34 sonuç
Jamf Private Access, yöneticilerin kendi ağlarına erişimi güvenli hale getirmelerine olanak tanıyan sıfır güven ağ erişim çözümüdür. Jamf Private Access hakkında daha fazla bilgi
Jamf Private Access ile kuruluşlar, ağ güvenliğinin korunmasıyla son kullanıcılara işlerini yapmaları için ihtiyaç duydukları kaynaklara hızlı ve kolay erişim sağlama arasında denge kurabilir. VPN’in aksine, bu Sıfır Güven Ağ Erişimi çözümüyle, kullanıcılar güvenli sitelere ne zaman veya nasıl erişeceklerini asla düşünmek zorunda kalmazlar. Kullanıcının kimliği doğrulanır, yetkilendirilir ve cihaz verilere doğrudan erişmesi için güvenilir hale getirilir; bunların tümü perde arkasından yapılır. Jamf Private Access hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
SecureLink, an Imprivata company, is the industry leader in critical access management
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. SecureLink hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
With Pulseway Network Access Control - Monitor, manage & implement policies for controlling devices and user access to their networks.
With Pulseway all-in-one Network Access Control software you can monitor, manage and implement policies for controlling devices and user access to their networks. Identify different network devices, turn an existing Pulseway agent into a probe that detects and, where possible, identify all agents on the network. You can then enroll any discovered device that you want to monitor. Start your free trial today! Pulseway hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
N-able N-sight RMM is a complete solution that makes remote access, management, ticketing, and billing easier for MSPs and IT Pros
N-able N-sight RMM (formerly N-able RMM) is a complete remote monitoring and management platform designed to make managing, maintaining, and protecting IT assets easy for IT service providers, MSPs, and in-house IT professionals. From a single web-based dashboard, you get fast access and support tools, robust remote monitoring and management with patch management and drag & drop automation included, and ticketing & billing. N-able N-sight RMM is built for those who need to do more and earn more N-sight hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
ITAM Software: Track complete hardware & software asset life-cycles, licenses, contracts, certificates, renewal reminders, and more!
Device42 is the most comprehensive discovery system for Hybrid IT available today. Continuously discover, map, and optimize infrastructure and applications across data center and cloud environments. Device42 intelligently groups discovered workloads by application affinities, dramatically reducing the effort required to create move groups, capturing all communications. Customers across 60 countries use these capabilities to manage and modernize their IT infrastructure and application landscapes. Device42 hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone.
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone. Kisi hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
İşletmelerin merkezi bir platformdan tesisler genelinde erişimi yönetmesine ve izlemesine yardımcı olan bulut tabanlı fiziksel güvenlik çözümü.
Anahtarsız giriş, mobil kimlik bilgileri, uzaktan güvenlik yönetimi, akıllı kilitler, ziyaretçi yönetimi ve kimlik yönetimi çözümlerini pazara sunan önde gelen bulut tabanlı erişim kontrolü ve akıllı alan teknolojisi. Brivo platformu güvenlik otomasyonu, uzaktan yönetim sağlar, çalışan ve kiracı deneyimini geliştirir ve her türlü fiziksel alanda tüm insanların ve varlıkların güvenliğini artırır. Brivo Access hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours? Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others. Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS). Apply multi email signatures and send bulk vacation messages. Join thousands of users and improve your company's security and control. Conecta Suite hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement.
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement. SAP Access Control hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
We provide a way to grant access to your wireless and LAN networks, as well as your Linux servers, and only for the duration needed
Free Trial Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need. Also, we provide SSH Key Management and enforcement. Foxpass hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Genea Access Control is a cloud-based access control platform that provides physical security to buildings and enterprises.
Genea access control is a cloud-based access control platform that provides physical security for buildings and enterprises. The solution includes mobile-based access control, visitor management, access logs, out-of-the-box integrations, non-proprietary access control hardware, 24/7 support & more. Our software allows building tenants to self-manage access for their employees to the building through the main entrance, parking garage, and any other access points. Genea Access Control hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Kentik is the network observability company. Our platform is a must-have to plan, run, and fix any network.
Kentik is the network observability company. Our platform is a must-have for the network front line, whether digital business, corporate IT, or service provider. Network and cloud professionals turn to the Kentik Network Observability Cloud to plan, run, and fix any network, relying on our infinite granularity, AI-driven insights, and insanely fast search. Kentik makes sense of network, cloud, host, and container flow, internet routing, performance tests, and network metrics. Kentik hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities.
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. Perimeter 81 hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering.
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering. Access Control Manager hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges
Great for all industries with 500-10,000 Employees. Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR is vendor agnostic and eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Portnox CLEAR hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Designed to adapt — secure network access solutions tailored to evolving business needs.
Network Access Control (NAC) is a policy of securely accessing the network and restricting unauthorized users or devices outside of it. Any unverified attempts to connect are supervised and detected by IT administrators responsible for enforcing NAC security policy. However, it’s a labor-intensive task that requires resources and attention to detail — to minimize the workload and increase performance quality, NordLayer offers a centralized Control Panel that supports access activity monitoring. NordLayer hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Relevance platform to deliver contextually relevant information for personalized interactions with clients, partners, customers & more.
Relevance platform to deliver contextually relevant information for personalized interactions with clients, partners, customers & more. Coveo Relevance Cloud hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc. NACVIEW hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Re-imagined Network Access Control for the World of IoT
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution. Genian NAC hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. Adept Secure hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems.
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems. Sleek, secure hardware and convenient, touchless mobile entry enhances the user experience, while cloud-based enterprise software and built-in video capabilities effortlessly scale to make remote system management easier than ever. Openpath is a complete access control system designed to secure anywhere from a single door up to hundreds of entries across multiple locations. Openpath hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
StrongDM gives technical staff a direct route to the critical infrastructure they need to be their most productive.
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. strongDM hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Teleport (OSS & Enterprise) is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications.
Teleport is a secure access solution that consolidates infrastructure access into a single platform. With Teleport, engineers and security teams get unified access to Linux and Windows servers, Kubernetes clusters, databases, and DevOps applications like CI/CD, version control, and monitoring dashboards across all environments. Teleport replaces VPNs, shared credentials, and legacy privileged access management technologies to improve security and engineering productivity. Teleport hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor. The solution allows users to accelerate security operations, assure workloads, protect workloads and enhance micro-segmentation effectiveness. VMware AppDefense hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises. Appgate SDP hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, 24/7.
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, at any time. With the Klevio suite you have everything to easily manage access to your property or business: - Klevio hardware is installed at the property to deliver secure keyless access - The Klevio Dashboard is your access management tool with advanced key sharing & monitoring features - The Klevio Phone App is the digital key - the more secure and convenient way to unlock doors Klevio hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications.
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications. The software allows users to simplify operations, monitor application performance, enable firewalls and more. VMware SD-WAN hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems.
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems. Carbon Black App Control hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Mainframe security suite of products for real-time threat detection, user authorization, and cybersecurity compliance.
Mainframe security suite for real-time threat detection, user authorization, and cybersecurity compliance. The suite includes the following products: IBM Z Multi-Factor Authentication, zSecure Command Verifier, zSecure Audit, zSecure Alert, zSecure Admin, zSecure Visual, zSecure CICS Toolkit, and zSecure Manager for RACF z/VM. IBM Security zSecure hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Network, automation and management platform to build your virtual private topology and integrate on-prem and multi-cloud environments.
mmesh is an all-in-one, easy-to-use hybrid cloud integration platform with automation, monitoring and management capabilities to build your own virtual private topology and integrate your on-prem and multi-cloud environments in minutes. The mmesh cloud networking engine, decentralized and ready for the Web3, enforces end-to-end encryption over QUIC streams. Integrate your Kubernetes apps with other cloud-based or legacy infrastructure without adding a single line of code or configuration. mmesh hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Cloud-based network access control (NAC) platform that helps manage regulatory compliance, access control, and security threats.
Cloud-based network access control (NAC) platform that helps manage regulatory compliance, access control, and security threats. Zentry Trusted Access hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Cloud-based application delivery solution that helps user access the right apps, while meeting your business requirements.
VMware SASE is a cloud-based application delivery solution that helps you to use the right apps, at the right time and location, while meeting your business requirements. VMware SASE hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Secure Internet Gateway includes SaaS-delivered DNS Filtering that monitors and secures web access for users.
Secure Internet Gateway includes SaaS-delivered DNS Filtering that monitors and secures web access for users. Pricing is based on the number of endpoints and is additive to ZeroThreat Advanced. Xcitium Secure Internet Gateway hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi
Banyan’s ZTNA solution provides secure one-click access to applications and infrastructure from anywhere – without legacy VPNs.
Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments. Banyan Security hakkında daha fazla bilgi

Özellikler

  • Politika Oluşturma
  • Erişim Denetimleri/İzinleri
  • Birden Çok Kimlik Doğrulama Yöntemi
  • Yetkisiz Erişim Önleme Sistemi