Voici notre liste d'applications pour Logiciels de sécurité informatique. Les filtres vous aident à affiner les résultats pour trouver exactement ce que vous cherchez.

Classer par

130 options de logiciels métiers disponibles

CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time. En savoir plus sur CloudJacketX
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. En savoir plus sur ManageEngine Vulnerability Manager Plus
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans. En savoir plus sur SaaS Vulnerability Scanner
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents. En savoir plus sur Clearswift SECURE Email Gateway
Acronis Cyber Protect est un logiciel cloud qui aide les entreprises à tirer parti de la technologie de l'IA (intelligence artificielle) pour détecter les menaces liées à la cybersécurité sur les actifs informatiques et les systèmes de points de terminaison. Les superviseurs peuvent réaliser des évaluations de vulnérabilité, déployer des correctifs... En savoir plus sur Acronis Cyber Protect
Excellente protection avec assistance en temps réel. Le tout depuis un seul emplacement centralisé. En savoir plus sur SYSVOOT Antivirus Pro
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes. En savoir plus sur Cynet 360
Live Ensure™ protège les utilisateurs en sécurisant et en authentifiant leurs identités grâce à une approche multi-facteur synthétisée. Les utilisateurs sont convaincus que leurs identifiants sont protégés quand ils sont sur votre site. Vos utilisateurs sont protégés contre le phishing, le pharming ou les attaques de type "homme du milieu" (MITM).... En savoir plus sur LiveEnsure
CloudPassage® Halo® est une plateforme internationalement avant-gardiste d'automatisation de la conformité et de la sécurité qui offre une visibilité instantanée sur les serveurs et une protection continue aux serveurs. En savoir plus sur CloudPassage Halo
BlueFiles permet aux utilisateurs d'envoyer des fichiers cryptés en toute sécurité tout en maintenant un contrôle total sur les destinataires, les périodes d'accès, les téléchargements et l'impression. En savoir plus sur BlueFiles
Cornerstone MFT est une solution basée sur le cloud qui aide les entreprises, les services financiers et les organisations de santé à gérer la sécurité et les transferts de fichiers sur les serveurs. Les fonctionnalités clés comprennent l'automatisation des processus, la gestion de la conformité, la collaboration et le cryptage des données. En savoir plus sur Cornerstone MFT Server
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. En savoir plus sur StackRox
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. En savoir plus sur Evidian
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... En savoir plus sur Quantum Network Security
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... En savoir plus sur PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). En savoir plus sur iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... En savoir plus sur RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. En savoir plus sur Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. En savoir plus sur Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. En savoir plus sur swIDch Auth SDK
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. En savoir plus sur IDA Pro
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. En savoir plus sur SSI Kit
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals. En savoir plus sur Sealit
La solution Verimatrix Code Protection introduit une sécurité puissante, automatisée et d'autodéfense directement dans votre application. Elle empêche toute modification de l'application et peut être facilement mise en œuvre à n'importe quelle étape du processus de développement. Il est essentiel de conserver la confiance des clients en créant des... En savoir plus sur Verimatrix Code Protection
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. En savoir plus sur DIARIO
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. En savoir plus sur Anti-Executable
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. En savoir plus sur AdsPower
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package. En savoir plus sur CODA Footprint
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls En savoir plus sur FortMesa
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web. En savoir plus sur Cybersprint

Catégories connexes