Best IT Security Software for Airlock

Find and compare the best IT Security software for Airlock in 2024

Use the comparison tool below to compare the top IT Security software for Airlock on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,132 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 3
    LogPoint Reviews
    LogPoint provides a simple and quick security analytics implementation. It also offers a user-friendly interface which can be integrated with any IT infrastructure. LogPoint's modern SIEM and UEBA offers advanced analytics and ML driven automation capabilities that enable customers to secure build-, manage and transform their businesses. This allows for lower costs to deploy a SIEM solution either on-premise or in the cloud. The solution can be integrated with all devices on your network to provide a comprehensive and correlated overview over events in your IT infrastructure. LogPoint's Modern SIEM software translates all data into a common language that allows you to compare events across different systems. A common language makes it easy to search, analyze, and report on data.
  • 4
    Kaspersky Anti-Virus Reviews
    Top Pick
    It blocks the latest viruses, ransomware and spyware as well as cryptolockers. This also helps to stop cryptocurrency mining malware from affecting your computer's performance. Antivirus protection that works in real time. Blocks ransomware, cryptolockers & more. Prevents the spread of cryptomining malware. Your PC will perform as it was designed.
  • 5
    Google Authenticator Reviews
    Top Pick
    Google Authenticator generates 2-Step verification codes on your phone. 2-Step verification provides greater security for your Google Account. It requires a second step to verify your identity when you sign in. You will need a code that was generated by Google Authenticator on your phone in addition to your password.
  • 6
    Panda Fusion Reviews

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Endpoint Protection Plus and Systems Management solutions to protect, manage, and support all your corporate devices. Cloud-delivered solutions allow for rapid deployment without the need for costly server infrastructure investments or maintenance. Maximum Security: Continuous protection of all office endpoints, inside and out. - Proactive Support & Maintenance: Rapid incident management, troubleshooting. - Centralized Control & Management: Permanent visibility to all hardware, software, and other IT infrastructure components.
  • 7
    Sophos Central Device Encryption Reviews
    Remote working has made it more critical than ever to protect computers and data. Full disk encryption is a critical first line of defense against theft or loss of laptops. Sophos Central Device encryption leverages Windows BitLocker as well as macOS FileVault to protect devices and data.
  • 8
    IBM Verify Reviews
    Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
  • 9
    Kobil Reviews

    Kobil

    Kobil Systems

    Secure digital identities and business communication are now possible. Our platform is designed to simplify all business processes and ensure the highest security standards. Start your journey today! You can quickly build your own ecosystem of integrated customers, partners, and technologies with just a few steps. All identities can be added immediately via email, SMS, post, or any other method you choose. Our secure user directory allows you to connect and sync your user database in just one click. In minutes, create your own super app; enrich your ecosystem; and integrate partners. You can easily integrate many ready-made integrations in a matter of minutes without any coding or developers. KOBIL's next-generation digital identity solution supports all possible (identity) use cases. Allow identities to securely log into your websites, apps, or mini apps.
  • 10
    Symantec Advanced Authentication Reviews
    Symantec Advanced Authentication solutions can help you reduce threats and encourage growth. You can get real-time protection for both your online and mobile apps. Our innovative solution allows you to authenticate an employee, partner, or contractor while providing a seamless login experience. This allows legitimate users to access any device at any time, from any device. This builds trust and brand loyalty. You can get a flexible and scalable solution that includes strong multi-factor authentication as well as risk-based methods such device identification, geolocation, and user activity.
  • 11
    Webroot BrightCloud Threat Intelligence Reviews
    Webroot BrightCloud®, Threat Intelligence Services are integrated by top security vendors worldwide to help you provide proactive protection against modern threats to your customers. Webroot BrightCloud®, Threat Intelligence Services help protect your customers against malicious URLs, files, IPs, and mobile apps. They integrate accurate, near-real-time threat intelligence into both your network and endpoint security. The platform scans billions upon billions of URLs and millions upon millions of domains. It also leverages machine learning to classify each threat according to its importance to your business. Cloud-based solutions that provide instantaneous updates are essential in today's cyber threat landscape. Many of the malware we see today may disappear tomorrow.
  • 12
    Fujitsu Biometrics-as-a-Service Reviews
    Fujitsu is transforming the market with its cloud-based identity platform, or Biometrics-as-a-Service, through quick deployment that lowers costs and allows customers to choose and blend modalities to develop the best use case for their particular organization and requirements, permitting rapid integration with existing business intelligence and systems. Fujitsu offers plug-and-play, pay-per-use biometric-enabled solutions. These solutions can support more than 50 biometric devices and respond instantly to different modalities. With a pay-for-use business model, you can get biometric enablement quickly and at lower costs. This platform is open to all industries, including healthcare, financial services, and manufacturing. It allows multiple modalities, such as voice, facial, and fingerprinting.
  • 13
    RSA ID Plus Reviews
    Cloud solutions that support your digital transformation at your pace, tailored to meet every identity and access management need. ID Plus also includes the multi-functional DS100 hardware authentication device. All plans can be deployed in the cloud, on prem or hybrid. All plans can be easily modified to meet your changing needs. ID Plus cloud multifactor authentication (MFA), one of the most secure products available and the most widely used MFA in the world, is a great choice. Register for our 2-week free trial to find out why.
  • 14
    Blink Reviews
    Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls.
  • 15
    Lucidum Reviews
    The attack surface isn't just your internet-connected devices, IOT, or endpoints. It's everything. Other CAASM vendors want to replace your SIEM, or upgrade your spreadsheet. We don't disrupt your workflow, we serve it, we don't fight your SIEM, we fit it. Lucidum helps you identify the main causes of data loss, security incidents and mismanagement. You will get incredible value from 4-6 connections. We don't charge you for connectors, or ingestion. Just connect them all. Directly inject CAASM into SIEM. Reduce costs by reducing ingestion and streamlining computing. We provide cybersecurity professionals with CAASM insights to map, monitor, and manage every cyber asset. This enhances their ability to uncover hidden risks and mitigate threats. We offer unprecedented control of the technology landscape by leveraging the combined strengths of CAASM and AI for predictive analytics.
  • 16
    OneSpan Authentication Servers Reviews
    Multi factor authentication and transaction signing capabilities can be deployed at large scale to secure access and transactions. Use API technologies and proven authentication servers to protect access and transactions, and simplify identity management. Secure access to corporate resources as well as banking applications by using strong authentication Secure transaction signing is possible with the user-friendly Cronto®. technology. A single integrated system simplifies authentication management. Support new standards in network access and application security for all major operating systems and platforms. Server downtime and service disruptions can be eliminated to ensure business continuity. No matter what operating system or architecture, server solutions can be deployed. OneSpan server solutions validate authentication requests to provide secure and seamless access for a variety corporate resources and applications.
  • Previous
  • You're on page 1
  • Next