Utiliza la página Capterra.co de Colombia para encontrar el mejor software de Cybersecurity Software para tu empresa.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required. Learn more about Barkly
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Learn more about Okta
Por Argent Software
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo. Learn more about Argent for AWS
Teramind provides a user-centric security approach to monitor employee's PC behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Learn more about Teramind
Netwrix Auditor gives you deep insight into what unstructured data you have, who owns it, who is entitled to access it and who actually uses it. With Netwrix Auditor, you can ensure that you have all the proper access security measures in place to prevent breaches. Oversee data access and permission changes, identify users with unnecessary access and lock it down, monitor file activity and detect suspicious user behavior, manage your unstructured data and optimize storage with Netwrix Auditor. Learn more about Netwrix Auditor
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Learn more about ComplyAssistant
Por Horangi Cyber Security
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Learn more about Horangi Web Security Services
Marshal is a free, online privacy tool that connects to your cloud services (Box, Dropbox, Google Drive, Microsoft OneDrive, Onehub) to uncover any exposed sensitive data you are sharing. Within minutes, Marshal delivers a secure, sanitized report outlining any exposed Social Security Numbers, credit card numbers, email addresses or phone numbers you are sharing. Learn more about Marshal
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Learn more about EventSentry
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios.
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management.
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included.
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys.
Enterprise Security Score assess the cybersecurity posture of organizations. It combines data on past and current risk vectors with external data and compares it with intelligence on the security posture seen in known breaches to provide an empirical score to: -Assess the chance of a breach in the coming 12 months. -Assess cybersecurity posture across the organization and any subsidiaries. -Assess the cybersecurity posture of third parties such as suppliers and partners.
Cryptosense provides state-of-the-art analysis software to help businesses eliminate the vulnerabilities caused by insecure use of cryptography in their applications and infrastructure.
Por Webroot Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Through an application-aware global CDN platform, Incapsula provides any website and web application with best-of-breed Security, DDoS Protection, Load Balancing & Failover solutions, available as standalone services or as an integrated solution. It takes 5 minutes to activate Incapsula, without any hardware/software or any code changes
Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more.
Por Safer Social
Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more!
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The companys approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecards proprietary SaaS platform offers an unmatched breadth and depth of critical data points.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need.
Por CyberSaint Security
The CyberStrong Platform implements the language of cyber for the future of business. Empower your team to streamline continuous compliance and risk management with CyberStrong's unparalleled time-to-value, breakthrough AI and Machine Learning, and agile workflow. Get instant visibility into any combination of compliance standards and experience what immediate cybersecurity ROI feels like. Get a Free Demo: https://www.cybersaint.io
Por Risk Vision
RiskVision, powered by Resolver, offers a threat-based and intelligence-driven approach to IT risk and compliance. The RiskVision platform manages risk through a closed-loop lifecycle on identification, assessment, remediation, and monitoring processes to protect your organization from cyber attacks. Introduce new levels of IT efficiency and achieve continuous compliance across multiple regulatory and control frameworks.
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance.
Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users.
Por NetLib Security
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer.
- PCI Compliance Software
- Software para Cumplimiento de normas
- Software para Gestión de riesgos
- Software para Gestión de servidores
- Software para Monitorización de red
- Software para Protección de puntos de trabajo
- Software para Seguridad de red
- Software para Seguridad informática
- Vulnerability Management Software