Aqui está nossa lista de aplicativos para Software de Segurança Informática. Use os filtros para restringir os resultados e encontrar exatamente o que você está procurando.

Classificar por

127 opções de software

SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans. Leia mais sobre o SaaS Vulnerability Scanner
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents. Leia mais sobre o Clearswift SECURE Email Gateway
O Acronis Cyber Protect é um software baseado na nuvem que ajuda as empresas a aproveitar a tecnologia de inteligência artificial (IA) para detectar ameaças à segurança cibernética em ativos de TI e sistemas de endpoint. Os supervisores podem realizar avaliações de vulnerabilidade, implantar patches de segurança e impedir ameaças remotamente. Leia mais sobre o Acronis Cyber Protect
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes. Leia mais sobre o Cynet 360
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Leia mais sobre o LiveEnsure
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Leia mais sobre o CloudPassage Halo
BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing Leia mais sobre o BlueFiles
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption. Leia mais sobre o Cornerstone MFT Server
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. Leia mais sobre o StackRox
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. Leia mais sobre o Evidian
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... Leia mais sobre o Quantum Network Security
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... Leia mais sobre o PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). Leia mais sobre o iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... Leia mais sobre o RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. Leia mais sobre o Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. Leia mais sobre o Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. Leia mais sobre o swIDch Auth SDK
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. Leia mais sobre o IDA Pro
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. Leia mais sobre o SSI Kit
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals. Leia mais sobre o Sealit
Verimatrix Code Protection solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. It's critical to maintain customer trust by building SDKs and apps that won’t become an entry point for hackers. Leia mais sobre o Verimatrix Code Protection
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. Leia mais sobre o DIARIO
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. Leia mais sobre o Anti-Executable
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. Leia mais sobre o AdsPower
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package. Leia mais sobre o CODA Footprint
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls Leia mais sobre o FortMesa

Categorias relacionadas