Aqui está nossa lista de aplicativos para Software de Segurança Informática. Use os filtros para restringir os resultados e encontrar exatamente o que você está procurando.

Classificar por

180 opções de software

PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... Leia mais sobre o PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). Leia mais sobre o iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... Leia mais sobre o RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. Leia mais sobre o Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. Leia mais sobre o Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. Leia mais sobre o swIDch Auth SDK
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. Leia mais sobre o SSI Kit
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. Leia mais sobre o Verimatrix Code Shield
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. Leia mais sobre o DIARIO
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys. Leia mais sobre o Securden
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. Leia mais sobre o AdsPower
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls Leia mais sobre o FortMesa
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web. Leia mais sobre o Cybersprint
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments,... Leia mais sobre o Trend Micro Cloud One
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues. Leia mais sobre o GetSecured
A software solution that helps businesses automate data security and compliance through discovery, mapping, labeling, risk mitigation, and protecting data assets. Leia mais sobre o Polar Security
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management. Leia mais sobre o Rzilient
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls,... Leia mais sobre o BroShield
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels. Leia mais sobre o Risk Assistant
Adaptive SSO Authentication & FIM Solution Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo. Leia mais sobre o Hitachi ID Bravura Pass
Prove's Phone-Centric Identity platform helps companies mitigate fraud while accelerating revenue and reducing OPEX across mobile, desktop, tablet, contact center, and in-store channels. Leia mais sobre o Prove
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails. Leia mais sobre o Windows Privilege Manager
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster. Leia mais sobre o Secure Remote Worker
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner. The platform automates several stages of the traditional penetration testing cycle, introducing an agile penetration testing approach and making security testing accessible... Leia mais sobre o Blacklock
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world. Leia mais sobre o Teleport
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles... Leia mais sobre o tbIAM
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you. Leia mais sobre o iBoostUp
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated. Leia mais sobre o Versio.io
Shieldoo's mesh network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity. Leia mais sobre o Shieldoo
O IObit Uninstaller é um software que remove programas indesejados do computador, além de plugins e arquivos suspeitos, garantindo uma navegação mais segura e melhorias na performance do aparelho. O sistema também oferece uma verificação inteligente que realiza uma limpeza completa e otimizada. Leia mais sobre o IObit Uninstaller

Categorias relacionadas