182 results
Why Capterra is free
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities Learn more about Syxsense Secure
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Learn more about Syxsense Secure
Syxsense Secure offers vulnerability scanning, patch management, plus Endpoint Detection and Response (EDR) all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help secur...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Report and demonstrate compliance for credential creation, usage, and storage, and track changes by actor, date, and application. Learn more about SolarWinds Passportal
Manage passwords with best practices. Set password expiry dependent on risk (30-90 days), generate strong passwords designed to block dictionary and brute force attacks, auto-rotate passwords, and make password changes quickly and easily. Track changes and activity with audit trails and reports. Onboard technicians fast, revoke access with a single workflow, and reduce risk in the event of technician departure. Access can be limited. Learn more about SolarWinds Passportal
Manage passwords with best practices. Set password expiry dependent on risk (30-90 days), generate strong passwords designed to block dictionary and brute force attacks, auto-rotate passwords, and make...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click. Learn more about 1Password
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. When everyone uses 1Password, your risk goes down and your productivity goes up. Learn more about 1Password
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password i...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive file...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
DNS Based web content filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network & computer security now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important file...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email threats and, the newest malware. You can choose between unmanaged and managed solutions. AVG Cloud Management Console allows you to quickly deploy antivirus to multiple endpoints, manage policies, monitor threats, schedule updates, and protect devices. Learn more about AVG Antivirus Business Edition
AVG Antivirus Business Edition protect your business from viruses, ransomware, and other online threats in real-time. Our top-rated antivirus protects your business from: hacker attacks, web and email ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. Price from $49.99 Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial. Learn more about OneLogin
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Learn more about OneLogin
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure an...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring. Learn more about EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & cor...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situations they depict which heightens their ability to learn and remember the lesson. And a little bit of humor never hurts to keep people interested. AwareGO borrows from the masters of advertising where short, story driven videos increase employee awareness levels and help keep the workplace safe. Learn more about AwareGO
AwareGO is a platform for cybersecurity awareness. Businesses can create concise training campaigns, schedule them and track results. AwareGO's goal is for the viewer to see and recognize the situation...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
A comprehensive cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks. Learn more about CloudPassage Halo
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and respond to critical risks. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, and portability needed to succeed in these new environments. Learn more about CloudPassage Halo
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, achieve compliance, and find and resp...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Fold...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all i...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear fo...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits,...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online.
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
An email server with a powerful built in spam and junk message filtering engine that eliminates up to 99% of spam upon installation.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email and a plethora of other features making it a very user friendly server. Mass email manager.
Xeams is a secure and powerful mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that elimina...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages us...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Computer security solution that helps businesses create, resize, or format disks to maximize performance and protect data.
MiniTool Partition Wizard Free helps users to manage disks and partitions, check file system, align SSD partition, migrate OS to SSD, clone disk, convert MBR to GPT, etc. Aiming to become the most powerful free partition manager in the long term, it keeps offering ever-increasing new features like Disk Benchmark and Space Analyzer to bring users the best experience.
MiniTool Partition Wizard Free helps users to manage disks and partitions, check file system, align SSD partition, migrate OS to SSD, clone disk, convert MBR to GPT, etc. Aiming to become the most powe...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Computer security solution that helps businesses detect threats and prevent targeted attacks across networks and emails.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control po...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
We provide a cost-effective, secure, and socially responsible way to recycle and retire IT assets, computers and computer storage.
WipeDrive enables corporations, government entities, and individuals to permanently and securely erase data from hard drives, removable media, and mobile devices. We provide a cost-effective, secure, and socially responsible way to recycle and retire computers and computer storage. WipeDrive is the world leader in secure data destruction.
WipeDrive enables corporations, government entities, and individuals to permanently and securely erase data from hard drives, removable media, and mobile devices. We provide a cost-effective, secure, a...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications.
On-premise and mobile VPN tool that helps users browse in private network and prevent Internet Provider from monitoring communications....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.
Keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring....
ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more.
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Dire...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com.
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compl...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
GlassWire is a modern network monitor & security tool with a built in firewall.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types.
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Secure email, web form, and e-signature service that lets you send and receive private, encrypted emails, attachments, and web forms.
Do you need an encrypted email and web form service so your conversations remain secure and confidential? Are you a healthcare practitioner such as a therapist, chiropractor, optometrist, or dentist in need of HIPAA compliance? Hushmail allows you to send and receive private, encrypted emails, attachments, and e-signable web forms to and from anyone, even people who don't use Hushmail. Perfect for small to medium businesses in professions requiring discretion such as healthcare or law.
Do you need an encrypted email and web form service so your conversations remain secure and confidential? Are you a healthcare practitioner such as a therapist, chiropractor, optometrist, or dentist in...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers.
Access control solution for corporate apps that supports integration with third party authentication providers....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Automate and scale your web security program with Netsparker - a single platform for all your web security needs.
Netsparker is the only end-to-end web application security solution that lets you scale and automate your web security program. Boasting a unique combination of enterprise features, including asset discovery, dead accurate scanning, automatic verification with Proof-Based Scanning, comprehensive SDLC integration, and extensive collaboration support, Netsparker was designed with automation in mind for enterprise-class scalability.
Netsparker is the only end-to-end web application security solution that lets you scale and automate your web security program. Boasting a unique combination of enterprise features, including asset dis...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
UserLock offers two-factor authentication, contextual restrictions and real-time insight around all Active Directory logins.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to all users' access, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance.
Two-Factor Authentication & Access Management for Windows Active Directory. By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrato...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
PC firewall that keeps personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Network security solution that helps businesses streamline endpoint protection and software deployment across workstations.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are.
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
RG System is a SaaS IT Management Platform that offers on a unified interface RMM, Data Backup & Restore and Endpoit Security features.
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same interface 3 complementary modules: Remote Monitoring & Management, Data Backup & Restore and Endpoint Security. You can easily monitor, remote control, backup, restore and protect hybrids IT environements from a centric SaaS portal. Make IT Easy with RG System!
As a SaaS IT Management expert for more than 10 years, RG System offers a centric portal designed to help both MSPs and IT Pros manage efficiently IT infrastructures. The solution combines on the same ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Indeni helps IT pros detect network issues before they become major issues using security infrastructure automation.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience, to replace tedious tasks with turn-key integration with your existing processes. It's certified automation, with control, so you can focus on mission-critical projects that drive new business.
Indeni provides security infrastructure automation with unprecedented visibility thats ready to go in minutes. Production-ready automation elements are curated from vetted, community-sourced experience...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Probely helps Security and DevOps engineers deliver secure web apps without compromising deadlines and disturbing your current work
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing int...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business host...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Provides strong encryption, supports multiple protocols, security standards & authentication methods....
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Public key infrastructure; enables, manages and simplifies the use of digital certificates.
Public key infrastructure; enables, manages and simplifies the use of digital certificates.
Public key infrastructure; enables, manages and simplifies the use of digital certificates....
Secure password management, end-user dashboards and SSO to thousands of cloud applications!
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules.
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password rese...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers.
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and Exchange SMTP connectors; Syspeace also offers country-based IP blocking.)
Host-based Intrusion Detection Software, protecting against brute force attacks on Microsoft servers. (Syspeace protects Windows login attempts (like RDP login attempts), SQL Server login attempts and ...
  • Anti Virus
  • Audit Trail
  • File Access Control
  • Compliance Management
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log