the internet to pick out attacks from within legitimate network traffic. Skilled security analysts investigate suspicious activity and raise security incidents when you need to take action. Our Threat Intelligence function monitors key attack groups, ensuring that the latest techniques can be detected.
Provides end-to-end monitoring of your critical IT infrastructure and applications, providing early warning when the first signs of failure appear and enabling you to react faster, more effectively.
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.
DETECTION Our solution analyses thousands of hits in real time, automatically detecting bad bots from human and good bot traffic. ALERTING Real time email alerts help you understand which bots access your website, and for what purpose. PROTECTION Our experts devise tailor-made strategies and activate DataDome technology to protect your website against bad bots activity. BENEFITS Regain control over your content, improve your website performance and protect your users.
BluKrypt is an on-premise CASB that completely secures your critical data on the cloud. Whether the data is in your collaboration tools, archive & backup platforms or SaaS applications, BluKrypt gives you total control over data security. BluKrypt acts as a secure cloud gateway to enable enterprises to fully manage security policy enforcement irrespective of where the digital assets are stored public cloud, private cloud or local data stores. As opposed to other CASBs, which mainly rely on
Protects networks through DNS filtering of inappropriate websites, blocking malware, and eliminating web based ads. Our 100% cloud based platform allows you to filter over 60+ categories covering more than 20+ Billion URLs. Solution provides easy one click network wide forced safe search and YouTube safe modes with G Suite support. Works great for both single and multi-campus deployments.
The Corero SmartWall Threat Defense System (TDS) is a family of DDoS protection appliances that eliminate cyber threats in real-time. These appliances deliver comprehensive DDoS protection in rapidly scalable deployments for higher performance, greater connectivity and broader functionality than ever before. Organizations can deploy a combination of SmartWall TDS DDoS protection appliances to deliver the performance, connectivity and security required for advanced threat protection.
HaltDos protects your Website from the wide range of DDoS attacks. It ensures high-availability of your website by providing you an in-depth network monitoring and custom dashboards.
Por NTP Software
With NTP Softwares File Auditor, you have an immediate view of who is accessing which documents across your entire storage environment. The view is in real time. This file auditing software gives you automatic reporting and auditing tools. These tools help you build an extra layer of security around your companys sensitive file data and intellectual property.
We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security, risk, cost, activity, quality, maintainability, efficiency and dependencies of your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, software technical security certifications and outsourcing agreement management, to name but a few of the possibilities brought about by our platform.
Secure-NOK offers SNOK, an easy-to-use, state-of-the-art tool for monitoring, detection, and early warning of cybersecurity events in industrial control and automation systems. Through our products and services, Secure-NOK enables well-informed security decisions. We provide knowledge and awareness of security risks and their consequences and support our customers with holistic defense strategies and solutions.
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data.
CIGLOO is the next generation browser isolation management platform, It provides organizations with the ability to enforce web isolation and assures that all malicious browsers code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data.
Por Haystax Technology
Constellation enables organizations to move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities, and people. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems.
Por Mithi Software Technologies
ClrStream is the email security, continuity and durability solution for your MS Exchange, Office 365, MDaemon, Postfix, PostMaster, Zimbra & other mail solutions. ClrStream protects your email servers from Spam, Virus, Ransomware and DDOS attacks. It also provides email continuity when the primary mail server is unavailable or down. When bundled with Vaultastic, email data durability is guaranteed at 99.99999999999%. All without any lengthy and costly email service migrations.
Monitor all your devices easily and in one place! With Spiceworks Network Monitor you can keep an eye on your servers and SNMP-enabled devices like routers and switches from one dashboard. Youll have total visibility over your network, so you can catch issues before any of your users, and be the IT hero you were meant to be. After work hours, rely on email alerts to keep you updated of the critical issues affecting your systems. All of this, and its free! Download Network Monitor now.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world
Por Webroot Software
Webroot SecureAnywhere DNS Protection offers a straightforward, effective way to prevent everyday web usage from becoming a major security risk. The intuitive web-based console enables admins to finely tune web access policies by IP and limit access to other potentially risky websites. Webroot offers over 82 URL categories for admins to tailor their usage policies to their organization's needs.
PracticeProtect is the easy way for Accountants to manage passwords, control access & protect data. Secure your firm with: One Portal & One Password For All Your Applications; Control Access for all team, whether Home Based, Outsourced or Offshore; Prevent Unauthorised Password Resets; Full Access Visibility (Mandatory Breach Legislation ready); Optional Two-Factor Identification; Suspicions Activity Notifications; Works With Xero, Quickbooks and all other Cloud Accounting applications.
Por Tenable Network Security
Nessus, the industry's most widely deployed vulnerability management solutions, helps you reduce your organizations attack surface and ensure compliance. Nessus features high-speed asset discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and more. With the world's largest continuously-updated library of vulnerability and configuration checks, Nessus sets the standard for vulnerability scanning speed and accuracy.
Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...
Por Observable Networks
Endpoint modeling learns the behavior of every endpoint on your network, combines it with threat intelligence algorithms in the cloud, and monitors activity in real time allowing you to identify and remediate threats. With unprecedented visibility into your network, configurable alerts, and an intuitive UI, endpoint modeling closes the widening gaps left by traditional security methods.
Por Free Connected
No Annoying Pop-up Ads! The best VPN to Enjoy Private, Secure surfing experience.Lightning fast connection.Easy to download and use across your devices.All you have to do is to tap the Connect button then you are protected. Unblock All Websites And Apps Change IP as you want Secure Your Internet Activity And WiFi Connection. Come to experience the real Trustworthy VPN service by the independent developer team!X-VPN Is Definitely Your Online Bodyguards!
Provides an advanced, central security console for real-time security event monitoring and automated response, host-based intrusion detection, event log consolidation, and security configuration management.
east-tec InvisibleSecrets 4 hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution & real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
The Evident Security Platform (ESP) streamlines and optimizes vulnerability and risk management. It continuously monitors your AWS cloud, automatically identifies security misconfigurations, and enables rapid mitigation of risk through guided remediation. ESP's automation, customization, and ease-of-use enables cloud teams to securely deploy and migrate workloads to AWS and implement a process of continuous compliance. Start your free trial and get results immediately.
Por Hewlett Packard Enterprise
The HPE Intelligent Management Center Standard Software Platform and Enterprise platform are comprehensive wired and wireless network management tools supporting the FCAPS (Fault, Configuration, Accounting, Performance, Security) model, providing for end-to-end business management of IT, scalability of system architecture, and accommodation of new technology and infrastructure.
Por CacheGuard Technologies
An Appliance oriented Operating System dedicated to Web traffic Security and Optimization. CacheGuard embeds a gateway antivirus, a URL filtering facility, a firewall, a traffic shaping facility, an SSL inspection facility, a Web proxy, a reverse proxy, a Web application load balancer, a Web application firewall, a traffic logger and much more.
Por Marty Soft Conception
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access.
A DNS-based internet security and web filtering service providing a range of flexible, fast and reliable solutions for businesses and institutions of any size. Choose just the right SafeDNS solution for your industry or type of organization from a SMB to a multinational enterprise. Block botnets, malicious and phishing sites, web ads and unwanted online content such as pornography, violence, hate & racism, social media, gambling - in a word any inappropriate content.
AIONCLOUD is a simple way to secure your website. AIONCLOUD is total web security service to safeguard websites from various attacks and improve your business performance. AIONCLOUD detects and blocks malicious activities and protects critical data from the latest threats such as SQL injection, DDos, homepage defacement, information leaks, identity theft and malware.
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution
Por Ridgeback Network Defense
Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea of Interactive Deception. The Ridgeback Interactive Deception Platform influences adversary behavior, leading the adversary to engage in behaviors that reveal malicious intent. Ridgeback creates the appearance of billions of unavoidable phantom resources in the network, each a landmine that stops lateral exploits in real time. Up and running in ten minutes.
Por Access Watch Technologies
Access Watch enhances your security layer against costly and malicious robotic traffic. Mitigate attacks and abuse of your website from bad bots and reduce hosting costs by up to 30%.
It doesnt matter what you buy.. Our technology sits on top of your existing systems. We aggregate all of your technology systems into one Security Dashboard, giving you a real time and on demand view of your network This real time view constantly monitors for potential threats, and compliance issues 24/7/365. If we find something nasty we tell you. Our response speed is the fastest in the industry. Its all designed to put you back in control (fast)
With modusCloud, secure your business email with cloud based spam protection, targeted phishing protection, email archiving, secure encryption, Office 365 integrations, and much more. The modusCloud solution provides the essentials for email continuity, advanced threat protection, URL and attachment defense, along with machine learning to ensure industry leading catch rates and lowest false positives. 24/7/365 Customer support will ensure your email security is always in good hands.
Cloudnosys platform delivers security, compliance, cost and DevOps automation. Continually scan entire your AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc. Provides DevOps automation such as on/off/snooze, snapshot management and identifies costs savings by improving asset utilization for Azure and AWS. Meet PCI, HIPAA, FISMA, AWS CIS Benchmark compliance quickly. Provides easy guided remediation and audit functions.
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria.
Por South River Technologies
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.
EdgeWave iPrism Web Security is Military-Grade defense against the most advanced threats. Unlike other disconnected cyber security point solutions that leave a network open to breaches, iPrism uses a transformational approach to cyber security that combines expert analysis and human review, sophisticated technology, and Military-Grade cyber operations. Deployed via an efficient cloud hybrid platform, iPrism is a highly effective and affordable solution to keep your critical data secure.
Por Comodo Group
Comodo cWatch Web is a Managed Security Service for websites and applications that combines a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully managed solution from a 24/7 staffed Cyber Security Operation Center (CSOC) of certified security analysts and is powered by a Security Information and Event Management (SIEM) that leverages data from over 85 million endpoints to detect and mitigate threats before they occur.
Por CloudNow Technologies
Akku is a Cloud Access Security Broker (CASB) that acts as a gateway on the cloud to filter access based on authorization to various cloud applications. It can facilitate such as Single Sign-on (SSO), Blocking Consumer G Suite, IP Restriction, Customization of password policy, YouTube filtering, DNS filtering and Multi-factor authentication. About CloudNow Technologies: CloudNow Technologies (CNT) is a fast growing IT consuming and software development company founded in 2014.
CertHat Tools for Microsoft PKI provides you with a web based tools for PKI management. It is easy to install and can manage all of your AD CS servers but can also import external certificates. With CertHat you will be able to track all your certificates and create alerts before they expire. CertHat help you to increase productivity and dramatically reduce the risk of system or business incidents due to expired certificate