View
Sorting
Products found: 13
AnubisNetworks MPS
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
AppRiver Email Security
- Modern dashboard that spotlights phishing and malware threats
- Real-time protection from phishing and malware
- Proprietary technology that protects against conversation hijacking
- Maximizes or limits user control options
- Over 60 filtering techniques
- Office 365-compatible
- Efficiently filters quarantine with convenient declutter feature
- Viewable or searchable quarantined messages for a domain
- Downloadable messages for further analysis
- Full security management with Two-Factor authentication (2FA)
Avanan
- Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
- Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
- Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
- Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
Barracuda Email Security Gateway
CORE Security
Introducing CORE Security
When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.CORE Base
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Quarterly
- System hardening
- Next-generation firewall
- Advanced DDoS mitigation: Standard (20 Gbps)
CORE Enterprise
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation: Enhanced (250 Gbps)
- 24/7 SIEM services
CORE Platinum
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Managed Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation
- Pro (Terabit+)
- 24/7 SIEM services
- Intrusion Prevention System (IPS)
Bolt-on CORE Security™ Services
In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:- Data loss prevention (DLP)
- Web application firewalls (WAF)
- Penetration testing
- URL filtering (Virtual Desktops only)
- Email spam filtering and antivirus (Exchange only)
- Compliance consultancy
Dr.Web Enterprise Security Suite
ESET Secure Enterprise
IKARUS Software Security mail.security
- Defense against SPAM, malware and Zero-Day exploits: Checking and deleting attachments, archives and links, virus alerts, statistics and more
- Anti-SPAM-Features: multi-level concept with greylisting, bayesian & lexical analysis, SPF and else, adaptive rating system, custom filters and actions
- Real-time protection against the latest virus and SPAM outbreaks
- Proactive isolation of threats
- Flexible configuration options: filter options including attachment and HTML filter, SPAM criteria, TLS encryption
- Multi-client capability
- Individual branding of the web interface possible
- Detailed logging for all functions
- Automated reporting and statistics
McAfee Complete EndPoint Protection - Business (CEB)
McAfee Complete Endpoint Threat Protection
McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.
Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.
McAfee MVISION Mobile
Always-on defense for on-the-go devices
Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier—and even offline.Advanced analysis thwarts advanced attacks
Machine learning algorithms analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify advanced device, application, and network-based attacks.A single console for all devices—including mobile
As an integrated component of McAfee Device Security, McAfee MVISION Mobile extends visibility and control of your mobile assets from the same single console of all your McAfee-managed devices, including OS-based endpoints, servers, containers, and embedded IoT devices.OZON Platform
automated processes & human expertise. Anti-virus and anti-spam are no longer adapted against new cyber threats Web Security. Website traffic is analyzed in real time to insure a protection against cyber-attacks such as injection, denial of service, robots propagating malicious programs or stealing data.
Protection against all web cyber attacks Full protection against all web cyber-attacks (DoS, DDoS, SQL injection, XSS, RFI/LFI, Directory Traversal…) targeting your website, data and transactions. Vulnerability detection. Automatic and periodic security flaws detection of the protected website in order to generate the appropriate protection rules. HTTPS security. SSL/TLS software stack secure configuration and SSL/TLS certificate lifecycle management with automatic renewal following cryptographic state of the art. Email Security. Before being delivered in coworker mailbox, each email is analyzed in real time to insure a protection against attacks such as malware, phishing and spear phishing. For maximum efficiency, several complementary security technologies (heuristics, artificial intelligence and predictive) analyze email origin, content and context. Protocol analysis. To detect and block malicious emails, the first technique is to perform a protocol analysis. This first scan can quickly eliminate a large number of threats, including massive attacks.
Heuristic analysis. The heuristic analysis of the entire content of the email (header, URL and attachment) can detect and block more sophisticated attacks like malware and phishing.
Predictive analysis. Unique predictive technology can analyze the context of email as a whole. Regardless of language, this innovative technology can identify behavioral anomalies and block new cyber-attacks in real time. Endpoint Security. Each Windows or MacOS workstation is protected against all types of malicious programs (virus, trojan, ransomware, crypto-miner, …). A software agent is deployed on each desktop/laptop to perform a heuristic and behavioral analysis of all processes. The integration of artificial intelligence and machine learning technologies makes it possible to detect sophisticated malware. Protection against malware. Detection and blocking of sophisticated malware without relying on a signature database.
Protection against ransomware. Avoid data encryption by a ransom program.
Protection against malicious sites. Navigate the Internet safely. Access to a malicious site is automatically blocked.
Proofpoint Email Protection
Protection against BUSINESS EMAIL COMPROMISE (BEC)
Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead.
We analyze:
- Sender-recipient relationship
- Domain reputation
- Email headers and envelope attributes
- Email content
Granular filtering and control
Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:
- Spam
- Impostor
- Bulk
- Phishing
- Malware
- Adult
- Low Priority
Detailed visibility
Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria. With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge. Give your people self-service control over their email preferences such as:
- Quarantines
- Safe and block lists
- Bulk mail delivery
These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally. More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.
Features and Benefits
- Advanced Email Filtering, Control and Visibility. Email Protection allows you to set up robust policies as a first step in routing email to users. You can create detailed firewall rules based on your needs. Even set up policies for anti-virus. We also leverage user bulk mail actions to improve accuracy of future detection and classification. With a wealth of data and search tools, you can ensure your organization's email is protected.
- Impostor Email Threat Protection. Imposter attacks are hard to detect. Our Stateful Composite Scoring Service (SCSS) is a machine learning approach that searches specifically for these email threats. It uses what’s known about your unique environment, along with data from all Proofpoint customers, to more effectively detect and block email fraud.
- Internal Mail Defense. As organization move to cloud-based email services, compromised accounts are on the rise. Internal Mail Defense can automatically scan all internal email traffic, providing a multilayered approach to looking for such things as spam, malware or phishing attacks being sent via compromised accounts. It removes these emails and provides reporting to shows which accounts have been compromised.
- Email Continuity. Email downtime can be a significant hit to worker productivity. Enterprise Continuity ensures email is always available, even if your company email is down. It provides full access to users—via Outlook integration, a web portal or native mobile support. And it automatically activates in an outage, with fully automated recovery.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.