Ykkösvalintamme

Sponsoroitu

Hyviä arvioita saaneet ohjelmistot

143 tulosta
Cloud-hosted GDPR compliant business backups. Secure and robust infrastructure with German servers. Lue lisää tuotteesta euBackups
Cloud-hosted GDPR compliant business backups. Secure and robust infrastructure with German servers. 100% European hosted Central management console Zero Knowledge encryption Secure Key Management In crease or decrease storage or devices on a monthly basis Monthly or annual terms Free 14 day trial Unlimited bandwidth File sync Green hosting White labeling available Our hosted infrastructure is fully-compliant with EU data protection and GDPR guidelines. Lue lisää tuotteesta euBackups

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
NinjaOne (formerly NinjaRMM) is the easiest, all-in-one IT management solution that MSPs and IT professionals love. Lue lisää tuotteesta NinjaOne
NinjaOne (formerly NinjaRMM) is the leading unified IT operations solution that simplifies the way IT teams work. With NinjaOne, IT teams can manage all their endpoints and support end-users within one fast, modern, intuitive platform, improving technician efficiency and user satisfaction. The NinjaOne platform gives IT teams proactive monitoring, patch management & more. NinjaOne supports over 9,000 customers around the world, and is consistently ranked #1 for our world-class customer support. Lue lisää tuotteesta NinjaOne

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Kasm Workspace is a secure virtualized workspace for interacting with sensitive data using restrictions that prevent data loss/sharing. Lue lisää tuotteesta Kasm Workspaces
Kasm Workspaces is changing the way that businesses secure sensitive data using our Containerized Desktop Infrastructure (CDI) and browser-based rendering technology. Developed for secure collaborati on on highly sensitive Government/Defense programs, our technology allows users to seamlessly interact with sensitive data through the web browser while also protecting the data from being taken or shared. Kasm is not just a service, but a highly configurable platform, with a robust developer API. Lue lisää tuotteesta Kasm Workspaces

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution Lue lisää tuotteesta Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Lue lisää tuotteesta Acronis Cyber Protect Cloud

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform. Lue lisää tuotteesta Comet Backup
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform for businesses and IT providers. You control your backup environment and storage destination (local, AWS, Google Cloud Storage, Azure, Backblaze, Wasabi, or other S3 storage providers). Our backup software supports businesses across 120 countries in 12 languages. No contracts. Support, updates, replication, and re-branding are all free. 30-day FREE trial! Lue lisää tuotteesta Comet Backup

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Cove Data Protection offers backup, disaster recovery, and archiving. Protect servers, workstations, and Microsoft 365 with Cove. Lue lisää tuotteesta Cove Data Protection
Cove Data Protection offers backup, disaster recovery, and archiving for the cloud-first world. Protect servers, workstations, and Microsoft 365 with efficient data protection as a service. Includes cloud storage and a unified multitenant dashboard. Save time, use less storage, and keep backups safer from ransomware with Cove. Lue lisää tuotteesta Cove Data Protection

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Safetica protects your sensitive data against insider threats, and breaches by detecting security incidents. Lue lisää tuotteesta Safetica
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance. Safetica is a European software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions. Safetica NXT (cloud-native) Safetica ONE (on-prem) Lue lisää tuotteesta Safetica

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Protect your code from exposed secrets and high-risk security misconfigurations, with zero permissions and no data transfer. Lue lisää tuotteesta SpectralOps
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Lue lisää tuotteesta SpectralOps

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Acronis Cyber Protect natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. Lue lisää tuotteesta Acronis Cyber Protect
Acronis Cyber Protect integrates backup and AI-based antimalware and protection management into one solution. Integration and automation provide unmatched protection increasing productivity while decreasing TCO. Acronis Cyber Protect offers one agent, one management interface, one license removing complexity and risks associated with non-integrated solutions. With Acronis Cyber Protect, you get one integrated solution that delivers complete protection from todays threats. Lue lisää tuotteesta Acronis Cyber Protect

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Employee Monitoring and Intelligent Data Loss Prevention (DLP) Software - Cloud, On-prem, Private Cloud, AWS deployment options Lue lisää tuotteesta Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based management dashboard Out-of-the-box integration to leading SIEM platforms for real-time alerts/action Extensive, customizable reporting Cloud/private-cloud/on-prem deployment options for SMB & Enterprise Meet compliance, monitoring, audit and forensics requirements for GDPR, HIPAA, PCI & more Lue lisää tuotteesta Teramind DLP

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Endpoint DLP Plus is an integrated DLP solution designed to safeguard sensitive endpoint data and effectively mitigate insider risks. Lue lisää tuotteesta ManageEngine Endpoint DLP Plus
Endpoint DLP Plus leverages advanced data loss prevention strategies to safeguard sensitive data within endpoints. Its capabilities enable administrators to locate, consolidate and categorize sensitive information as well as monitor and limit its movement across various exit routes such as cloud applications, email, peripheral devices and more in order to prevent accidental or deliberate disclosure. It is a versatile and scalable solution ideal for SMB's and enterprises. Lue lisää tuotteesta ManageEngine Endpoint DLP Plus

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
ManageEngine AD360 is an unified IAM solution that provides in-depth access management & governance for Microsoft Active Directory, M36 Lue lisää tuotteesta ManageEngine AD360
ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and secure user identities, facilitate identity governance, and ensure compliance. It provides in-depth access management for Microsoft Active Directory, M 365, G Suite, and other target systems, and gives an edge over native tools. Its key capabilities include authentication, auditing, user behavior analytics (UBA), multi-factor authentication (MFA), and single sign-on (SSO). Lue lisää tuotteesta ManageEngine AD360

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform. Lue lisää tuotteesta Malwarebytes for Business

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Google Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications. New customers get $300 in free credits to fully explore and conduct an assessment of Google Cloud. You won’t be charged until you upgrade. Google Cloud Platform offers a modular-based platform providing build and scale services to businesses of any size within any industry. In addition to cloud storage and scalable data warehouses with built-in machine learning, Google Cloud Platform provides relational and non-relational databases for transactions, complex queries, streaming, offline sync, and more. A range of tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning are also available. Lue lisää tuotteesta Google Cloud Platform

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Lue lisää tuotteesta ESET Endpoint Security

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
NAKIVO Backup & Replication is a reliable and affordable data protection solution for virtual, physical, cloud and SaaS environments.
NAKIVO Backup & Replication is a comprehensive data protection solution delivering incremental, application-aware backup, instant recovery, ransomware protection and disaster recovery orchestration for VMware vSphere, Microsoft Hyper-V, Nutanix AHV, Amazon EC2, physical Windows/Linux environments, Microsoft 365 and Oracle Database. Lue lisää tuotteesta NAKIVO Backup & Replication

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Lue lisää tuotteesta Webroot Business Endpoint Protection

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote. Lue lisää tuotteesta NeoCertified

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s. File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. Lue lisää tuotteesta AccessPatrol

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Monitor and analyze your employees company-wide whether they are in the office or working remotely.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the system of record, presenting detailed, accurate, and actionable data for use in incident response, high-risk insider monitoring, and productivity reporting. Cerebral can be deployed On-prem, in the Cloud or through an MSP provider. Lue lisää tuotteesta Veriato Cerebral

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Delivery Trust enables two-way secured communication without recipients of your secured messages having to download or register
Delivery Trust by Identillect Technologies provides convenient, user-friendly email security for businesses of all sizes; no IT department or know-how is required for set up or administration. Unlike many encryption solutions, Delivery Trust enables two-way secured communication without recipients of your secured messages having to download, purchase or register for services. Lue lisää tuotteesta Delivery Trust

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Comprehensive enterprise backup solution for all workloads, combining data protection for backups, replicas, storage snapshots and CDP.
Comprehensive enterprise backup solution for all workloads, combining data protection for backups, replicas, storage snapshots and CDP replicas under one control panel. Veeam provides backup, restore and replication for virtual machines and cloud-based workloads, as well as physical servers and workstations. VMware, Hyper-V, AWS, Azure, Windows, Linux, Nutanix AHV and Google GCP are supported. Veeam also delivers multiple integrations with leading storage vendors and service providers. Lue lisää tuotteesta Veeam Backup & Replication

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Keepit is a software company dedicated to data protection that specializes in cloud data backup and recovery covering all SaaS apps.
Keepit is the industry leader in cloud-to-cloud backup that provides complete coverage across all Microsoft 365 workloads: Teams, Exchange, OneDrive, SharePoint, Groups, and Public Folders. Keepit's architecture runs on a secure, private infrastructure offering data immutability and securing data availability - always. With Keepit, you can manage your data independently from your SaaS provider. Lue lisää tuotteesta Keepit

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. $4/user/mo. Try 14 days free!
GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. It is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one secure virtual network. No hardware or complex setup is required, GoodAccess is deployable in less than 10 minutes. Create a free account to try all the GoodAccess features during a 14-day trial, continue with a paid plan, or go with Starter for free. Lue lisää tuotteesta GoodAccess

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies. Lue lisää tuotteesta McAfee DLP Endpoint

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
In just one click, secure Microsoft 365, Google Workspaces, Slack, Teams and more against the latest threats.
Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for email and cloud collaboration solutions such as Microsoft 365, Google Workspaces, and Slack. The platform deploys in one click via API to prevent Business Email Compromise, phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. No other solution is capable of blocking both external and insider attacks. Lue lisää tuotteesta Avanan

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use.
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS Lue lisää tuotteesta Unitrends Backup

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location. Lue lisää tuotteesta Zscaler

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
BLACKbox enables SMEs with centralized data storage with data loss, theft prevention & remote access
Every company possesses digital assets. Data in the form of accounting or ERP data, Non-Disclosure Agreements with your customers to protect their intellectual property, Sensitive company secrets, or confidential data. Continuity is lost if this data is lost. Leakage or theft of sensitive data exposes the company to significant liability. BLACKbox enables enterprises to prevent data loss and theft from servers, laptops, desktops, tablets, and smartphones. Lue lisää tuotteesta BLACKbox

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
SilverSky provides advanced email protection, compliance and information protection solutions to keep your company and users safe.
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration. With over 20 years of experience serving regulated industries, we have the experience and skills to ensure your email environment stays safe and compliant with the latest industry regulations. Lue lisää tuotteesta SilverSky Email Protection Suite

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Scalable data warehousing, replication, integration, & data backup platform. Quickly connect any data source to any data warehouse!
Relational Junction connects any data source to any data warehouse in just minutes. Relational Junction enables secure & efficient data integration & replication between a wide variety of cloud, hybrid, & on-premise data sources/applications. Our patented scalability & multithreaded technology quickly connects all of your critical business information in one place for a 360-degree view of your data. This unified view allows for robust reporting & analytics. Lue lisää tuotteesta Relational Junction

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Lue lisää tuotteesta Panda Adaptive Defense 360

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Lue lisää tuotteesta DriveStrike

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Patronum Google Workspace Management, Email Signature, Contact Sharing, Drive Management and more.
Google Workspace Management, Email Signature, Contact Sharing, Drive Management and more. Patronum takes the Google Workspace (G Suite) administrators wish list in order to create a set of must-have features to transform the way Google Workspace users, groups and resources are managed. Onboarding and Off-boarding users within Google Workspace can be time-consuming and costly. Patronum makes the whole process simple and intuitive. Lue lisää tuotteesta Patronum

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
BetterCloud is the mission control center for discovering, managing, and securing SaaS applications, data, and users.
BetterCloud is the market leader for SaaS Operations, enabling IT professionals to transform their employee experience, maximize operational efficiency, and centralize data protection. With no-code automation enabling zero touch workflows, thousands of forward thinking organizations like HelloFresh, Oscar Health and Square now rely on BetterCloud to automate processes and policies across their cloud application portfolio. Lue lisää tuotteesta BetterCloud

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities. Lue lisää tuotteesta Symantec Enterprise Vault

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Lue lisää tuotteesta Prey

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
On-premise backup solution that performs automatic, scheduled backups of Windows servers to a variety of backup devices.
On-premise backup solution that performs automatic, scheduled backups of Windows servers to a variety of backup devices. Lue lisää tuotteesta BackupAssist

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamicall y apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics. Lue lisää tuotteesta Forcepoint DLP

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
With this software, you can restore lost, formatted, and accidentally deleted office documents, emails, photos, videos, and more.
Stellar Data Recovery Professional is a powerful DIY data recovery software to recover any file type from Windows PC and external storage media, including 4K drives. It recovers the data from corrupted, missing, formatted, or encrypted hard drive partitions and volumes. It also supports recovery from optical media. Stellar Data Recovery Professional is a powerful DIY data recovery software to recover any file type from Windows PC and external storage media, including 4K drives. Lue lisää tuotteesta Stellar Data Recovery Professional

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Chimpa UEM is an EMM crossplatform solution that allows to manage, monitor and protect devices in schools and business.
Chimpa UEM combines a Unified Endpoint Management (UEM) to the Mobile Threat Defense (MTD) that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS, Android and Windows devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); Lue lisää tuotteesta Chimpa

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Wasabi delivers simple, predictable and highly secure cloud object storage at 1/5th the price of the hyperscalers with no hidden fees.
Wasabi is revolutionizing cloud storage for the data era. Trusted by tens of thousands of customers worldwide, Wasabi’s hot cloud storage enables organizations of all sizes to securely store and instantly access a nearly unlimited amount of data at a fraction of the cost of competitive solutions. By increasing performance and eliminating complicated storage tiers and unpredictable fees for egress and API calls, Wasabi simplifies data management decision-making while reducing cost of ownership. Lue lisää tuotteesta Wasabi

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux.
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Lue lisää tuotteesta Endpoint Protector

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Lue lisää tuotteesta Jazz Platform

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility and proven security.
Protect, secure, recover. From the minds of Commvault—ten times a leader in the Gartner Magic Quadrant—Metallic is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and any other threat out there. No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology. Lue lisää tuotteesta Metallic SaaS Backup & Recovery

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archiv e, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Lue lisää tuotteesta Retrospect

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices. Lue lisää tuotteesta Inky

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Enterprise cross platform file replication software that syncs & mirrors files between different sites, OSs, clouds, VMs and servers.
Enterprise cross platform file replication software that syncs & mirrors files between different sites, different systems, different storage and different clouds. EnduraData software runs on VMs as well as on physical machines. EDpCloud is used for automatic secure file transfer, data delivery,continuous backup, server backup, data protection and workflow automation. EDpCloud replicates only file changes(deltas) in real time, on a scheduled basis or on demand. Multiple operating systems support, Lue lisää tuotteesta EDpCloud

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
Clumio unleashes the full power of the cloud to deliver secure backup as a service for your enterprise data wherever it needs to be.
Clumio helps organizations simplify data protection in AWS. Its secure air-gapped SaaS solution protects from ransomware and enables organizations to achieve stringent compliance requirements, backup and restore data in minutes, and gain better visibility to optimize cloud storage costs. Lue lisää tuotteesta Clumio

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta
BeyondDLP Enables A Safe Data Experience A unique & Proactive Data Loss & Leakage Prevention solution to protect your data - anywhere.
ITsMine provides safety and protection to your shared and distributed work environment, along with regulatory compliance. ITsMine’s technology overcomes the major challenges and complexities of current data security solutions by automatically constructing “Safe Zones." ITsMine is agentless, API-based, and can be deployed in approximately 30 minutes. Proactively protecting against internal and external threats; while covering data at rest, in motion, and in use. Inside and beyond the company. Lue lisää tuotteesta Beyond DLP

Ominaisuudet

  • Sallittujen listalle / mustalle listalle lisääminen
  • Käytäntöjen hallinta
  • Verkkopohjaisten uhkien hallinta
  • Häiriöiden hallinta
  • Arkaluontoisten tietojen tunnistus
  • Vaatimustenmukaisuuden seuranta