Endpoint Protection
2 Review
ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.
2 Review
Haikiki iQ - AI-assisted threat hunting Haikiki is a German AI company applying artificial intelligence to detect cyberattackers. Haikiki iQ Μs anomaly detection analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection and guided investigation. Its self-learning AI is similar to the humanβ¦
Read more about this company2 Review
REVE Antivirus Endpoint Security solutions incorporate a Device Control technology that allows the administrator to block or allow permissions for using external devices such as Hard Disk, Pen drive, USB Dongle, Printers, External CD/DVD. By blocking unauthorized media, Device control prevents the spreading of a virus via removable devices.
2 Review
Wahupa SCM is based on a proven successful concept with a slew of new innovations. We've taken our vast experience building best-of-class Supply Chain Management (SCM) products and started all over to build a product that will optimize your supply chain, and still be affordable.
2 Review
TXHunter provides an easy to use and convenient tool for conducting threat incident investigations remotely. If any endpoint system or server is suspected of having been attacked, TXHunter can simply take a snapshot of the suspicious system and automatically conduct an incident investigation. If the investigation process identifies suspicious files orβ¦
Read more about this company2 Review
Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
2 Review
Centurion SmartShield endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising system integrity.
2 Review
Heimdal Security is a Denmark-based, self-financed, cybersecurity vendor, specialized in DNS filtering, silent patching, antivirus/antimalware software, and Privileged Access Management (PAM) solutions. In an ever-evolving threatscape, traditional, file-based, Antivirus solutions are no longer sufficient to withstand the next generation of onlineβ¦
Read more about this company2 Review
2 Review
Panda Adaptive Defense 360 is an innovative cybersecurity solution for endpoints and servers, delivered from the Cloud. Its agent is lightweight and minimal impact on endpoints performance, which is managed via a single Cloud console. AD360 combines the widest range of endpoint protection (EPP) technologies with EDR capabilities, automating theβ¦
Read more about this company2 Review
CyberGatekeeper uses agents with the server to determines whether endpoint compliance with policies, before allowing devices onto the network.
2 Review
CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.
2 Review
The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should notβ¦
Read more about this company2 Review
NVC enables authorized users to easily configure their visibility nodes seamlessly. By treating connected visibility nodes as a single virtual switching fabric, configuring multi-device solutions becomes transparent without the need to manually configure each of the connected devices one by one.
2 Review
Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industry to achieve efficiency and sophistication in product design that combines a multitude of technologies.