89 results
Why Capterra is free
EncryptTitan is an email encryption platform for MSPs and enterprises. Learn more about EncryptTitan
EncryptTitan is an email encryption platform for MSPs and enterprises adhering to state and federal privacy regulations.

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. Try 14 days free trial. Learn more about GoodAccess
GoodAccess creates a secure and encrypted network infrastructure that hides your critical services and assets from the internet, controls authorized access, and comes with a fully automated deployment in just 10 minutes. Allow your employees to works remotely from unsecured WiFi hotspots without worrying that a third-party agent monitors their traffic, see what systems your employees use, and sometimes even intercept sensitive data. Learn more about GoodAccess

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click.
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. When everyone uses 1Password, your risk goes down and your productivity goes up. Learn more about 1Password

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security software that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easy-to-use cloud-based console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP. Learn more about Folder Lock

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper Business

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. Learn more about TunnelBear

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Learn more about Cloudflare

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan dns filtering filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Try a free Trial of WebTitan today, full support included. Great monthly pricing available starting at less than $1 per user per month. Hosted locally, no latency. Learn more about WebTitan

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports. Learn more about CrashPlan

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about SecureAnywhere

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles. Learn more about JumpCloud Directory Platform

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more. Learn more about Intercept X Endpoint

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Learn more about Bitdefender GravityZone

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Industry-leading data protection helps businesses of all sizes through data encryption, compliance, file management and cloud backup.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware failure, and data corruption. Restore data following a ransomware attack without paying ransom and retain business data to meet compliance requirements. Automatic backup, with award winning support makes data protection seamless. Learn more about Carbonite

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data.
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge.
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution. Learn more about Passportal

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Hong Kong based GZ Systems experimented with a VPN in 2006 and that was the beginning of a revolutionary VPN - PureVPN
Purevpn leads the cybersecurity industry with a self-managed constellation of 300,000+ IPs, 6,500+ servers in 180+ locations, and a 31-day money-back guarantee. PureVPN offers seamless access to content while ensuring users' complete online anonymity. Learn more about PureVPN

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience PlatformTM provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Seamlessly manage all your digital identities and take complete control over application access to defend against cyberattacks, increase operational efficiency, and boost productivity. Learn more about OneLogin

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Effectively secures, automates, manages, and protects critical data as well as processes and workflows.
Effectively secure, automate, manage, and protect your most critical data as well as the resulting processes and workflows. Ipswitch MOVEit solutions allow you to manage, provision, and automate all internal and external file and data interactions, create and enforce security policies and file-expiration rules, ensure privacy and confidentiality, schedule workflows and processes and more--all without any manual scripting. Request a Trial Today! Learn more about MOVEit

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus endpoint security all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Learn more about Syxsense

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Citrix Workspace is a unified, secure & intelligent digital workspace that organizes & guides work & transforms employee experience.
Citrix Workspace is the digital workspace solution - a unified, secure, intelligent work platform that organizes, guides, and automates the most important details users need to make timely decisions and collaborate with others. A customized interface organizes essential data, tasks, and tools into a personalized flow so users can focus on their work and increase employee productivity and engagement. No more switching from app to app or sifting through irrelevant information and activities. Learn more about Citrix Workspace

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Acronis Cyber Protect is the unique AI-enhanced integration of Data Protection with Cybersecurity in a single service provider solution
Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware, security and management capabilities such as vulnerability assessments, patch management, URL filtering, and more. Now Service Providers can eliminate complexity and make security a centerpoint of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Learn more about Acronis Cyber Protect Cloud

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
GlassWire is a modern network monitor & security tool with a built in firewall.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Learn more about GlassWire

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Real online privacy. Anywhere.
The most powerful VPN is now simple to use. One subscription protects all your devices. HMA can be used on 5, 10, or unlimited devices simultaneously. Certified No-Log VPN.

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure. Learn more about Automox

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Simplify complex data center infrastructures by providing services that support all major hardware and software.
Todays employees enjoy the freedom to work from anywhere. Your organizations content is increasingly being accessed and shared outside of the firewall across devices and applications. At the same time, the number of data breaches is on the rise and the consequences to exposed organizations are far-reaching. Symantec offers a broad, comprehensive encryption solution that allows you to protect your information wherever it is, whether at rest or in transit. Learn more about Data Center Optimization

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Provides access to a free and open Internet, connecting you to any content and sites, securely and anonymously.
Provides access to a free and open Internet, connecting you to any content and sites, securely and anonymously.

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required.
Perch Security, a ConnectWise solution, offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, Perch helps you keep clients safe with the best threat intel on the market. Learn more about Perch Security

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Hushmail is a secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms to and from anyone, even people who don't use Hushmail. With easy-to-use webmail, a secure message center, drag-and-drop form builder, and iPhone app, there's no complicated installation. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance, and our legally binding e-signatures comply with ESIGN and UETA. Learn more about Hushmail

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Secure and manage open source software with Synopsys, eliminating pain related to open source vulnerabilities and license compliance.
Black Duck is a comprehensive solution for managing security, license compliance, and code quality risks that come from the use of open source in applications and containers. Named a leader in software composition analysis (SCA) by Forrester, Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and prioritize your remediation activities. Learn more about Black Duck

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Avira Antivirus Pro is an award-winning antivirus program that offers comprehensive protection when surfing the Internet.
Avira Antivirus Pro is a comprehensive antivirus program that offers protection against phishing and ransomware. It enables private individuals and companies to surf the Internet, download files and make purchases without having to fear external attacks in the form of infected pages and harmful downloads. The program includes a number of features that do not significantly affect the performance of the device. Learn more about Avira Antivirus Pro

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance.
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides its users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. Various integrations & multi-tenancy available Learn more about EventSentry

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Learn more about Qualys Cloud Platform

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho Learn more about Netsparker

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Cloud encryption for over 30 cloud providers, including OneDrive, Dropbox and Google Drive; with new Microsoft Teams integration.
Boxcryptor is an easy-to-use encryption software optimized for the cloud. It allows the secure use of cloud storage services without sacrificing comfort. Boxcryptor supports all major cloud storage providers (such as OneDrive, SharePoint, Microsoft Teams, Dropbox, Google Drive) and supports all clouds that use the WebDAV standard. With Boxcryptor your files are protected from the moment you send them to your cloud provider. Learn more about Boxcryptor

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries. Learn more about My Digital Shield

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection.
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service all delivered via a single lightweight agent. Learn more about Falcon

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business. Learn more about Indeni

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Files.com is a SaaS file transfer platform that enables organizations to securely store, transfer, and share business-critical files.
Files.com is a SaaS FTP file transfer platform that enables organizations to securely transfer or share files between users, teams, and organizations (B2B). Files.com is a unique solution that combines the base benefits of FTP software and the security and automation of managed file transfer (MFT) software. Learn more about Files.com

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language. Learn more about Probely

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Learn more about DriveStrike

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security. You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal. Make IT Easy with RG System! Learn more about RG System

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Learn more about Veriato RansomSafe

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results.
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Give users streamlined access to the applications they use every day, from anywhere.
Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features. Learn more about Clearlogin

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
Leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Jscrambler is the leader in client-side security. The companys security solutions provide enterprise-grade JavaScript application shielding and webpage real-time monitoring. With Jscrambler, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, while also providing complete visibility over client-side attacks, including DOM tampering and supply chain attacks. Jscrambler is trusted by the Fortune 500 and 43.000+ companies and individuals globally. Learn more about JScrambler

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software
HackEDU offers hands-on Secure Coding Training online to help developers lower vulnerabilities in code and meet compliance requirements
HackEDU offers interactive Secure Coding Training online to help software developers lower the risk of vulnerabilities in code. HackEDUs hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, Node.js, Go, and Javascript. Unlike other offerings, HackEDU is a learning platform that uses real applications, real tools, and real coding exercises to teach both offensive and defensive security to developers online and on-demand. HackEDU reduces vulnerabilities. Learn more about HackEDU

Features

  • Access Controls/Permissions
  • Policy Management Software
  • Password Manager Software
  • Tokenization
  • File Encryption
  • Disk Encryption
  • Key Management Software