Audience

Network security solution for IT teams

About DragonSoft DVM

The DVM detection project includes security vulnerability detection, vulnerability audit detection, account and setting audit detection, and supports risk assessment and statistics functions. It also has a database scanner to support database vulnerability detection and security risk assessment. D-GCB can detect the information and communication software of government agencies and units to test whether the endpoint device conforms to the TW GCB configuration settings, thereby reducing the risk of internal computer attacks and avoiding information security concerns. Hyper EDR can detect more than 5000 kinds of popular APT malware and hacking tools. This threat-aware mode does not require any Kernel Driver operation and consumes almost no extra CPU resources.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

DragonSoft Security Associates
Founded: 2002
United States
www.dragonsoft.com

Videos and Screen Captures

You Might Also Like
Engage for Amazon Connect, the Pre-built Contact Center Platform Icon
Engage for Amazon Connect, the Pre-built Contact Center Platform

Utilizing the power of AWS and Generative AI, Engage provides your customers with highly personalized, exceptional experiences.

Engage is a pre-built, intelligent contact center platform that transforms customer service.

Product Details

Platforms Supported
SaaS
Support
Phone Support
Online

DragonSoft DVM Frequently Asked Questions

Q: What kinds of users and organization types does DragonSoft DVM work with?
Q: What languages does DragonSoft DVM support in their product?
Q: What kind of support options does DragonSoft DVM offer?

DragonSoft DVM Product Features

IT Security

Vulnerability Scanning
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting