View
Sorting
Products found: 26
Barracuda WAF-as-a-Service…
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM…
- Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution
- Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems
- Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)
- Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates
- Rely on updates from the renowned BeyondTrust Security Research Team
Centripetal Networks CleanINTERNET…
- Lowers false positives through bulk enforcement of millions of complex IOC rules, paired down from hundreds of millions of indicators
- Greatly reduces event volume through intelligence-based filtering and data aggregation
- Converts indicators to action on a continuous basis, as intelligence feeds are dynamically updated
- Organizations cannot apply threat intelligence at-scale
- High latency rates limit real-time prevention of known threats. Less than 1% of compromise indicators are persistently applied to an organization’s defense
- Eradicate threats based threat intelligence enforcement
- Focus on investigating the 10% of threats that are unknown
Without a single platform that can process the amount of threat intelligence necessary to actively defend the business, security teams have been struggling. Firewalls and IPS systems are not the answer.
Centripetal has solved this problem with its invention of the Threat Intelligence Gateway. This solution fundamentally changes how cyber teams filter bad traffic based on intelligence, allowing them to:
Cisco Advanced Malware Protection (Cisco AMP for Endpoints)…
- Filtering out policy-violating files from the Internet, e-mails, and more.
- Detecting and protecting against client-side exploit attempts and exploit attempts aimed at client applications like Java and Flash.
- Recognizing, blocking, and analyzing malicious files.
- Identifying malware patterns and anticipating potentially breached devices.
- Tracking malware’s spread and communications.
- Alleviating threats of reinfection.
Cybonet Cybowall…
- Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats
- Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment
- Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization
- Detect Lateral Movement - Trap attackers that have already breached perimeter defenses
- Detect Active Breaches - Discover network breaches quickly to reduce damaging effects
- Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.
- Intrusion Detection - Breach detection capabilities without network interference.
- Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.
- Network Forensics - Discover and analyze the source of security attacks and incidents.
- Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.
- Default Passwords - Pinpoint and change default passwords to reduce risks.
- Malware Hunter - Identify malicious files and where they reside in the network.
Dr.Web Desktop Security Suite…
F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData…
Forcepoint Email Security Cloud, Forcepoint Web Security Cloud…
Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping. Your business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur. Forcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.
Forcepoint Web Security…
Easily extend visibility and control to cloud applications, from shadow IT reporting to full control via inline (proxy) mode. Not just URL filtering Don’t need your traffic forwarded to the cloud? Enable URL filtering in our leading Next Generation Firewall (NGFW), allowing for granular controls based on users and applications. Streamline compliance Meet the highest certification standards across data privacy laws and residency requirements in different jurisdictions—while allowing users to keep doing good things. Expand internet access for roaming users Apply different policies when an employee connects from corporate and non-corporate locations with Forcepoint Web Security. Security and protection beyond the endpoint Extend your existing policies to mobile devices and protect them from Advanced Threats, mobile malware, phishing attacks, spoofing, and more with Web Security. ThreatSeeker Intelligence Unite over 900 million endpoints (including inputs from Facebook), and with Forcepoint ACE security defenses, analyze up to five billion requests per day. This is the core collective intelligence for all Forcepoint products—managed by Forcepoint Security Labs. Enterprise-grade DLP protection Forcepoint’s 9x Magic Quadrant leading DLP and integrated Incident Risk Ranking (IRR) can protect your data from people-based security incidents, including risk caused by accidental, compromised, and malicious insiders. Eliminate crippling false malware with AMD Cloud sandboxing allows you to optimize remediation efforts for incident response teams with comprehensive and actionable intelligence—providing 100% efficacy in malware detection.
Grey Wizard Shield…
- Full Web Protection. DDoS + WAF + API + BOTs
- 3 Independent. Data Centers located only in EU. Your data never leaves EU
- Premium Support. Median ticket response time 6 minute. Customer service and SOC 24/7/365
- Easy to use. No software & hardware. No IT specialist required
- 5 minute setup. All configuration is automatic
- Innovative Technologies. Machine Learning & A.I. Behavioral Anomaly Detection
Imperva SecureSphere Database Firewall…
- Logs only what activity is necessary while monitoring all activity for security violations
- Monitors and protects high-transaction databases
- Blocks suspicious behavior when it happens – investigate in-context
- Executes multi-action security alerts, eliminating bottlenecks and delays
- Interlocks database protection with the SecureSphere Web Application Firewall, CounterBreach Insider threat protection, and malware protection, providing multifactored data security
Indegy Industrial Cybersecurity Suite…
Flexible, All-in-One Industrial Cyber Security Solution
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment.
Deployed as a network or virtual appliance, Indegy's agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows servers to PLC backplanes - in a single pane of glass.
The Indegy Industrial Cybersecurity Suite is delivered as an all-in-one turnkey appliance that plugs into the network without the use of agents. The Indegy Security Platform is available in 1U Rack form factor as well as a virtual appliance, while the Indegy Sensors come in both rack mounts or DIN-rail mount form factors.
- Asset Tracking –provide you with a comprehensive up-to-date inventory of all assets in your network including dormant devices.
- Threat Detection & Mitigation –monitors for both cyber threats and operational mistakes. It generates alerts based on detection of behavioral anomalies as well as predefined policy conditions.
- Device Integrity - Discovers, classifies and queries all ICS assets even when they aren't communicating in the network. Using patent-pending active detection technology, this addon option works conjointly with network sniffing by collecting information that is impossible to find in the network - yet crucial to protecting the OT environment.
- Vulnerability Management – Receive periodic reports of risk levels for each of the assets in your ICS network. The reports enable you to delve deeply into the risk factors in the network and prioritize mitigation steps.
- Configuration Control - Tracks and logs all configuration changes, whether executed by a human user or by malware, over the network or physically on the device.
- Enterprise Visibility – Gain complete enterprise visibility by sending alerts directly to your SIEM as well as distributing them by email to the relevant parties.
McAfee Complete EndPoint Protection - Business (CEB)…
McAfee Complete Endpoint Threat Protection…
McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.
Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.
McAfee Endpoint Protection — Advanced Suite…
Panda Endpoint Protection…
Next-Generation Endpoint Security Advanced cyber-security to counter malware, with prevention, detection and remediation capabilities.
Endpoint Detection and Response Monitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints
Malware Intelligence Platform The correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.
Advanced threats are gone The Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks. This way, protection systems can be activated before threats are executed. Complete advanced protection for endpoints and servers to eradicate the malware.
SecPoint Protector…
ShieldApps PC Privacy Shield…
- Don't leave tracks behind. Leave no traces of your private online activity on the Web and your computer or laptop.
- Guard against internet fraud. Prevent phishing and identity theft by stopping hackers, scammers and fraudsters dead in their tracks
- Protect ypur personal information. Sleep better at night knowing that your PC is safer from intruders and unwelcome visitors
- Stop advertises from prying. Automatically delete cookies that advertisers place on your PC to learn about your habits and behaviours.
Sonatype Nexus Firewall…
- Reduce development rework by selecting only the best open source components based on policy.
- liminate friction between development and security teams by automating open source policies at time of selection.
- Create waivers for quarantined components when no alternative is available and/or compensating controls exist.
SonicWall Capture Advanced Threat Protection…
- Multi-engine cloud sandbox that includes virtualization, hypervisor level analysis and full-system emulation
- High security effectiveness at diagnosing new threats
- Automated breach prevention enabled by blocking files until a security verdict is determined
- Near real-time signature deployment protects organizations from follow-on attacks
- Email and app notifications with robust reporting from the sandbox environment
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.