Best Alexio Defender Alternatives in 2024

Find the top alternatives to Alexio Defender currently available. Compare ratings, reviews, pricing, and features of Alexio Defender alternatives in 2024. Slashdot lists the best Alexio Defender alternatives on the market that offer competing products that are similar to Alexio Defender. Sort through Alexio Defender alternatives below to make the best choice for your needs

  • 1
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 2
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    1 Rating
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 3
    Qualys TruRisk Platform Reviews
    Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors.
  • 4
    EventSentry Reviews

    EventSentry

    NETIKUS.NET ltd

    $85.00/one-time
    Hybrid SIEM solutions combine real-time log monitoring with comprehensive system and network monitoring to provide users with a complete view of their servers, endpoints, and networks. The security event log normalization and correlation engine with descriptive emails alerts provides additional context. It presents cryptic Windows security incidents in easy-to-understand reports that provide insight beyond what is available as raw events. EventSentry's NetFlow component visualizes network traffic and can detect malicious activity. It also provides insight into bandwidth usage. EventSentry's ADMonitor component makes it easy to keep track of Active Directory changes. It records all changes to Group Policy objects and provides a complete user inventory that can be used to identify old accounts. There are many integrations and multi-tenancy options.
  • 5
    Avast Small Business Solutions Reviews
    Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Go about your business knowing you are backed by effective cybersecurity built for small companies. Control your IT security from anywhere, powered by the cloud, advanced AI, and a global threat detection network. Avast Small Business Solutions consist of: * Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks.  * Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline.  * Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
  • 6
    CimTrak Integrity Suite Reviews
    Compliance standards and regulations require that you secure your enterprise from both internal and external threats. CimTrak's auditing, change management, and reporting capabilities enable private and public companies alike to meet or exceed the most stringent compliance requirements. CimTrak covers all compliance requirements, including PCI, SOX and HIPAA. CIS, NIST, CIS, and many others. CimTrak's File and System Integrity Monitoring helps protect your important files from accidental or malicious changes that could cause damage to your IT infrastructure, compromise your data, or violate regulations like PCI. IT environments are subject to change. CimTrak provides integrity monitoring, proactive response to incidents, change control, auditing, and auditing capabilities all in one cost-effective file integrity monitoring tool.
  • 7
    360 Security Guard Reviews
    360 Security Guard is a leading security antivirus product that can detect and kill all types of Trojan viruses. It is committed to protecting users' computers security. We have many features that will improve your computer's efficiency. You can scan the computer in multiple dimensions, including garbage collection, computer running speed, system abnormalities and computer security risks. This will quickly assess the system's status. To detect the threat situation immediately, 38 layers of protection barriers are added layer after layer, creating an all-weather, all-weather cyberspace defense. You can get the most recent information about popular games and events in real-time, gather multiple media, unify the entrance. Get the latest and most popular games, download and install them, and get access to them through 360 exclusive distribution channels.
  • 8
    McAfee Total Protection Reviews
    McAfee®, Total Protection provides protection for your security needs today, so that you can live your life online. Safe browsing, premium antivirus. Secure VPN and ID theft protection. McAfee is more than antivirus software. It offers peace of mind. McAfee protects what is most important - you. McAfee has protected over 500 million devices using its award-winning antivirus. However, we understand that you need a solution to protect your privacy and personal information, as well as help you navigate safely online. Multi-layered identity protection protects your accounts by notifying you if your information is leaked online and automatically generating complex passwords. Secure VPN turns unsecured networks into your private network, protecting your credit card information and personal data. Search results and social media pages can be contaminated by color-coded links that expose fraudulent and dangerous sites. We'll even direct you to safety if your misclicks are detected.
  • 9
    AVG Internet Security Reviews
    You can have total security online. AVG Internet Security is an award-winning antivirus that offers customizable firewalls, remote access protection against hackers, as well as award-winning antivirus. AVG Internet Security protects you from viruses and malware, keeps emails safe, protects passwords and webcams from hackers, and allows you to shop and bank online with no worries. Advanced Antivirus scans your computer for viruses, ransomware and spyware. If suspicious software behavior is detected on your computer, Behavior shield will send alerts. AI Detection proactively detects malware samples to protect your computer from new threats. CyberCapture automatically uploads malware samples to our antivirus software for analysis. This prevents new threats. You can stay safe online by scanning downloads, emails, and links for potential threats. Also, avoid unsecure Wi-Fi networks. Link Scanner scans links for suspicious content to avoid dangerous websites.
  • 10
    McAfee WebAdvisor Reviews
    McAfee WebAdvisor helps you stay safe while browsing and searching the web. WebAdvisor protects you from malware and phishing attempts as you surf the web. It does not affect your browsing performance. Protect yourself against malicious sites that may contain spyware, viruses, adware, and phishing scams. McAfee WebAdvisor is free and will help you enjoy worry-free web surfing. McAfee WebAdvisor offers misclick protection to block malware and phishing websites if you click on a malicious URL, typo protection that protects against incorrectly typed web addresses and points you in the right direction, safer downloading that scans your downloads and alerts if there is a risk, security check to make sure your firewall and antivirus are active before you surf, and safe browsing that uses a color-coded system that lets you know which links you can click.
  • 11
    ZoneAlarm Extreme Security NextGen Reviews
    ZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses.
  • 12
    Avast Ultimate Business Security Reviews
    Top Pick
    Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management with online management console * Device Protection with next-gen antivirus * Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection * Online Security and Privacy with VPN, Web Shield, end Web Control * Patch Management
  • 13
    Microsoft Defender for Individuals Reviews
    The Microsoft Defender app is now available for download as part of your Microsoft 365 subscription. It provides easy-to-use online security for you, your family and your devices. One centralized view allows you to monitor and manage your security status across all your devices and computers. Anti-phishing and antivirus protection can help protect your family and you from online threats. Receive real-time alerts that include recommended actions and information about how you can stay safe online. All your online security status can be viewed from one central location. All your data and device protections for your family are available in one place. You can easily add or remove devices. You and your family can rest easy knowing that malware protection is available. You get continuous protection with antivirus scans for your devices and apps. You can control what files and apps are scanned by identifying trusted ones. Receive real-time alerts about security changes that affect you and your family.
  • 14
    Webroot Internet Security Complete Reviews
    Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. While antivirus protects your devices and VPN protects your connection by keeping you browsing private, both work together to provide you with security and privacy while you work, share, bank, browse, and bank. Webroot protects usernames, account numbers, and other personal information from online threats. Our cloud-based protection keeps your family and you safe every time you connect. Webroot is the most efficient, lightweight and cost-effective antivirus product on the market. You can stay safe at home and on the move. Access your files on your mobile device securely and easily. Privacy protection and system maintenance tool that erases all past online activity to protect privacy.
  • 15
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 16
    Bitdefender Premium Security Reviews
    All you need, when you need it: unlimited VPN, password manager and priority support. Multi-platform. The most advanced technologies are available to detect, prevent, detect, and remedy any cyber-threat anywhere in the world. Bitdefender Premium Security provides the best protection against cyber threats across all operating systems. This premium security and privacy pack includes the multi-awarded Bitdefender Total Security. It also includes a powerful VPN that allows unlimited traffic and a multiplatform Password Manager. Bitdefender's multi-layered protection is unbeatable and protects your devices from all cyber threats. Bitdefender security software responds immediately to online threats without compromising your system's performance. Bitdefender Premium Security protects your privacy online and personal information.
  • 17
    iPrism Web Security Reviews
    iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service.
  • 18
    Kaspersky Endpoint Security Reviews
    You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
  • 19
    LogPoint Reviews
    LogPoint provides a simple and quick security analytics implementation. It also offers a user-friendly interface which can be integrated with any IT infrastructure. LogPoint's modern SIEM and UEBA offers advanced analytics and ML driven automation capabilities that enable customers to secure build-, manage and transform their businesses. This allows for lower costs to deploy a SIEM solution either on-premise or in the cloud. The solution can be integrated with all devices on your network to provide a comprehensive and correlated overview over events in your IT infrastructure. LogPoint's Modern SIEM software translates all data into a common language that allows you to compare events across different systems. A common language makes it easy to search, analyze, and report on data.
  • 20
    Sealit Reviews
    You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you.
  • 21
    Webroot Internet Security Plus Reviews
    Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur.
  • 22
    Defencebyte Reviews

    Defencebyte

    Defencebyte

    $39 per year
    To ensure your computer's safety and performance, download our antivirus software. You can give your computer a new lease on life by removing all unnecessary files and programs. Your antivirus online purchase will keep your computer free from unwanted software. You can trust defencebyte to keep your computer safe online no matter what. We are available to assist you 24/7 if you have any questions about your online antivirus purchase. You can give your computer a better level of protection by downloading an antivirus for Windows. Windows computers are most commonly targeted by hackers and viruses. Ransomware can target your system and critical data. With defencebyte security, you can create a secure digital environment that protects your networks and systems. Ransomware traces are removed. Protects both devices and networks.
  • 23
    McAfee LiveSafe Reviews
    McAfee®, LiveSafe™, is the best protection for your computers, Macs and smartphones. McAfee LiveSafe offers award-winning antivirus protection, as well as many other features, to protect your computer, mobile devices, and identity. We keep you safe so that you can concentrate on what is important. Protect your computer from viruses and other threats with both online and offline protection. One subscription protects your Macs, PCs, smartphones, tablets, and computers. When you connect to public Wi-Fi, keep your browsing habits and data secure. McAfee LiveSafe is a standout among our security solutions. Its combination of privacy, identity tools, and antivirus features will protect you against all types of threats. When you sign up for auto-renewal** you will have access to our secure VPN. This provides bank-grade encryption to protect your online activities and personal information.
  • 24
    Webroot Business Endpoint Protection Reviews
    Endpoint protection software is required to protect your business. It must be stronger and more intelligent than traditional antivirus. Endpoint protection or endpoint security is a general term for cybersecurity services that protect network endpoints such as laptops, desktops and smartphones, tablets, servers and virtual environments. These services can include antimalware and web filtering. Endpoint protection is essential for businesses to protect their critical systems, intellectual property, customers, employees, and guests from ransomware and other cyberattacks. You may be asking yourself, "Do I really need endpoint protection?" The truth is that criminals are constantly inventing new ways to attack networks, steal data, and take advantage of employee trust. Although smaller businesses may believe they are not at risk, this is false. Small businesses with 100 employees and fewer are now at the same risk as larger enterprises with 20,000 employees.
  • 25
    Matrix42 EgoSecure Data Protection Reviews
    Everything works as it did before, but now it's secure. All-round protection for your devices, applications, and sensitive company data. Your data remains secure. Digital networking and device diversity allow for greater flexibility, but they also increase the risk to malware, data loss, theft, and other threats. Traditional antivirus and firewall protection are no longer sufficient to close security gaps. You can quickly see all data flows within the network with a click of a mouse and trigger the appropriate protection measures. Insight Analysis - This analyzes the network's security to determine the best protection measures. As a dashboard, you can view the analysis results. It is not possible to draw conclusions about individual users' activities. Reports can be generated automatically and sent via e-mail.
  • 26
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 27
    BrowseControl Reviews
    BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
  • 28
    Kaspersky Security Cloud Reviews
    All our top apps and features in one place. 6 premium apps & products for Windows, macOS Android, iOS, and iOS - all in one location & packed full of 100s of features. Anti-ransomware, parental controls, mobile security, password management and VPN*. Privacy tools, data leak detection and Home Wi-Fi security are all available remotely. Find out if your private account data has been leaked and get advice on what you should do next. You will be notified immediately if any unknown app attempts to connect with your webcam or microphone. To keep you safe, you can also receive personalized alerts and warnings directly to your devices. Cloud-based security keeps your devices safe and secure. You can view metrics that show the health of your hard drive and make predictions about how to fix them. Specially designed tools make it easy to manage storage space and battery life for your Android devices.
  • 29
    SpyShelter Reviews

    SpyShelter

    SpyShelter

    $25 per year
    SpyShelter Anti Keylogger monitors the behavior of all current actions on your computer and allows you to block any malware attempts to take place. SpyShelter can stop both custom-made and commercial keyloggers. This technology is unique and cannot be detected by anti-virus software. SpyShelter doesn't rely on fingerprint databases, so you won't have to worry about zero day malware. Your registry, RAM, and all applications will be protected as soon as SpyShelter is installed. SpyShelter's fast algorithm processing is faster than other security software. This makes it more suitable for older computers. SpyShelter Anti Keylogger offers solid protection against both known and unknown "zero day" spy and monitoring software. This includes keyloggers screen loggers webcam loggers and keyloggers.
  • 30
    CloudJacketXi Reviews
    CloudJacketXi, a Flexible Managed Security-as-a-Service Platform. No matter if you are an established company or a start-up SMB, our service offerings can be customized to meet your needs. We are experts in flexible cybersecurity and compliance offerings. Our services are available to clients in many verticals, including government, legal, medical and hospitality. Here's a quick overview on the various layers of protection that can tailor to your organization's needs. Flexible Layers: Our flexible security-as-a-service platform allows for a layered approach where you can choose exactly what your organization needs. Intrusion Prevention System; Intrusion Detection System Security Information and Event Management Internal Threat Detection Lateral Threat Detection Vulnerability Management Data Loss Prevention All monitored and managed by SOC.
  • 31
    Intruder Reviews
    Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
  • 32
    Panda Fusion Reviews
    Fusion combines our Endpoint Protection Plus and Systems Management solutions to protect, manage, and support all your corporate devices. Cloud-delivered solutions allow for rapid deployment without the need for costly server infrastructure investments or maintenance. Maximum Security: Continuous protection of all office endpoints, inside and out. - Proactive Support & Maintenance: Rapid incident management, troubleshooting. - Centralized Control & Management: Permanent visibility to all hardware, software, and other IT infrastructure components.
  • 33
    Intrusta Reviews

    Intrusta

    iSubscribed

    $24.99 one-time payment
    Digital security should be simple for you, we believe. We are here to protect you so you can click, surf, and browse without worry. We are your partner. We identify, analyze, and prevent threats so that you can get on with your day. Intrusta's goal to simplify online security is ours. We make it easy to use our software, pay your bill, or chat with a customer service representative. We have moved on from confusing billing practices and shocking price hikes. We will tell you upfront what you pay and when. You shouldn't be surprised when renewal time comes around. We are perpetual learners and have a knack to improve. Our knowledge helps us keep up with changing threats. We are proud of our outstanding support. We are reliable, empathetic and always available to help. We can help you with any technical, product, or payment problem.
  • 34
    Barracuda Web Security Gateway Reviews
    Barracuda Web Security Gateway allows organizations to use online tools and applications without being exposed to web-borne malware, viruses, lost productivity, or misused bandwidth. It is a comprehensive solution to web security and management. It combines award-winning spyware, virus, and malware protection with a powerful policy engine and reporting engine. Advanced features allow organizations to adapt to new requirements such as remote filtering, social-network regulation, and visibility into SSL encrypted traffic. Remote user licenses can be purchased for unlimited access to the corporate network. This allows you to control content and access policies on mobile devices. Virtual appliances are also available for the Barracuda Web Security Gateway. Barracuda Content Shield is a hosted web security solution.
  • 35
    Dhound Reviews

    Dhound

    IDS Global

    $30 per month
    Your business is connected to sensitive data or critical infrastructure. You understand the costs of an attacker finding a vulnerability. You are required to follow security regulations set forth by law. SOC2, HIPAA, PCI DSS, etc.) You are required to conduct pentests conducted by a third party company. Your clients promise partnership only if you provide reliable and secure solutions. You keep your promises and guarantee your system security through penetration testing. Pen test is a fake hacking attack, but it is performed by security knights who are dedicated to protecting your web security. Penetration testing, also known as ethical hacking or pen test, is performed by Dhound so that you can let out your worries and feel confident in the security of your system. Dhound's ethical hacking does not only look for vulnerabilities, unlike vulnerability assessment. It would be too simple for us. We use hackers' mindsets and techniques to stay ahead of our adversaries. But we don't worry!
  • 36
    Exigence Reviews
    Exigence provides a command-and-control center software that helps manage major incidents. Exigence automates collaboration between stakeholders within and outside the organization. It organizes it around a timeline that records each step taken to resolve an issue and drives workflows among stakeholders and tools. This ensures that all stakeholders are on the same page. The product connects stakeholders, processes, and tools, reducing time to resolution. Customers who have used Exigence have experienced a transparent process, quicker onboarding of the relevant stakeholders, and a shorter time to resolve critical incidents. Exigence is used by customers to address critical incidents as well as for planned cyber incidents such as business continuity testing or software release.
  • 37
    iLocker Reviews

    iLocker

    Protectstar

    $376 per year
    iLocker makes your Mac more flexible and safer, even if you are sharing your Mac with others. iLocker Mac protects each app from unauthorized access, including Apple Mail, Photos Contacts Safari and Games. iLocker Mac protects the apps you choose. It also records failed attempts to access protected apps so that you can see the date and time. To improve security, the automatic exit feature locks down the app after a certain time when you are away from the keyboard. There is only one way to protect the app you want. You can just drag and drop your apps onto the button. You can now unlock your Mac instantly. Apple Pay is a secure way to make online purchases. Access system settings and locked Notes quickly. You can even switch users with a single touch.
  • 38
    OSE Reviews
    Compromised organizations can face significant barriers to restoring customer trust and brand reputation after being hacked. OSE alerts you to any attacks on your critical systems and warns you if they happen so that you can stop them before they cause damage to your brand, reputation, IP, and customer trust. OSE provides an audit of an attack, listing the changes made and what they were before resolving it quickly. OSE reporting is helpful in ISO 27000 compliance. OSE (Operating System Security Enforcer), implements your Security Policy. This can be either an out-of-the-box OSE standard or your customized version. Applying the security policy to all Unix, Linux, and Windows corporate servers.
  • 39
    NerveCenter Reviews
    Sometimes, primary utility power outages can occur. These are often caused by weather or poor infrastructure. Reliable backup power op UPS power is essential to maintain network uptime as networks grow in size, complexity, and importance. UPS batteries can lose their capacity as early as three to five years. Although UPS battery manufacturers might advertise a 10-year battery life, or a life span, external factors can cause battery degradation and shorten its life. Internal cell resistance (via temperatures) - To verify the health of low-capacity cells. Inter-Cell Resistance is a way to ensure that cells have conduction path integrity. This allows for hot spots, fires and abrupt shut downs through temperature monitoring. A properly monitored UPS battery system will have a longer life span, use less energy to charge, and require less maintenance. Increase network uptime and prevent outages due to UPS failures, UPS capacity issues, and drained UPS batteries.
  • 40
    Sophos Home Reviews
    The malware that targets fortune 500 companies also attacks private users. Sophos Home employs the same award-winning security measures that keep these companies safe. Sophos Home scans your computer and removes any malware that might be slowing it down. By blocking ransomware and viruses from stealing and destroying files, documents, or photos, you can keep your private information secure. Sophos Home protects you from hackers and phishing so you can surf the internet with confidence. It starts with a deep scan of your computer and cleaning it clean to remove any hidden threats. Your system is cleaned of any malware. Removes trojans rootkits, spyware and other malware. Protects against viruses and malware, trojans. Worms, bots. Unwanted apps.
  • 41
    ITsMine Beyond DLP Reviews
    ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available.
  • 42
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 43
    Xeams Reviews

    Xeams

    Synametrics Technologies

    $20.00/year/user
    Xeams, a secure and powerful complete email server for Windows, Linux Solaris, MacOSX, and other flavors UNIX, is available. Xeams supports SMTP and POP3, as well as IMAP. It has a powerful spam filtering engine which eliminates up to 99 percent of junk mail upon installation. It is very user-friendly because it offers a flexible approach to email.
  • 44
    Ransomware Defender Reviews

    Ransomware Defender

    ShieldApps Software Development

    $49.99 one-time payment
    Ransomware Defender from ShieldApps is a unique solution that deals with ransomware. Ransomware Defender is specially designed to detect and block ransomware before it causes any damage. It blacklists and stops both unique and common ransomware. Ransomware Defender is installed and stands guard 24 hours a day using active protection algorithms that are enhanced with user-friendly notifications and alerts. Ransomware Defender is fully automatic and takes care of all threats using an advanced Scan > Discover > Lock Down mechanism. This protects against detected threats and works with all major antiviruses and antimalware products. Ransomware Defender includes a scheduled automatic scan, a secure file eraser, lifetime updates, and support! It detects and removes all known ransomware before it can cause damage to your computer. This program will scan your computer and locate hidden ransomware in high- and low-level folders.
  • 45
    TACHYON Endpoint Security 5.0 Reviews
    Advanced anti-virus solution that blocks cyber threats like malware, spyware, ransomware and others. Protect your system and other important information with enhanced monitoring and protection.
  • 46
    Anti-Executable Reviews
    By blocking unauthorized executables, you can stop threats from ever starting. Faronics Anti-Executable stops unknown threats from bypassing your antivirus solution. It protects against sophisticated threats such as zero-day attacks, mutating malicious software, and advanced persistent threats. This requires an approach that goes beyond traditional antivirus solutions. By ensuring that only approved applications are allowed on a computer, it also ensures that you are protected from any unknown threats. Faronics Anti-Executable provides security and flexibility to protect your endpoints. Faronics Anti-Executable ensures that your servers are always protected. Faronics Anti-Executable protects your identity and keeps your computer safe against malware. Faronics Anti-Executable offers security beyond antivirus by preventing unauthorized programs - malicious, unlicensed, or simply undesirable - from ever executing.
  • 47
    Stronghold Antivirus Reviews
    Stronghold Antivirus is an antispyware and antivirus software that provides superior real-time proactive (on-access), and on-demand protection for your computer at home and office. Stronghold Antivirus detects and eliminates over 3.500.000 known viruses, spywares, adwares, trojans rootkits, and other threats. It uses a regularly updated database of malicious footprints to do this. Active on-access shield protection protects against unknown threats. Stronghold Antivirus is easy to use and pleasing to the eyes. Professionals will enjoy the additional features. Despite being powerful, it is very lightweight and won't consume any noticeable system resources. You can create any scan area, customize on-demand or on-access protection modules and schedule scanning with separate settings. You can also add programs to white and/or black lists and manage them.
  • 48
    Syspeace Reviews

    Syspeace

    Treetop Innovation

    $4.20/month/server
    Syspeace protects Windows Servers against potentially dangerous incidents like hacking or brute force attacks. Syspeace is an essential addition to firewalls and antivirus solutions. Syspeace can be downloaded for free and you can try it for 30 days. Our per-computer licenses can be purchased when you are ready. They are flexible and affordable. You only pay what you use. You also get all updates. This is how it looks. Your company has a physical location. You would expect that security guards would protect your facility if someone attempts to gain access repeatedly using a fake key or invalid card. You might think that antivirus and firewall protection are sufficient for your servers. Antivirus and firewall software can only protect your facility from attacks at certain gates, but not against intruders.
  • 49
    eScan Reviews

    eScan

    MicroWorld Technologies

    $58.95/one-time/user
    eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication.
  • 50
    G DATA Reviews
    G DATA prepares your optimally for cyber threats. It opens up all possibilities for the digital future. G DATA was the first company to develop antivirus software. It was launched in 1987. We protect our customers from all types of cybercrime today with end-to–end solutions and services using the latest security software and AI technologies. We also offer online security awareness training to teach employees safe behavior. G DATA customer support is available 24 hours a day, with support teams and the G DATA SafetyLab working together at the same place. Independent tests have shown that G DATA IT security solutions offer the highest attack detection rates to effectively combat Trojans, malware, and other unknown viruses.