253 results
Why Capterra is free
Computer security solution that helps businesses detect threats and prevent targeted attacks across networks and emails.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Multi-dimensional scanning and process interrogation technology that detects and removes spyware through consistent scans.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.
Multi-dimensional scanning and process interrogation technology that detects and removes spyware, malware and more through consistent scans and automated database updates.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.
PBX solution that helps small to medium enterprises place calls using a business phone number across remote locations, enabling call routing, audio-conferencing, call routing, call forwarding & more.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
We provide a cost-effective, secure, and socially responsible way to recycle and retire IT assets, computers and computer storage.
WipeDrive enables corporations, government entities, and individuals to permanently and securely erase data from hard drives, removable media, and mobile devices. We provide a cost-effective, secure, and socially responsible way to recycle and retire computers and computer storage. WipeDrive is the world leader in secure data destruction.
WipeDrive enables corporations, government entities, and individuals to permanently and securely erase data from hard drives, removable media, and mobile devices. We provide a cost-effective, secure,...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
VPN solution that allows businesses to remain anonymous when browsing the web by hiding their IP address.
VPN solution that allows businesses to remain anonymous when browsing the web by hiding their IP address.
VPN solution that allows businesses to remain anonymous when browsing the web by hiding their IP address.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results,...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Do you need an encrypted email and web form service so your conversations remain secure and confidential? Are you a healthcare practitioner such as a therapist, chiropractor, optometrist, or dentist in need of HIPAA compliance? Hushmail allows you to send and receive private, encrypted emails, attachments, and e-signable web forms to and from anyone, even people who don't use Hushmail. Perfect for small to medium businesses in professions requiring discretion such as healthcare or law.
Do you need an encrypted email and web form service so your conversations remain secure and confidential? Are you a healthcare practitioner such as a therapist, chiropractor, optometrist, or dentist...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in software composition analysis (SCA) by Forrester, Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Enterprise-Grade Security For Any Business Email, Cloud Apps, Endpoint Security and Data Loss Prevention in one award-winning platform
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and mitigate threats, eliminating the need for a security team to chase down security events. Provided as a subscription service, with nothing to install on premises, Coronet brings enterprise grade cyber defense to organizations at an affordable price, eliminating complexity and team involvement
Coronet is a world leader in providing organizations of every size with cyber defense for their email, cloud applications, any endpoint, and data leakage prevention. Coronet uses AI to detect and...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Email security management solution that helps detect & block threats through various tools like firewalls, SCSS & more.
Email security management solution that helps detect & block threats through various tools like firewalls, SCSS & more.
Email security management solution that helps detect & block threats through various tools like firewalls, SCSS & more.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Automatic, insightful, all-in-one endpoint security from the trusted leader.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware.
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization &...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Syspeace is your cyber crime solution (Host-based Intrusion Detection Software) to protect your business against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.)
Syspeace is your cyber crime solution (Host-based Intrusion Detection Software) to protect your business against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Automated proximity-based 2FA authentication into computers and websites. Passwordless login and auto-lock PCs, Macs, and websites.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly with password autofill. No more locked out accounts. When the token moves out of range, GateKeeper automatically locks the computer. Be preventative against expensive and disruptive data breaches. Your password caddie for a password-free experience. Never go back to memorizing and typing passwords.
Touchless, automated proximity-based authentication into computers, websites, and software. Passwordless login and auto-lock PCs with a token. Authenticate with your presence and log in instantly...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more.
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Next-generation Apple device management for macOS, iOS, iPadOS, and tvOS.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of the box. The only MDM with a pre-built library of 150+ automations. Leverage app patching, compliance templates, and the industry's first macOS agent that auto-remediates - even when devices are offline. Provision devices in minutes with 1-click configurations for Mac, iPhone, iPad, and Apple TV.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware.
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware.
Shield Antivirus Business Edition provides endpoint protection to systems from viruses, malware and ransomware.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Avira Antivirus Pro is an award-winning antivirus program that offers comprehensive protection when surfing the Internet.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and make purchases without having to fear external attacks in the form of infected pages and harmful downloads. The program includes a number of features that do not significantly affect the performance of the device.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Network security solution that helps businesses streamline endpoint protection and software deployment across workstations.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Provides strong encryption, supports multiple protocols, security standards & authentication methods.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security. You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal. Make IT Easy with RG System!
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines and disturbing your current work
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automatically eliminate threats in real time for both on-prem and cloud environments and is the only solution to provide visibility into encrypted traffic across networks directly from the endpoint. SentinelOne is a converged EPP + EDR solution that seamlessly integrates with diverse IT environments.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results.
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe.
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.
Designed specifically for small and midsized businesses, it protects PCs and file servers from a broad range of cyber threats.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Public key infrastructure; enables, manages and simplifies the use of digital certificates.
Public key infrastructure; enables, manages and simplifies the use of digital certificates.
Public key infrastructure; enables, manages and simplifies the use of digital certificates.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Protect & manage your organizations devices wherever they are & wherever you are. With HiddenApp, peace of mind is fitted as standard.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate capability, advanced anti-theft features, custom remote lock & wipe and a whole lot more, from one simple user-friendly dashboard. Secure your Windows 10 PCs, Apple Macs, iPads and iPhones in minutes.
HiddenApp makes managing a fleet of devices easy! Its a mobile device monitoring, tracking, and theft-recovery app for every organization. It gives you 24/7 visibility, track, trace & locate...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Secure password management, end-user dashboards and SSO to thousands of cloud applications!
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules.
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.
Web security solution that filters malware, app, content, and social media threats with real-user activity and network monitoring.

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Password Depot reliably protects your passwords and documents from unauthorized access! Whether at home or in a major corporation.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access rights a user receives, which folders or entries they can view or, for example, which activities should be logged. Thanks to the intuitive user guidance of Password Depot, all employees will be able to work with the program within a very short time, without expensive and time-consuming training.
Password Depot allows businesses and other organizations to manage, administer, and share passwords, credentials, and documents centrally. You decide - down to the smallest detail - which access...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
With this software, you can restore lost, formatted, and accidentally deleted office documents, emails, photos, videos and more.
Stellar Data Recovery Professional is a powerful DIY data recovery software that can recover your all lost or deleted data from almost all file types. It helps recover data from corrupt, missing, formatted, encrypted hard drive, SSD, USB & scratched or partially burnt optical discs. It can also recovers data from completely crashed & unbootable systems
Stellar Data Recovery Professional is a powerful DIY data recovery software that can recover your all lost or deleted data from almost all file types. It helps recover data from corrupt, missing,...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software
Employee monitoring solution that helps with feature such as user behavior analysis, productivity tracking and investigation tools.
StaffCop Enterprise is on-permise software system that makes your business safe and secure. StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity. StaffCop Enterprise is an application based on client-server architecture which allows to monitor all the user activity on workstations, system events and information channels.
StaffCop Enterprise is on-permise software system that makes your business safe and secure. StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider...

Features

  • Anti Virus
  • Audit Trail
  • Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Network Security Software