2020-05-11T12:51:54+00:00
- Privileged Access Management
- Discover, manage, audit, and monitor privileged accounts,
- Privilege sessions recording, control and monitoring, Manage privilege accounts passwords
- Zero trust privilege approach on endpoints, Unify Least Privilege & Endpoint Security to Condense the Threat Surface
- Provide instant, secure, reliable remote support to end-users and customers—on or off your network—using Windows, Mac, iOS, Android, and more. Focus on fixing issues, not fixing connection
- Privileged Password Management
- Endpoint Privilege Management
- Manage privileges on Windows, Mac, Linux, and Unix endpoints
- Secure Remote Access
- Centrally manage and secure remote access for service desks and vendors
2020-05-07T14:01:04+00:00
- VISIBILITY & MONITORING.
- CHANGE MANAGEMENT.
- POLICY COMPLIANCE.
- FIREWALL CLEANUP & AUDIT.
- FIREWALL MIGRATION & UPGRADE
- SECURITY MANAGER.
- POLICY PLANNER.
- POLICY OPTIMIZER.
- RISK ANALYZER.
- IMMEDIATE INSIGHT.
2020-05-07T13:06:25+00:00
- Drive adoption of BYOD with management and security industry best practices.
- Provide a layered defense-in-depth approach to security, ensuring a trusted endpoint environment with capabilities such as patch and remediation, configuration management, application control, device control, disk encryption and more.
- HEAT Desktop & Server Management (DSM).
- HEAT PatchLink.
- HEAT Endpoint Management & Security Suite (EMSS).
- HEAT Endpoint Security Suite (ES).
2020-05-11T13:22:28+00:00
- Microsoft infrastructure auditing and governance
- MS Active Directory auditing and governance
- File Servers auditing and governance
- MS Exchange auditing and governance
- ActiveDirectory enterprise password enforcer
- Privilege Access Management
- Next Generation Privilege access management for privileges sessions management, Monitoring and recording
- Threat Detection
- Detect and respond to abnormal behavior and advanced attacks against Active Directory and File Systems
- StealthINTERCEPT
- REAL-TIME POLICY ENFORCEMENT and change audit for Microsoft Infrastructure
- StealthAUDIT
- REPORTING & GOVERNANCE for Microsoft Infrastructure
- StealthDEFEND
- REAL-TIME THREAT DETECTION AND RESPONSE for FileServer and Active Directory
- Stealthbits Privileged Activity Manager
- Next Generation PRIVILEGED ACCESS MANAGEMENT
- StealthINTERCEPT Enterprise Password Enforcer
- Extend Microsoft Active Directory password policy with granual controls and prevent the use of compromised dictionary passwords and weak detectable passwords
2020-05-07T12:43:45+00:00
- Comprehensive multi-vector discovery and risk mitigation of advanced threats and targeted attacks.
- Multi-layered endpoint protection platform, based on true cyber-security technologies.
- Border-less security engineered for hybrid cloud
Proactive detection of cross-channel fraud in Real Time.
- Kaspersky Anti Targeted Attack Platform.
- Threat Prevention and Advanced Endpoint Control.
- Kaspersky Fraud Prevention Cloud/Mobile/endpoints.
2020-04-27T13:20:58+00:00
- Detect changes in real time and differentiate authorized from unauthorized changes—then prioritize response based on business context.
- Discover assets and scan for vulnerabilities with granular risk scoring to prioritize the most urgent business risks.
- Reliably collects, normalizes, analyzes and stores log data for immediate alerting of suspicious behaviors and to support detailed forensic analysis.
- Keep configurations in a known and trusted state and identify and remediate non-compliant changes using our nearly 800 policy/platform combinations.
- Network and Data Security.
- Security Policy Management and Enforcement.
- Security Compliance.
2020-05-07T13:14:13+00:00
- Enterprise Mobility Management.
- Mobile Device Management.
- Secure Mobile Email/Apps/Content.
- Enterprise Mobility Management Platform.
- Cloud Security with MobileIron Access.
- Windows Security with MobileIron Bridge.
2020-04-27T13:24:17+00:00
- Trend Micro enterprise security suites deliver adaptive threat protection and data security tailored to meet your specific security needs. With a single, centrally managed suite, you will reduce costs, increase visibility, and close the security gaps across the layers of your IT environment.
- High-performance endpoint security suite protects virtual and physical desktops against today’s evolving threat landscape using the broadest range of anti-malware techniques available to stop ransomware and other attacks.
- Deep Discovery Inspector is a physical or virtual network appliance that monitors 360-degrees of your network to create complete visibility into all aspects of targeted attacks, advanced threats, and ransomware.
- Through use of extensive detection techniques, monitoring of all network activity, custom sandbox analysis, and correlated threat intelligence.Deep Discovery Inspector can detect and analyze malware, command and control (C&C) communications, and evasive attacker activities that are invisible to standard security defenses.
- Smart Protection for Endpoints.
- ScanMail Suite for Exchange.
- Deep Discovery Inspector.
2020-05-07T13:04:16+00:00
- Automate and centralize DNS management.
- DNS Traffic Control.
- Internal DNS Security.
- External DNS Security.
- DNS Firewall.
- DNS Firewall.
- Advanced DNS Protection.
- ActiveTrust Cloud.
- ActiveTrust.
- Network Insight.
- DNS Traffic Control.