View
Sorting
Products found: 14
AgiliWay Custom Software development
- Business requirements gathering and analysis
- Solution architecture design
- Development
- Quality control strategy planning and solution testing
- Solution deployment
- End-users education and migration support from old systems
- Post-implementation maintenance and user support
Products(services)
- Custom Software development
- Outsourcing Consulting
- Web Dev
- Mobile Dev
- BigData
- QC
- BPO
- CiviCRM implementation
- Odoo Implementation
- E-commerce
Agiliway Услуги по комплексной разработке
FireEye Email Security
FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created.
Leveraging FireEye’s extensive threat intelligence from frontline investigations and millions of sensors, FireEye Email Security prioritizes critical alerts and enables endpoint and network incident mitigation and remediation. FireEye Email Security works seamlessly with the FireEye security operations platform – FireEye Helix – providing visibility across the entire infrastructure.
Flexible deployment options
FireEye Email Security - Server Edition is an on-premises appliance that protects against advanced email attacks. Real-time updates from the entire FireEye ecosystem combined with attribution of alerts to known threat actors provide context for prioritizing and acting on critical alerts and blocking spear-phishing emails.
With nothing to install, FireEye Email Security - Cloud Edition is ideal if you’re migrating email to the cloud. It integrates seamlessly with cloud-based email systems such as Office 365 with Exchange Online Protection to stop targeted, advanced attacks faster and more accurately than Exchange Online Protection alone.
Full stack email security solution
FireEye MVX engine
Rapidly detects and blocks unknown malicious attacks.
Advanced URL defense
Inspects URLs for links to credential-phishing sites and rewrites URLs.
Impersonation detection
Stops difficult to detect malware-less attacks.
Retroactive analysis and alerting
Detects and alerts on URLs that go live after email delivery
FireEye FX
FireEye NX
- Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
- Understand and prioritize critical alerts with reliable execution evidence and contextual insights
- Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
- Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
- Future-proof your investment with an extensible, modular architecture
- Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
- Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
- Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
- Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
VAFromEurope
Qualified Business Process Outsourcing specialists can help you cover routine processes in various areas like:
- Virtual Assistance
- Data Entry
- Website Content Management
- Virtual Project Management
- SEO/SMM and others.
Корпоративный Web-site
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.