Filter Results (134)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
United Arab Emirates
Pricing Options
134 results
SecureDoc Disk Encryption offers businesses Enterprise manageable, full-scale encryption using a sector-by-sector encryption approach.
Learn more about SecureDoc Disk Encryption
Our product ensures the protection of sensitive information stored on desktops, laptops, tablets & servers by employing single or multi-factor authentication from password to hardware token, and
...
Read more
Smart card support for PreBoot Authentication (PBA). SecureDoc with PBConnex allows for preboot network authentication either wired or wirelessly by utilizing network based resources to authenticate users, enforce access controls, and manage end point devices before the operating system loads.
Learn more about SecureDoc Disk Encryption
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
1Password’s industry-leading security brings private, secure, and user-friendly secrets management to more than 115,000 businesses.
1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly secrets management to more than 115,000 businesses.
Store anything from logins and
...
Read more
secure notes to SSH keys and sensitive documents. Get your secrets out of spreadsheets and emails and into 1Password for secure sharing and a single source of truth. You can even monitor and mitigate security risks like potential breaches, password health, and team usage from your insights dashboard.
Learn more about 1Password
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Commercial customers have the flexibility of choosing from multiple editions to meet specific business & technical requirements:
MySQL Enterprise Edition includes the most comprehensive set of advanced features, management tools and technical support to achieve the highest levels of MySQL scalability, security, reliability,
...
Read more
and uptime. It reduces the risk, cost, and complexity in developing, deploying, and managing business-critical MySQL applications.
Learn more about MySQL
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cybersecurity application for IT administrators to prevent data breaches, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud
...
Read more
sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.
...
Read more
Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP.
Learn more about Folder Lock
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention
...
Read more
System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Learn more about Symantec Endpoint Security
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect
...
Read more
sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now.
Learn more about Keeper Password Manager
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice.
Businesses rely on TunnelBear
...
Read more
for:
Securing remote and traveling employees
Global quality assurance testing
Gathering competitive intelligence
Stealthfully conducting market research
Accessing geo-restricted business tools
Businesses have access to priority support and a personal account manager.
Learn more about TunnelBear
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that
...
Read more
powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Learn more about Cloudflare
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control.
WebTitan
...
Read more
DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day.
Try a free Trial of WebTitan today, full support included.
Learn more about WebTitan
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the
...
Read more
recovered files can be tracked through status reports.
Learn more about CrashPlan
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors,
...
Read more
rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date.
Learn more about Webroot Business Endpoint Protection
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint
protection solution built to stop the widest range of attacks. Intercept X
combines multiple techniques including
...
Read more
signatureless exploit prevention, deep
learning malware detection, anti-ransomware capabilities, root cause analysis,
and more.
Learn more about Intercept X Endpoint
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security
services to physical endpoints, mobile devices, virtual machines in private, public cloud and
...
Read more
Exchange
mail servers.
GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public
cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
Learn more about Bitdefender GravityZone
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Enforce full disk
...
Read more
encryption (FDE) for Windows and macOS devices, regardless of location, to ensure that in a worst case scenario, cybercriminals can’t access your sensitive company data. Further secure your organization by enabling MFA or SSO to deter attacks.
Learn more about JumpCloud Directory Platform
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Search, analyze, and visualize data from your entire data ecosystem. Monitor, alert, and report on your operations to drive resilience.
Are you ready to take control of your data? Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act in real-time. With Splunk, you can predict and
...
Read more
prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform.
Learn more about Splunk Enterprise
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Industry-leading data protection helps businesses of all sizes through data encryption, compliance, file management and cloud backup.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware
...
Read more
failure, and data corruption. Restore data following a ransomware attack without paying ransom and retain business data to meet compliance requirements. Automatic backup, with award winning support makes data protection seamless.
Learn more about Carbonite
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Desktop email client that supports easy-to-use PGP & S/MIME email encryption. Create PGP keypairs, upload and lookup public keys.
eM Client is a desktop email app designed to help individuals and businesses with secure email communication, daily agenda, upcoming (online) events, collaboration with colleagues and more, all in a
...
Read more
unified clean interface. The app supports email encryption and digital signatures (PGP,S/MIME) including eM Keybook service to share public PGP keys. Lookup is also available for Proton.me and keys.openpgp.org. You can also easily create new PGP/GPG Keypair directly in eM Client.
Learn more about eM Client
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Bitwarden is an open source password manager that enables users to securely store and share sensitive data with end-to-end encryption.
With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on
...
Read more
any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
Learn more about Bitwarden
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Effectively secures, automates, manages, and protects critical data as well as processes and workflows.
Effectively secure, automate, manage, and protect your most critical data as well as the resulting processes and workflows. Progress MOVEit solutions allow you to manage, provision, and automate all
...
Read more
internal and external file and data interactions, create and enforce security policies and file-expiration rules, ensure privacy and confidentiality, schedule workflows and processes and more--all without any manual scripting. Request a Trial Today!
Learn more about MOVEit
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge.
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and
...
Read more
privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution.
Learn more about Passportal
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cypherdog's E-mail Encryption solution provides complete email protection by encrypting all email messages.
Cypherdog E-mail Encryption (CEE) encrypts and decrypts e-mail messages including attachments and provides recipients with the verification of the sender’s identity. Our software is user-friendly
...
Read more
while maintaining the highest message security level because of asymmetric encryption and lack of third parties. It supports data privacy and data leak protection politics.
You can use CEE on the most popular browsers and Outlook. With just one click, you can use Cypherdog to encrypt e-mail messages.
Learn more about Cypherdog E-mail Encryption
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price
...
Read more
that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity.
Learn more about OneLogin
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Citrix Workspace is a unified, secure & intelligent digital workspace that organizes & guides work & transforms employee experience.
Citrix Workspace is the digital workspace solution - a unified, secure, intelligent work platform that organizes, guides, and automates the most important details users need to make timely decisions
...
Read more
and collaborate with others. A customized interface organizes essential data, tasks, and tools into a personalized flow so users can focus on their work and increase employee productivity and engagement. No more switching from app to app or sifting through irrelevant information and activities.
Learn more about Citrix Workspace
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Hong Kong based GZ Systems experimented with a VPN in 2006 and that was the beginning of a revolutionary VPN - PureVPN
Purevpn leads the cybersecurity industry with a self-managed constellation of 300,000+ IPs, 6,500+ servers in 180+ locations, and a 31-day money-back guarantee. PureVPN offers seamless access to
...
Read more
content while ensuring users' complete online anonymity.
Learn more about PureVPN
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL
...
Read more
filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue.
Learn more about Acronis Cyber Protect Cloud
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Provides access to a free and open Internet, connecting you to any content and sites, securely and anonymously.
Provides access to a free and open Internet, connecting you to any content and sites, securely and anonymously.
Learn more about Hotspot Shield VPN
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
GlassWire is a modern network monitor & security tool with a built in firewall.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth
...
Read more
and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types.
Learn more about GlassWire
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
The most powerful VPN is now simple to use. One subscription protects all your devices. HMA can be used on 5, 10, or unlimited devices
The most powerful VPN is now simple to use. One subscription protects all your devices. HMA can be used on 5, 10, or unlimited devices simultaneously. Certified No-Log VPN.
Learn more about HMA
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Syxsense is a leading USEM solution that monitors, detects, and remediates vulnerabilities from a single console.
Syxsense is a leading Unified Security and Endpoint Management (USEM) solution that monitors, detects, and remediates vulnerabilities from a single console. With Syxsense, IT teams can manage and
...
Read more
secure all endpoints in their environment, even if they’re remote, roaming, or in the cloud. The Syxsense platform gives teams accurate vulnerability detection, targeted patch management, automated remediation, and more. Syxsense is cloud-based and supports Windows, Mac, Linux, iOS, and Android devices.
Learn more about Syxsense
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Avira Antivirus Pro is an award-winning antivirus program that offers comprehensive protection when surfing the Internet.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and
...
Read more
make purchases without having to fear external attacks in the form of infected pages and harmful downloads. The program includes a number of features that do not significantly affect the performance of the device.
Learn more about Avira Antivirus Pro
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console.
...
Read more
IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Learn more about Automox
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Simplify complex data center infrastructures by providing services that support all major hardware and software.
Todays employees enjoy the freedom to work from anywhere. Your organizations content is increasingly being accessed and shared outside of the firewall across devices and applications. At the same
...
Read more
time, the number of data breaches is on the rise and the consequences to exposed organizations are far-reaching. Symantec offers a broad, comprehensive encryption solution that allows you to protect your information wherever it is, whether at rest or in transit.
Learn more about Data Center Optimization
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. Try 14 days free trial.
GoodAccess creates a secure and encrypted network infrastructure that hides your critical services and assets from the internet, controls authorized access, and comes with a fully automated deployment
...
Read more
in just 10 minutes. Allow your employees to works remotely from unsecured WiFi hotspots without worrying that a third-party agent monitors their traffic, see what systems your employees use, and sometimes even intercept sensitive data.
Learn more about GoodAccess
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see
...
Read more
beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Learn more about ConnectWise SIEM
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Sealit is a Zero Trust data protection solution for end-to-end email & file encryption. Full security - just 1 click.
Sealit protects confidential information. Our password-less Zero Trust encryption allows you to secure all sensitive communication with your team and clients with just one click. Sealit seamlessly
...
Read more
integrates with Outlook, Gmail, and your file systems, allowing you to continue working the way you do. Recipients simply use their biometrics to access messages, ensuring that only desired recipients can access confidential information. Sealit is here to protect your most important asset - your data.
Learn more about Sealit
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Hushmail is a secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use
...
Read more
Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and iPhone app, there's no complicated installation. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance, and our legally binding e-signatures comply with ESIGN and UETA.
Learn more about Hushmail
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Secure and manage open source software with Synopsys, eliminating pain related to open source vulnerabilities and license compliance.
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in
...
Read more
software composition analysis (SCA) by Forrester, Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and prioritize your remediation activities.
Learn more about Black Duck
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Designed to adapt — secure network access solutions tailored to evolving business needs.
Working outside a protected company network exposes internal data and applications to external threats. Thus a company must be concerned with hiding any online activity and traffic from an open
...
Read more
internet to secure data transmission and storage. NordLayer utilizes impossible to break military-grade AES 256-bit encryption that covers all data when browsing, sending, and sharing business-sensitive information between your peers.
Learn more about NordLayer
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Software for businesses and private users to manage, share, compress, and encrypt data to protect files against cyberattack threats.
WinZip software is a file archiving and compression tool for individuals and businesses. It is designed for zipping, archiving, unpacking, and compressing various data files formats. The software
...
Read more
provides information technology security to users, and it enables employees to collaborate on work to increase productivity and enhance business operations. It incorporates the same high-level AES encryption security standards used by banks and military personal for securing files.
WinZip streamlines file-sharing and compressing for users. The program supports integration with other systems and helps improve workflows. The software allows for the customization of the installation package, allowing users to install only the required features of the software. Companies can access business features like SharePoint and enterprise-grade cloud storage integration. Users can also control encryption and password policies and benefit from virtual drive file support to optimize file management.
Learn more about WinZip
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors
...
Read more
your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.
Learn more about Qualys Cloud Platform
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance.
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides its users with a complete picture of their servers and endpoints. The
...
Read more
included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. Various integrations & multi-tenancy available
Learn more about EventSentry
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
CrowdStrike is a cybersecurity leader with a cloud-native platform for protecting endpoints, cloud workloads, identities, and data.
CrowdStrike is redefining modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity, and data.
Learn more about Falcon
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Learn more about Bitium
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Invicti, formerly Netsparker, is a comprehensive automated web vulnerability scanning solution.
Invicti, formerly Netsparker, is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of
...
Read more
attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence.
Learn more about Invicti
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Files.com is a SaaS file transfer platform that enables organizations to securely store, transfer, and share business-critical files.
Files.com is a SaaS file transfer platform that enables organizations to securely transfer or share files between users, teams, organizations (B2B), and customers (B2C).
Files.com has been
...
Read more
providing businesses with secure, cloud native file transfers for 10+ years, servicing over 6000+ customers across key industries like healthcare, finance, media, technology, and more.
Learn more about Files.com
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Unified encryption key management & policies across your devices while maintaining access control on all your endpoints.
Remote wipe, lock, encrypt and locate for all operating systems. Data & device protection solution for devices that are lost, stolen, missing, or unreturned by personnel. It empowers you to protect
...
Read more
devices that have escaped your control, to prevent data compromise. Escrow encryption keys, rotate keys, set PBA policies, offer self-service key recovery, and more. DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Learn more about DriveStrike
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
On-premise file sharing solution that helps businesses share messages, documents, videos, and photos in an encrypted network.
On-premise file sharing solution that helps businesses share messages, documents, videos, and photos in an encrypted network.
Learn more about Keybase
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures.
The solution combines on the
...
Read more
same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security.
You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal.
Make IT Easy with RG System!
Learn more about RG System
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced
...
Read more
experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Learn more about Indeni
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software