View
Sorting
Products found: 26
Barracuda WAF-as-a-Service
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM
- Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution
- Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems
- Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)
- Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates
- Rely on updates from the renowned BeyondTrust Security Research Team
Cybonet Cybowall
- Stop Endpoint Tampering and Malware - Leverage network and endpoint detection of Advanced Persistent Threats
- Map Network Assets - Increase visibility with a map of all endpoints connected to your network to gain insight into your environment
- Identify Vulnerabilities - Stay informed of vulnerabilities for patch deployment prioritization
- Detect Lateral Movement - Trap attackers that have already breached perimeter defenses
- Detect Active Breaches - Discover network breaches quickly to reduce damaging effects
- Meet Compliance Requirements - Adhere to compliance standards; GDPR, ISO, PCI-DSS, HIPAA etc.
- Intrusion Detection - Breach detection capabilities without network interference.
- Network Traps - Insight into lateral movement between endpoints and detects threats by serving as a trip wire for active attacks.
- Network Forensics - Discover and analyze the source of security attacks and incidents.
- Vulnerability Assessment - Monitor business assets and identify vulnerable systems inside the network, including risk level, for patch deployment prioritization.
- Default Passwords - Pinpoint and change default passwords to reduce risks.
- Malware Hunter - Identify malicious files and where they reside in the network.
Dr.Web Desktop Security Suite
F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData
F5 BIG-IP DNS, BIG-IP Local Traffic Manager от SecureData
BIG‐IP LTM – это полный прокси между пользователями и серверами приложений, обеспечивающий безопасность, оптимизацию трафика приложений и балансировку его нагрузки.
Преимущества F5 BIG-IP DNS:
- глобальная балансировка нагрузки на приложения
- легкая масштабируемость системы доменных имен.
- повышение производительности системы доменных имен (обработка свыше 10 млн. запросов в секунду)
- защита DNS от DDoS-атак
FORCEPOINT Advanced Malware Detection, Forcepoint Email Security Cloud, Forcepoint Web Security Cloud
Forcepoint Email Security Cloud, Forcepoint Web Security Cloud
Forcepoint Email Security applies real-time behavioral sandboxing, enterprise-grade DLP and other advanced defense technologies to prevent leaks of sensitive information, empowering your workers — in the office or on the road — as you safely adopt technologies like Microsoft Office 365. In addition, detect phishing and secure email wherever users need access, even on mobile devices, through features like Phishing Education and URL Wrapping. Your business and data are under constant attack. Traditional filtering and antivirus products no longer provide sufficient protection, and many web security solutions can’t address advanced threats as they occur. Forcepoint Web Security provides advanced, real-time threat defense to stop advanced threats and prevent data loss. It provides robust protection through context- and content-aware defenses, coupled with integrated Cloud Access Security Broker (CASB) functionality, to provide control and visibility for cloud applications on both on-premises and roaming users. The combination of industry-leading web protection, CASB functionality and enterprise DLP delivers protection at a value no other vendor can match.
Forcepoint Web Security
Group-IB Threat Intelligence
- Prompt attack and threat notifications for your company, clients and partners
- Direct access to compromised data and TTPs of malicious activity
- Detections, analysis and forecasts of hacking activity in the areas of your interest
- Convenient web interface for data search and analysis – no installation required
- STIX/TAXII ready, official OASIS Cyber Threat Intelligence (CTI) Technical Committee Member
- 24x7 Personal cyber intelligence analyst support: tailored reports, malware analysis and much more
- Evaluate risks, analyze statistics and assess potential damages
- Prioritize threats based on expert forecasts
- Learn attack tactics and cybercrime strategy
- Know your enemy
- Adapt your security tools and response plans
- Learn about data leaks and identify insiders
- Prevent confidential data from being sold to third parties
- Monitor hacking attacks and activity peaks correlating with your incidents
- Apply IoCs to you layered cyber security infrastructure
- Protect your clients, employees, and partners against fraud and personal data theft
- Receive attack confirmation, learn about the attack source and mechanisms used
- Prevent leakage and industrial espionage
- Effectively stop targeted attacks
- Prevent illegal use of your brand
- More than 10 patented technologies, automation and special tactics, algorithms and machine learning are helping us to collect raw data on cyber threats.
- Best analysts are making intelligence out of threat data, enriching them with context, revealing kill chains and TTPs (tactics, technics and procedures) of cyber criminals.
- Building links between incidents, IoCs and cyber criminals activities all over the world with the help of CERTs, Europol, Interpol and other international cyber crime fighters.
- Deep knowledge of Russian-speaking and international cybercriminal markets
- Adjustable amount of hours of remote analysts
- Ability to request assistance from special team of Group-IB security experts responsible for handling high-profile investigations
Group-IB Threat Intelligence (Киберразведка по подписке)
- Распределенная сеть мониторинга и HoneyNet ловушек
- Аналитика бот-сетей
- Закрытые и публичные хакерские площадки, онлайн-конференции
- Приватные группы в соцсетях
- Трекеры сетевых атак
- Данные сенсоров Threat Detection System
- Результаты криминалистических экспертиз Лаборатории Group-IB
- Мониторинг и исследование вредоносных программ
- База обращений в Центр реагирования CERT‑GIB
- Результаты поведенческого анализа вредоносных файлов с помощью машинного интеллекта
- Контакты с регисторами доменных имен и хостинг-провайдерами по всему миру
- Обмен данными с Europol, Interpol и объединениями по противодействию киберугрозам
- Целевые исследования Group-IB
- Проверка данных и сбор дополнительных сведений
- Реконструкция сценариев атак
- Исследования вредоносных программ
- Установление взаимосвязей между преступными группами
- Отслеживание трендов, формирование прогнозов
- Разработка рекомендаций по реагированию
- сведения о новых вредоносных программе или сервисах для хакерского сообщества,
- изменения в тактике проведения атак,
- утечки и продажи корпоративных данных,
- объявления о поиске инсайдеров в разных компаниях или исполнителей атак,
- обсуждение уязвимостей.
- хеш-сумму вредоносного файла,
- полное описание функциональных возможностей вредоносной программы,
- копию файла настроек или веб-инжектов,
- адреса серверов управления (C&C) и обновлений.
- учетные записи, ассоциированные с корпоративными доменами и диапазонами IP: e-mail аккаунты, доступы к intranet-ресурсам и т.д.
- номера банковских карт,
- копии ключей электронной цифровой подписи.
- дата детектирования скомпрометированной учетной записи,
- источник получения данных (серверы, адреса для управления бот-сетью),
- информация о расположении и IP зараженного пользователя,
- название и подробное описание вредоносной программы, использованной злоумышленниками,
- название преступной группы и тактика ее действий,
- фото-отчеты осмотров панелей управления бот‑сетями.
- списки целей DDoS-атак,
- cписки сайтов с размещенным фишинговым контентом,
- списки взломанных сайтов, распространяющих вредоносные программы,
- списки сайтов, подвергшихся deface-атакам.
- Для распространения вредоносных программ хакеры часто используют метод Driveby, который заключается в заражении пользователей легитимных сайтов, ни посетители, ни администраторы которого не догадываются об активности преступников. Благодаря своевременному получению данных о взломанных сайтах возможно полностью предотвратить такие атаки.
- о начале новой операции,
- о результатах успешных атак в рамках отдельной операции или независимо от нее,
- о тактике и инструментах каждой атаки,
- о связях между разными группами.
- Информация позволит взвешенно оценить риски быть атакованными в рамках определенной операции, смоделировать возможный инцидент и подготовиться к нему.
- Подозрительные IP-адреса
Imperva SecureSphere Database Firewall
- Logs only what activity is necessary while monitoring all activity for security violations
- Monitors and protects high-transaction databases
- Blocks suspicious behavior when it happens – investigate in-context
- Executes multi-action security alerts, eliminating bottlenecks and delays
- Interlocks database protection with the SecureSphere Web Application Firewall, CounterBreach Insider threat protection, and malware protection, providing multifactored data security
infotecs ViPNet Coordinator HW
McAfee Complete Endpoint Threat Protection
McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and provide actionable insights to combat zero-day threats and sophisticated attacks.
Core endpoint protection, including anti-malware, firewall, device control, email and web security works together with machine learning and dynamic application containment to detect zero-day threats in near real time, and classify and halt them before they can execute on your systems. Actionable forensic data and easy-to-read reports keep you informed and help you make the move from responding to outbreaks, to investigating and hardening your defenses. And, because McAfee Complete Endpoint Threat Protection is built using an extensible framework, you can add other advanced threat defenses with ease as your security needs and the threat landscape evolve.
McAfee Endpoint Protection — Advanced Suite
Netsparker Cloud
Netsparker Desktop
ObserveIT
- Uncover risky user activity by identifying anomalous behavior in real time.
- Insider Threat Rules
- Rely on hundreds of carefully calibrated, out-of-the-box Insider Threat Rules
- Gain insight into 25 risk categories (all customizable by user group)
- Categorize website visits and enable alerts based on risky activity
- Insider Threat Intelligence & Reporting
- Enhance security operations and regulatory compliance with detailed reports
- Investigate and view information about any user’s activities
- Secure Key-Logging
- Detect inappropriate activity in real time
- Trigger alerts on sensitive keywords and commands typed
- Detect data exfiltration attempts when users type protected keywords
- Investigate risky user activity in minutes—not days. Gain a comprehensive, 360-degree view into user behavior.
- User Session Recording
- Record user sessions for visual playback of exactly what happened, when, where, and why
- Rich, user-centric metadata provides full context of any user session
- Precise activity trails show every user action
- Receive easy-to-understand alerts based on user activity
- Easily search through captured sessions and get a breakdown of each user session
- Reduce risk with real-time user notifications and blocking. Directly enforce company security policy—automatically and in real time—to promote security awareness and prevent insider threats.
- Block Out-of-Policy Actions
- Block user activities that breach security or violate company policies
- Stop incidents before they can progress
- Real-Time User Notifications
- Warn users against proceeding with actions that violate policy
- Notify users that policy violations will be recorded and reviewed
- Reduce non-compliant actions by 80% with real-time warnings
- Optimize security and IT processes by collecting user feedback
- Precise visibility helps security account for all user activity and is crucial for root cause analysis, regulatory compliance audit reporting, and proactive user monitoring on high-risk users.
- Get user audit trails of everything that happens on your critical systems
- Monitor, record and analyze any privileged user action
- Monitor critical system access & activity on any system including:
- Windows Server
- 31 Distributions of Unix/Linux
- Citrix, VMware, and Hyper-V
- AWS/Azure Systems
- Detect Privileged Escalation & System Access
- Monitor remote connections such as Remote Desktop, Terminal Services, VMware, GoToMyPC, LogMeIn, SSH, Telnet, ICA, and local logins
- Alert security and IT teams to abnormal, suspicious or malicious privileged user activity
- Account for any service or shared account with secondary identification
- ObserveIT helps organizations meet appropriate compliance requirements across a range of frameworks.
- Secondary Authentication
- Require a secondary challenge-response for user using shared account IDs
- Increase visibility into who did what, even when credentials are shared by team members
- Secure shared accounts
- DBA Auditing
- Monitor SQL queries executed by DBAs against production databases
- Capture SQL query activity
- Review SQL queries performed by date and other criteria
- Reporting
- Generate basic reports from preconfigured templates
- Produce flexible application usage reports and trend analysis reviews
- Create comprehensive customized reports based on their own requirements
- Aggregate or summarize information about all monitored user activity
- Anonymize user data to protect employee and contractor privacy, meet regulations, and maintain trust with your users.
- Anonymization Mode
- Encrypt and obfuscate all personal user information
- In anonymization mode, information remains hidden unless specifically
- requested and approved by an authorized administrator
- Meet stringent privacy laws, including the EU General Data Protection Regulation
- Splunk
- HP ArcSight
- IBM QRadar
- LogRhythm
- Securonix
- Exabeam
- ServiceNow
- Lieberman
Panda Endpoint Protection
Next-Generation Endpoint Security Advanced cyber-security to counter malware, with prevention, detection and remediation capabilities.
Endpoint Detection and Response Monitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints
Malware Intelligence Platform The correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.
Advanced threats are gone The Platform connects contextual intelligence with defensive operations to pre-empt malicious behavior and data leaks. This way, protection systems can be activated before threats are executed. Complete advanced protection for endpoints and servers to eradicate the malware.
SKYBOX FIREWALL ASSURANCE
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.