activeDEFENCE Description

Threats to your organization's infrastructure range from malware to advanced persistent threats (APT), to extortion and internal breaches. Businesses must now consider smartphones, tablets, and consumerization. This is in addition to telecommuters, contractors and partners and business-critical services hosted on the cloud. Security is more important than ever, and far more complex. You need a multi-layered, flexible defensive strategy to protect your information and systems. This strategy must cover all components of your IT environment. It should include the network, perimeter, data, applications, endpoints, and endpoints. This will minimize and manage the vulnerabilities and weak points that could expose your organization to risk. Activereach's comprehensive portfolio of network security solutions will protect your business against advancing threats, improve network performance, and optimize operational efficiencies.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
activereach
Year Founded:
2008
Headquarters:
United Kingdom
Website:
activereach.net/solutions/network-security/

Media

activeDEFENCE Screenshot 1
Recommended Products
1Password makes it easy to store and share passwords anywhere, anytime Icon
1Password makes it easy to store and share passwords anywhere, anytime

More than a password manager.

Protect yourself, your family, or your global workforce with simple security, easy secret sharing, and actionable insight reports.
Start Today

Product Details

Platforms
SaaS
Type of Training
Documentation
Videos
Customer Support
Phone Support
24/7 Live Support
Online

activeDEFENCE Features and Options

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Email Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

DDoS Protection Service

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

activeDEFENCE User Reviews

Write a Review
  • Previous
  • Next