|
|
Related Products
-
Shrimpy
Simplify the way you manage your portfolio by automating your trading strategy. Connect Shrimpy to all your crypto exchange accounts to automate trading strategies that can improve performance and reduce risk in the long-term. Automatically copy the top crypto traders on the only social trading platform that was built for simple portfolio management. No matter your experience with cryptocurrency, Shrimpy can help you build a portfolio strategy, track performance, and monitor the market. Shrimpy was built with your security in mind from the beginning. Every API key is securely encrypted and stored using FIPS 140-2 validated hardware security modules (HSMs) to protect the confidentiality and integrity of your exchange API keys. Shrimpy only requires the ability to read data and make trades, so your funds can't be removed from the exchange. We also encourage all users to utilize our Two-Factor Authentication (“2FA”) service which secures access to your account.
-
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
-
Securden Unified PAM
Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization.
• Enforce remote password resets on devices.
• Manage Windows domain, service, local admin accounts & their dependencies.
• Eliminate hardcoded-credentials from scripts and configuration files.
• Automate password access for non-human identities with APIs.
• Protect SSH keys, track usage & associate with UNIX devices.
• Share accounts with granular access controls.
• One-click remote access to assets without revealing passwords.
• Grant Just-In-Time access to privileged accounts.
• Shadow, Monitor & record live sessions.
• Endpoint privilege management with application controls.
• Integrate with AD, AzureAD for user provisioning.
• Integrate with solutions for MFA, SIEM, ITSM & SSO.
• Comply with regulations with audit trails & custom reports
-
Comet Backup
Start running backups and restores in less than 15 minutes! Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup.
Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers).
Comet’s modern ‘chunking’ technology powers client-side deduplication with no full re-uploads after the first backup. Backups are incremental forever—your oldest backup can restore just as fast as your most recent. No need for differentials or delta-merging. Data is compressed and encrypted during backup, transit and rest.
Test drive Comet Backup with a 30-day FREE trial!
-
ManageEngine Log360
Log360 is a one-stop solution for all your log management and network security challenges. This tightly-integrated solution combines the capabilities of ADAudit Plus, EventLog Analyzer, O365 Manager Plus, Exchange Reporter Plus, and Cloud Security Plus. With a versatile combination like this, you'll gain complete control over your network; you'll be able to audit Active Directory changes, network device logs, Microsoft Exchange Servers, Microsoft Exchange Online, Azure Active Directory, and your public cloud infrastructure all from a single console. Monitor and audit critical Active Directory changes in real time. Meet stringent requirements of regulatory mandates such as PCI DSS, FISMA, HIPAA, SOX, GLBA, GPG 13, and the GDPR by means of readily available reports. Receive exhaustive information in the form of audit reports on critical events in Azure Active Directory and Exchange Online.
-
Hotspot Shield
Protect yourself with military-grade encryption, and access sites and streaming content around the world. Hotspot Shield encrypts your connection and doesn’t log any data that could be tied to you, shielding your identity and info from hackers and cyber predators. With servers across 80+ countries and 35+ cities, our proprietary Hydra protocol optimizes your VPN to ensure fast, secure connections for gaming, streaming, downloading, P2P, and more.
-
ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
-
Golioth
Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud.
Select hardware and connectivity that meets your needs from your preferred vendor.
Use the open source Golioth Device SDK to integrate with your firmware securely. Once connected you can instantly monitor, manage, and update your devices from the Golioth console.
We’re a group of industry-leading hardware, firmware, and cloud engineers. We understand the struggle to connect “sand” to the internet, so we built a better way to do just that. We’re built for the embedded developer workflow. Use the tools you’re already familiar with to build robust and reliable devices, faster.
Choose from hundreds of hardware options and a variety of connectivity types, protocols, and multiple embedded RTOS providers.
Golioth provides a single control plane for all your devices, whether you’re exploring an idea, or improving an existing project.
-
Heimdal Endpoint Detection and Response (EDR)
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies:
- Next-Gen Antivirus
- Privileged Access Management
- Application Control
- Ransomware Encryption Protection
- Patch & Asset Management
- Email Security
- Remote Desktop
- Threat Prevention ( DNS based )
- Threat Hunting & Action Center
With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
-
Cerberus FTP Server
Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations.
- FTP/S, SCP, SFTP, HTTPS
- SAML SSO
- Active Directory & LDAP
- Secure SSL Encryption
- Two-Factor Authentication
- IP Auto-Banning and Geoblocking
- HIPAA Compliant
- FIPS 140-2 Validated
- Advanced Reporting
- Comprehensive Auditing
- Web File Transfer Client
- Email Notifications
- Event Support & Automation
- File Retention Policies
-Unlimited Connections
-Virtual Directories
-Users & Groups
-Detailed Logs
-Full IPv6 Support
-FTP with TLS/SSL
-SOAP control API
-Web Administration
-SSH2 SFTP and SCP
-Public Key Authentication
|
|