Endpoint Protection Software
Endpoint Protection software provides security against malware, system attacks, viruses, and other threats. IT security professionals use endpoint protection software to ensure data, virtual machines, physical laptops and servers, and everything within their network is resistant to hackers. Related directories include Computer Security software, Network Security software, Mobility software, Mobile Device Management software, Identity Management software, and
Filter Results (87)
- Cloud, SaaS, Web (62)
- Installed - Mac (36)
- Installed - Windows (56)
- Mobile - Android Native (18)
- Mobile - iOS Native (16)
- Activity Log (46)
- Anti Virus (38)
- Application Security (37)
- Behavioral Analytics (39)
- Device Management (45)
- Encryption (25)
- Signature Matching (16)
- Vulnerability Scanning (15)
- Web Threat Management (40)
- Whitelisting / Blacklisting (41)
The SolarWinds® N-central® remote monitoring and management platform is designed to help managed service providers handle complex networks with ease. With extensive automation and in-depth configurability options, security features like antivirus and patch management, and integrated backup, N-central is built to help MSP businesses efficiently manage intricate networks from one easy-to-use platform. Learn more about SolarWinds N-central The SolarWinds® N-central® remote monitoring and management platform is designed make managing complex IT networks simple. Learn more about SolarWinds N-central
A web-based windows desktop management software that helps in managing 1000s of desktops from a central location. It can manage desktops both in LAN and across WAN. It automates regular desktop management activities like installing software, patches, and service packs, standardize the desktops by applying uniform configurations such as wallpapers, shortcuts, printer, etc. In simple terms, it helps administrators to automate, standardize, secure, and audit their windows network. Learn more about ManageEngine Desktop Central Helps administrators to automate, standardize, secure, and audit their windows network. Desktop Central now supports MDM also. Learn more about ManageEngine Desktop Central
Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources for their employees, partners, contractors, and outsourcers. Learn more about Fyde Secure access to Internet and corporate resources with a single solution. Learn more about Fyde
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks. Learn more about NinjaRMM NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection. Learn more about NinjaRMM
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about EventLog Analyzer EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform. Learn more about EventLog Analyzer
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Try a free Trial of WebTitan today, support included. Learn more about WebTitan DNS Based web content filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
AVG Antivirus Business Edition 2018 keeps your business and customer data safe from latest ransomware, viruses, malware and and outbreaks in real-time. Its powered with new cloud based features as CyberCapture, improved malware detection and enhanced web shield. This product includes also free remote management and great reporting. Client user interface is updated, as well. Available for Windows PCs, desktops and servers. AVG offers free phone support 24/7 to its customers. Learn more about AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 keeps your SMBs and customer data safe from online threats in real-time Learn more about AVG Antivirus Business Edition
Are you worried about weak passwords and password reuse that could undermine your company security? Does your IT team spend most of their time on password reset requests? Solve these problems with 1Password! It is easy to deploy and manage and trusted by over 30,000 businesses and over 15 mln users worldwide. Learn more about 1Password Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click. Learn more about 1Password
Endpoint Protector is a Data Loss Prevention solution for Enterprise and Small-Medium businesses, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc. Learn more about Endpoint Protector Data Loss Prevention. Device Control and eDiscovery capabilities on Windows, macOS and Linux Learn more about Endpoint Protector
With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy with a centralized console. You can also manage security configurations, harden web servers, mitigate zero-day vulnerabilities, run end-of-life audits, and eliminate risky software. Simplify vulnerability management with remotely deployable agent, web based interface and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus An easy to deploy, affordable, centralized console based tool to prioritize and eliminate vulnerabilities and misconfigurations. Learn more about ManageEngine Vulnerability Manager Plus
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about Patch Manager Plus Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications. Learn more about Patch Manager Plus
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ADAudit Plus ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software. Learn more about ADAudit Plus
Netsurion empowers organizations to successfully predict, prevent, detect, and respond to cybersecurity threats. Our SIEM platform, EventTracker, unifies machine learning, behavior analytics, and security orchestration, with recognition for 11 straight years on the Gartner MQ for SIEM. Our managed security service, EventTracker SIEMphonic, delivers a Co-Managed SIEM service driven by our 24/7 SOC. EventTracker EDR also protects critical endpoints from zero-day attacks and mutating malware. Learn more about EventTracker By providing SIEM, EDR and a 24/7 SOC, we quickly and efficiently deliver advanced threat protection and security orchestration. Learn more about EventTracker
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-500 employees). Works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. Price from $49.99 All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
LogMeIn Central is a powerful, easy-to-use endpoint protection and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk. Simplified endpoint management for desktops, servers, and mobile laptops.
CrashPlan for Small Business provides peace of mind through easy-to-use, unlimited automatic data backup and recovery. We help small businesses and organizations recover and bounce back faster from any worst-case scenario, whether it is a disaster, simple human error, a stolen laptop, ransomware and more. Our data security solution is a product of Code42, an industry leader protecting the critical data of more than 47,000 world-class organizations, including the largest global brands. Easy, affordable, unlimited cloud backup for businesses with up to 200 employees.
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control. Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices. Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the system of record, presenting detailed, accurate, and actionable data for use in incident response, high-risk insider monitoring, and productivity reporting. Cerebral can be deployed On-prem, in the Cloud or through an MSP provider. Monitor and analyze your employees company-wide whether they are in the office or working remotely.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks. NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization. Automatic, insightful, all-in-one endpoint security from the trusted leader.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi Incapsula provides cloud-based layer 7 load balancing and failover, site failover (DR), and global server load balancing (GSLB)
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing. Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Deep Freeze Reboot to Restore Software provides ultimate endpoint protection by freezing a snapshot of your desired computer configuration and settings. With an instant reboot, any unwanted or unauthorized changes are completely erased from the system, restoring it back to its pristine Frozen state. Deep Freeze provides unrestricted system access to end-users while preventing permanent configuration changes and ensures 100% workstation recovery with every restart.. Reboot to Restore is System Restore technology helps to restore Windows and Mac to a pristine, pre-configured state with just a reboot.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce. Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required. Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over software that is not built for your systems. It boasts one of the most comprehensive sets of virus signatures available and keeps itself up to date by automatically downloading the latest virus definitions. You'll have peace of mind knowing that your scan engine is backed by battle-tested technology. Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers.
Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs. Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS. Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Idaptive delivers Next-Gen Access, protecting organizations from data breaches through a Zero Trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). Idaptive Next-Gen Access is an integrated platform delivering identity and access management solutions as a service.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automatically eliminate threats in real time for both on-prem and cloud environments and is the only solution to provide visibility into encrypted traffic across networks directly from the endpoint. SentinelOne is a converged EPP + EDR solution that seamlessly integrates with diverse IT environments. Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money. Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data. Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware. A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware. Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration. Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.
SECDO is transforming life for security teams, enabling them to investigate and respond to incidents faster than ever. With a combination of automated alert validation, contextual investigation, threat hunting and rapid remediation, SECDO gives security professionals the power to keep the enterprise free from threats. Only SECDO automatically validates every SIEM alert, using detailed endpoint activity history and causality analysis to provide the full context of the alert back to the root cause Secdos next-gen incident response platform includes automated alert validation, contextual investigation and rapid remididation
Privilege Manager is the only all-in-one least privilege and application control solution capable of supporting enterprises and fast growing organizations at scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application controls keeps people productive, and actionable reporting demonstrates value to executives and auditors. Privilege access management solution that helps organizations protect their endpoints by implementing the principle of least privilege.
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more. Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more.
AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).
Provides a single management console, security compliance verification, media encryption, anti-malware and program control. Provides a single management console, security compliance verification, media encryption, anti-malware and program control.
SecPod Saner provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy to manage solution. SecPod creates computer security software for proactively managing endpoint computer risks.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. Get complete visibility into the configuration of every server, network device, and cloud app you're running.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc. It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time. Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint. It also supports additional security features including device control, deep content inspection, remediation actions, encryption and comprehensive auditing. Running in the background, utilizing advanced throttling techniques, the agent silently discovers critical information without interrupting end user activity. Designed to enable users to securely collaborate by applying centralized information management policies on the endpoint.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer. Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required. The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution
Stellar EDB to PST Converter efficiently and quickly converts Microsoft Exchange Database (EDB) files into Outlook PST files. The software can convert both online and offline EDB files and the converted data can also be saved in HTML, RTF and PDF format. All the mailbox items including contacts, calendars, emails, attachments, notes, tasks and journals can be converted. User can preview the data before saving it in a PST file and there is also a provision for selective conversion. Stellar EDB to PST Converter is a professional tool that proficiently converts online as well as offline
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device. End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain English queries, with a Google-like experience, right in your web browser. Cloud-based endpoint management and protection platform to assess security and enforce compliance of endpoints.
Drawing on decades of experience as enterprise leaders in the Apple IT space, our founders invented Kandji. Together, they recruited a veteran team of IT specialists to develop the first and only compliance cloud for macOS that eliminates the costly, impractical challenge of deploying and maintaining custom code. Every part of Kandjis system architecture and easy-to-use functionality was designed to ensure every fleet remains safe, compliant and foolproof. Kandji is the first turnkey, cloud-based software solution to offer customizable security, compliance, and reporting for Mac computers.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks. REVE Endpoint Security software provides advanced protection for all endpoints of an organization.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response. Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure. Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.
Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities. Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities.
IntSights is the leading external threat intelligence and protection platform, purposefully designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect, prevent, and eliminate threats at their source. IntSights is the leading external threat intelligence and protection platform designed to neutralize threats outside the wire.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices. Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components. With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end. Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.