Voici notre liste d'applications pour Logiciels de sécurité informatique. Les filtres vous aident à affiner les résultats pour trouver exactement ce que vous cherchez.

119 options de logiciels métiers disponibles

Classer par
Live Ensure™ protège les utilisateurs en sécurisant et en authentifiant leurs identités grâce à une approche multi-facteur synthétisée. Les utilisateurs sont convaincus que leurs identifiants sont protégés quand ils sont sur votre site. Vos utilisateurs sont protégés contre le phishing, le pharming ou les attaques de type "homme du milieu" (MITM).... En savoir plus sur LiveEnsure
CloudPassage® Halo® est une plateforme internationalement avant-gardiste d'automatisation de la conformité et de la sécurité qui offre une visibilité instantanée sur les serveurs et une protection continue aux serveurs. En savoir plus sur CloudPassage Halo
BlueFiles permet aux utilisateurs d'envoyer des fichiers cryptés en toute sécurité tout en maintenant un contrôle total sur les destinataires, les périodes d'accès, les téléchargements et l'impression. En savoir plus sur BlueFiles
Cornerstone MFT est une solution basée sur le cloud qui aide les entreprises, les services financiers et les organisations de santé à gérer la sécurité et les transferts de fichiers sur les serveurs. Les fonctionnalités clés comprennent l'automatisation des processus, la gestion de la conformité, la collaboration et le cryptage des données. En savoir plus sur Cornerstone MFT Server
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. En savoir plus sur StackRox
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. En savoir plus sur Evidian
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... En savoir plus sur Quantum Network Security
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... En savoir plus sur PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). En savoir plus sur iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... En savoir plus sur RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. En savoir plus sur Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. En savoir plus sur Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. En savoir plus sur swIDch Auth SDK
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. En savoir plus sur IDA Pro
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. En savoir plus sur SSI Kit
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals. En savoir plus sur Sealit
Verimatrix Code Protection solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. It's critical to maintain customer trust by building SDKs and apps that won’t become an entry point for hackers. En savoir plus sur Verimatrix Code Protection
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. En savoir plus sur DIARIO

Catégories connexes