ORION
ORION prevents data loss by analyzing data in motion with context-aware, proprietary AI agents, significantly reducing operational overhead and false positives while drastically increasing the number of real incidents detected and prevented.
Our specialized agents understand the context behind every data trace in real-time, from classification, lineage, identity, environment, to external relations, analyze it for data loss indicators, detecting and preventing exfiltration.
Learn more
Curtain LogTrace File Activity Monitoring
Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Licensing:
Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
Learn more
Zscaler
Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
Learn more
Kitecyber
Kitecyber provides an AI-powered endpoint security solution to protect your workforce and data from modern threats like AI agents, data exfiltration, credential theft and insider risk. Our unified security agent runs on each endpoint and provides comprehensive security while meeting compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc.
Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The unified agent offering includes the following protections:
1) Control and visibility into AI agent usage
2) Secure Web Gateway to safeguard internet access
3) Eliminate Shadow SaaS and Shadow AI
4) Anti-Phishing measures to protect user credentials
5) Zero Trust Private Access (Next gen VPN)
6) Data Loss Prevention across all devices—Mac, Windows, and mobile
7) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors
8) Continuous Compliance Monitoring
Learn more