Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
TekSIP for Windows is a SIP Registrar as well as a SIP Proxy. TekSIP supports UDP (IPv4 & IPv6), TCP (IPv4 & IPv6), TLS, and WebSocket transports. Only commercial editions support Secure WebSocket and TLS. TekSIP has been tested on Microsoft Windows Vista and Windows 7/8/10/11 servers. TekSIP is a signaling service for WebRTC based SIP-based phones.
TekSIP is compliant with RFC 3261 and RFC 3263. It also complies to RFC 3581, RFC 3891, RFC 3311 and RFC 3481. It supports NAT traversal, ENUM. Please refer to Readme for technical details on NAT traversal. You can choose the IP address that will be listened to and alternative SIP endpoints when making outgoing calls. You can also log the session details in a log and monitor registrations and active sessions in real-time. Windows Performance Monitor (Perfmon.exe) allows you to monitor the number of active sessions and registrations. TekSIP redirects calls to an alternate endpoint if the called endpoint is not available (Offline, busy ...). GUI can be used to terminate an active SIP session.
Description
Protector Air aims to safeguard individual sessions and the transactions that occur within them. In addition, Protector Endpoint enhances security for both internal and external endpoints by actively neutralizing the keylogging and data-extraction functionalities of malware, thereby thwarting the theft of vital corporate or user credentials along with other confidential information exploited by cybercriminals to engage in fraud or attain unauthorized access to corporate networks. Designed as a targeted solution against crimeware attacks, Protector Endpoint recognizes the increasing sophistication of such threats, which renders traditional detection-and-removal methods of antivirus software ineffective. Many conventional endpoint protection solutions tend to be cumbersome and difficult to manage, making them less desirable. Rather than focusing on detection and removal of crimeware, Protector Endpoint takes a more proactive approach by disabling the functions of crimeware, thus preventing it from gathering sensitive information. Consequently, without access to data entered by users in their browsers, cybercriminals are rendered incapable of executing their criminal schemes effectively. This shift in strategy highlights the need for more innovative security measures in the face of evolving cyber threats.
API Access
Has API
API Access
Has API
Integrations
TekRADIUS
Pricing Details
$239
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
KaplanSoft
Founded
2011
Country
Turkey
Website
www.kaplansoft.com
Vendor Details
Company Name
Trusted Knight Corporation
Founded
2010
Country
United States
Website
www.trustedknight.com/protector-endpoint-protection/
Product Features
Telephony
Auto-Dialer
Call Center Management
Call Monitoring
Contact Management
IVR / Voice Recognition
Inbound Reporting
Outbound Reporting
Predictive Dialer
Telemarketing Management
VoIP
Voice & Data Integration
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting