Endpoint Protection
2 Отзыва
ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.
2 Отзыва
Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ ́s anomaly detection analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection and guided investigation. Its self-learning AI is similar to the human…
Узнайте больше об этой компании2 Отзыва
REVE Antivirus Endpoint Security solutions incorporate a Device Control technology that allows the administrator to block or allow permissions for using external devices such as Hard Disk, Pen drive, USB Dongle, Printers, External CD/DVD. By blocking unauthorized media, Device control prevents the spreading of a virus via removable devices.
2 Отзыва
Wahupa SCM is based on a proven successful concept with a slew of new innovations. We've taken our vast experience building best-of-class Supply Chain Management (SCM) products and started all over to build a product that will optimize your supply chain, and still be affordable.
2 Отзыва
TXHunter provides an easy to use and convenient tool for conducting threat incident investigations remotely. If any endpoint system or server is suspected of having been attacked, TXHunter can simply take a snapshot of the suspicious system and automatically conduct an incident investigation. If the investigation process identifies suspicious files or…
Узнайте больше об этой компании2 Отзыва
Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
2 Отзыва
Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.
2 Отзыва
Heimdal Security is a Denmark-based, self-financed, cybersecurity vendor, specialized in DNS filtering, silent patching, antivirus/antimalware software, and Privileged Access Management (PAM) solutions. In an ever-evolving threatscape, traditional, file-based, Antivirus solutions are no longer sufficient to withstand the next generation of online…
Узнайте больше об этой компании2 Отзыва
2 Отзыва
Panda Adaptive Defense 360 is an innovative cybersecurity solution for endpoints and servers, delivered from the Cloud. Its agent is lightweight and minimal impact on endpoints performance, which is managed via a single Cloud console. AD360 combines the widest range of endpoint protection (EPP) technologies with EDR capabilities, automating the…
Узнайте больше об этой компании2 Отзыва
CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.
2 Отзыва
CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.
2 Отзыва
The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not…
Узнайте больше об этой компании2 Отзыва
NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.
2 Отзыва
Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industry to achieve efficiency and sophistication in product design that combines a multitude of technologies.