Security
1 Review
Multiple threats call for multiple layers of defense. ContentKeeper layers complementary technologies that detect, identify, analyze and prevent attacks on todayโs distributed, cloud-enabled organization. Easy to scale, manage and use, the platform protects from advanced malware, ensures compliance and controls policies across mobile devices, remoteโฆ
Read more about this company1 Review
ContentProtect provides: Content filtering, Internet usage policies apply to devices on and off the network, Web based administration and reporting, Productivity tools with custom rules and time controls, Email alerts for policy violations or filter change requests, Customized policy settings and rules.
1 Review
Collect all your customers' websites distributed across different Shared, VPS, and Dedicated servers in one place and get started providing comprehensive website security to all your clients under your own brand, at your price. It's a quick and easy way to grow your business.
1 Review
FGX-Web monitors and protects websites against the latest threats affecting online businesses - constantly updated by our forensic research from investigations of criminal activity, from simple hacks to sophisticated cyber attacks by malicious hackers.
1 Review
Welcome to Website Security SCANNER and MONITOR by H-X Technologies! These professional automated services are designed for protection of your websites. This Guide will help you to use our services in the best possible way, even if you are not a cyber security specialist. First, if you have not read the Frequently Asked Questions page, we suggest you toโฆ
Read more about this company1 Review
Launch security scans for your WordPress websites and have results in a minute. Schedule daily, weekly, twice a week, twice a month or monthly scans. Detailed security reports which includes guidelines to improve security. Email alerts once we find new vulnerabilities.
1 Review
SecureKloud is a cloud native company with a combination of platforms and services, designed to solve problems around Blockchain, Cloud, Enterprise Security, Data Collaboration, Decision Engineering, and Managed Services.
1 Review
Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowers companies to safeguard their business-critical assets. With just a few clicks, Cymulate challenges your security controls by initiating thousands of attack simulations, showing you exactlyโฆ
Read more about this company1 Review
Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identify gaps, and instantly apply selected mitigation advice for the purpose of security validation, hardening and mitigation. The platform is powered by anโฆ
Read more about this company1 Review
LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response โ notโฆ
Read more about this company1 Review
securiCAD is a foreseeti product, developed to perform virtual attack simulations on models of IT architectures. Based on decades of research at the Royal Institute of Technology in Stockholm (KTH), securiCAD enables companies to transform their risk assessments from isolated technical problems to a holistic approach for measuring the risk exposure ofโฆ
Read more about this company1 Review
1 Review
By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.
1 Review
The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.
1 Review
A comprehensive endpoint solution that prevents attacks through trickery and deception.
1 Review
Smokescreen is a pioneer in deception-based threat detection and response. It is the solution of choice for offensive security teams, with a customer Net Promoter Score above 70. Smokescreen's deception platform protects many of the worldโs most targeted organisations including leading financial institutions, energy companies, manufacturing giants, andโฆ
Read more about this company1 Review
Recorded Future delivers the worldโs most technically advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence for security operations and response, threat analysis, third-party risk, vulnerability management, brand protection, and geopolitical risk, Recorded Futureโฆ
Read more about this company1 Review
Arm security IP extends across the system with processors and subsystem protection (both hardware and software), as well as acceleration and offloading.