Best DNSFilter Alternatives in 2024

Find the top alternatives to DNSFilter currently available. Compare ratings, reviews, pricing, and features of DNSFilter alternatives in 2024. Slashdot lists the best DNSFilter alternatives on the market that offer competing products that are similar to DNSFilter. Sort through DNSFilter alternatives below to make the best choice for your needs

  • 1
    Control D Reviews
    See Software
    Learn More
    Compare Both
    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. With Control D you can: block malicious threats, block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more), redirect traffic using transparent proxies and gain visibility on network events and usage patterns, with client level granularity. Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
  • 2
    SpamTitan Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    SpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today!
  • 3
    Cloudflare Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Cloudflare is the foundation of your infrastructure, applications, teams, and software. Cloudflare protects and ensures the reliability and security of your external-facing resources like websites, APIs, applications, and other web services. It protects your internal resources, such as behind-the firewall applications, teams, devices, and devices. It is also your platform to develop globally scalable applications. Your website, APIs, applications, and other channels are key to doing business with customers and suppliers. It is essential that these resources are reliable, secure, and performant as the world shifts online. Cloudflare for Infrastructure provides a complete solution that enables this for everything connected to the Internet. Your internal teams can rely on behind-the-firewall apps and devices to support their work. Remote work is increasing rapidly and is putting a strain on many organizations' VPNs and other hardware solutions.
  • 4
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    121 Ratings
    See Software
    Learn More
    Compare Both
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 5
    SafeDNS Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    At SafeDNS, we are committed to creating a safer and more secure online environment for SMBs, enterprises, ISPs, MSPs, OEMs, and Education. We have a global footprint, making the internet safer for millions of users in over 60 countries. With years of experience in the field of cybersecurity and DNS filtering, we offer cutting-edge solutions to safeguard your digital life. Our innovative technologies help you stay protected against malware, phishing attacks, inappropriate content, and more. SafeDNS currently serves over 4000 institutions and home users around the world.
  • 6
    WebTitan Reviews
    Top Pick
    WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan Cloud for Wi-Fi is a cloud-based content filtering solution for your Wi-Fi environment. Wi-Fi guests can be exposed to unsuitable websites and malware. WebTitan Cloud for Wi-Fi allows you to control the content that can be accessed, creates a safe environment to access the internet, and provides your organization with reports regarding network usage. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. This makes the WebTitan Cloud DNS filter an ideal solution for organizations needing maximum protection and minimal maintenance. WebTitan Cloud is a low maintenance solution that can be set up in five minutes to stop your users from accessing inappropriate content online. Start your free Trial of WebTitan today, with full support included.
  • 7
    Perimeter 81 Reviews

    Perimeter 81

    Perimeter 81

    $8 per user per month
    1 Rating
    Perimeter 81, a SaaS-based solution that provides customized networking and the highest level of cloud security, is revolutionizing how organizations use network security. Perimeter 81 simplifies secure network, cloud, and application access for modern and distributed workforce with an integrated solution that gives companies of all sizes the ability to be securely mobile and cloud-confident. Perimeter 81's cloud-based, user-centric Secure Network as a service is not like hardware-based firewalls and VPN technology. It uses the Zero Trust and Software Defined Perimeter security models. It offers greater network visibility, seamless integration with all major cloud providers, and seamless onboarding.
  • 8
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 9
    FlashStart Reviews

    FlashStart

    FlashStart Group Srl

    $0.90/month
    5 Ratings
    It is very difficult to find data to show people who don’t care about malware. Although people may not be able to provide the exact details, almost everyone is aware that it's a serious threat. FlashStart blocks botnets, ransomware, malware, and other threats using global, top-class protection streams. You can block any web content that you find inappropriate by using content filtering. These sites could be dangerous, distracting, and unsavoury. Pro+ includes a secure, downloadable app. All devices are protected by centralized FlashStart protection at the home-office, cafe, and anywhere else. No router dependency. The idea is to optimize the filter to meet your individual needs. This is not an appliance. It is a lightweight application that runs on the existing IT systems of the end user. It should allow a low latency performance of less than 5ms.
  • 10
    Zorus Archon Web Filtering Reviews
    A web filtering platform that is fully integrated for managed service providers. Archon filters traffic via a proxy system. This allows you to allow access to certain parts of a site and block others. Archon is centrally managed and deployed in a single click. This eliminates the need for expensive hardware. Archon can learn from every new deployment and scan site to optimize itself. Traditional UTM systems protect devices only within their networks. Archon protection is portable with the device. Protect your clients wherever they are doing business. Gartner estimates that half of employees will continue working remotely even after COVID-19 is over. Traditional security platforms, such as corporate firewalls or VPNs, don't consider new work trends like hybrid work from home. Employees can access cloud storage and e-mail from multiple devices, even their personal computers. Archon was designed with geographic diversity in view.
  • 11
    Forcepoint Secure Web Gateway Reviews
    Protect the web from malware and threats by proactive protection. Full content inspection and in-line scanning help to reduce risk. You can easily secure your global workforce using a single endpoint with Web Security, DLP and CASB. Flexible connectivity and traffic redirection options are also available. You can deploy where, when, and how you want. You can choose from hybrid, on-premises, or cloud deployment architectures to move at your own pace to the cloud. Inline capabilities and behavioral analytics help to protect your data and policies around the globe. Consistent policies that provide strong access control for all sites, cloud apps, users, and other users on and off the corporate network. Protect users from malicious threats, including zero day threats. Protect users from zero-day threats using remote browser isolation and real-time threat intelligence. Deep content inspection is available for encrypted and unencrypted traffic, which allows you to detect evolving threats throughout the kill chain.
  • 12
    BrowseControl Reviews
    BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
  • 13
    ARMO Reviews
    ARMO provides total security to in-house data and workloads. Our patent-pending technology protects against security overhead and prevents breaches regardless of whether you are using cloud-native, hybrid, legacy, or legacy environments. ARMO protects each microservice individually. This is done by creating a cryptographic DNA-based workload identity and analyzing each application's unique signature to provide an individualized and secure identity for every workload instance. We maintain trusted security anchors in protected software memory to prevent hackers. Stealth coding-based technology blocks any attempts to reverse engineer the protection code. It ensures complete protection of secrets and encryption keys during use. Our keys are not exposed and cannot be stolen.
  • 14
    ScoutDNS Reviews

    ScoutDNS

    ScoutDNS

    $15 per month
    The DNS Layer provides content filtering and malware protection. ScoutDNS is used by organizations of all sizes to increase visibility, comply with content obligations and reduce malware exposure. You can manage 67 content categories. Search results for image and video images are restricted to Google and Bing networks. YouTube Strict and Moderate modes are supported with G Suite support. Block streaming media, P2P and social networks. Blocks ransomware, malware, and phishing websites. Stop hidden malware and objectionable contents in embedded ads. Easy to deploy and automatic updates to the latest threats. Full log reporting and dashboard. Create and mange multiple whitelist/blacklists.
  • 15
    DNSSense Reviews
    DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.
  • 16
    Cisco Umbrella Reviews
    Are you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement.
  • 17
    Webroot DNS Protection Reviews
    Protective filtering to increase security, visibility, privacy, and control. Maximize safety, minimize risks, and maximize productivity while surfing the internet. Businesses today need to have visible, secure, private, manageable, and visible control of internet traffic. The current domain name system (DNS), simply resolves internet requests via a global network of servers. These servers then translate those requests into unique Internet Protocol (IP), addresses. This vital service was not designed to be secure and there are many DNS vulnerabilities and exploits. Protective DNS services like Webroot®, DNS Protection allow organizations to manage their networks and ensure that they have the visibility, security, privacy, and visibility they need to protect their IT infrastructure and users. This includes remote workers. Its primary goal is to provide a secure, private, resilient, and manageable internet connection. Automated filtering uses Webroot BrightCloud® Internet Threat Intelligence in order to block requests.
  • 18
    Netsweeper Reviews

    Netsweeper

    Netsweeper

    $1 per month
    Netsweeper is a web filtering and digital monitoring platform that helps organizations protect internet users from harmful content. It also provides online activity reporting and web filtering solutions to ensure digital safety both on-premises and remotely. Netsweeper is the leading web filtering platform, with the lowest total cost-of-ownership. It provides advanced intelligence and management solutions to service provider networks, governments, as well as enterprises. Netsweeper can be onboarded in cloud or on-premise deployments. It works across multiple devices and systems to provide high levels of protection from all locations. Netsweeper is the most advanced content filtering platform for managing internet access and activity to protect users against illicit content and other web threats. Netsweeper's dynamic categorization engine scans billions of websites to find and sort the content and adds it to a Netsweeper Category Name Server database.
  • 19
    iPrism Web Security Reviews
    iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service.
  • 20
    Barracuda Content Shield Reviews
    Protect your business's web browsing. At any given moment, 18.5 million websites are infected by malware. Protect your business and users from malicious downloads, websites, and links. Protect your users, both local and remote, from malicious files and websites. 40% of internet activity is not work-related. With granular access policies, you can stop unproductive and inappropriate web browsing. You can get started in minutes and there is no need to install client software. Barracuda Content Shield Plus, a cloud-based service, offers robust content filtering, file protection, granular policy enforcement, reporting, and real-time threat information to protect your users, organization, and brand. Its proxy-free architecture guarantees minimal latency. Barracuda Content Shield offers advanced web security, but with a smaller feature-set. Content Shield offers advanced DNS filtering and URL filtering. It uses agent-based filtering.
  • 21
    Symantec WebFilter / Intelligence Services Reviews
    Symantec WebFilter is powered by the Global Intelligence Network. It provides real-time web content protection and security categorization. The web filtering service categorizes billions upon billions of URLs automatically into over 80 predefined categories. These include 12 security categories that IT administrators can easily manage. Symantec Secure Web Gateway includes Blue Coat ProxySG and provides the most precise and comprehensive web application control policy engine to protect your entire enterprise's web filter and cloud access protection. Advanced Intelligence Services adds new options to your webfilters and content control policies. They also offer additional security management options with URL threat levels and geolocation.
  • 22
    Palo Alto Networks DNS Security Service Reviews
    Palo Alto Networks DNS Security Service is a cloud-based analytics platform that provides your firewall access to DNS signatures generated by advanced predictive analysis and machinelearning. It also includes malicious domain data from a growing threat information sharing community. The DNS Security subscription service will increase your protection against DNS threats. DNS Security now offers individually configurable and extensible DNS Security Signature Categories. This allows you to create separate security policies based upon the risk factors associated certain types of DNS traffic. DNS Security now protects against additional DNS-based threats such as those that rely upon dynamic DNS hosted domains and recently registered domains.
  • 23
    CensorNet Web Security Reviews
    Censornet Web Security protects your organization from web-borne malware and offensive or inappropriate content. It also helps you manage time spent on websites that can impact productivity. Unique architecture ensures lightning-fast response times for all users, no matter where they may be in the world.
  • 24
    Forcepoint URL Filtering Reviews
    Forcepoint URL Filtering provides defenses against productivity It prevents the loss of web content and other threats to operations. It provides security. Delivering defenses against terrorism can increase organizational productivity Web activity that drains productivity while providing the required Security in a world with advanced threats This is a simple solution. Manage, enables compliance around controlling certain categories Materials accessed via the Internet are not intrusive.
  • 25
    NextDNS Reviews
    NextDNS protects against all types of security threats, blocks trackers and ads on websites and apps, and provides a safe and supervised Internet experience for children, on all devices and across all networks. You can define your threat model and adjust your security strategy by activating 10+ types of protections. The most trusted threat intelligence feeds contain millions of malicious domains and are all updated in real time. We analyze DNS questions and answers in real-time, allowing us to detect and block malicious behaviour. Our threat intelligence system can catch malicious domains faster than traditional security solutions, with typically only a few hours between domain registrations and the beginning of an attack. Block trackers and ads on websites and apps, even the most malicious. Block the most popular ads and trackers blocklists. Millions of domains are all kept up-to-date in real time.
  • 26
    CleanBrowsing Reviews
    Modernized DNS-based content filtering. You can easily decide what content should and shouldn't be allowed on the internet. It's powerful for our children and our business. CleanBrowsing, a DNS-based content filtering system that allows you to browse the internet safely and without any surprises, is called CleanBrowsing. It intercepts domain requests and filters sites that should not be blocked based on your filtering requirements. Our free family filter blocks porn, obscenity, and adult content while still allowing Google and other web sites to load safely. Our three predefined filters (Security and Adult) are available for global consumption. The Family filter blocks adult/obscene content and applies Safe Search filters for Google, Bing, Yandex etc. However, the security filter restricts access to malicious activity.
  • 27
    ContentProtect Reviews
    ContentProtect blocks inappropriate and time-wasting web content to increase productivity. The powerful cloud-based administration tools allow you to make changes and view reports from anywhere.
  • 28
    Skyhigh Security Secure Web Gateway (SWG) Reviews
    Skyhigh Security SSE integrates with Skyhigh Security Secure Web Gateway (SWG) to help you understand and manage your web access. This mature web security solution is designed to protect users from zero day threats and enforce data privacy everywhere. Skyhigh Security Secure Web Gateway is an intelligent, cloud-native web security system that protects your workforce against malicious websites and cloud applications. It can be used from any device, any app, and any location. Hyperscale Service Edge provides seamless connectivity and no disruption to users. It features cloud-native web security and blazing fast ultra low latency. Cloud Security Advisor provides real-time insights and cloud isolation to protect users, data, applications, and minimize web and cloud attack surface. Our robust DLP engine and integrated CASB functionality allows you to control access to all cloud services. It also protects against data loss.
  • 29
    Smoothwall Filter Reviews
    Facilitates a safer digital learning environment by providing real-time content-awareness and granular control through web filtering. Protects users by categorizing new or existing content in real time by analysing the content, context, and construction of each page. Web filtering policies can be created based on user group and content category, IP location, time, and time. Securely grant guest mobile devices internet access on your network across all platforms. Allow read-only access to social media sites and remove inappropriate content. Educational organizations face the challenge of protecting students from harmful content and allowing them to learn freely. It is crucial to avoid blocking or placing unreasonable restrictions. Analyzes the content, context, and construction of each page to categorize new and existing web content in real-time.
  • 30
    BloxOne Threat Defense Reviews
    BloxOne Threat Defense maximizes brand security by working with existing defenses to protect your network. It also automatically extends security to your digital imperatives including SD-WAN and IoT. It powers security orchestration automation and response (SOAR), which reduces time to investigate and respond to cyberthreats. It also optimizes security ecosystem performance and lowers total cost of enterprise threat defense. This solution transforms the core network services that you rely upon to run your business into your most valuable security asset. These services include DNS, DHCP, and IP address management (DDI) which play a central part in all IP-based communications. Infoblox makes them the common denominator, allowing your security stack to work together at Internet scale and in unison to detect and prevent threats earlier and to stop them from happening.
  • 31
    Barracuda Web Security Gateway Reviews
    Barracuda Web Security Gateway allows organizations to use online tools and applications without being exposed to web-borne malware, viruses, lost productivity, or misused bandwidth. It is a comprehensive solution to web security and management. It combines award-winning spyware, virus, and malware protection with a powerful policy engine and reporting engine. Advanced features allow organizations to adapt to new requirements such as remote filtering, social-network regulation, and visibility into SSL encrypted traffic. Remote user licenses can be purchased for unlimited access to the corporate network. This allows you to control content and access policies on mobile devices. Virtual appliances are also available for the Barracuda Web Security Gateway. Barracuda Content Shield is a hosted web security solution.
  • 32
    iboss Reviews
    The iboss Zero Trust Secure Access Service Edge (SASE) redefines network security architecture for modern businesses, enabling secure, direct-to-cloud connections that prioritize safety and speed. At its core, iboss Zero Trust SASE enforces strict access controls, ensuring that only authenticated and authorized users and devices can access network resources, regardless of their location. This is achieved through a comprehensive suite of security services that operate under the principle of "never trust, always verify," including advanced threat protection & malware defense, data loss prevention (DLP), CASB, RBI, ZTNA, and real-time inspection of encrypted traffic. Built in the cloud, iboss Zero Trust SASE provides unparalleled visibility across all user activities and sensitive data transactions, facilitating a secure digital transformation. This allows organizations to adopt a more flexible, perimeter-less security model that supports the dynamic work environments of today's workforce. With iboss Zero Trust SASE, businesses can confidently embrace cloud technologies and mobile working without compromising on security, ensuring a balance between productivity and protection in the ever-evolving cyber landscape.
  • 33
    Untangle NG Firewall Reviews
    It can be difficult and expensive to manage your network and ensure that every device is protected. NG Firewall simplifies network security by providing a single, modular software platform that can be customized to meet your evolving needs. Designed for companies with limited IT budgets and IT resources, NG Firewall offers a browser-based, responsive, and intuitive interface that allows you to quickly see the traffic on your network. NG Firewall provides a comprehensive enterprise-grade network security platform that can be used to protect any organization, from content filtering to advanced threat prevention, VPN connectivity, and bandwidth optimization. Dedicated hardware appliances offer extensive network control, visibility into traffic and other events, flexible connectivity options and multiple layers of advanced protection.
  • 34
    Comodo Dome Shield Reviews
    DNS-based security solution that blocks malicious domains and applies company web filtering policy. It's simple, but it's extremely effective.
  • 35
    Diladele Web Filter Reviews
    The user attempts to access a website via the Internet. The browser connects to the site directly or via explicitly set proxy settings. Remote site responses and requests are sent to Squid. They are authenticated and redirected either locally or remotely to Web Safety ICAP filter. Based on the policy settings, requests and responses are reviewed and access to information is granted or denied. The database stores information about each request and response. Web Safety is an ICAP web filter which plugs directly into Squid proxy. This allows it filter URLs and to inspect encrypted HTTPS traffic. It is easy to block encrypted explicit content. Deep content inspection of web pages is performed and all links to inappropriate content and explicit language are blocked. All inappropriate content is also blocked on general purpose web sites like Google Search, Google Images and Bing.
  • 36
    Securd DNS Firewall Reviews
    Our global, anycast DNS firewall and resolver ensures that the Internet is always available to all users worldwide. It features 10ms resolutions, real time threat protection, and a zero trust posture to reduce your attack surface. Antivirus protection cannot keep up with modern malware, ransomware and phishing attacks. To protect your assets against these threats, you need a multilayered approach. DNS filtering can reduce the risk of a successful cyberattack by blocking access to malicious domains, preventing downloads from compromised sites, and preventing malware exfiltrating your data. DNS firewalls provide historical and real-time visibility into endpoint DNS queries. This is essential to quickly find and fix infected devices. A worldwide anycast network powers Securd DNS Firewall.
  • 37
    Rawstream Reviews

    Rawstream

    Rawstream

    $2.00/month/user
    Rawstream can help you improve your business' cybersecurity. Rawstream can crush ransomware, malware and spyware. You will be able to deploy quickly and get real-time insights. Watch Rawstream in action, or contact our experts to learn more about Rawstream. Get in touch with our team to collaborate cost-effectively! Get up to 90% off Microsoft Office Licenses Rawstream's Usage Analytics allows you to drill into activity and identify Excel ninjas. With consolidated data driven decisions, you can build a productive team with Google For Work. Multiple deployment options are available for IT administrators. Filter over 80 categories and enable Google Safe Search. Easy deployment with support Windows and Linux. AD, Citrix, and Terminal Services support. Cloud DNS filtering, SSL filtering. Rawstream cybersecurity protects all devices on the network against malicious sites. We don't miss any updates.
  • 38
    Palo Alto Networks Strata Reviews
    Strata is the industry-leading network security suite. Protect users, applications, data and networks from attacks while managing network transformation. Device Insights, based on data from PAN-OS device monitoring, gives you a snapshot of your next-generation firewall deployment's health and highlights areas for improvement. Our award-winning security features the first ML-Powered NGFW in the world. We are driven by innovation and committed to protecting your business proactively. Natively integrated, best-in-class capabilities result in high-quality networking and security. Our Next-Generation Firewalls powered by ML allow you to see everything including IoT and reduce errors through automatic policy recommendations.
  • 39
    Radware DefensePro Reviews
    DefensePro VA and DefensePro VA offer advanced DDoS protection, protection, and IoT botnet attack mitigation across legacy and public clouds. Radware's attack mitigation solution, DefensePro, provides automated DDoS defense against fast-moving, high volume, encrypted, or very short duration threats. This includes IoT-based attacks such as Mirai, Pulse and Burst, DNS and TLS/SSL attacks, and those associated with Permanent Denial of Service and Ransom Denial-of-Service techniques. Are you tired of fighting long-running attack campaigns? Are you using the right DDoS defense techniques to protect your organization from today's sophisticated DDoS attacks. Organizations face reduced revenues, higher costs, and damaged reputations. Radware's hybrid attack mitigation solution integrates real-time WAF protection, SSL protection, and DDoS protection on site with a cloud service that can be activated on demand.
  • 40
    CMIT Secure DNS Filtering Reviews
    CMIT Secure DNS Filtering™ allows users to adjust web access policies based on IP addresses and restrict access to sites that pose a threat to the network. Our solution is simple and effective, and prevents everyday web usage becoming a security threat.
  • 41
    ContentKeeper Reviews
    Organizations today need a security solution that can scale for future expansion, integrate seamlessly with existing technology and centralizes policy management. It also provides control over remote locations and mobile users. ContentKeeper's Secure Internet Gateway, (SIG), helps protect against malware and ensures policy management across all devices. Our Multi-layered Web Security Platform provides full visibility into web traffic, activity, and network performance without adding complexity. Multiple layers of defense are used, including machine learning/predictive files analysis, behavioral analysis, cloud Sandboxing, and threat isolation to protect against malware and advanced persistent threats. This product is designed for high-demand networking environments. It simplifies security and policy management, and ensures safe and productive web browsing regardless of device or geographic location.
  • 42
    Netskope Reviews
    Today, there are more users and data outside of the enterprise than inside. This is causing the network perimeter we know to be dissolved. We need a new perimeter. One that is built in cloud and tracks and protects data wherever it goes. One that protects the business without slowing down or creating unnecessary friction. One that allows secure and fast access to the cloud and the web via one of the most powerful and fastest security networks in the world. This ensures that you don't have to compromise security for speed. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter. Netskope is committed to this vision. Security teams face challenges in managing risk and ensuring that the business is not affected by the organic adoption of mobile and cloud technology. Security has been able to manage risk traditionally by using heavy-handed controls. However, today's business wants speed and agility. Netskope is changing the definition of cloud, network and data security.
  • 43
    Impero Webcheck Reviews
    AI-powered internet filtering in schools The internet without the harmful stuff. Although the internet is an amazing resource, not all online content is conducive for learning. Impero's internet filtering for schools is robust and can analyze content in real time to ensure students are safe online, in the classroom, and everywhere else. Our web filter for schools uses an AI categorization service (CNS), which scans all HTTP, HTTPS, and FTP web traffic to block any content that contains pornography, drug abuse, extremism, and other sensitive material. Impero Webcheck protects school networks against encrypted traffic, including proxy avoidance and virus-based threats. It also ensures that all devices on the network are secure.
  • 44
    CacheGuard Reviews

    CacheGuard

    CacheGuard Technologies

    $9.99 per month
    2 Ratings
    CacheGuard product line is based on a core product called CacheGuard-OS. Once installed on a bare metal or virtual machine, CacheGuard-OS transforms that machine into a powerful network appliance . The resulted appliance can then be implemented as different types of Gateways to Secure & Optimize your network. See below a brief description of all CacheGuard appliances. - Web Gateway: gain control over the Web traffic in your organization & filter unwanted Web traffic in your organization. - UTM (Unified Threat Management) : secure your networks against all kind of threats coming from the internet with a Firewall, an Antivirus at the Gateway, a VPN server and a Filtering proxy. - WAF (Web Application Firewall): block malicious requests on your critical Web applications and protect your business. The WAF integrates OWASP rules with the possibility to design your own custom rules. In addition, an IP reputation based filtering allows you to block IPs listed in real time blacklists. - WAN Optimizer : prioritize your critical network traffic, save your precious bandwidth and get High Availability for your internet access through multiple ISP.
  • 45
    Secucloud Reviews
    Secucloud GmbH is active worldwide as a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform particularly for providers. The Elastic Cloud Security System 2 (ECS2) is available to a wide range market and target groups, including mobile communications & landline users, small businesses & homes, SMEs, and allows them to access enterprise-level security solutions. This platform is easy to use and doesn't require any hardware or proprietary appliances. It can support more than 100 million connected users. Secucloud is at forefront of cyber security and has built strong partnerships over the years with industry leaders, combining their expertise to its own internal innovation cycles. Secucloud is well-positioned to fight an ever-changing landscape of cyber threats.
  • 46
    Flowmon Reviews
    Real-time network anomalies can be addressed and made decisions. Flowmon's actionable information is available in cloud, hybrid, and on-premise environments. Flowmon's network Intelligence integrates SecOps and NetOps into a single solution. It is capable of automated traffic monitoring, threat detection, and provides a solid foundation for informed decision-making. Its intuitive interface makes it easy for IT professionals to quickly understand incidents and anomalies, their context, impact, magnitude and, most importantly, their root cause.
  • 47
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 48
    Cisco Secure Web Appliance Reviews
    Even legitimate websites can be infected by advanced threats. Users could click on unsafe sites and put your company at risk. Cisco Secure Web Appliance protects you organization by blocking dangerous sites and testing unknown sites before users can click on them. Cisco Secure Web Appliance protects your users with TLS 1.3 and high performance capabilities. Cisco Secure Web Appliance offers multiple ways to automatically detect web-based threats and block them. The Cisco Secure Web Appliance Premier license, powered by Talos threat research, includes in-depth URL filtering, reputation analysis, multiple antivirus engines and Layer 4 traffic monitoring. It also includes Malware Defense for Secure Web Appliance (CTA) and Cognitive Threat Analytics (CTA).
  • 49
    Canopy Reviews

    Canopy

    Canopy

    $7.99 per month
    Canopy is a digital parenting app that blocks pornography from every website. It is also the only digital parenting app that immediately alerts parents when it detects sexting so they can address it with their children. Canopy gives parents peace of mind knowing that their children are safe online. Canopy uses advanced computing technology including artificial intelligence (AI) and machine learning to instantly identify and filter out pornographic content online. Protects over 2 million devices worldwide. Protects thousands of schoolchildren online. It helps US law enforcement to prevent digital crimes against children. Filter out inappropriate content from your child's smartphone, schedule screen time breaks, and find out if your child has left school or home. This is just the beginning. Canopy provides everything families need to thrive in the digital age.
  • 50
    ThreatSTOP Reviews

    ThreatSTOP

    ThreatSTOP

    $79 per month
    The platform automates threat intelligence collection, curation, timely application for mitigation and visibility, and timely application. We bring a high-quality, affordable, and actionable threat intelligence platform to a noisy industry that is characterized by high prices. ThreatSTOP is easy to install and the security benefits are immediate. You can mix and match threat intelligence protection bundles depending on your organization's requirements or create your own policies. We are vendor-neutral and provide comprehensive protection, including IP filtering and Protective DNS. With multi-layered security, you can provision your devices and enterprises consistently.