PC Sicherheitsprogramme

Nutze Capterra.ch in Schweiz um die beste PC Sicherheitsprogramme für dein Unternehmen zu finden.

Erfahre warum Capterra kostenlos ist

Erfahre mehr über die Sortierungsoptionen

Softwareprodukte filtern:

143 Produkte gefunden

Produktbewertung

Einsatz

Funktionen

OneLogin

OneLogin

von OneLogin

(17 Bewertungen)

Entwickelt für Unternehmen mit mehr als 100 Anwendern, bietet ONELOGIN eine Cloud-basierte Identity und Access Management (IAM) Lösung, die einfaches Single-Sign-On bietet (SSO) und es einfacher für Unternehmen macht, den Zugriff auf Web-Anwendungen sowohl in der Cloud als auch hinter der Firewall zu sichern und zu verwalten. Hat Dein Unternehmen drei oder mehr SaaS oder interne Web-Anwendungen? Wenn ja, dann wirst Du von der Sicherheit der Cloud-basierten Single Sign-On-Lösung ONELOGIN profitieren. Erfahre mehr über OneLogin

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

von Webroot Software

(65 Bewertungen)

Multi-Vektor-Schutz vor Viren und Malware, der vollständigen Schutz gegen alle heutigen hoch entwickelten Malware-Bedrohungen wie Trojaner, Keylogger, Phishing, Spyware, Hintertüren, Rootkits, Zero-Day und fortgeschrittene hartnäckige Bedrohungen bietet. Integriertes Identitäts- & Privacy Shield verhindert, dass Daten gestohlen oder erfasst werden, wenn das Internet genutzt wird, und die ausgehende Firewall verhindert ebenfalls, dass Malware deine Daten stiehlt. Du musst dir keine Sorgen um Updates machen - Cloud-basierte Sicherheit bedeutet, dass die Endpunkte immer auf dem neuesten Stand sind. Erfahre mehr über Webroot SecureAnywhere Endpoint Protection

Avast Business Antivirus Pro Plus

Avast Business Antivirus Pro Plus

von Avast

(214 Bewertungen)

Avast Business Antivirus Pro Plus ist ein All-in-one-Paket zum Schutz von Endgeräten und Servern für kleine und mittelständische Unternehmen (das von einem bis 200 Mitarbeiter besonders gut geeignet ist). Funktioniert auf PCs, Macs und Servern. Das Produkt ist mit 18 hochmodernen Funktionen ausgestattet, um dein Geschäftsleben vollumfassend zu schützen, einschließlich Virenschutz für Server, Netzwerksicherheit und VPN-Schutz für unterwegs. Der ultimative Schutz für Daten, Identitäten und Endpunkte. Das Produkt kann ohne Konsole, mit Cloud oder mit On-Premise-Konsole verwendet werden. Erfahre mehr über Avast Business Antivirus Pro Plus

ADAudit Plus

ADAudit Plus

von ManageEngine

(10 Bewertungen)

ManageEngine ADAudit Plus ist eine Lösung für IT-Sicherheit und Compliance. Mit über 200 Berichten und Echtzeitwarnungen liefert sie Wissen über Änderungen am Inhalt und an der Konfiguration von Active-Directory-, Azure-AD- und Windows-Servern. Darüber hinaus bietet sie Einblicke in den Zugriff auf Arbeitsstationen und Dateiserver (einschließlich NetApp und EMC). Mit ADAudit Plus können Sie die An- und Abmeldung von Benutzern verfolgen, Kontosperrungen analysieren, ADFS, ADLDS und Drucker prüfen, Protokolle an SIEM-Tools weiterleiten und vieles mehr. Erfahre mehr über ADAudit Plus

EventLog Analyzer

EventLog Analyzer

von ManageEngine

(3 Bewertungen)

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, event correlation, real-time alerting, log forensics and log retention. Now you can mitigate sophisticated cyber-attacks, identify the root cause of security incidents and thwart data breaches. Erfahre mehr über EventLog Analyzer

Teramind

Teramind

von Teramind

(42 Bewertungen)

Teramind bietet einen benutzerzentrierten Sicherheitsansatz, um das Mitarbeiter-PC-Verhalten zu überwachen. Unsere Software optimiert die Mitarbeiter-Datenerfassung, um verdächtige Aktivitäten zu identifizieren, mögliche Bedrohungen zu erkennen, die Effizienz der Mitarbeiter zu überwachen und die Industrie der Einhaltung sicherzustellen. Wir helfen, Vorfälle, die die Sicherheit gefährden, zu reduzieren, indem wir Echtzeit-Zugriff auf Benutzeraktivitätenm Bereitstellung von Warnungen, Warnungen, Umleitungen und Benutzer-Lock-outs, um dein Geschäft so effizient und sicher wie möglich auszuführen. Erfahre mehr über Teramind

WebTitan

WebTitan

von TitanHQ

(129 Bewertungen)

DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing-Versuche und stellt Webinhaltskontrolle bereit. Wir filtern über 1/2 Milliarden DNS-Anfragen täglich, identifizieren 60.000 Malware-Iterationen pro Tag und haben mehr als 7.500 Kunden. Cloud und Gateway-Versionen stehen zur Verfügung. Verbessere Deine Cybersicherheit jetzt. Nutze die kostenlose Testversion von WebTitan heute, inkl. Support. Erfahre mehr über WebTitan

Passworks

Passworks

von Certero

(1 Bewertung)

Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. Erfahre mehr über Passworks

Marshal

Marshal

von Onehub

(0 Bewertungen)

Marshal is a free, online privacy tool that connects to your cloud services (Box, Dropbox, Google Drive, Microsoft OneDrive, Onehub) to uncover any exposed sensitive data you are sharing. Within minutes, Marshal delivers a secure, sanitized report outlining any exposed Social Security Numbers, credit card numbers, email addresses or phone numbers you are sharing. Erfahre mehr über Marshal

TunnelBear

TunnelBear

von TunnelBear

(34 Bewertungen)

Wenn TunnelBear eingeschaltet ist, wird Deine Internetverbindung mit AES-256-Bit-Verschlüsselung gesichert und Deine öffentliche IP-Adresse wird in das Land Deiner Wahl geschaltet. Unternehmen verlassen sich auf TunnelBear für: die Sicherung der Außendienst-Mitarbeiter, die globalen Qualitätssicherungstests, die Sammlung von konkurrierender Intelligenz, verdeckte Durchführung von Marktforschung, Zugriff auf geografisch eingeschränkte Business-Tools. Unternehmen haben Zugriff auf bevorzugten Support und einen persönlichen Account Manager.

mSpy

mSpy

von mSpy

(5 Bewertungen)

mSpy ist die beliebteste Überwachungs- und Sicherheitsanwendung auf dem Markt mit Millionen von zufriedenen Nutzern rund um den Globus. Unsere Software verfolgt alle Aktivitäten im Hintergrund des überwachten Telefons, inklusive GPS-Standort, Web-Geschichte, Bilder, Videos, E-Mail, SMS, Skype, WhatsApp, Tastatureingaben und vieles mehr. Das einfach zu benutzende Bedienungsfeld, 24/7 Live-Kundenunterstützung und die 256-Bit-Verschlüsselung machen mSpy die beste Lösung auf dem Markt, um Deine Kinder sicher und Mitarbeiter produktiv zu wissen.

VyprVPN

VyprVPN

von Golden Frog

(12 Bewertungen)

Verwaltet sein eigenes Netzwerk und verfügt über eine eigene Hardware, so dass wir die schnellsten VPN-Geschwindigkeiten in der Welt liefern können

AVG Internet Security

AVG Internet Security

von AVG Technologies

(201 Bewertungen)

AVG hilft dir, dein Unternehmen zu expandieren und zu erfahren, dass deine Daten und Online-Kommunikation geschützt sind.

MiniTool Partition Wizard

MiniTool Partition Wizard

von MiniTool

(30 Bewertungen)

Minitool Partition Wizard Free Edition ist Teil des Partition-Managers, der sich an Privat- und an Heimbüro-Nutzer wendet. Bestimmte Software besitzt umfassende Plattenpartition-Management-Funktionen, wie Partition zusammenfügen, versetzen / skalieren, kopieren, erstellen, aufteilen, löschen, formatieren und Dateisystem konvertieren.

PowerBroker

PowerBroker

von BeyondTrust

(0 Bewertungen)

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management.

Phishme

Phishme

von Phishme

(2 Bewertungen)

Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis.

Kaspersky Endpoint Security

Kaspersky Endpoint Security

von Kaspersky Lab

(130 Bewertungen)

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.

CylancePROTECT

CylancePROTECT

von Cylance

(14 Bewertungen)

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Bitium

Bitium

von Bitium

(11 Bewertungen)

Access control solution for corporate apps that supports integration with third party authentication providers.

Internet Lock

Internet Lock

von TopLang Software

(0 Bewertungen)

Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.

LogPoint

LogPoint

von LogPoint

(0 Bewertungen)

The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user.

DeviceLock

DeviceLock

von DeviceLock

(0 Bewertungen)

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.

NerveCenter

NerveCenter

von Logmatrix

(0 Bewertungen)

Delivers integrated, real-time security management in a single, seamless suite.

Indeni

Indeni

von Indeni

(9 Bewertungen)

Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues.

SecurityEXPERT

SecurityEXPERT

von St. Bernard Software

(0 Bewertungen)

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.

TF2000

TF2000

von ComputerProx

(0 Bewertungen)

Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you.

Jscrambler

Jscrambler

von Jscrambler

(0 Bewertungen)

Jscrambler is the leader in security for JavaScript Applications, working on highly innovative security products to protect Web and Mobile apps. Their products are used by 30.000 users in 145 countries, including some of the most innovative companies in the world and Fortune 500 organizations, in a number of sectors including Finance, Advertising, Media and Gaming. Recently, a new Webpage Integrity module was introduced that extends their code protection expertize to the webpage.

ControlCase

ControlCase

von ControlCase

(0 Bewertungen)

ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI.

Rohos Logon Key

Rohos Logon Key

von Tesline-Service

(0 Bewertungen)

Two-factor authentication solutions for Windows. Secure USB Key logon.

Gemnasium

Gemnasium

von Gemnasium

(0 Bewertungen)

Gemnasium monitors your applications' open source dependencies and alerts you about updates and security vulnerabilities. Your project might be using a dangerous dependency, we will notify you as soon as advisories are public and affect your projects. We support JavaScript, Ruby, Python and PHP applications with more coming soon. We have an enterprise version that supports GitHub Enterprise, GitLab and Bitbucket Server. All versions have free trials.

BlackFog

BlackFog

von BlackFog

(1 Bewertung)

BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer.

Security Shield

Security Shield

von PCSecurityShield

(0 Bewertungen)

A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without.

Nfusion

Nfusion

von Ntrepid

(0 Bewertungen)

Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop.

ZoneAlarm Pro

ZoneAlarm Pro

von Zone Labs

(8 Bewertungen)

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.

FileAudit

FileAudit

von IS Decisions

(0 Bewertungen)

Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more.

Network Security Auditor

Network Security Auditor

von Nsasoft

(0 Bewertungen)

Network security audit system designed to audit network and detect available security vulnerabilities in the network.

DriveCrypt

DriveCrypt

von Securstar

(0 Bewertungen)

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.

Black Duck Hub

Black Duck Hub

von Black Duck

(28 Bewertungen)

Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection

von Symantec

(17 Bewertungen)

Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents.

SSH Tectia

SSH Tectia

von SSH Communications Security

(2 Bewertungen)

Enables secure system administration, secure file transfer and secure application connectivity with centralized control.

Active Shield

Active Shield

von Security Stronghold

(1 Bewertung)

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

Retina Network Security Scanner

Retina Network Security Scanner

von eEye Digital Security

(0 Bewertungen)

Combines advanced scanning technology with most comprehensive vulnerability database.

Falcon Host

Falcon Host

von CrowdStrike

(2 Bewertungen)

Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Invisible Secrets

Invisible Secrets

von NeoByte Solutions

(0 Bewertungen)

Security software that encrypts your data and files for safe keeping or secure transfer across the net.

SecuBox

SecuBox

von Aiko Solutions

(0 Bewertungen)

AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage for all important and business critical information.

AnVir Task Manager Pro

AnVir Task Manager Pro

von AnVir Software

(0 Bewertungen)

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.

Clearlogin

Clearlogin

von Evolve IP

(9 Bewertungen)

Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features.

StillSecure

StillSecure

von StillSecure

(0 Bewertungen)

Security testing, monitoring and management software that defends networks from security breaches.

Fortres 101

Fortres 101

von Fortres Grand

(1 Bewertung)

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.

NetSupport Protect

NetSupport Protect

von NetSupport

(0 Bewertungen)

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.

Fusion

Fusion

von Panda Security

(3 Bewertungen)

Easy-to-use protection against viruses, spyware, hackers, spam and other Internet threats.

CyberGatekeeper

CyberGatekeeper

von InfoExpress

(0 Bewertungen)

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Genesis

Genesis

von Internet Biometric Security Systems

(0 Bewertungen)

On demand biometric security solution for any type of internet application requiring security of confidential information.

QualysGuard Enterprise

QualysGuard Enterprise

von Qualys

(0 Bewertungen)

Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.

eScan ISS

eScan ISS

von MicroWorld Technologies

(0 Bewertungen)

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.

LiveEnsure

LiveEnsure

von LiveEnsure

(0 Bewertungen)

Authenticates users through their mobile device, location, knowledge and behavior.

RSA Keon

RSA Keon

von RSA Security

(4 Bewertungen)

Public key infrastructure; enables, manages and simplifies the use of digital certificates.

GamaScan

GamaScan

von GamaSec

(2 Bewertungen)

Website security test to protect application and server against hackers.

Tripwire for Servers

Tripwire for Servers

von Tripwire

(0 Bewertungen)

Detect intentional tampering, user error, software failure, and introductions of malicious software.

Saint Security Suite

Saint Security Suite

von SAINT

(0 Bewertungen)

The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA.

AccuHash

AccuHash

von Viwal Interactive

(0 Bewertungen)

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.

G Data Internet Security 2013

G Data Internet Security 2013

von G Data Software

(2 Bewertungen)

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.

AccessPatrol

AccessPatrol

von CurrentWare

(0 Bewertungen)

AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).

Egosecure Endpoint

Egosecure Endpoint

von Egosecure

(0 Bewertungen)

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries

Beacon

Beacon

von Great Bay Software

(7 Bewertungen)

Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication.

Veriato RansomSafe

Veriato RansomSafe

von Veriato

(4 Bewertungen)

Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.

CipherCloud for Salesforce

CipherCloud for Salesforce

von CipherCloud

(2 Bewertungen)

CipherCloud for Salesforce addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.The CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with Salesforce.

BorderWare Firewall Server

BorderWare Firewall Server

von BorderWare Technologies

(1 Bewertung)

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

NetIQ Sentinel 7

NetIQ Sentinel 7

von NetIQ

(1 Bewertung)

Make decisive, appropriate responses to incidents by automating identification and resolution processes.

Secure Hive

Secure Hive

von Secure Hive

(0 Bewertungen)

Create encrypted archives and self-extracting .exe files for secure storage and file sharing.

Validian Protect

Validian Protect

von Validian

(0 Bewertungen)

Manages all crucial security functions, including authentication, encryption and addressing.

TweakEasy Professional

TweakEasy Professional

von WinSetter

(0 Bewertungen)

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.

CimTrak Integrity Suite

CimTrak Integrity Suite

von Cimcor

(0 Bewertungen)

Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments.

RollBack Rx Server

RollBack Rx Server

von Horizon Datasys

(0 Bewertungen)

Windows Server backup and restore utility that gives IT professionals an instant backup capability that can quickly restore mission critical systems.

Viewfinity Application Control

Viewfinity Application Control

von Viewfinity

(0 Bewertungen)

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.

Advanced Security Manager

Advanced Security Manager

von Nexvue

(0 Bewertungen)

Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica.

GlassWire

GlassWire

von GlassWire

(11 Bewertungen)

Schützt dein Computer-Netzwerk und die Privatsphäre über Netzwerk-Monitoring und ein eingebautes Firewall-Management-Tool.

ForeScout CounterACT Edge

ForeScout CounterACT Edge

von ForeScout Technologies

(3 Bewertungen)

Security hardware that monitors the perimeter and preempts targeted attacks.

iLock Security Services

iLock Security Services

von 2AB

(1 Bewertung)

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy.

Spoon

Spoon

von Spoon

(1 Bewertung)

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.

Trust Lockdown

Trust Lockdown

von White Cloud Security

(1 Bewertung)

App trust-listing technology. Protects your systems by only allowing trusted applications to execute.

Vera

Vera

von Vera

(1 Bewertung)

Vera secures any kind of data, wherever it goes

PowerTech

PowerTech

von HelpSystems

(1 Bewertung)

Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.

OpaqueVEIL

OpaqueVEIL

von TecSec

(0 Bewertungen)

Enables access to information through encryption, providing information security, privacy and confidentiality.

Identity & Access Manager

Identity & Access Manager

von Evidian

(0 Bewertungen)

Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning.

WiKID Authentication System

WiKID Authentication System

von WiKID Systems

(0 Bewertungen)

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

Secure CommNet

Secure CommNet

von Radient Software

(0 Bewertungen)

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.

MemberProtect

MemberProtect

von InetSolution

(0 Bewertungen)

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.

IntelliTrack Network

IntelliTrack Network

von Soni-Soft

(0 Bewertungen)

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.

Calyx Suite

Calyx Suite

von Open Seas

(0 Bewertungen)

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Security Services Platform

Security Services Platform

von Edgeos

(0 Bewertungen)

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.

IMCrypto Pro

IMCrypto Pro

von Global Information Technology

(0 Bewertungen)

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.

PlatinumCache

PlatinumCache

von DTS

(0 Bewertungen)

Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software.

SyncBoss

SyncBoss

von SecurePro Software

(0 Bewertungen)

File Synchronization Application and Cloud Storage.

XyLoc Security Server

XyLoc Security Server

von Ensure Technologies

(0 Bewertungen)

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.

Trustifier KSE

Trustifier KSE

von Trustifier

(0 Bewertungen)

Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network.

Data Rover EP

Data Rover EP

von Mission2Mars

(0 Bewertungen)

DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization.

Secure Hunter Business

Secure Hunter Business

von Secure Hunter

(0 Bewertungen)

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.

Appvigil

Appvigil

von Wegilant

(0 Bewertungen)

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest.

Cofactor Kite

Cofactor Kite

von Cofactor Computing

(0 Bewertungen)

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.

Promisec Endpoint Manager 4.12

Promisec Endpoint Manager 4.12

von Promisec

(0 Bewertungen)

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.

Specops Password Sync

Specops Password Sync

von Specops Software

(0 Bewertungen)

Specops Password Sync simplifies password management for users by allowing them to use one password across multiple systems- including on-premises and SaaS targets. Specops Password Sync instantly synchronizes Active Directory passwords to other systems, which ensures complexity is applied to all business systems.

Votiro Secure Email Gateway

Votiro Secure Email Gateway

von Votiro

(0 Bewertungen)

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.

Siwenoid

Siwenoid

von Siwena

(0 Bewertungen)

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.

iSafeSend

iSafeSend

von DMS Companies

(0 Bewertungen)

Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information.

EntryProtect

EntryProtect

von SentryBay

(0 Bewertungen)

Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data.

Avast Business CloudCare

Avast Business CloudCare

von Avast

(214 Bewertungen)

Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.

NordVPN

NordVPN

von NordVPN

(45 Bewertungen)

Wir helfen Unternehmen dabei, ihre Netzwerke und Internetverbindungen sicher zu betreiben. Unser VPN-Service stellte eine zusätzliche Sicherheitsebene dar und sichert ihre Kommunikation. Das geschieht mittels leistungsfähiger Verschlüsselung für den gesamten eingehenden und ausgehenden Datenverkehr, damit niemand dritter deine vertraulichen Informationen einsehen kann. Schütze dein Unternehmen gegen Sicherheitslücken. Sicherer Fernzugriff für das Team. Vereinfache die Unternehmensnetzwerk-Sicherheit. Greife auf regionsspezifische Online-Inhalte von der ganzen Welt aus zu.

bitdefender GravityZone

bitdefender GravityZone

von bitdefender

(30 Bewertungen)

GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.

McAfee E-Business Server

McAfee E-Business Server

von McAfee

(18 Bewertungen)

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.

Windscribe

Windscribe

von Windscribe

(9 Bewertungen)

Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online.

Prey

Prey

von Prey

(3 Bewertungen)

A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy.

F-Secure VPN+

F-Secure VPN+

von F-Secure

(2 Bewertungen)

Provides strong encryption, supports multiple protocols, security standards & authentication methods.

Hushmail

Hushmail

von Hushmail

(2 Bewertungen)

Hushmail is a secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone, even people who don't use Hushmail. With easy-to-use webmail and an iPhone app, there's no complicated installation process. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance and include the required BAA, an archive account and secure forms.

CWIS Security Antivirus Scanner

CWIS Security Antivirus Scanner

von Cobweb Security

(2 Bewertungen)

A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.

Web Security Appliance

Web Security Appliance

von IronPort

(1 Bewertung)

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.

modusGate

modusGate

von Vircom

(1 Bewertung)

modusGate is an on-premise multi-layer anti-spam email filtering gateway harnessing 2 decades of security and network experience. It incorporates state of the art AI through a real-time machine learning engine to effectively identify threats by reputation and advanced statistical models. We integrate layered scanning with Bitdefender and Avira Anti-Virus, providing leading defense against phishing and malware threats.

End-user IT Analytics

End-user IT Analytics

von Nexthink

(1 Bewertung)

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.

SpyShelter Anti-Keylogger

SpyShelter Anti-Keylogger

von SpyShelter

(1 Bewertung)

Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.

Cisco Cloudlock

Cisco Cloudlock

von Cisco Cloudlock

(1 Bewertung)

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

HackerOne

HackerOne

von HackerOne

(1 Bewertung)

A computer security solution with issue tracker connection, security inbox, team controls, analysis & metrics, and more.

Bodi

Bodi

von Pilixo

(1 Bewertung)

Bodi ist eine komplette End-Point-Security-Plattform und umfasst Folgendes ... Phishing-Präventions: Hindert Nutzer daran, dass versehentlich einen Klick auf bösartige Links erfolgt und Datendiebstahl passiert. Es gibt Echtzeit-Warnungen auf Basis definierter Regeln. Nutzungsanalyse detaillierte Analyse der App-Nutzung, Web-Browsing, Drucken,, Aktivität forensische Evidenz sowie vollständige Aufzeichnung und Suche nach dem Begriff detaillierter Untersuchungen, Sanierung, vollständige Fernsteuerungsfunktionen zur Behebung von Problemen mit dem Gerät Integrierter API-Support

MetaPhish

MetaPhish

von MetaCompliance

(1 Bewertung)

The MetaPhish product has the ability to originate emails from a set of prepopulated simulated phishing domains. The software contains a library of smart learning experiences such as infographics, notices and training videos. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator.

Firewall-1

Firewall-1

von Check Point Software Technologies

(0 Bewertungen)

Firewall that provides access control, content security, authentication and centralized management.

Network Security Manager

Network Security Manager

von Intellitactics

(0 Bewertungen)

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats.

Snorkel-Server

Snorkel-Server

von Odyssey Technologies

(0 Bewertungen)

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.

PureSight CSDK/OEM

PureSight CSDK/OEM

von PureSight Technologies

(0 Bewertungen)

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Net Monitor for Employees

Net Monitor for Employees

von EduIQ.com

(0 Bewertungen)

Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity.

east-tec Eraser

east-tec Eraser

von East-Tec

(0 Bewertungen)

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC.

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway

von Clearswift

(0 Bewertungen)

The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, the Clearswift SEG incorporates the latest in inbound threat protection (Sophos and/or Kaspersky AV), a multi-layer spam defence mechanism, multiple encryption options, deep content inspection control on size and types of attachments and Adaptive Redaction features

Anti-Executable

Anti-Executable

von Faronics

(0 Bewertungen)

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Any other programs - whether they are unwanted, unlicensed, or simply unnecessary - are blocked from ever executing.

OX Guard

OX Guard

von Open-Xchange

(0 Bewertungen)

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.

Cyberator

Cyberator

von Zartech

(0 Bewertungen)

Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution

ThreatSentry

ThreatSentry

von Privacyware

(0 Bewertungen)

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

CISS Forza

CISS Forza

von SAI Technology

(0 Bewertungen)

A computer security solution that limits incorrect employee access privileges and responds to malicious activity.

SERVERWAT.CH Security Scanner

SERVERWAT.CH Security Scanner

von SERVERWAT.CH Security Scanner

(0 Bewertungen)

Are you running an online business and haven't thought about security? Find your vulnerabilities before others do. Schedule vulnerability scans for your servers and get notified when it's time to call your admin.

BlueFiles

BlueFiles

von Forecomm

(0 Bewertungen)

In a simple and fast way, send your sensible data with full confidentiality. With the BlueFiles virtual printer, send an encrypted copy of your native files with permanent control over printing, download, access period, recipients, even after dispatch, or simply right click on your original files or folders to transfer them. BlueFiles ensures the highest degree of confidentiality until reception of your data with a simple and user-friendly interface.

BitRaser

BitRaser

von Stellar Data Recovery

(0 Bewertungen)

BitRaser is a plug and play software that completely erases data beyond the scope of data recovery. It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm.

Encryptionizer

Encryptionizer

von NetLib Security

(0 Bewertungen)

Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.

Cornerstone MFT Server

Cornerstone MFT Server

von South River Technologies

(0 Bewertungen)

Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes.

SecureCircle

SecureCircle

von SecureCircle

(0 Bewertungen)

The first security product designed to meet the challenges of securing & managing unstructured data in a zero-trust word. Unlike existing technologies, SecureCircle provides a transparent solution which is always encrypted, trackable, and retractable. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements.

Ransomware Defender

Ransomware Defender

von ShieldApps Software Development

(0 Bewertungen)

Scans, detects and protects from ransomware malicious attempts.

SecuredTouch

SecuredTouch

von SecuredTouch

(0 Bewertungen)

SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.