Related Products
|
||||||
About
Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization
|
About
Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.
|
About
EDR is a 24/7 job. But it doesn't have to be yours. Implementing EDR is one of the most effective ways to strengthen your security posture. As with any enterprise platform, turning a tool into a capability can be difficult and time consuming. Red Canary gives you industry-leading technology backed by an expert team that has run hundreds of EDR instances for years. We’ll work alongside your team to unlock immediate value. Many EDR providers have SaaS offerings, but most come with data collection caveats to protect their resources. Red Canary provides full visibility EDR with zero on-premise deployment and long-term storage. A lot happens on your endpoints. Collecting, indexing, and storing high-volume telemetry requires significant hardware and software resources. Whether your EDR is on-premise or in the cloud, Red Canary gives you unlimited long-term telemetry storage with easy access when you need it.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Organizations looking for IT and network security and protection
|
Audience
IT Professionals searching for a solution to detect threats
|
Audience
IT teams looking for a powerful Cloud Security solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$270 per year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationBitdefender
www.bitdefender.com/business
|
Company InformationGFI Software
Founded: 1994
United States
www.gfi.com/products-and-solutions/network-security-solutions/keriocontrol
|
Company InformationRed Canary
Founded: 2013
United States
redcanary.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Firewall Features
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Endpoint Detection and Response (EDR) Features
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
|
||||
Integrations
Atera
Axonius
Azure Marketplace
BackBox
Beam AI
Bitdefender Sandbox Analyzer
Carbon Black EDR
CloudNuro
CrowdStrike Falcon
IRONSCALES
|
Integrations
Atera
Axonius
Azure Marketplace
BackBox
Beam AI
Bitdefender Sandbox Analyzer
Carbon Black EDR
CloudNuro
CrowdStrike Falcon
IRONSCALES
|
Integrations
Atera
Axonius
Azure Marketplace
BackBox
Beam AI
Bitdefender Sandbox Analyzer
Carbon Black EDR
CloudNuro
CrowdStrike Falcon
IRONSCALES
|
||||
|
|
|
|