Suomi Näytä paikalliset tuotteet
483 tulosta
Powerful key management encryption tool providing full control & security of the entire key lifecycle from enterprise to endpoint. Lue lisää tuotteesta VaultCore
VaultCore is the world's only encryption key management solution to automate the key lifecycle process, deliver the capacity to support hundreds of millions of keys, and offer seamless network integration to safeguard assets from attack on devices and infrastructure. Serving the banking/financial, healthcare, data storage, telecomm, energy, IT, and transportation industries, VaultCore is most recognized for it's scalability, interoperability, powerful automation, and ease of use. Lue lisää tuotteesta VaultCore

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service. Lue lisää tuotteesta Cato Networks Suite
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Lue lisää tuotteesta Cato Networks Suite

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance. Lue lisää tuotteesta EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Lue lisää tuotteesta EventSentry

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities on a centralized platform. Lue lisää tuotteesta ManageEngine EventLog Analyzer
EventLog Analyzer, a comprehensive log management solution, collects, analyzes, correlates, searches, and archives log data from endpoints, firewalls, servers, databases, applications, and more. It provides visibility into network activity, spots suspicious activities through incident detection mechanisms such as event correlation, threat intelligence and more, mitigates potential threats and offers audit-ready report templates that help enterprises to comply with IT mandates at ease. Lue lisää tuotteesta ManageEngine EventLog Analyzer

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
An award-winning solution that delivers comprehensive security for small and medium business devices, data, and employees. Lue lisää tuotteesta Avast Ultimate Business Security
Avast Ultimate Business Security is the best cybersecurity and privacy protection to secure your users, devices, and applications from malware, phishing, ransomware, and advanced cyberattacks. - It provides powerful online protection and automation, keeping devices and applications updated and secure. - Delivers Mobile Protection, Password & Webcam Protection, USB Protection, and VPN. - Includes Patch Management to automate the patching process, keeping devices secure. Lue lisää tuotteesta Avast Ultimate Business Security

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Create an encrypted, zero-trust network that hides your systems, cloud apps and assets from the internet. 14 days free trial. Lue lisää tuotteesta GoodAccess
GoodAccess creates a secure and encrypted network infrastructure that hides your business systems, cloud apps, assets and resources from the internet and controls authorized access using the concept of Software-Defined Perimeter. With fully automated deployment, in 10 minutes you can secure all devices wherever they connect while avoiding complex infrastructure designs that result in higher operational costs and risk. Lue lisää tuotteesta GoodAccess

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Lue lisää tuotteesta Jamf Protect
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers. Lue lisää tuotteesta Jamf Protect

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Automated proximity-based 2FA authentication into computers and websites. Passwordless login and auto-lock PCs, Macs, and websites. Lue lisää tuotteesta GateKeeper Enterprise
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly with password autofill. No more locked out accounts. When the token moves out of range, GateKeeper automatically locks the computer. Be preventative against expensive and disruptive data breaches. Your password caddie for a password-free experience. Never go back to memorizing and typing passwords. Lue lisää tuotteesta GateKeeper Enterprise

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Log360 is a comprehensive SIEM solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. Lue lisää tuotteesta ManageEngine Log360
Log360 is a SIEM solution that helps combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to several compliance mandates. You can customize the solution to cater to your unique use cases. It offers real-time log collection, analysis, correlation, alerting and archiving abilities. You can monitor activities that occur in your Active Directory, network devices, employee workstations, file servers, Microsoft 365, cloud services and more. Lue lisää tuotteesta ManageEngine Log360

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Dark Web ID monitors business data and credentials and alerts you if found for sale on dark web markets so that you can prevent breach. Lue lisää tuotteesta Dark Web ID
Dark Web ID helps MSPs and Internal IT teams protect their organization and customers from a cybersecurity breach by monitoring the dark web 24/7/365 and alerting if any sensitive company or employee data or passwords are found up for sale on the dark web. Lue lisää tuotteesta Dark Web ID

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
HackerOne is the industry standard for hacker-powered security. Lue lisää tuotteesta HackerOne
With HackerOne Assessments, work with a true cybersecurity partner, not just another vendor, to secure your network, web applications, mobile apps, API, and cloud environments. Lue lisää tuotteesta HackerOne

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Flowmon ADS is a security solution that uses machine learning to detect anomalies and malicious behaviour hidden in network traffic. Lue lisää tuotteesta Flowmon Anomaly Detection System
Flowmon Anomaly Detection System analyzes network traffic from multiple perspectives to counter malicious behavior and cyberattacks. By using a combination of detection methods, including machine learning, adaptive baselining, heuristics, behavior patterns, and signatures, context-rich visualization and reporting, ADS provides SecOps teams with capabilities for incident detection, handling, analysis and response. Flowmon ADS is a part of Kemp product portfolio. Lue lisää tuotteesta Flowmon Anomaly Detection System

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Lue lisää tuotteesta ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Lue lisää tuotteesta ManageEngine Key Manager Plus

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
ManageEngine PAM360 Complete privileged access security for enterprise IT Lue lisää tuotteesta ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security. Lue lisää tuotteesta ManageEngine PAM360

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets. Lue lisää tuotteesta Holm Security VMP
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Lue lisää tuotteesta Holm Security VMP

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Jamf Threat Defense protects iOS endpoints from malicious attacks. Lue lisää tuotteesta Jamf Threat Defense
As iPhone device usage grows in the enterprise, the need to secure them is even greater. Jamf Threat Defense protects your organization’s iOS endpoints from being compromised through mobile threat detection and zero-day phishing prevention. Lue lisää tuotteesta Jamf Threat Defense

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Network security tool that helps users protect PC, Mac, Android & iOS devices against spyware, viruses, malware, ransomware, and more.
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money. Lue lisää tuotteesta Norton AntiVirus

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform. Lue lisää tuotteesta Malwarebytes for Business

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Google Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. New customers get $300 in free credits to fully explore and conduct an assessment of Google Cloud. You won’t be charged until you upgrade. Google Cloud Platform offers a modular-based platform providing build and scale services to businesses of any size within any industry. In addition to cloud storage and scalable data warehouses with built-in machine learning, Google Cloud Platform provides relational and non-relational databases for transactions, complex queries, streaming, offline sync, and more. A range of tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning are also available. Lue lisää tuotteesta Google Cloud Platform

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Computer security tool that helps businesses secure networks through encryption, personal IP addresses, browser extensions, and more.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world Lue lisää tuotteesta NordVPN

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Lue lisää tuotteesta ESET Endpoint Security

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
VPN solution that provides businesses with remote access, policy management, threat protection, and more.
VPN solution that provides businesses with remote access, policy management, threat protection, and more. Lue lisää tuotteesta Cisco AnyConnect

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Download free IT help desk software for IT pros & sysadmins around the world in all businesses. Support & mobile apps also free.
The Spiceworks IT Help Desk is purpose-built for IT pros, we have just what you need to run a better internal IT help desk and a better business. Start tackling tickets in minutes with free help desk software (on your server or in the cloud). Plus, it's more than just ticket tracking: understand (and change!) team behavior and articulate your value to the business. Get it free today! Lue lisää tuotteesta Spiceworks

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
SpamTitan Email Security prevents unwanted email spam, phishing attacks, malware, ransomware, Spoofing, BEC and other email threats
SpamTitan is a Leading Email Security for businesses and MSPs. SpamTitan helps control mail flow, clean it, and protect against unwanted email threats including phishing and malware. Compliant with Microsoft 365, G-Suite and Outlook. Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a free Trial of SpamTitan Email Security today, full support included. Lue lisää tuotteesta SpamTitan

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. Lue lisää tuotteesta TunnelBear

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all application s for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Lue lisää tuotteesta Duo Security

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Lue lisää tuotteesta Cloudflare

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Protect your business from viruses, ransomware, and email threats including spam, phishing, and more.
AVG Internet Security Business Edition protects your business from viruses, ransomware, and email threats including spam, phishing, and more. Our top-rated antivirus protects your business by blocking cyberthreats, keeping your data secure, and allowing remote access from a management console. AVG Cloud Management Console is an easy-to-use platform that allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and secure devices. Lue lisää tuotteesta AVG Internet Security Business Edition

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Try a free Trial of WebTitan today, full support included. Lue lisää tuotteesta WebTitan

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Lue lisää tuotteesta CrashPlan

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Lue lisää tuotteesta Webroot Business Endpoint Protection

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Ensure network security and prevent unwarranted access with MFA, SSO, and more, across Windows, macOS, and Linux systems. Plus, leverage JumpCloud’s hosted RADIUS servers to easily provision and deprovision access to VPNs and Wi-Fi networks — no on-prem infrastructure needed on your end, and no shared passwords. Lue lisää tuotteesta JumpCloud Directory Platform

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Lue lisää tuotteesta Bitdefender GravityZone

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
SecureLink, an Imprivata company, is the industry leader in critical access management
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Lue lisää tuotteesta SecureLink

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities enterprise management
OpenVPN Access Server is a full featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications. Lue lisää tuotteesta OpenVPN

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cloud-based solution that provides remote systems management for desktops, servers, and mobile laptops.
With the release of GoTo Central and GoTo Pro, GoTo's next-generation solutions for remote access and systems management, GoTo IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products. Lue lisää tuotteesta Pro

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Lue lisää tuotteesta Splunk Enterprise

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Malwarebytes for Teams protects against malware, ransomware, viruses, hackers, and other established and emerging cyberthreats.
Protect up to 20 of your office devices with Malwarebytes award-winning detection, protection, and remediation technology. Block the hackers and scammers who want to hold your data hostage. (Ransomwar e attacks on businesses went up 365 percent in 2019.) Stop resource hogging threats from slowing down your devices so you can work faster and get more done, every day. One convenient and practical cybersecurity solution for all your office devices: Windows, Mac, Chromebook, and Android. Lue lisää tuotteesta Malwarebytes for Teams

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. Lue lisää tuotteesta ConnectWise Automate

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Lue lisää tuotteesta Connect Secure

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
DNS-based threat protection & content filtering. Driven by realtime A.I. Built for MSPs and Enterprise.
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. Lue lisää tuotteesta DNSFilter

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin provides multiple solutions that allow you to enable seamless and reliable Single Sign-On and MFA for on-premises network appliances and applications, like VPN and WiFi endpoints. Benefits include zero on-premises footprint, simplified administrative experience, decreased costs, and increased security, visibility, and productivity. Lue lisää tuotteesta OneLogin

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager. Lue lisää tuotteesta Xeams

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Lue lisää tuotteesta Nessus

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Network Performance Monitor (NPM) is affordable software that can help you detect, diagnose, and resolve network performance issues.
SolarWinds Network Performance Monitor (NPM) is a powerful and affordable solution that can help you quickly detect, diagnose, and resolve network performance problems and outages. NPM provides advanced network troubleshooting for on-premise, hybrid, and cloud services with critical path hop-by-hop analysis. NPM's comprehensive coverage is designed to enable an IT professional to reduce mean outage time, see return on network investments & determine how to reallocate resources for future health. Lue lisää tuotteesta Network Performance Monitor

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Lue lisää tuotteesta Delivery Trust

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
GlassWire is a modern network monitor & security tool with a built in firewall.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Lue lisää tuotteesta GlassWire

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Lue lisää tuotteesta BlackBerry CylancePROTECT

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security.
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Lue lisää tuotteesta ManageEngine Firewall Analyzer

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates. Lue lisää tuotteesta SUPERAntiSpyware

Ominaisuudet

  • Raportointi/analytiikka
  • Tunkeutumisten tunnistusjärjestelmä
  • Haavoittuvuuksien etsintä
  • Toiminnan valvonta
  • Uhkiin reagointi
  • Käyttöoikeuksien tarkistus / luvat
  • Palomuurit