Security
2 Review
Proxy-Seller.com is a provider of individual, private, dedicated proxy servers. IPv4, IPv6, and Mobile proxies as well. More than 36 countries to choose a proxy from, more than thousands of cities.
2 Review
Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.
2 Review
Malwarebytes is the cybersecurity company that millions worldwide trust. Malwarebytes proactively protects organizations and their employees against advanced malicious threats, including ransomware, that traditional antivirus tools and other endpoint protection products miss. Driven from the cloud through a single pane of glass, Malwarebytes solutionsβ¦
Read more about this company2 Review
BluVector Pulse delivers a fully turnkey sense and respond platform, automating the health and heartbeat monitoring and device management of the market-leading BluVector Cortex offering.
2 Review
ceBox is a connected PC solution that lets users pilot all desktops centrally without any third-party solution needed. Offered as a monthly subscription service, the ceBox offer includes the Intel NUC, centralized management of NUC kits as well as proactive support.
2 Review
Hysolate is revolutionizing enterprise endpoints, resolving the conflict between security and productivity. We bring air gap security to the enterprise and at the same time free knowledge workers from past usage restrictions.
2 Review
The secure and reliable protection against any malware is Application Whitelisting. It defines what can be executed. Anything else cannot be started.
2 Review
SNOW is an endpoint detection/response solution in the form of a lightweight cross platform sensor. Operating on a host based managed system, it proactively searches through networks 24/7 to provide the ultimate protection against todays most sophisticated cyber security threats.
2 Review
ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.
2 Review
Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ Μs anomaly detection analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection and guided investigation. Its self-learning AI is similar to the humanβ¦
Read more about this company2 Review
REVE Antivirus Endpoint Security solutions incorporate a Device Control technology that allows the administrator to block or allow permissions for using external devices such as Hard Disk, Pen drive, USB Dongle, Printers, External CD/DVD. By blocking unauthorized media, Device control prevents the spreading of a virus via removable devices.
2 Review
Wahupa SCM is based on a proven successful concept with a slew of new innovations. We've taken our vast experience building best-of-class Supply Chain Management (SCM) products and started all over to build a product that will optimize your supply chain, and still be affordable.
2 Review
TXHunter provides an easy to use and convenient tool for conducting threat incident investigations remotely. If any endpoint system or server is suspected of having been attacked, TXHunter can simply take a snapshot of the suspicious system and automatically conduct an incident investigation. If the investigation process identifies suspicious files orβ¦
Read more about this company2 Review
Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
2 Review
Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.
2 Review
Heimdal Security is a Denmark-based, self-financed, cybersecurity vendor, specialized in DNS filtering, silent patching, antivirus/antimalware software, and Privileged Access Management (PAM) solutions. In an ever-evolving threatscape, traditional, file-based, Antivirus solutions are no longer sufficient to withstand the next generation of onlineβ¦
Read more about this company2 Review
2 Review
Corax is a cyber risk analytics and underwriting platform that helps those involved in cyber risk transfer with client facing and carrier/reinsurer facing activity.