Cyber Security Software

Nutze Capterra.ch in Schweiz um die beste Cyber Security Software für dein Unternehmen zu finden.

Erfahre warum Capterra kostenlos ist

SecurityScorecard

SecurityScorecard

von SecurityScorecard

(0 Bewertungen)

SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The companys approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecards proprietary SaaS platform offers an unmatched breadth and depth of critical data points. Erfahre mehr über SecurityScorecard

IT Risk Management Software

IT Risk Management Software

von Risk Vision

(0 Bewertungen)

Risk Vision, a Resolver company, offers a threat-based and intelligence-driven approach to IT incident and risk management. The Risk Vision platform manages risk through a closed-loop lifecycle on identification, assessment, remediation, and monitoring processes to protect your organization from cyber attacks. Introduce new levels of IT efficiency through advanced ticketing and verification so you can prioritize and remediate quickly on the critical vulnerabilities. Erfahre mehr über IT Risk Management Software

WebTitan

WebTitan

von TitanHQ

(108 Bewertungen)

DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Erfahre mehr über WebTitan

Perimeter 81

Perimeter 81

von Safer Social

(0 Bewertungen)

Recognized as the leading business VPN, we offer a fast and cost-effective cloud service that ensures secure network access for businesses of all sizes. Deploy private VPN servers with dedicated IPs in a matter of seconds, manage multiple team members and say goodbye to expensive hardware, tedious installation and hours of help desk support. Includes a complete management portal and single-click apps for every device. Erfahre mehr über Perimeter 81

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

von Webroot Software

(41 Bewertungen)

Multi-Vektor-Schutz vor Viren und Malware, der vollständigen Schutz gegen alle heutigen hoch entwickelten Malware-Bedrohungen wie Trojaner, Keylogger, Phishing, Spyware, Hintertüren, Rootkits, Zero-Day und fortgeschrittene hartnäckige Bedrohungen bietet. Integriertes Identitäts- & Privacy Shield verhindert, dass Daten gestohlen oder erfasst werden, wenn das Internet genutzt wird, und die ausgehende Firewall verhindert ebenfalls, dass Malware deine Daten stiehlt. Du musst dir keine Sorgen um Updates machen - Cloud-basierte Sicherheit bedeutet, dass die Endpunkte immer auf dem neuesten Stand sind. Erfahre mehr über Webroot SecureAnywhere Endpoint Protection

Teramind

Teramind

von Teramind

(16 Bewertungen)

Teramind provides a user-centric security approach to monitor employee's PC behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Erfahre mehr über Teramind

Netwrix Auditor

Netwrix Auditor

von Netwrix

(75 Bewertungen)

Netwrix Auditor gives you deep insight into what unstructured data you have, who owns it, who is entitled to access it and who actually uses it. With Netwrix Auditor, you can ensure that you have all the proper access security measures in place to prevent breaches. Oversee data access and permission changes, identify users with unnecessary access and lock it down, monitor file activity and detect suspicious user behavior, manage your unstructured data and optimize storage with Netwrix Auditor. Erfahre mehr über Netwrix Auditor

Horangi Web Security Services

Horangi Web Security Services

von Horangi Cyber Security

(1 Bewertung)

Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Erfahre mehr über Horangi Web Security Services

EventSentry

EventSentry

von Netikus.net

(15 Bewertungen)

Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Erfahre mehr über EventSentry

Praetorian

Praetorian

von Praetorian

(0 Bewertungen)

As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios.

PowerBroker

PowerBroker

von BeyondTrust

(0 Bewertungen)

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management.

FICO Enterprise Security Score

FICO Enterprise Security Score

von FICO

(0 Bewertungen)

Enterprise Security Score assess the cybersecurity posture of organizations. It combines data on past and current risk vectors with external data and compares it with intelligence on the security posture seen in known breaches to provide an empirical score to: -Assess the chance of a breach in the coming 12 months. -Assess cybersecurity posture across the organization and any subsidiaries. -Assess the cybersecurity posture of third parties such as suppliers and partners.

Heimdal CORP

Heimdal CORP

von Heimdal Security

(1 Bewertung)

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.

Okta

Okta

von Okta

(99 Bewertungen)

Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure.

Hybrid Cloud Security

Hybrid Cloud Security

von Trend Micro

(10 Bewertungen)

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.

Centrify Infrastructure Services

Centrify Infrastructure Services

von Centrify

(1 Bewertung)

Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...

Crypto Complete

Crypto Complete

von HelpSystems

(1 Bewertung)

Encryption and key management system that protects IBM i data and offers field encryption and backup encryption..

Darktrace

Darktrace

von Darktrace

(1 Bewertung)

Self-configuring cyber defense system based on machine learning and probabilistic mathematics.

Barriqade

Barriqade

von TulipControls

(1 Bewertung)

Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.

ThreatAdvice

ThreatAdvice

von ThreatAdvice

(1 Bewertung)

Learning Management System for companies to educate employees on cyber security.

RedSeal

RedSeal

von RedSeal Networks

(0 Bewertungen)

Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.

Cyberator

Cyberator

von Zartech

(0 Bewertungen)

Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution

Business Suite

Business Suite

von F-Secure

(0 Bewertungen)

Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.

Hybrid Cloud Security

Hybrid Cloud Security

von Symantec

(0 Bewertungen)

Security solution for on-premises data centers and public clouds.

SandBlast Threat Emulation

SandBlast Threat Emulation

von Check Point Software Technologies

(0 Bewertungen)

CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.

Enterprise Threat Protector

Enterprise Threat Protector

von Akamai Technologies

(0 Bewertungen)

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

Threat Response

Threat Response

von Proofpoint

(0 Bewertungen)

Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

AbuseSA

AbuseSA

von Synopsys

(0 Bewertungen)

Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.

TAP

TAP

von FireEye

(0 Bewertungen)

Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

Security Intelligence Platform

Security Intelligence Platform

von Exabeam

(0 Bewertungen)

Security management and operations platform with detection, analytics, and response capabilities.

GreySpark

GreySpark

von FourV Systems

(0 Bewertungen)

Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.

Fidelis Elevate

Fidelis Elevate

von Fidelis Cybersecurity

(0 Bewertungen)

Automated threat detection and response platform that protects both network and endpoint devices.

inDefend

inDefend

von DataResolve Technologies

(0 Bewertungen)

Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.

Techefix

Techefix

von Techefix

(0 Bewertungen)

Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.

Securonix UEBA 6.0

Securonix UEBA 6.0

von Securonix

(0 Bewertungen)

Securonix UEBA 6.0 is purpose-built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyze and cross-correlate all interactions between users, systems, and data to detect insider threats, cyber threats, fraud, cloud data compromise and noncompliance.

Avanan Cloud Security Platform

Avanan Cloud Security Platform

von Avanan

(0 Bewertungen)

Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users.

Voxility DDoS Protection

Voxility DDoS Protection

von Voxility

(0 Bewertungen)

1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites

Ericom Shield

Ericom Shield

von Ericom Software

(0 Bewertungen)

Browser Isolation technology that prevents malware and zero-day attacks.

Apility.io

Apility.io

von Apility.io

(0 Bewertungen)

Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

CDCAT®

CDCAT®

von APMG International

(0 Bewertungen)

CDCAT provides a comprehensive cyber security strategy and capability improvement service.

Snyk

Snyk

von Snyk

(0 Bewertungen)

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.

Business VPN

Business VPN

von KeepSolid

(0 Bewertungen)

Business VPN by KeepSolid is the top tool for enterprises of any scale. Along with unmatched data protection and anti-throttling qualities, it also presents a super-handy opportunity to look at online resources from the eyes of residents of other locations. Test ad campaigns, international products and websites, and much more!

Virus Vanish

Virus Vanish

von DigitalBulls

(0 Bewertungen)

Free tool that scans your computer for viruses, malware, spyware, and other threats.