477 resultados
¿Por qué es gratis Capterra?
ThreatCop is an AI/ML-based security attack simulator and awareness tool that assesses the real-time threat posture
ThreatCop is a cyber security simulator and awareness tool that launches dummy cyber attacks on employees followed with awareness modules and gamified assessment. It simulates and imparts customized awareness based on top 6 attack vectors namely Phishing, Ransomware, Vishing, SMiShing, Cyber Scam and Removable Media. It compares the pre and post cybersecurity awareness levels of employees and provides a comprehensive report on individual user awareness as 'Employee Vulnerability Score (EVS)'
ThreatCop is a cyber security simulator and awareness tool that launches dummy cyber attacks on employees followed with awareness modules and gamified assessment. It simulates and imparts customized...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Employee cyber risk management platform which identifies, risks and analyzes and evaluates employee knowledge gaps in cybersecurity
Comprehensive management of human cyber risk: 1.- Assess Cyber Awareness and Strengthening Needs Monthly chatbot guided sessions and situational decisions between Employees and Platform 2.- Execute personalized awareness itineraries Specific content for the needs of each person Tailor-made contents packages 3.-Phishing Campaign Simulation, automated and personalis for each employee 4.- Mitigate Cyber Risk Delivers the best actions to reduce organizations risk
Comprehensive management of human cyber risk: 1.- Assess Cyber Awareness and Strengthening Needs Monthly chatbot guided sessions and situational decisions between Employees and Platform 2.- Execute...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Aborda las cuestiones de privacidad, residencia, seguridad y problemas de cumplimiento de los datos para que las organizaciones puedan implementar Salesforce con confianza.
CipherCloud for Salesforce resuelve los problemas de privacidad, residencia, seguridad y cumplimiento de datos para que las organizaciones puedan implementar Salesforce con confianza. La solución CipherCloud entiende los metadatos de Salesforce y brinda a las organizaciones la capacidad de etiquetar fácilmente cualquier campo, archivo y adjunto estándar y personalizado como confidenciales. Una vez configurada, la solución CipherCloud protege estos datos y evita que se filtren a usuarios no autorizados, mientras trabaja a la perfección con Salesforce.
CipherCloud for Salesforce resuelve los problemas de privacidad, residencia, seguridad y cumplimiento de datos para que las organizaciones puedan implementar Salesforce con confianza. La solución...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
La plataforma SIEM (información de seguridad y gestión de eventos, por sus siglas en inglés) de LogPoint ayuda a las empresas a proteger sus datos ante intrusiones y responder ante ciberataques de conformidad con las normas regulatorias.
LogPoint proporciona un análisis de datos de alta velocidad, preciso y fácil de usar para detectar y responder a amenazas de forma segura aplicando reglas de correlación en tiempo real y minimizando los falsos positivos. Detecta amenazas avanzadas y reduce el tiempo de investigación con UEBA (análisis del comportamiento del usuario y de la entidad, por sus siglas en inglés) para todas las fuentes de datos. La creación de informes enriquecidos proporciona la inteligencia práctica que necesitas para tomar las decisiones correctas más rápido.
LogPoint proporciona un análisis de datos de alta velocidad, preciso y fácil de usar para detectar y responder a amenazas de forma segura aplicando reglas de correlación en tiempo real y minimizando...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported.
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Su diseño se orienta a ayudar a las organizaciones a cumplir con los desafíos del mantenimiento de registros, la supervisión y el descubrimiento electrónico.
Diseñada para ayudar a las organizaciones a cumplir con los desafíos del mantenimiento de registros, la supervisión y el descubrimiento electrónico, la plataforma de archivado de Smarsh proporciona un repositorio unificado y listo para búsquedas de todas las comunicaciones electrónicas archivadas, lo que incluye correo electrónico, redes sociales, mensajería instantánea, mensajes móviles/de texto y contenido web. El contenido se ingresa, se indexa y se conserva en su formato original y se pone a disposición para la búsqueda, revisión y producción.
Diseñada para ayudar a las organizaciones a cumplir con los desafíos del mantenimiento de registros, la supervisión y el descubrimiento electrónico, la plataforma de archivado de Smarsh proporciona...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming over 45 OSINT feeds, equating to over one million IPs, domains, and URLs that are searchable for free on our website. A dedicated solution is available for enterprise customers who want to manage private or vendor-provided threat intelligence without sharing to the community.
Pulsedive is an analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats. Pulsedive is currently consuming...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Axonius is a cybersecurity asset management platform used to strengthen security, IT operations, and risk management.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with hundreds of security, management, and IT solutions, Axonius deploys in hours (not weeks) to improve security and IT operations, threat and vulnerability management, incident response, and security posture assessment.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security coverage gaps, and automatically validates and enforces security...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Cloud Control automatiza la seguridad en la nube y la supervisión y gestión del cumplimiento.
Cloud Control es una plataforma de protección de cargas de trabajo e infraestructura en la nube totalmente basada en API que ofrece a las empresas un control completo de la nube mediante inteligencia de seguridad práctica en AWS, GCP y Azure. Con Cloud Control, la organización puede obtener visibilidad completa de su infraestructura en la nube, evitar configuraciones erróneas, aplicar buenas prácticas de seguridad, implementar gobernanza de IAM (gestión de identidad y acceso, por sus siglas en inglés), garantizar el cumplimiento con marcos de cumplimiento en constante evolución y solucionar automáticamente cualquier infracción casi en tiempo real.
Cloud Control es una plataforma de protección de cargas de trabajo e infraestructura en la nube totalmente basada en API que ofrece a las empresas un control completo de la nube mediante inteligencia...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program
An entry point for implementing structure and diligence in the management of a cybersecurity program

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
RISK IDENT is a leading software development company that offers anti-fraud solutions with expert knowledge in data analytics and ML.
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sector. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications.
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sector. We are experts in data analytics and...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
CyberSmart ofrece certificación en el mismo día respaldada por el gobierno: Cumplimiento continuo de preparación de RGPD y gobernanza IASME en servicios esenciales cibernéticos.
CyberSmart se creó en 2017 desde un acelerador GCHQ por parte de un grupo de expertos en seguridad con visión de futuro. Parte de la base de que muchas empresas necesitan cumplir ciertos estándares de seguridad de la información, pero se enfrentan a procesos demasiado complicados o se ven limitadas por los recursos financieros o humanos. CyberSmart ofrece certificación en el mismo día respaldada por el gobierno: preparación de RGPD y gobernanza IASME en servicios esenciales cibernéticos. Esto garantiza que todos los dispositivos cumplen continuamente con el uso de las aplicaciones móviles y de escritorio.
CyberSmart se creó en 2017 desde un acelerador GCHQ por parte de un grupo de expertos en seguridad con visión de futuro. Parte de la base de que muchas empresas necesitan cumplir ciertos estándares...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Office Protect is a Microsoft 365 add-on that lets you easily implement best practice security settings for all your clients.
Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at the same time, monitors activity 24/7, and alerts you to suspicious events in a timely fashion. By using Office Protect, you're raising clients baseline security, improving your security offer, and showing your value to customers.
Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
La visibilidad y el control en tiempo real que necesitas para tu red, mientras se reducen los gastos y aumenta la disponibilidad.
Las soluciones de Infoblox reducen los gastos de red y aumentan la disponibilidad y flexibilidad de la red mediante la automatización de los componentes clave de la infraestructura de red, que incluye la gestión de direcciones IP (IPAM [IP Address Management]), el sistema de nombre de dominio (DNS [Domain Name System]) y el protocolo de control de huésped dinámico (DHCP [Dynamic Host Control Protocol]). El resultado es una disminución significativa de los errores y la cantidad total de tareas necesarias para mantener las redes disponibles, flexibles y seguras.
Las soluciones de Infoblox reducen los gastos de red y aumentan la disponibilidad y flexibilidad de la red mediante la automatización de los componentes clave de la infraestructura de red, que...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Un programa para el cumplimiento de licencias de software, administración de configuraciones de hosts, planificación de actualización de hardware, administración de activos de TI, etc.
Un programa para el cumplimiento de licencias de software, administración de configuraciones de hosts, planificación de actualización de hardware, administración de activos de TI, etc.
Un programa para el cumplimiento de licencias de software, administración de configuraciones de hosts, planificación de actualización de hardware, administración de activos de TI, etc.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Enterprise cyber security management platform to prioritize investments to lower risk and improve cyber security performance.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors.
Enterprise cyber security performance platform that aligns risk and maturity while prioritizing investments and provides a narrative on cyber risk to Board of Directors.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint.
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecards patented rating technology is used by over...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
InsightIDR es tu solución de detección y respuestas ante amenazas. Encuentra y responde a todos los vectores de ataque más importantes detrás de las vulneraciones.
InsightIDR es tu solución de detección y respuestas ante amenazas. Encuentra y responde a todos los vectores de ataque más importantes detrás de las vulneraciones: phishing (suplantación de identidad), malware y uso de contraseñas robadas. InsightIDR recopila de forma nativa datos de tus terminales, registros de seguridad y servicios en la nube. Aplica analíticas de comportamiento de usuarios y atacantes a tus datos para encontrar las actividades de intrusos en cada paso de la cadena de ataque. Unifica tus datos de seguridad. Detecta antes de que las cosas se pongan críticas. Responde 20 veces más rápido con investigaciones visuales y automatización.
InsightIDR es tu solución de detección y respuestas ante amenazas. Encuentra y responde a todos los vectores de ataque más importantes detrás de las vulneraciones: phishing (suplantación de...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Integrated risk management platform that helps firms manage regulatory compliance, IT, security, vendors, audits and documentation.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers automated, intelligent cybersecurity compliance and risk management that's easily understood by analysts and Board members alike. CyberStrong provides a flexible solution with near-zero time to value and patented Artificial Intelligence automation, eliminating manual effort and enabling success.
Integrated Risk Management takes more than labeling manual, expensive, or legacy GRC solutions as IRM. Modern CISOs demand a fundamentally different kind of product. The CyberStrong Platform powers...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Endpoint protection solution that lets businesses identify, protect, and secure IoT devices from security vulnerabilities in real-time.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Protect your cloud assets and private network. Improve security and incident response across the distributed network.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Automated Penetration Testing, with a click of a button
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous, machine-based penetration tests that improve their immunity against cyber attacks across their organizational networks.
Pcysys delivers an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the hackers perspective, our software identifies, analyzes and...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Delivers zero-touch visibility & cyber threat prevention for medical devices & IT networks. Identify. Assess. Detect. Prevent.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility into the performance and safety of medical devices, but provides a business solution for preventing attacks and ensuring operational continuity. When it comes to the cybersecurity of critical healthcare infrastructure, lives are literally at stake. Why take take the risk? Better to take control.
CyberMDX prevents and counters cyber-threats around connected medical devices and clinical assets. With the MDefend healthcare cybersecurity solution, CyberMDX not only delivers granular visibility...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
The First Cloud & On Premise CyberSecurity platform that allows you to identify, analyze and solve security issues of IT assets.
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks - Code Review: solve issues in terms of source code - GDPR Assessment: identify your GDPR Compliance level and get an action plan to bridge the gap with GDPR - Phishing Simulation Attack: avoid phishing threats - MSSP: ensure security governance - Light SOC: Threat intelligence
Swascan is the first CyberSecurity platform in Cloud & On Premise: - Vulnerability Assessment & Network Scan: identify, analyze and solve vulnerabilities related to Websites, Web Apps and Networks -...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
The iboss cloud provides fast and secure Internet access on any device, from any location, in the cloud.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for traditional security appliances, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by over 190 issued and pending patents and more than 100 points of presence globally, iboss protects more than 4,000 organizations worldwide.
iboss is a cloud security company that provides organizations and their employees secure access to the Internet on any device, from any location, in the cloud. This eliminates the need for...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Secureworks combines machine learning with human intelligence to predict and prevent more threats.
Secureworks combines machine learning with human intelligence to predict and prevent more threats.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Claroty provides the leading industrial cybersecurity platform to drive visibility, continuity and resiliency in the industrial economy
Claroty, the industrial cybersecurity company, is trusted by the worlds largest enterprises to help them reveal, protect, and manage their OT, IoT, and IIoT assets. Its comprehensive platform connects seamlessly with customers existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote accessall with a significantly reduced total cost of ownership.
Claroty, the industrial cybersecurity company, is trusted by the worlds largest enterprises to help them reveal, protect, and manage their OT, IoT, and IIoT assets. Its comprehensive platform...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioral and deception techniques to prevent ransomware and fileless attacks. Defend against tomorrows threats today.
The Cybereason Defense Platform combines managed endpoint prevention, detection, and response in one lightweight agent. It delivers multi-layer endpoint prevention by leveraging signature and...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Automates third-party security lifecycle management.
Panorays automates third-party security lifecycle management. With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR and NYDFS.
Panorays automates third-party security lifecycle management. With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Policy-driven endpoint security. Add enterprise grade technologies such as application whitelisting, ringfencing and storage control.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not trusted. Combined with Ringfencing and storage policies, you enhance your zero-trust protection and block attacks that live off the land.
To stop ransomware and other malicious behaviors, you need to do more than look for threats. Reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Quixxi is an end-to-end mobile app security solution for developers to protect and monitor any mobile app in minutes.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set of security layers, for quick & easy mobile app protection. Quixxi is also a monitoring tool with Licensing, Analytics & Diagnostics SDK. Allowing developers to identify illegal use & help recover associated lost revenue, detailed insights into customer engagement & advanced debugging files.
Quixxi Security provides codeless app protection against hackers looking to clone, tamper, inject malicious code, or exploit your mobile app. A simple drag & drop feature applies a sophisticated set...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Secures remote access to private apps, replacing corporate VPNs with a more secure and usable zero trust-based solution.
Twingate enables businesses of all sizes to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of developers, DevOps, IT teams, and all end users easier, it replaces outdated, insecure, and difficult-to-maintain corporate VPNs which were not built to handle a world in which "work from anywhere" and cloud-based assets are increasingly the norm.
Twingate enables businesses of all sizes to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Aplicación web de configuración cero, protección de API y mitigación de bots para Kubernetes.
Prophaze Cloud WAF protege a las organizaciones de los hackers maliciosos que intentan atacar y robar datos de aplicaciones web, gateways de aplicaciones móviles o API. A diferencia de los firewalls tradicionales, Prophaze WAF protege de manera exclusiva las API web y móviles de brechas de seguridad empleando algoritmos de aprendizaje automático basados en el comportamiento y perfiles adaptativos. El producto está creado de forma nativa sobre la plataforma Kubernetes y protege la infraestructura en la nube y los clústeres de Kubernetes ante diversos vectores de ataque.
Prophaze Cloud WAF protege a las organizaciones de los hackers maliciosos que intentan atacar y robar datos de aplicaciones web, gateways de aplicaciones móviles o API. A diferencia de los firewalls...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.
Endpoint detection tool supports, filealyzer, anti-malware, anti-spyware, secured shredder, script editor, rootkit scan and more.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Helps monitor and analyze networks. Advanced Dropless Collection capabilities.
A complete Network Monitoring solution. Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.
A complete Network Monitoring solution. Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Smokescreen is a deception technology solution that blankets your network with decoys to trap hackers and bad guys.
Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBlack, you'll understand how adversaries operate and see how decoys planted all over your network provide high-fidelity detections every step of the way. It's easy to understand, easy to use, and we've got you covered on the Perimeter, Cloud, internal network, endpoints, and Active Directory.
Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBlack, you'll...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, for better Threat Intelligence, Monitoring, and Hunting.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3 SOAR, you can unify teams across borders and job functions: Easily manage all Incidents and Cases, collaborate on complex security and legal investigations, conduct post-incident analyses, derive actionable analytics, and automatically report on progress to continually improve your security posture.
D3 SOAR is a platform with a fully embedded MITRE ATT&CK Module, D3 Security helps SOC teams become Threat Hunters with streamlined workflows and $$$,$$$ in cost savings per year. With D3 SOAR, you...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Cloud software to continuously verify network set up and access to ensure compliance with policies and regulations..
Cloud security software to continuously verify hybrid, multi-cloud networks' security within and between physical, cloud, and software defined environments. with a visual interface to ensure control policies, analyze access, and more.
Cloud security software to continuously verify hybrid, multi-cloud networks' security within and between physical, cloud, and software defined environments. with a visual interface to ensure control...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
PEM provides holistic endpoint security management solution for medium and large enterprises.
PEM (Promisec Endpoint Manager) is the first agentless solution that delivers complete endpoint detection and remediation capabilities across the enterprise. PEM leverages proprietary technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps.
PEM (Promisec Endpoint Manager) is the first agentless solution that delivers complete endpoint detection and remediation capabilities across the enterprise. PEM leverages proprietary technology to...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Security and compliance solution that enables businesses to control network access and enhance visibility to unauthorized activities.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity.
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Worry-free protection from Mac & PC malware and viruses, and from unknown devices and applications trying to access your les.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security and productivity of the individuals within their company.
Flextivity is a cloud-based security and activity monitoring solution that helps business owners protect their company Macs and office networks while giving them powerful tools to impact the security...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Una herramienta inteligente en línea diseñada para el cumplimiento de normas ISO que te ayuda a implementar y mantener tus sistemas ISO con facilidad.
Conformio es una herramienta inteligente en línea para el cumplimiento de la norma ISO. Te ayuda a implementar y mantener tus sistemas ISO 9001, ISO 14001 o ISO 27001 con facilidad. Con Conformio puedes optimizar el esfuerzo de tu equipo con una sola herramienta diseñada para gestionar documentos, proyectos y comunicaciones. No requiere capacitación ni realizar instalaciones. Todo lo que necesitas para usarlo es una conexión a Internet y un navegador web. Otra ventaja de Conformio es que puedes probarlo gratis.
Conformio es una herramienta inteligente en línea para el cumplimiento de la norma ISO. Te ayuda a implementar y mantener tus sistemas ISO 9001, ISO 14001 o ISO 27001 con facilidad. Con Conformio...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Cryptosense proporciona software para detectar y eliminar las vulnerabilidades causadas por el mal uso de la criptografía en aplicaciones e infraestructuras.
Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e infraestructura.
Cryptosense proporciona un software de análisis de vanguardia para ayudar a las empresas a eliminar las vulnerabilidades causadas por el uso inseguro de la criptografía en sus aplicaciones e...

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra
Security solution for on-premises data centers and public clouds.
Security solution for on-premises data centers and public clouds.
Security solution for on-premises data centers and public clouds.

Funcionalidades

  • IA y aprendizaje automático
  • Análisis de comportamientos
  • Gestión de incidentes
  • Análisis de vulnerabilidades
  • Gestión de puntos de terminación
  • Lista blanca/negra