Security
2 Отзыва
Cymptom's Network Security Posture Management platform is the only solution that provides continuous full visibility of the entire hybrid network threat landscape in real-time. Cymptom maps all misconfigurations, segmentation flaws, weaknesses and vulnerabilities, as well as open ransomware vectors in the hybrid network continuously in real-time. Unlike…
Узнайте больше об этой компании2 Отзыва
FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nation-state grade reconnaissance techniques. The platform automatically discovers an organization’s digital attack surface and launches multi-stage safe…
Узнайте больше об этой компании2 Отзыва
Website Anti-malware product that will ensure business continuity by protecting your website from online threats and malware. With ThreatSign we guarantee the fastest incident response and access to the top-notch security professionals in case your site gets on blacklist or compromised. There is nothing to install and no maintenance is required. Fully…
Узнайте больше об этой компании2 Отзыва
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels. Protecting email (Office 365, G-Suite, MS Exchange), cloud storage (OneDrive, G-Drive, Dropbox, Box etc.) and IM (Slack, Teams, Skype and more) BitDam empowers organizations to collaborate safely.
2 Отзыва
Panda Adaptive Defense 360 is an innovative cybersecurity solution for endpoints and servers, delivered from the Cloud. Its agent is lightweight and minimal impact on endpoints performance, which is managed via a single Cloud console. AD360 combines the widest range of endpoint protection (EPP) technologies with EDR capabilities, automating the…
Узнайте больше об этой компании2 Отзыва
Cuckoo Sandbox is the leading open source automated malware analysis system.You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment.
2 Отзыва
Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.
2 Отзыва
Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.
2 Отзыва
inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This solution is built to achieve complete transparency over all the digital assets residing within the organization, thus, ensuring maximum security and solid…
Узнайте больше об этой компании2 Отзыва
Secucloud's ECS2 solution protects data traffic against external threats in mobile communication networks and prevents botnet traffic (even from its own network). In doing so, it enables providers to play an important role in the protection of their customers against malware and unwanted harmful content.
2 Отзыва
Making it easy to redirect URLs with full HTTPS support. You can even get email forwarding, analytics and API compatibility. Just type in your domain and we’ll deliver everything you need.
2 Отзыва
CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.
2 Отзыва
CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.
2 Отзыва
The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not…
Узнайте больше об этой компании2 Отзыва
NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.