Logiciels de sécurité informatique

Un logiciel de sécurité informatique automatise la sécurité et la surveillance des systèmes informatiques. Cette application analyse et surveille le réseau informatique d'une entreprise pour évaluer les vulnérabilités potentielles. De plus, elle offre des solutions de sécurité réseau personnalisables, ainsi que des solutions préconfigurées pour diverses normes réglementaires. Ce type de logiciel fournit des reporting en temps réel sur la sécurité du réseau, ainsi que des rapports d'incidents relatifs à des violations potentielles de la sécurité. Voir aussi : logiciel de sécurité réseau.

Pourquoi Capterra est gratuit

OneLogin

OneLogin

par OneLogin

(25 avis)

Destiné aux entreprises comptant plus de 100 utilisateurs, OneLogin propose une solution de gestion des identités et des accès (IAM) basée sur le cloud qui offre des authentifications uniques (SSO) simples. Il permet aux entreprises de sécuriser et de gérer plus facilement l'accès aux applications web aussi bien en cloud que derrière un pare-feu. Votre entreprise travaille avec au moins trois logiciels en tant que service (SaaS) ou applications web internes ? Alors la sécurité offerte par la solution OneLogin à authentification unique basée sur le cloud est faite pour vous. En savoir plus sur OneLogin

Solutions de gestion des identités (GIA) et des signatures uniques (SSO) pour les entreprises de toutes tailles. Démarrez immédiatement avec la version d'essai gratuite. En savoir plus sur OneLogin

MetaPhish

MetaPhish

par MetaCompliance

(1 avis)

The MetaPhish product has the ability to originate emails from a set of prepopulated simulated phishing domains. The software contains a library of smart learning experiences such as infographics, notices and training videos. Unlike other phishing solutions, the software allows the user to attest or communicate back to the administrator. En savoir plus sur MetaPhish

MetaPhish has the ability to originate emails from a set of prepopulated simulated phishing domains. En savoir plus sur MetaPhish

Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

par Webroot Software

(93 avis)

Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles comme les trojans, les keyloggers, le phishing, les logiciels espions, les backdoors, les rootkits (malwares furtifs), les zero-days et les menaces persistantes avancées. La protection de l'identité et des données personnelles incluse dans le logiciel empêche le vol ou l'enregistrement des données pendant l'activité en ligne, et le pare-feu outbound défend les données contre les vols par malware. Pas besoin de vous charger ni de vous préoccuper des mises à jour : grâce à la sécurité basée sur le cloud, les points terminaux sont toujours à jour. En savoir plus sur Webroot SecureAnywhere Endpoint Protection

Protection multivectorielle contre les virus et les logiciels malveillants offrant une protection complète contre toutes les menaces malware sophistiquées actuelles. En savoir plus sur Webroot SecureAnywhere Endpoint Protection

SolarWinds Threat Monitor

SolarWinds Threat Monitor

par SolarWinds MSP

(0 avis)

SolarWinds Threat Monitor (édition pour les prestataires de services) est une plateforme rapide, évolutive et basée sur le cloud, conçue pour permettre aux prestataires d'infogérance soucieux de la sécurité de disposer d'un outil unifié pour surveiller les journaux d'analyse des menaces des réseaux gérés et les comparer aux informations d'analyse des dernières menaces du monde entier. Neutralisez rapidement les menaces de votre client et préparez les informations nécessaires pour démontrer sa conformité aux normes définies par les organismes de réglementation. En savoir plus sur SolarWinds Threat Monitor

SolarWinds® Threat Monitor est l'outil nécessaire pour détecter, neutraliser et signaler les événements de sécurité sur tous vos réseaux gérés. En savoir plus sur SolarWinds Threat Monitor

Avast Business Antivirus Pro Plus

Avast Business Antivirus Pro Plus

par Avast

(343 avis)

Avast Business Antivirus Pro Plus est un puissant module de protection des terminaux et des serveurs tout-en-un pour les petites et moyennes entreprises (idéal pour 1 à 200 employés). Fonctionne sur PC, Mac et serveurs. Le produit est amélioré avec 18 fonctions de pointe pour assurer la sécurité de l'entreprise. Comprend un puissant antivirus, serveur, sécurité de messagerie et de réseau, cybercapture, pare-feu, gestionnaire de mots de passe, VPN et bien plus encore. Il peut être utilisé avec ou sans console cloud. Au choix. En savoir plus sur Avast Business Antivirus Pro Plus

Solution antivirus primée tout-en-un prête à protéger toutes les parties de l'entreprise. Disponible pour PC, Mac et serveurs. En savoir plus sur Avast Business Antivirus Pro Plus

JumpCloud DaaS

JumpCloud DaaS

par JumpCloud

(3 avis)

JumpCloud Directory-as-a-Service, c'est Active Directory et LDAP réinventés. JumpCloud gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux. JumpCloud gère les utilisateurs et leurs systèmes sous Mac, Linux ou Windows et fournit un accès aux ressources dans le cloud et sur site tel qu'Office 365, Suite G, AWS, Salesforce et Jira. Le même login connecte les utilisateurs aux réseaux et aux partages de fichiers via RADIUS et Samba, respectivement, en sécurisant le WiFi de votre entreprise. En savoir plus sur JumpCloud DaaS

JumpCloud Directory-as-a-Service gère et connecte en toute sécurité vos utilisateurs à leurs systèmes, applications, fichiers et réseaux. En savoir plus sur JumpCloud DaaS

WebTitan

WebTitan

par TitanHQ

(163 avis)

Filtre de contenu web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web. Ils filtrent plus d'un demi-milliard de requêtes DNS chaque jour, identifient 60 000 itérations de programmes malveillants par jour et comptent plus de 7 500 clients. Versions cloud et passerelle disponibles. Améliorez votre réseau et sécurité informatique maintenant. Faites un essai gratuit de WebTitan dès aujourd'hui, support compris. En savoir plus sur WebTitan

Filtre web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web En savoir plus sur WebTitan

Teramind

Teramind

par Teramind

(48 avis)

Teramind propose une approche de la sécurité centrée sur l'utilisateur pour surveiller le comportement de votre employé sur son PC. Ce logiciel rationalise la collecte des données des employés afin d'identifier les activités suspectes, de détecter les menaces éventuelles, de surveiller l'efficacité des employés et d'assurer la conformité du secteur. Il contribue à réduire les incidents de sécurité en fournissant un accès en temps réel aux activités des utilisateurs et en proposant des alertes, des avertissements, des redirections et des verrouillages d'utilisateurs pour que votre entreprise soit aussi efficace et sécurisée que possible. En savoir plus sur Teramind

Testez la version d'essai gratuite. Teramind simplifie la surveillance de l'activité de l'utilisateur et la prévention du vol de données. En savoir plus sur Teramind

Passworks

Passworks

par Certero

(1 avis)

Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. En savoir plus sur Passworks

Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. En savoir plus sur Passworks

Veriato RansomSafe

Veriato RansomSafe

par Veriato 360

(4 avis)

Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. En savoir plus sur Veriato RansomSafe

Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. En savoir plus sur Veriato RansomSafe

AVG Antivirus Business Edition

AVG Antivirus Business Edition

par AVG

(446 avis)

AVG Antivirus Business Edition 2018 protège les données de votre entreprise et de vos clients contre les rançongiciels, les virus, les logiciels malveillants et les épidémies en temps réel. Il est alimenté par de nouvelles fonctionnalités basées sur le cloud telles que CyberCapture, une détection améliorée des logiciels malveillants et un bouclier web amélioré. Ce produit inclut également une gestion à distance gratuite et un excellent reporting. L'interface utilisateur du client est également mise à jour. Disponible pour les PC Windows, les ordinateurs de bureau et les serveurs. AVG offre une assistance téléphonique gratuite 24h/24, 7j/7 à ses clients. En savoir plus sur AVG Antivirus Business Edition

AVG Antivirus Business Edition 2018 protège vos PME et vos données clients contre les menaces en ligne et en temps réel. En savoir plus sur AVG Antivirus Business Edition

TunnelBear

TunnelBear

par TunnelBear

(68 avis)

TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.

TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.

mSpy

mSpy

par mSpy

(6 avis)

Une application de surveillance et de sécurité pour examiner l'activité des utilisateurs et mesurer leur productivité.

Une application de surveillance et de sécurité pour examiner l'activité des utilisateurs et mesurer leur productivité.

VyprVPN

VyprVPN

par Golden Frog

(18 avis)

Gère son propre réseau et possède le matériel requis pour offrir le plus rapide débit de VPN au monde.

Gère son propre réseau et possède le matériel requis pour offrir le plus rapide débit de VPN au monde.

AVG Internet Security

AVG Internet Security

par AVG Technologies

(446 avis)

MiniTool Partition Wizard

MiniTool Partition Wizard

par MiniTool

(35 avis)

MiniTool Partition Wizard Free Edition est un gestionnaire de partitions gratuit, destiné aux particuliers et indépendants.

MiniTool Partition Wizard Free Edition est un gestionnaire de partitions gratuit, destiné aux particuliers et indépendants.

PowerBroker

PowerBroker

par BeyondTrust

(0 avis)

Une plateforme qui unifie des technologies efficaces pour faire face aux risques internes et externes : compte privilégié et gestion de la vulnérabilité.

Une plateforme qui unifie des technologies efficaces pour faire face aux risques internes et externes : compte privilégié et gestion de la vulnérabilité.

Phishme

Phishme

par Phishme

(3 avis)

Kaspersky Endpoint Security

Kaspersky Endpoint Security

par Kaspersky Lab

(236 avis)

CylancePROTECT

CylancePROTECT

par Cylance

(23 avis)

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.

Bitium

Bitium

par Bitium

(11 avis)

Access control solution for corporate apps that supports integration with third party authentication providers.

Access control solution for corporate apps that supports integration with third party authentication providers.

Internet Lock

Internet Lock

par TopLang Software

(0 avis)

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.

LogPoint

LogPoint

par LogPoint

(0 avis)

LogPoint est une solution SIEM efficace et utile pour les entreprises de toutes tailles en raison de sa conception unique et de ses nombreuses fonctionnalités.

LogPoint est une solution SIEM efficace et utile pour les entreprises de toutes tailles en raison de sa conception unique et de ses nombreuses fonctionnalités.

DeviceLock

DeviceLock

par DeviceLock

(0 avis)

Fournit à la fois un contrôle contextuel et basé sur le contenu pour une prévention maximale des fuites à un coût initial et de propriété minimum.

Fournit à la fois un contrôle contextuel et basé sur le contenu pour une prévention maximale des fuites à un coût initial et de propriété minimum.

NerveCenter

NerveCenter

par Logmatrix

(0 avis)

Delivers integrated, real-time security management in a single, seamless suite.

Delivers integrated, real-time security management in a single, seamless suite.

Indeni

Indeni

par Indeni

(12 avis)

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.

SecurityEXPERT

SecurityEXPERT

par St. Bernard Software

(0 avis)

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.

TF2000

TF2000

par ComputerProx

(0 avis)

Solution that automatically locks the system without requiring any keystrokes from the user.

Solution that automatically locks the system without requiring any keystrokes from the user.

Jscrambler

Jscrambler

par Jscrambler

(0 avis)

Laissez votre application JavaScript se protéger elle-même.

Laissez votre application JavaScript se protéger elle-même.

ADAudit Plus

ADAudit Plus

par ManageEngine

(16 avis)

ADAudit Plus est un serveur de fichiers Active Directory, Azure AD (y compris NetApp et EMC) et un logiciel de surveillance des modifications des postes de travail.

ADAudit Plus est un serveur de fichiers Active Directory, Azure AD (y compris NetApp et EMC) et un logiciel de surveillance des modifications des postes de travail.

ControlCase

ControlCase

par ControlCase

(0 avis)

Comprehensive computer security incident management system.

Comprehensive computer security incident management system.

Rohos Logon Key

Rohos Logon Key

par Tesline-Service

(0 avis)

Solutions d'authentification à deux facteurs pour Windows. Connexion sécurisée par clé USB.

Solutions d'authentification à deux facteurs pour Windows. Connexion sécurisée par clé USB.

Gemnasium

Gemnasium

par Gemnasium

(0 avis)

Cette solution de sécurité surveille les dépendances de votre projet et vous alerte en cas de mises à jour disponibles et de failles de sécurité.

Cette solution de sécurité surveille les dépendances de votre projet et vous alerte en cas de mises à jour disponibles et de failles de sécurité.

BlackFog

BlackFog

par BlackFog

(1 avis)

Security solution that manages data privacy, threat protection and tracking activity.

Security solution that manages data privacy, threat protection and tracking activity.

Security Shield

Security Shield

par PCSecurityShield

(0 avis)

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.

Nfusion

Nfusion

par Ntrepid

(0 avis)

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.

ZoneAlarm Pro

ZoneAlarm Pro

par Zone Labs

(9 avis)

Un pare-feu pour ordinateur qui protège vos données personnelles et votre vie privée des pirates informatiques et des voleurs de données.

Un pare-feu pour ordinateur qui protège vos données personnelles et votre vie privée des pirates informatiques et des voleurs de données.

FileAudit

FileAudit

par IS Decisions

(0 avis)

Suivi, audit, reporting et alertes proactives sur tous les accès aux fichiers et dossiers sur les serveurs Windows.

Suivi, audit, reporting et alertes proactives sur tous les accès aux fichiers et dossiers sur les serveurs Windows.

Network Security Auditor

Network Security Auditor

par Nsasoft

(0 avis)

Network security audit system designed to audit network and detect available security vulnerabilities in the network.

Network security audit system designed to audit network and detect available security vulnerabilities in the network.

DriveCrypt

DriveCrypt

par Securstar

(0 avis)

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.

Black Duck Hub

Black Duck Hub

par Black Duck

(28 avis)

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection

par Symantec

(28 avis)

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.

SSH Tectia

SSH Tectia

par SSH Communications Security

(3 avis)

Enables secure system administration, secure file transfer and secure application connectivity with centralized control.

Enables secure system administration, secure file transfer and secure application connectivity with centralized control.

Active Shield

Active Shield

par Security Stronghold

(1 avis)

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.

Retina Network Security Scanner

Retina Network Security Scanner

par eEye Digital Security

(0 avis)

Combines advanced scanning technology with most comprehensive vulnerability database.

Combines advanced scanning technology with most comprehensive vulnerability database.

Falcon Host

Falcon Host

par CrowdStrike

(3 avis)

Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Next-generation endpoint protection software that detects, prevents, and responds to attacks.

Invisible Secrets

Invisible Secrets

par NeoByte Solutions

(0 avis)

Logiciel de sécurité qui crypte vos données et vos fichiers pour les garder en sécurité ou les transférer en toute sécurité sur le net.

Logiciel de sécurité qui crypte vos données et vos fichiers pour les garder en sécurité ou les transférer en toute sécurité sur le net.

SecuBox

SecuBox

par Aiko Solutions

(0 avis)

Cryptage de disque AES 256 bits pour les terminaux portables Windows Embedded Compact et Windows CE et leurs cartes multimédias. Stockage sûr, sécurisé et pratique

Cryptage de disque AES 256 bits pour les terminaux portables Windows Embedded Compact et Windows CE et leurs cartes multimédias. Stockage sûr, sécurisé et pratique

AnVir Task Manager Pro

AnVir Task Manager Pro

par AnVir Software

(0 avis)

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.

Clearlogin

Clearlogin

par Evolve IP

(9 avis)

Give users streamlined access to the applications they use every day, from anywhere.

Give users streamlined access to the applications they use every day, from anywhere.

PA File Sight

PA File Sight

par Power Admin

(0 avis)

PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.

PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.

StillSecure

StillSecure

par StillSecure

(0 avis)

Security testing, monitoring and management software that defends networks from security breaches.

Security testing, monitoring and management software that defends networks from security breaches.

Fortres 101

Fortres 101

par Fortres Grand

(1 avis)

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.

NetSupport Protect

NetSupport Protect

par NetSupport

(0 avis)

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.

Fusion

Fusion

par Panda Security

(10 avis)

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.

CyberGatekeeper

CyberGatekeeper

par InfoExpress

(0 avis)

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.

Genesis

Genesis

par Internet Biometric Security Systems

(0 avis)

On demand biometric security solution for any type of internet application requiring security of confidential information.

On demand biometric security solution for any type of internet application requiring security of confidential information.

QualysGuard Enterprise

QualysGuard Enterprise

par Qualys

(2 avis)

Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

Monitors the vulnerability management process, tracks remediation and ensures policy compliance.

eScan ISS

eScan ISS

par MicroWorld Technologies

(1 avis)

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.

LiveEnsure

LiveEnsure

par LiveEnsure

(0 avis)

Authenticates users through their mobile device, location, knowledge and behavior.

Authenticates users through their mobile device, location, knowledge and behavior.

Secret Server Password Manager

Secret Server Password Manager

par Thycotic Software

(11 avis)

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets.

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets.

RSA Keon

RSA Keon

par RSA Security

(4 avis)

Public key infrastructure; enables, manages and simplifies the use of digital certificates.

Public key infrastructure; enables, manages and simplifies the use of digital certificates.

GamaScan

GamaScan

par GamaSec

(2 avis)

Website security test to protect application and server against hackers.

Website security test to protect application and server against hackers.

Saint Security Suite

Saint Security Suite

par SAINT

(2 avis)

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.

Tripwire for Servers

Tripwire for Servers

par Tripwire

(0 avis)

Detect intentional tampering, user error, software failure, and introductions of malicious software.

Detect intentional tampering, user error, software failure, and introductions of malicious software.

AccuHash

AccuHash

par Viwal Interactive

(0 avis)

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.

G Data Internet Security 2013

G Data Internet Security 2013

par G Data Software

(2 avis)

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.

Egosecure Endpoint

Egosecure Endpoint

par Egosecure

(0 avis)

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.

CipherCloud for Salesforce

CipherCloud for Salesforce

par CipherCloud

(3 avis)

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.

BorderWare Firewall Server

BorderWare Firewall Server

par BorderWare Technologies

(1 avis)

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.

NetIQ Sentinel 7

NetIQ Sentinel 7

par NetIQ

(1 avis)

Make decisive, appropriate responses to incidents by automating identification and resolution processes.

Make decisive, appropriate responses to incidents by automating identification and resolution processes.

Beacon

Beacon

par Great Bay Software

(1 avis)

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.

Secure Hive

Secure Hive

par Secure Hive

(0 avis)

Create encrypted archives and self-extracting .exe files for secure storage and file sharing.

Create encrypted archives and self-extracting .exe files for secure storage and file sharing.

Validian Protect

Validian Protect

par Validian

(0 avis)

Manages all crucial security functions, including authentication, encryption and addressing.

Manages all crucial security functions, including authentication, encryption and addressing.

TweakEasy Professional

TweakEasy Professional

par WinSetter

(0 avis)

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.

CimTrak Integrity Suite

CimTrak Integrity Suite

par Cimcor

(0 avis)

A comprehensive security software application that is easy to deploy and scales to the largest of global networks.

A comprehensive security software application that is easy to deploy and scales to the largest of global networks.

Viewfinity Application Control

Viewfinity Application Control

par Viewfinity

(0 avis)

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.

Advanced Security Manager

Advanced Security Manager

par Nexvue

(0 avis)

Now NexVue makes 2FA available for Acumatica.

Now NexVue makes 2FA available for Acumatica.

GlassWire

GlassWire

par GlassWire

(13 avis)

Helps protect your computer network and privacy via network monitoring and a built in firewall management tool.

Helps protect your computer network and privacy via network monitoring and a built in firewall management tool.

ForeScout CounterACT Edge

ForeScout CounterACT Edge

par ForeScout Technologies

(3 avis)

Security hardware that monitors the perimeter and preempts targeted attacks.

Security hardware that monitors the perimeter and preempts targeted attacks.

Vera

Vera

par Vera

(2 avis)

Vera secures any kind of data, wherever it goes

Vera secures any kind of data, wherever it goes

iLock Security Services

iLock Security Services

par 2AB

(1 avis)

Centralized management of users, groups and roles, role-based access control, entitlements and access policies.

Centralized management of users, groups and roles, role-based access control, entitlements and access policies.

Spoon

Spoon

par Spoon

(1 avis)

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.

Trust Lockdown

Trust Lockdown

par White Cloud Security

(1 avis)

App trust-listing technology. Protects your systems by only allowing trusted applications to execute.

App trust-listing technology. Protects your systems by only allowing trusted applications to execute.

Promisec Endpoint Manager 4.12

Promisec Endpoint Manager 4.12

par Promisec

(1 avis)

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.

OpaqueVEIL

OpaqueVEIL

par TecSec

(0 avis)

Enables access to information through encryption, providing information security, privacy and confidentiality.

Enables access to information through encryption, providing information security, privacy and confidentiality.

Identity & Access Manager

Identity & Access Manager

par Evidian

(0 avis)

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.

WiKID Authentication System

WiKID Authentication System

par WiKID Systems

(0 avis)

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.

Secure CommNet

Secure CommNet

par Radient Software

(0 avis)

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.

MemberProtect

MemberProtect

par InetSolution

(0 avis)

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.

IntelliTrack Network

IntelliTrack Network

par Soni-Soft

(0 avis)

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.

Calyx Suite

Calyx Suite

par Open Seas

(0 avis)

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.

Security Services Platform

Security Services Platform

par Edgeos

(0 avis)

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.

IMCrypto Pro

IMCrypto Pro

par Global Information Technology

(0 avis)

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.

PlatinumCache

PlatinumCache

par DTS

(0 avis)

Secures the Windows Operating System from unwanted or malicious writes.

Secures the Windows Operating System from unwanted or malicious writes.

SyncBoss

SyncBoss

par SecurePro Software

(0 avis)

File Synchronization Application and Cloud Storage.

File Synchronization Application and Cloud Storage.

XyLoc Security Server

XyLoc Security Server

par Ensure Technologies

(0 avis)

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.

Trustifier KSE

Trustifier KSE

par Trustifier

(0 avis)

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.

Data Rover EP

Data Rover EP

par Mission2Mars

(0 avis)

Calculates the Effective Permissions on Microsoft Windows File Servers.

Calculates the Effective Permissions on Microsoft Windows File Servers.

Secure Hunter Business

Secure Hunter Business

par Secure Hunter

(0 avis)

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.

Appvigil

Appvigil

par Wegilant

(0 avis)

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest.

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest.

Cofactor Kite

Cofactor Kite

par Cofactor Computing

(0 avis)

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.

Specops Password Sync

Specops Password Sync

par Specops Software

(0 avis)

Fights password fatigue by reducing number of passwords to remember

Fights password fatigue by reducing number of passwords to remember

Votiro Secure Email Gateway

Votiro Secure Email Gateway

par Votiro

(0 avis)

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.

Siwenoid

Siwenoid

par Siwena

(0 avis)

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.

iSafeSend

iSafeSend

par DMS Companies

(0 avis)

iSafeSend enables you to securely share sensitive information through a one-time use link.

iSafeSend enables you to securely share sensitive information through a one-time use link.

EntryProtect

EntryProtect

par SentryBay

(0 avis)

Provides real-time protection of user data from malware and phishing attacks

Provides real-time protection of user data from malware and phishing attacks

NordVPN

NordVPN

par NordVPN

(92 avis)

NordVPN applique un cryptage fort à tout votre trafic Internet afin qu'aucun tiers ne puisse violer vos communications professionnelles.

NordVPN applique un cryptage fort à tout votre trafic Internet afin qu'aucun tiers ne puisse violer vos communications professionnelles.

bitdefender GravityZone

bitdefender GravityZone

par bitdefender

(54 avis)

McAfee E-Business Server

McAfee E-Business Server

par McAfee

(27 avis)

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.

Windscribe

Windscribe

par Windscribe

(18 avis)

Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.

Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.

EventSentry

EventSentry

par Netikus.net

(16 avis)

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities.

F-Secure VPN+

F-Secure VPN+

par F-Secure

(6 avis)

Provides strong encryption, supports multiple protocols, security standards & authentication methods.

Provides strong encryption, supports multiple protocols, security standards & authentication methods.

Avast Business CloudCare

Avast Business CloudCare

par Avast

(5 avis)

Deliver powerful, layered protection to multiple customers quickly and easily.

Deliver powerful, layered protection to multiple customers quickly and easily.

Prey

Prey

par Prey

(4 avis)

A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM

A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM

Hushmail

Hushmail

par Hushmail

(3 avis)

Un service de messagerie sécurisé qui vous permet d'envoyer et de recevoir des e-mails et des pièces jointes cryptés et privés à destination et en provenance de n'importe qui.

Un service de messagerie sécurisé qui vous permet d'envoyer et de recevoir des e-mails et des pièces jointes cryptés et privés à destination et en provenance de n'importe qui.

EventLog Analyzer

EventLog Analyzer

par ManageEngine

(3 avis)

Fournit le logiciel SIEM (Security Information and Event Management) le plus rentable sur le marché.

Fournit le logiciel SIEM (Security Information and Event Management) le plus rentable sur le marché.

Firewall-1

Firewall-1

par Check Point Software Technologies

(2 avis)

Pare-feu qui assure le contrôle d'accès, la sécurité du contenu, l'authentification et la gestion centralisée.

Pare-feu qui assure le contrôle d'accès, la sécurité du contenu, l'authentification et la gestion centralisée.

Cisco Cloudlock

Cisco Cloudlock

par Cisco Cloudlock

(2 avis)

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise

HackerOne

HackerOne

par HackerOne

(2 avis)

CWIS Security Antivirus Scanner

CWIS Security Antivirus Scanner

par Cobweb Security

(2 avis)

Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.

Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.

Web Security Appliance

Web Security Appliance

par IronPort

(1 avis)

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.

modusGate

modusGate

par Vircom

(1 avis)

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate.

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate.

End-user IT Analytics

End-user IT Analytics

par Nexthink

(1 avis)

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.

SpyShelter Anti-Keylogger

SpyShelter Anti-Keylogger

par SpyShelter

(1 avis)

Protège des logiciels espions et de surveillance, y compris les enregistreurs de frappe, les enregistreurs de caméra et les logiciels financiers malveillants.

Protège des logiciels espions et de surveillance, y compris les enregistreurs de frappe, les enregistreurs de caméra et les logiciels financiers malveillants.

Powertech Security Software

Powertech Security Software

par HelpSystems

(1 avis)

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.

Bodi

Bodi

par Pilixo

(1 avis)

Augmentez la productivité des employés, découragez les menaces internes et améliorez la sécurité des données pour répondre aux exigences de conformité strictes.

Augmentez la productivité des employés, découragez les menaces internes et améliorez la sécurité des données pour répondre aux exigences de conformité strictes.

Barracuda Web Security Gateway

Barracuda Web Security Gateway

par Barracuda Networks

(1 avis)

Making Web Browsing Safe

Making Web Browsing Safe

Network Security Manager

Network Security Manager

par Intellitactics

(0 avis)

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats.

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats.

Snorkel-Server

Snorkel-Server

par Odyssey Technologies

(0 avis)

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.

PureSight CSDK/OEM

PureSight CSDK/OEM

par PureSight Technologies

(0 avis)

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.

Net Monitor for Employees

Net Monitor for Employees

par EduIQ.com

(0 avis)

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.

east-tec Eraser

east-tec Eraser

par East-Tec

(0 avis)

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway

par Clearswift

(0 avis)

The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss

The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss

RDS-Shield

RDS-Shield

par Marty Soft Conception

(0 avis)

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

Anti-Executable

Anti-Executable

par Faronics

(0 avis)

Faronics Anti-Executable garantit la productivité totale des terminaux en autorisant uniquement l'exécution d'applications approuvées sur un ordinateur ou un serveur.

Faronics Anti-Executable garantit la productivité totale des terminaux en autorisant uniquement l'exécution d'applications approuvées sur un ordinateur ou un serveur.

OX Guard

OX Guard

par Open-Xchange

(0 avis)

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.

Cyberator

Cyberator

par Zartech

(0 avis)

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap

ThreatSentry

ThreatSentry

par Privacyware

(0 avis)

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.

CISS Forza

CISS Forza

par SAI Technology

(0 avis)

A computer security solution that limits incorrect employee access privileges and responds to malicious activity.

A computer security solution that limits incorrect employee access privileges and responds to malicious activity.

SERVERWAT.CH Security Scanner

SERVERWAT.CH Security Scanner

par SERVERWAT.CH Security Scanner

(0 avis)

Schedule vulnerability scans for your servers and get notified when it's time to call your admin.

Schedule vulnerability scans for your servers and get notified when it's time to call your admin.

GridinSoft Anti-Malware

GridinSoft Anti-Malware

par Gridinsoft

(0 avis)

Une solution de sécurité réseau pour nettoyer le système des virus, aider à restaurer les performances de l'ordinateur et plus encore.

Une solution de sécurité réseau pour nettoyer le système des virus, aider à restaurer les performances de l'ordinateur et plus encore.

BlueFiles

BlueFiles

par Forecomm

(0 avis)

Envoyez vos données sensibles en toute confidentialité de manière simple et rapide.

Envoyez vos données sensibles en toute confidentialité de manière simple et rapide.

BitRaser

BitRaser

par Stellar Data Recovery

(0 avis)

BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.

BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.

Encryptionizer

Encryptionizer

par NetLib Security

(0 avis)

Transparent Data Encryption for any application or database on the Windows Platform.

Transparent Data Encryption for any application or database on the Windows Platform.

Cornerstone MFT Server

Cornerstone MFT Server

par South River Technologies

(0 avis)

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.

SecureCircle

SecureCircle

par SecureCircle

(0 avis)

SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.

SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.

Ransomware Defender

Ransomware Defender

par ShieldApps Software Development

(0 avis)

Scans, detects and protects from ransomware malicious attempts.

Scans, detects and protects from ransomware malicious attempts.

SecuredTouch

SecuredTouch

par SecuredTouch

(0 avis)

SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.

SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.

Driver Genius 18 Professional

Driver Genius 18 Professional

par Avanquest Software

(0 avis)

Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance

Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance

NCR Network & Security Services

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

RollBack Rx Pro

RollBack Rx Pro

par Horizon Datasys

(0 avis)

A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.

A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.

VMRay

VMRay

par VMRay

(0 avis)

VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.

VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.

IPdiva Cleanroom

IPdiva Cleanroom

par Systancia

(0 avis)

IPdiva Cleanroom is the combination of both Virtual Desktop Infrastructure (VDI) and Privileged

IPdiva Cleanroom is the combination of both Virtual Desktop Infrastructure (VDI) and Privileged