Voici notre liste d'applications pour Logiciels de sécurité informatique. Les filtres vous aident à affiner les résultats pour trouver exactement ce que vous cherchez.

Classer par

162 options de logiciels métiers disponibles

Maintenez une visibilité complète sur vos environnements numériques grâce à JupiterOne, une solution basée sur des graphiques, optimisée par des API (Application Programming Interface) et axée sur les données. Simplifiez la collecte des preuves de conformité, réduisez le délai entre les constatations et les mesures correctives et gérez la... En savoir plus sur JupiterOne
Spybot is an endpoint security suite, which helps enterprises detect and remove corrupt files, track unauthorized access to data, and protect systems from malware attacks. Features include anti-virus and anti-spyware, automated signature updates, task scheduling, and command-line tools. En savoir plus sur Spybot
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform. En savoir plus sur Cisco Umbrella
Beyond DLP est une plateforme de protection des données permettant de suivre et de protéger les données dispersées. Le logiciel ITsMine offre une protection des données aux entreprises dans une solution facile basée sur une API (Application Programming Interface). En savoir plus sur Beyond DLP
EventLog Analyzer est une solution web de SIEM (gestion des informations et des événements de sécurité) qui aide les petites et grandes entreprises à surveiller les périphériques réseau, les serveurs et les applications. Ses fonctionnalités clés comprennent l'audit, l'analyse du trafic, la détection des menaces et la gestion de la conformité. En savoir plus sur ManageEngine EventLog Analyzer
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access. En savoir plus sur PA File Sight
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. En savoir plus sur Hitachi ID Bravura Identity
CipherCloud permet aux entreprises d'adopter en toute sécurité des applications cloud tout en garantissant la confidentialité des données et en surmontant les risques de conformité et de sécurité réglementaires. En savoir plus sur CipherCloud
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments En savoir plus sur VaultCore
Tanium Endpoint Platform is an on-premise and cloud-based computer security software that helps businesses manage incidents, track asset inventory, handle vulnerability, and more from within a unified platform En savoir plus sur Tanium Endpoint Platform
MacKeeper is an antivirus solution that helps Mac users protect networks and digital assets from targeted attacks, malware, and other online threats. The application enables IT teams to block viruses, schedule scans, inspect files, and remove spyware, adware, and ransomware from systems. En savoir plus sur MacKeeper
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes. En savoir plus sur Cynet 360
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package. En savoir plus sur CODA Footprint
Cisco Cloudlock is an API-based cloud access security broker (CASB) that helps accelerate use of the cloud. It secures identities, data, and apps, and combats account compromises, breaches, and cloud app ecosystem risks. En savoir plus sur Cisco Cloudlock
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. En savoir plus sur ManageEngine Vulnerability Manager Plus
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover... En savoir plus sur CySight
Complete multilayered protection for endpoints, cloud applications & email, the #1 threat vector En savoir plus sur ESET PROTECT
CAST Highlight is a SaaS software intelligence product for rapid application portfolio analysis and Software Composition Analysis (SCA). En savoir plus sur CAST Highlight
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. En savoir plus sur Dhound
Fyde est une solution de sécurité réseau basée sur le cloud conçue pour aider les entreprises à fournir aux partenaires et aux entrepreneurs un accès privilégié aux ressources et applications de l'entreprise. Les fonctionnalités clés comprennent la gestion des politiques, la segmentation des applications, la détection des menaces et la gestion des... En savoir plus sur Fyde
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time. En savoir plus sur CloudJacketX
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans. En savoir plus sur SaaS Vulnerability Scanner
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... En savoir plus sur Quantum Network Security
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents. En savoir plus sur Clearswift SECURE Email Gateway
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. En savoir plus sur IDA Pro
Excellente protection avec assistance en temps réel. Le tout depuis un seul emplacement centralisé. En savoir plus sur SYSVOOT Antivirus Pro
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. En savoir plus sur Anti-Executable
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac. En savoir plus sur Pareto Security
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups. En savoir plus sur Hitachi ID Bravura Privilege
Live Ensure™ protège les utilisateurs en sécurisant et en authentifiant leurs identités grâce à une approche multi-facteur synthétisée. Les utilisateurs sont convaincus que leurs identifiants sont protégés quand ils sont sur votre site. Vos utilisateurs sont protégés contre le phishing, le pharming ou les attaques de type "homme du milieu" (MITM).... En savoir plus sur LiveEnsure
CloudPassage® Halo® est une plateforme internationalement avant-gardiste d'automatisation de la conformité et de la sécurité qui offre une visibilité instantanée sur les serveurs et une protection continue aux serveurs. En savoir plus sur CloudPassage Halo
BlueFiles permet aux utilisateurs d'envoyer des fichiers cryptés en toute sécurité tout en maintenant un contrôle total sur les destinataires, les périodes d'accès, les téléchargements et l'impression. En savoir plus sur BlueFiles
Cornerstone MFT est une solution basée sur le cloud qui aide les entreprises, les services financiers et les organisations de santé à gérer la sécurité et les transferts de fichiers sur les serveurs. Les fonctionnalités clés comprennent l'automatisation des processus, la gestion de la conformité, la collaboration et le cryptage des données. En savoir plus sur Cornerstone MFT Server
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. En savoir plus sur StackRox
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. En savoir plus sur Evidian
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... En savoir plus sur PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). En savoir plus sur iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... En savoir plus sur RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. En savoir plus sur Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. En savoir plus sur Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. En savoir plus sur swIDch Auth SDK
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities. En savoir plus sur 6clicks
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. En savoir plus sur SSI Kit
La solution Verimatrix Code Protection introduit une sécurité puissante, automatisée et d'autodéfense directement dans votre application. Elle empêche toute modification de l'application et peut être facilement mise en œuvre à n'importe quelle étape du processus de développement. Il est essentiel de conserver la confiance des clients en créant des... En savoir plus sur Verimatrix Code Shield
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. En savoir plus sur DIARIO
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys. En savoir plus sur Securden
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. En savoir plus sur AdsPower
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls En savoir plus sur FortMesa
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web. En savoir plus sur Cybersprint
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments,... En savoir plus sur Trend Micro Cloud One

Catégories connexes