114 sonuç
Safetica protects your data against insider threats and helps you to be compliant with regulations. Safetica hakkında daha fazla bilgi
Safetica provides easy-to-use on-prem and cloud-native data loss prevention and insider threat protection solutions that help organizations secure their data and ensure regulatory compliance. Safetica is a European software company founded in 2007, serving its customers in 120 countries globally, and provides data loss prevention and insider threat protection solutions. Safetica NXT (cloud-native) Safetica ONE (on-prem) Safetica hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
A complete XDR solution complete with timely incident alerts, environment monitoring, and expert input that supports full compliance. Heimdal eXtended Detection and Response (XDR) hakkında daha fazla bilgi
Heimdal eXtended Detection and Response is a fully compliant XDR solution supported by a live team of experts who are always on top of your cybersecurity needs. A centralized monitoring and incident response hub, it is your one-stop-shop for fast attack or infection alerts, policy validation, environment observation, and appropriately delivered responses to any type of cyber threat. Augment your digital defenses and acquire expert input on any scenario with Heimdal XDR today. Heimdal eXtended Detection and Response (XDR) hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Tehdit arama, önleme ve düzeltmeyi bir sonraki seviyeye taşıyan uç noktada algılama ve yanıtlama çözümü. Heimdal Endpoint Detection and Response (EDR) hakkında daha fazla bilgi
Heimdal Endpoint Detection and Response, yolunuza çıkabilecek siber güvenlik olaylarını aramak, önlemek ve düzeltmek için birlikte çalışan çok iyi altı ürünün oluşturduğu kesintisiz bir EDR (uç noktada algılama ve yanıtlama) çözümüdür. Söz konusu ürünler arasında Heimdal Tehdit Önleme, Yama ve Varlık Yönetimi, Fidye Yazılımı Şifreleme Koruması, Yeni Nesil Antivirüs, Ayrıcalıklı Erişim Yönetimi ve Uygulama Denetim bulunmaktadır. Heimdal Endpoint Detection and Response (EDR) hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cloud-based Endpoint Detection and Response (EDR) with 72-hour ransomware recovery for Windows PCs, Windows servers and Linux servers.
Cloud-based Endpoint Detection and Response (EDR) with 72-hour ransomware recovery for Windows PCs, Windows servers and Linux servers. Rated #1 for ease-of-use to help businesses identify, analyze, and remediate threats on a unified platform. Malwarebytes for Business hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. ESET Endpoint Security hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Kötü amaçlı yazılımları, fidye yazılımlarını ve kimlik avını engelleyen, ek olarak gelişmiş web içeriği denetimi sağlayan kurumsal DNS web içeriği ve güvenlik filtresi.
Siber saldırıları, kötü amaçlı yazılımları, fidye yazılımlarını ve kötü niyetli kimlik avını engellemenin yanı sıra ayrıntılı web içeriği denetimi sağlayan DNS tabanlı web içeriği filtresi ve web güvenliği katmanı. WebTitan DNS filtrelemesi, her gün 2 milyardan fazla DNS isteğini filtreler, günde 300.000 kötü amaçlı yazılım yinelemesi belirler ve 7.500’den fazla müşterisi vardır. Hemen ücretsiz WebTitan deneme sürümünü kullanın (tam destek dahildir). Kullanıcı başına ayda 1 dolardan daha az bir ücretten başlayan harika aylık fiyatlandırma mevcuttur. Yerel olarak barındırılır, gecikme yoktur. WebTitan hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date. Webroot Business Endpoint Protection hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, MSPs, VARs/Distributors, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. JumpCloud Directory Platform hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Bitdefender GravityZone hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Splunk Enterprise hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Connect Secure hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates. SUPERAntiSpyware hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Maintain complete endpoint visibility and inventory of all software with Automox's cloud-based platform.
Automox allows you to maintain complete visibility into the endpoints and software used in your organization's day-to-day operations, while also providing the information needed to manage patching, risk mitigation, and endpoint hardening decisions. With Automox, you'll have the ability to see all endpoints and applications from a single console which enables administrators to identify misconfigured systems, missing patches, or compliance issues. Automox hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment. Guardio hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Microsoft 365 Defender enables businesses to stop attacks with automated, cross-domain security and built-in AI.
Microsoft 365 Defender stops attacks with automated, cross-domain security and built-in AI. As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsofts XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats. Microsoft 365 Defender hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. ConnectWise SIEM hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security.
ZeroThreat Advanced combines the benefits of ZeroThreat Essentials with Advanced Endpoint Security (AV/NGAV), endpoint detection and response (EDR), endpoint management capabilities, and 5 mobile device management (MDM) licenses to deliver exploit prevention, enhanced reporting, and endpoint management from a centralized SaaS platform. Licensed by number of endpoints. Zero Threat Advanced hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Blackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community.
Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Headquartered in Maryland, USA, the company was established by former US Department of Defense and Intelligence cybersecurity experts. Blackpoint's True 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe! Blackpoint MDR hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect.
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers. Jamf Protect hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Automated proximity-based 2FA authentication into computers and websites. Passwordless login and auto-lock PCs, Macs, and websites.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly with password autofill. No more locked out accounts. When the token moves out of range, GateKeeper automatically locks the computer. Be preventative against expensive and disruptive data breaches. Your password caddie for a password-free experience. Never go back to memorizing and typing passwords. GateKeeper Enterprise hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Apex One is an endpoint detection and response software designed to help businesses investigate threats and protect the system.
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities. Managers can detect the indicators and intent of attackers in real-time and manage threat responses on a unified interface. Apex One allows teams to identify and analyze the impact as we Apex One hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today.
Continuously predict, prevent, detect, and respond to advanced threats efficiently and effectively by combining deep learning-enabled technology and a team of cybersecurity experts providing 24/7 monitoring, analysis, and incident response. Our managed platform approach to cybersecurity simplifies operations and reduces security gaps caused by standalone point products.? Netsurion Managed Threat Protection hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Protect your equipment from digital threats. Complete security for small and medium businesses.
This cybersecurity solution includes: Online identity protection, antivirus and antispyware, antispam, protection against public networks, remote administration, web access control, USB device control, corporate mobile management and more. It allows combining protection from 5 to 25 computers + 5 smartphones + 1 or 2 file servers; all options include the remote administration tool. ESET Home Office Security Pack hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Qualys Multi-Vector EDR - A new approach to EDR that shortens response times and reduces costs.
Traditional EDR solutions focus only on endpoint activity to detect attacks. Qualys brings a new multi-vector approach and the power of its Cloud Platform to protect the entire attack chain, from attack and breach prevention, to detection and response — all in a single, cloud-based app. Qualys Cloud Platform hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cybersecurity with AI-powered prevention, detection, response and hunting in a single autonomous XDR platform.
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity ️XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface. SentinelOne hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), & a 24/7 managed hunting service all delivered via a single lightweight agent. Falcon Insight delivers continuous, comprehensive endpoint visibility that spans detection, response and forensics to ensure nothing is missed and to stop breaches. Falcon hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
DataDome mobil uygulamaları, web sitelerini ve API’leri çevrimiçi dolandırıcılık ve bot saldırılarına karşı korumak için ileri teknolojiyle koruma sağlar.
DataDome mobil uygulamaları, web sitelerini ve API’leri veri kazıma, scalping, kimlik bilgilerini doldurup hesabı ele geçirme, 7. katmanda DDoS saldırıları ve kart dolandırıcılığı dahil olmak üzere çevrimiçi dolandırıcılık ve bot saldırılarından korur. Yapay zekayla çalışan bot algılama motorumuz, en büyük e-ticaret işletmelerini korumak için her gün dünya çapında 25 bulunma noktasından gelen bir tri̇lyondan fazla veri parçasını gerçek zamanlı olarak işler. DataDome hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Huntress’ Process Insights feature provides Managed Endpoint Detection & Response (EDR) capabilities backed by 24/7 threat hunters.
Huntress’ Process Insights feature provides Managed Endpoint Detection & Response (EDR) capabilities supported by 24/7 threat hunters. Process Insights provides additional visibility into endpoint activity and strengthens the EDR functionality within the Huntress Managed Security Platform. By monitoring for malicious processes, Process Insights builds an extensive view of cyber threats as they occur. And when a threat is detected, Threat Operations shares an report to help you take action. Huntress hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
The ultimate next-generation antivirus powered by market-leading threat intelligence, forensics, and firewall integration.
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis, process and behavior-based examination, and real-time cloud inspection. It is the detection-oriented counterpart to our threat prevention offering, Heimdal Threat Prevention. Besides its EDR features, Heimdal NGAV comes with complete firewall integration, which will further secure your workstations. Heimdal Next-Gen Endpoint Antivirus hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Emsisoft Anti-Malware hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Ağ operatörlerinin ağ trafiğini analiz etmesini ve ağ sorunlarını gidermesini sağlayan ağ performansı izleme ve tanılama aracı.
Flowmon, etkili ağ sorun giderme, performans izleme, kapasite planlama, şifrelenmiş trafik analizi ve bulut izleme için profesyonel bir araçtır. Sadece kırmızı/yeşil altyapı durumu yerine, ağ operasyonları ekiplerinin kullanıcı deneyimini anlamasına yardımcı olurken veri gürültüsü ve analitik çalışmayı minimumda tutar. Flowmon çözümü, Kemp ürün portföyünün bir parçasıdır. Flowmon hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with cont
Advanced malware protection solution that helps businesses secure endpoints, emails and web traffic across multiple platforms with continuous tracking, malware prevention, sandboxing and more. Cisco Secure Endpoint hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Jazz Platform hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility and proven security.
Protect, secure, recover. From the minds of Commvault—ten times a leader in the Gartner Magic Quadrant—Metallic is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and any other threat out there. No matter where your data lives — on premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology. Metallic SaaS Backup & Recovery hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices. Inky hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
GorillaStack helps to automate real-time security remediation, managing backup lifecycles, and optimize cloud bills.
GorillaStack helps DevOps to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStack can also help to reduce your cloud bills and manage backups reliably. GorillaStack hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation.
Cloud-based solution that provides deep endpoint visibility deep, AI-driven analytics, and workflow automation to streamline your cyber security activities. Symantec Endpoint Detection and Response hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
BeyondDLP güvenli bir veri deneyimi sağlar Verilerinizi her yerde korumak için benzersiz proaktif veri kaybı ve sızıntı önleme çözümü.
ITsMine, ortak ve dağıtık çalışma ortamınıza yasal uyumluluğun yanı sıra güvenlik ve koruma sağlar. ITsMine’ın teknolojisi, otomatik olarak “Güvenli Bölgeler” inşa ederek mevcut veri güvenliği çözümlerinin başlıca zorluklarının ve karmaşıklıklarının üstesinden gelir. ITsMine ajansız çalışır, API tabanlıdır ve yaklaşık 30 dakikada dağıtılabilir. Verileri hareketsiz, hareket halinde ve kullanımda tutarken dahili ve harici tehditlere karşı proaktif olarak koruma. Şirketin içinde ve dışında. Beyond DLP hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment. Axonius hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks.
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This includes both fileless and file-based strains for complete, round-the-clock safety. It can detect any encryption attempt, even those that have no signatures or behavioral patterns. Our solution was built to be universally compatible with any antivirus, be it Heimdal’s own NGAV or something else. Heimdal Ransomware Encryption Protection hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Cynet AutoXDR is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield.
Cynet AutoXDR is a detection and response security platform specifically created for todays multi-faceted cyber-battlefield. Cynet 360 hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today. Cybereason hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact.
A solution and team dedicated to monitoring and responding to cyberattacks before they make an impact. Arctic Wolf SOC-as-a-Service hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks.
FortiEDR provides automated endpoint protection, detection, and response against advanced attacks. FortiEDR hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
SOC Prime TDM is a SaaS community delivering threat detection content that can be used across various SIEM formats and EDR solutions.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that allows security professionals to detect and respond to cyber threats, as well as increase ROI for the majority of their SIEM, EDR, NSM and SOAR tools in use. TDM aggregates over 65,000 SIEM & EDR rules, parsers and search queries, and other content mapped directly to the MITRE ATT&CK® framework and compatible with your EDR solution in use, including Microsoft Defender ATP, Carbon Black, CrowdStrike, and Qualys. Threat Detection Marketplace hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc. NACVIEW hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. InsightIDR hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Cisco Secure Cloud Analytics hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur. ManageEngine DataSecurity Plus hakkında daha fazla bilgi

Özellikler

  • Anomali/Kötü Amaçlı Yazılım Algılama
  • Düzeltme Yönetimi
  • Öncelik Belirleme
  • Beyaz Listeye/Kara Listeye Ekleme
  • Sürekli İzleme