DragonSoft DVM Description

The DVM detection initiative encompasses the identification of security vulnerabilities, audits for vulnerabilities, and assessments of accounts and settings, while also providing functions for risk evaluation and statistical analysis. Additionally, it features a database scanner designed to facilitate database vulnerability detection and assess security risks. The D-GCB system can identify the information and communication software utilized by government entities, ensuring that endpoint devices align with TW GCB configuration standards, which helps mitigate the risk of internal cyberattacks and addresses information security issues. Furthermore, Hyper EDR is capable of recognizing over 5000 types of prevalent APT malware and hacking tools, operating in a threat-aware mode that eliminates the need for any Kernel Driver interventions, thereby utilizing minimal CPU resources. Overall, these tools collectively enhance the security posture of organizations by enabling proactive risk management and vulnerability assessment strategies.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
DragonSoft Security Associates
Year Founded:
2002
Headquarters:
United States
Website:
www.dragonsoft.com

Media

Recommended Products
Outgrown Windows Task Scheduler? Icon
Outgrown Windows Task Scheduler?

Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Download Free Tool

Product Details

Platforms
Web-Based
Customer Support
Business Hours
Online Support

DragonSoft DVM Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Software

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

DragonSoft DVM User Reviews

Write a Review
  • Previous
  • Next