168 resultados
¿Por qué es gratis Capterra?
Prey es un software y plataforma online de rastreo, administración y protección de equipos móviles y sus datos.
Prey es un software y plataforma online para el rastreo, administración y protección de computadores portátiles y dispositivos móviles con alternativas personales y empresariales. El servicio es desarrollado por la empresa Chilena Prey Inc.
Prey es un software y plataforma online para el rastreo, administración y protección de computadores portátiles y dispositivos móviles con alternativas personales y empresariales. El servicio es...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Reduzca el riesgo, mantenga el cumplimiento y agilice las operaciones de seguridad con Infocyte.
Infocyte ayuda a los equipos de seguridad a proteger los terminales con detección avanzada de amenazas, respuesta automática a incidentes y evaluaciones instantáneas de amenazas. Integra y optimiza la pila de seguridad de terminales (SIEM, SOAR, EDR y más) con una consola en la nube fácil de usar. Los proveedores de servicios de seguridad gestionada (MSSP) emplean Infocyte para ofrecer evaluaciones rentables de riesgos de ciberseguridad, respuesta a incidentes de seguridad, detección de amenazas y detección gestionada y servicios de seguridad de respuesta (MDR).
Infocyte ayuda a los equipos de seguridad a proteger los terminales con detección avanzada de amenazas, respuesta automática a incidentes y evaluaciones instantáneas de amenazas. Integra y optimiza...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Plataforma de administración de seguridad que proporciona filtrado de URL web, motor antivirus, zona protegida de archivos automática, análisis de comportamiento y HIPS.
Plataforma de administración de seguridad que proporciona filtrado de URL web, motor antivirus, zona protegida de archivos automática, análisis de comportamiento y HIPS.
Plataforma de administración de seguridad que proporciona filtrado de URL web, motor antivirus, zona protegida de archivos automática, análisis de comportamiento y HIPS.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
CrowdStrike es uno de los líderes en protección de terminales de última generación en la nube.
CrowdStrike es uno de los líderes en protección de terminales de última generación en la nube. CrowdStrike revoluciona la protección de terminales unificando antivirus de última generación, detección y respuesta de terminales y servicio de búsqueda gestionado 24/7, todo ello mediante un único agente ligero.
CrowdStrike es uno de los líderes en protección de terminales de última generación en la nube. CrowdStrike revoluciona la protección de terminales unificando antivirus de última generación, detección...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automatically eliminate threats in real time for both on-prem and cloud environments and is the only solution to provide visibility into encrypted traffic across networks directly from the endpoint. SentinelOne is a converged EPP + EDR solution that seamlessly integrates with diverse IT environments.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Protect & manage your organizations devices wherever they are & wherever you are. With HiddenApp, peace of mind is fitted as standard.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.
Endpoint protection platform that helps IT professionals protect WordPress websites from targeted attacks, malware, and other threats.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
La protección de terminales detiene las amenazas en el terminal y coordina el cumplimiento con la seguridad de la nube y la red.
La protección avanzada de terminales de Trap detiene las amenazas en el terminal y coordina el cumplimiento con la seguridad de la nube y la red para evitar ciberataques.
La protección avanzada de terminales de Trap detiene las amenazas en el terminal y coordina el cumplimiento con la seguridad de la nube y la red para evitar ciberataques.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Password Depot reliably protects your passwords and documents from unauthorized access! Whether at home or in a major corporation.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access rights a user receives, which folders or entries they can view or, for example, which activities should be logged. Thanks to the intuitive user guidance of Password Depot, all employees will be able to work with the program within a very short time, without expensive and time-consuming training.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more.
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Una VPN en la nube rentable y con un solo clic que garantiza acceso seguro y simplificado a recursos de SaaS y de red para empresas de todos los tamaños.
Perimeter 81 es uno de los mejores servicios de acceso a red segura para tu organización. Despídete de costosos hardware, tediosas instalaciones y largas horas con la asistencia del centro de ayuda. Otorga instantáneamente a los empleados acceso seguro a los recursos críticos de la empresa basados en instalación local, web o en la nube. En cuestión de segundos, implementa servidores VPN privados con direcciones IP estáticas y obtén amplia visibilidad de la red a través de un portal de administración completo. Incluye aplicaciones de un solo clic para cada dispositivo.
Perimeter 81 es uno de los mejores servicios de acceso a red segura para tu organización. Despídete de costosos hardware, tediosas instalaciones y largas horas con la asistencia del centro de ayuda....

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Software de protección de terminales líder en su sector. Descubre, supervisa y protege los datos confidenciales.
Endpoint Protector pone fin a las fugas de datos y al robo de datos y ofrece un control perfecto de los dispositivos de almacenamiento portátiles. Sus capacidades de filtrado de contenido para datos en reposo y en movimiento van desde el tipo de archivo hasta el contenido predefinido basado en diccionarios, expresiones regulares o regulaciones como GDPR, PCI DSS, CCPA, HIPAA, etc.
Endpoint Protector pone fin a las fugas de datos y al robo de datos y ofrece un control perfecto de los dispositivos de almacenamiento portátiles. Sus capacidades de filtrado de contenido para datos...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR)...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
DeepArmor is the first AI-based endpoint protection software built specifically for small businesses.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading efficacy. Stay protected wherever you work with security that works both online and off, and take advantage of DeepArmor's simple management and low impact to users. You can install and activate in less than 5 minutes without needing any IT or security skills.
DeepArmor is the first AI-based endpoint protect built specifically for small businesses. It helps you prevent attacks from ransomware, viruses, and other advanced malware with industry-leading...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity
GFI EndPointSecurity reduces risk of data leaks and other malicious activity

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Enterprise mobility management solution coupled with turn-key enterprise applications to increase productivity and efficiency.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both Apple iOS and Google Android operating systems are support under one unified console.
WeGuard platform provides security and enterprise mobility applications out of the box to help secure mobile devices along with increasing productivity and efficiencies in mobile operations. Both...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Imperva Sonar offers cloud-based solutions for application, data, and edge security.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect business traffic.
Imperva Sonar offers cloud-based solutions for application, data, and edge security. It helps protect and secure data on websites, mobile apps, and APIs from automated attacks that can affect...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Cypherdog is an encryption tool for secure data transfer and communication between only two users.
Cypherdog is an encrypted file sharing, messaging and file storing. Cypherdog provides a desktop app compatible with Windows, MacOS and Linux that allows to send files, use chat, store files in cloud or local encrypted. Being the most advanced encryption software, Cypherdog ensures that the solutions proposed are unique and ensure the highest level of communication with confidentiality and anonymity.
Cypherdog is an encrypted file sharing, messaging and file storing. Cypherdog provides a desktop app compatible with Windows, MacOS and Linux that allows to send files, use chat, store files in cloud...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Cloud-based RMM software for patch management, endpoint management, remote desktop, IT asset management made for MSPs and IT admins
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support remote end-users. The cloud-based platform enables automatic patch management, remote desktop access, software deployment and distribution, IT asset inventory, network monitoring, reporting, and more. Action1 RMM is Free Forever for up to 50 endpoints, and it includes all the paid version features.
Action1 RMM is a fast and powerful cloud-based Remote Monitoring & Management (RMM) solution created for MSPs and IT professionals to manage endpoints, comply with security standards, and support...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
For on-premises, SaaS, and cloud-native data, Metallic gives you the best choice for your hybrid cloud data protection journey.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade solution to protect their data. Built on Microsoft Azure, Metallic offers coverage across apps, endpoints, on-premise, & cloud environments - proven to safeguard critical business data from deletion, corruption, & attack. Stay secure, stay compliant, stay recoverable with Metallic backup & recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Quince segundos de visibilidad y control sobre cada terminal. Incluso a través de las redes más grandes.
Quince segundos de visibilidad y control sobre cada terminal. Incluso a través de las redes más grandes.
Quince segundos de visibilidad y control sobre cada terminal. Incluso a través de las redes más grandes.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Sistema de protección de datos para Windows, Mac o Linux. Analiza los datos entrantes y salientes y detiene la penetración de malware.
Sistema de protección de datos para Windows, Mac o Linux. Analiza los datos entrantes y salientes y detiene la penetración de malware.
Sistema de protección de datos para Windows, Mac o Linux. Analiza los datos entrantes y salientes y detiene la penetración de malware.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Policy-driven endpoint security. Add enterprise grade technologies such as application whitelisting, ringfencing and storage control.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors.
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion.
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet 360 is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Dhound es una herramienta de supervisión de seguridad y detección de intrusiones para servidores de internet, nubes y aplicaciones web.
Dhound IDS proporciona recopilación y análisis de eventos de seguridad basados en agentes en tu servidor/dispositivo orientado a internet; recopilación y análisis de eventos de seguridad sin agente para la nube (AWS); detección y alerta de intrusiones y actividad sospechosa; auditoría de tráfico saliente y detección de fugas de datos; control de acceso y análisis completo de direcciones IP para la investigación de incidentes y seguimiento de eventos personalizados que son importantes, especialmente para tu negocio en línea.
Dhound IDS proporciona recopilación y análisis de eventos de seguridad basados en agentes en tu servidor/dispositivo orientado a internet; recopilación y análisis de eventos de seguridad sin agente...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Acceso seguro a Internet y recursos corporativos con una única solución.
Fyde ayuda a las empresas con una fuerza laboral cada vez más distribuida a mitigar el riesgo de incumplimiento al permitir el acceso seguro a recursos empresariales críticos para sus empleados, socios, contratistas y subcontratistas.
Fyde ayuda a las empresas con una fuerza laboral cada vez más distribuida a mitigar el riesgo de incumplimiento al permitir el acceso seguro a recursos empresariales críticos para sus empleados,...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Una herramienta basada en consola centralizada, fácil de implementar y asequible para priorizar y eliminar vulnerabilidades y configuraciones erróneas.
Con Vulnerability Manager Plus, desde la detección y evaluación de vulnerabilidades hasta su eliminación con un flujo de trabajo de parcheo automatizado, todos los aspectos de la administración de vulnerabilidades se simplifican con una consola centralizada. También puedes administrar las configuraciones de seguridad, fortalecer los servidores web, mitigar las vulnerabilidades de día cero, ejecutar auditorías al final de la vida útil y eliminar software riesgoso. Simplifica la administración de vulnerabilidades con un agente de implementación remota, interfaz basada en la web y escalabilidad sin fin.
Con Vulnerability Manager Plus, desde la detección y evaluación de vulnerabilidades hasta su eliminación con un flujo de trabajo de parcheo automatizado, todos los aspectos de la administración de...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
CybrHawk SIEM ZTR proporciona todas las herramientas fundamentales: IDS, aprendizaje automático, multinube, MDR, EDR, búsqueda de amenazas e inyección de memoria.
CybrHawk SIEM ZTR proporciona todas las herramientas fundamentales: IDS (sistema de detección de intrusiones, por sus siglas en inglés), riesgos de inteligencia, comportamiento, aprendizaje automático, información de la nube, MDR (respuesta de detección gestionada, por sus siglas en inglés), EDR (detección y respuesta de terminales, por sus siglas en inglés), búsqueda de amenazas y detección de inyección de memoria. Su objetivo es proporcionar sistemas de control total a toda la empresa. Esta solución SIEM también ofrece inyección de memoria en su plataforma. La organización consigue un software de seguimiento listo para usar desde el primer día. Visibilidad avanzada.
CybrHawk SIEM ZTR proporciona todas las herramientas fundamentales: IDS (sistema de detección de intrusiones, por sus siglas en inglés), riesgos de inteligencia, comportamiento, aprendizaje...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Producto de ciberseguridad de Windows para empresas.
Producto de ciberseguridad de Windows para empresas.
Producto de ciberseguridad de Windows para empresas.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.
Endpoint protection solution that helps businesses detect threats and malicious activities across devices to secure information breach.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Prilink's Network Metering Software provides network analytics for IP, PRI and SIP network from the Demarc Point.
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds of Telco connections from Demarc Point, visualize Internet (IP), PRI and VOIP (SIP trunk) traffic, send traffic alerts by text message or email, determine bandwidth requirements and troubleshoot network problems using deep packet inspection (DPI).
Prilink specializes in real-time non-intrusive communication protocol analysis that provides authentic 4-year CDR and traffic for voice and IP network. Our Network Metering Software monitors hundreds...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...

Funcionalidades

  • Cifrado
  • Lista blanca/negra
  • Seguimiento de actividades
  • Gestión de dispositivos