Cyber Security Software
Nutze Capterra.ch in Schweiz um die beste Cyber Security Software für dein Unternehmen zu finden.
Barkly ersetzt das herkömmliche Antivirusprogramm mit dem stärksten Schutz, der intelligentesten Technologie und der einfachsten Verwaltung. Barkly blockiert Angriffe bei allen Vektoren und Absichten, einschließlich Exploits, Skripte, ausführbare Dateien und Ransomware. Die patentierte Drei-Ebenen-Architektur von Barkly bietet eine unübertroffene Transparenz auf allen Ebenen des Systems, einschließlich der CPU, um Angriffe zu blockieren. Barkly ist unglaublich einfach zu verwalten und zu implementieren: Es sind keine Richtlinien, Konfigurationen oder Sicherheitskenntnisse erforderlich. Erfahre mehr über Barkly
von Risk Vision
RiskVision von Resolver arbeitet beim IT-Risiko- und Compliancemanagement mit einem gefährdungs- und informationsbasierten Ansatz. Risiken werden in einem geschlossenen Kreislauf aus Erkennungs-, Einschätzungs-, Abhilfe- und Überwachungsprozessen verwaltet, um das Unternehmen vor Cyberangriffen zu schützen. So erreicht man neue Dimensionen der IT-Effizienz und durchgängige Compliance mit mehreren Regulierungs- und Kontrollmechanismen. Erfahre mehr über IT Risk Management Software
von Webroot Software
Multi-Vektor-Schutz vor Viren und Malware, der vollständigen Schutz gegen alle heutigen hoch entwickelten Malware-Bedrohungen wie Trojaner, Keylogger, Phishing, Spyware, Hintertüren, Rootkits, Zero-Day und fortgeschrittene hartnäckige Bedrohungen bietet. Integriertes Identitäts- & Privacy Shield verhindert, dass Daten gestohlen oder erfasst werden, wenn das Internet genutzt wird, und die ausgehende Firewall verhindert ebenfalls, dass Malware deine Daten stiehlt. Du musst dir keine Sorgen um Updates machen - Cloud-basierte Sicherheit bedeutet, dass die Endpunkte immer auf dem neuesten Stand sind. Erfahre mehr über Webroot SecureAnywhere Endpoint Protection
DNS-basierte Web-Inhaltsfilter blockiert Malware, Ransomware und Phishing-Versuche und stellt Webinhaltskontrolle bereit. Wir filtern über 1/2 Milliarden DNS-Anfragen täglich, identifizieren 60.000 Malware-Iterationen pro Tag und haben mehr als 7.500 Kunden. Cloud und Gateway-Versionen stehen zur Verfügung. Verbessere Deine Cybersicherheit jetzt. Nutze die kostenlose Testversion von WebTitan heute, inkl. Support. Erfahre mehr über WebTitan
ThirdPartyTrust is a cybersecurity solution to ensure the biggest threat - your partners, vendors and third parties - are maintaining the best security posture. Assess your vendor holistically using data integrations like SecurityScorecard and ArgosRisk, custom and pre-built questionnaires, and storage for insurances, SOC reports and penetration tests. Erfahre mehr über ThirdPartyTrust
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Erfahre mehr über ESET Endpoint Security
Teramind bietet einen benutzerzentrierten Sicherheitsansatz, um das Mitarbeiter-PC-Verhalten zu überwachen. Unsere Software optimiert die Mitarbeiter-Datenerfassung, um verdächtige Aktivitäten zu identifizieren, mögliche Bedrohungen zu erkennen, die Effizienz der Mitarbeiter zu überwachen und die Industrie der Einhaltung sicherzustellen. Wir helfen, Vorfälle, die die Sicherheit gefährden, zu reduzieren, indem wir Echtzeit-Zugriff auf Benutzeraktivitätenm Bereitstellung von Warnungen, Warnungen, Umleitungen und Benutzer-Lock-outs, um dein Geschäft so effizient und sicher wie möglich auszuführen. Erfahre mehr über Teramind
Netwrix Auditor gives you deep insight into what unstructured data you have, who owns it, who is entitled to access it and who actually uses it. With Netwrix Auditor, you can ensure that you have all the proper access security measures in place to prevent breaches. Oversee data access and permission changes, identify users with unnecessary access and lock it down, monitor file activity and detect suspicious user behavior, manage your unstructured data and optimize storage with Netwrix Auditor. Erfahre mehr über Netwrix Auditor
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Erfahre mehr über ComplyAssistant
von Horangi Cyber Security
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Erfahre mehr über Horangi Web Security Services
Marshal is a free, online privacy tool that connects to your cloud services (Box, Dropbox, Google Drive, Microsoft OneDrive, Onehub) to uncover any exposed sensitive data you are sharing. Within minutes, Marshal delivers a secure, sanitized report outlining any exposed Social Security Numbers, credit card numbers, email addresses or phone numbers you are sharing. Erfahre mehr über Marshal
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Erfahre mehr über Log360
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios.
SiteLock is the Global Leader in website security, currently protecting more than five million websites. The company provides advanced, cloud-based security solutions for organizations of all sizes. SiteLock products include daily scanning with automatic malware removal, a managed web application firewall with a global CDN for a blazing fast website, advanced DDoS protection and an unrivaled 24/7 U.S. based phone support staff.
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management.
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues.
Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security and end-to-end-encryption. All data is end-to-end encrypted without Crypho or anyone else having access to the encryption keys. There is no way for Crypho or a third party to gain access to any of the data. Even if the data is intercepted, stolen or seized, it is worthless without access to the members keys.
Enterprise Security Score assess the cybersecurity posture of organizations. It combines data on past and current risk vectors with external data and compares it with intelligence on the security posture seen in known breaches to provide an empirical score to: -Assess the chance of a breach in the coming 12 months. -Assess cybersecurity posture across the organization and any subsidiaries. -Assess the cybersecurity posture of third parties such as suppliers and partners.
Okta ist der führende Anbieter von Identität für das Unternehmen. Die Okta Identity Cloud verbindet und schützt Mitarbeiter vieler der weltweit größten Unternehmen. Sie verbindet Unternehmen auch sicher mit ihren Partnern, Lieferanten und Kunden. Mit der umfassenden Integration in über 5.000 Apps ermöglicht die Okta Identity Cloud einen einfachen und sicheren Zugriff von jedem Gerät aus. Tausende von Kunden, darunter Experian, 20th Century Fox, LinkedIn und Adobe, vertrauen darauf, dass Okta schneller arbeitet, den Umsatz steigert und sicher bleibt.
Tandem Security & Compliance Software by CoNetrix is an innovative suite of information security and compliance management tools used by more than 1400 U.S. financial institutions. Modules include: Risk Assessment, Policies, Business Continuity Planning, Vendor Management, Social Media Management, Audit Management, Phishing, Cybersecurity, and more. Software features include secure document storage, unlimited users, roles & responsibilities, tasks, email reminders, and incredible support.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...
ThreatAdvice's affordable, best in class cyber education and awareness platform will help you to understand the vulnerabilities and risks your business faces and will arm you with the knowledge and tools to protect your organization. Our team of cyber experts become your full-time cybersecurity partner through comprehensive employee cyber education, a 24/7 cyber hotline, emergency data response, ongoing risk awareness through phishing campaigns, cyber policies and procedures library, and more.
von Safer Social
Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community.
Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more!
von Argent Software
Let us show you how to monitor AWS and local machines on a single pane of glass. S3: Intelligent folder management with configurable alerts. EC2: Go beyond Amazon's limited console. The new Argent for AWS provides native monitoring and security for all your cloud apps, well beyond Amazon's 14 day limit. Click to schedule your free demo.
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The companys approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecards proprietary SaaS platform offers an unmatched breadth and depth of critical data points.
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need.
von CyberSaint Security
The CyberStrong Platform implements the language of cyber for the future of business. Empower your team to streamline continuous compliance and risk management with CyberStrong's unparalleled time-to-value, breakthrough AI and Machine Learning, and agile workflow. Get instant visibility into any combination of compliance standards and experience what immediate cybersecurity ROI feels like. Get a Free Demo: https://www.cybersaint.io
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution
Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance.
Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users.
von NetLib Security
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers. LoginCat gives you complete protection from malware, zero-day exploit or be it any other cyberattack. LoginCat eliminate passwords and use patented passphrase technology which is many magnitudes safer.
von Cobweb Security
The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats We use encryption to hide all the components of your website from hackers. It is importance of this function is crucial. The fact that hackers penetrate your site through known vulnerabilities finding them by using a simple Google search.
OUTSCAN is an automated vulnerability management solution scanning and securing external networks, and allowing companies to protect their sensitive data. It analyzes the environment, detects vulnerabilities, notifies organisations and gives solution to remediate in order to prevent cybercriminals from penetrating their networks. OUTSCAN is easy to deploy as aSaaS solution, but Outpost24 expert team can help to implement it if necessary. The customer support is also available 24/7.