|
|
Related Products
-
Google Cloud Platform
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits.
Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
-
ManageEngine Endpoint Central
ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
-
Heimdal Endpoint Detection and Response (EDR)
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies:
- Next-Gen Antivirus
- Privileged Access Management
- Application Control
- Ransomware Encryption Protection
- Patch & Asset Management
- Email Security
- Remote Desktop
- Threat Prevention ( DNS based )
- Threat Hunting & Action Center
With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
-
Cisco Umbrella
Cisco Umbrella is a cloud-delivered security service that secures internet access and controls cloud application usage across networks, branch offices, and roaming users. The DNS-layer security packages provide protection from malware, phishing, ransomware, and more by analyzing and learning from internet activity patterns to automatically uncover current and emerging threats. It proactively blocks malicious requests before they reach a customer’s network or endpoints.
-
ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments.
✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement.
✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly.
✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations.
✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
RISK IDENT
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sectors. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications. Our intelligent software products detect online fraud through an automated evaluation and interpretation of data points. We deliver results in real time and thus enable you to stop fraudulent attacks before the damage occurs. Multiple awards, serious data security. The challenge in fraud prevention is the networking and evaluation of all relevant data points at high processing speed. That is exactly what we deliver: Identifying anomalies in real time.
-
The Asset Guardian EAM (TAG)
The Asset Guardian (TAG) has a proven 15-year track record for maintaining, managing and optimizing enterprise assets with thousands of users worldwide.
TAG offers CMMS, EAM, APM, and Maintenance-as-a-Service applications that can scale with your organization’s needs and technological requirements. Its native application is based on Microsoft Dynamics 365 Business Central and integrates everything from Microsoft 365 to Azure cloud and IoT services, helping you decrease maintenance and asset costs, extend asset lifecycles beyond depreciation, and eliminate costly production downtime.
TAG’s mobile-EAM applications offer an unparalleled UX experience. TAG Mobility Suite was developed to provide maintenance individuals with role-based interfaces to support their specific processes, from inspections to IoT-connected assets and work order scheduling. Facilitate mobile maintenance adoption, improve communication, solve issues faster and manage resources in real-time, wherever you are.
|
|